mirror of
https://github.com/termux/termux-packages.git
synced 2025-11-01 17:18:53 +00:00
2486 lines
109 KiB
Diff
2486 lines
109 KiB
Diff
From 943a8c834c77219426620b196603d993d4c984c1 Mon Sep 17 00:00:00 2001
|
|
From: Chongyun Lee <licy183@termux.dev>
|
|
Date: Fri, 18 Apr 2025 23:54:01 +0800
|
|
Subject: [PATCH] reland jumbo 9
|
|
|
|
Enable jumbo build for the following component(s)/source_set(s):
|
|
|
|
- //content:browser
|
|
- //content:devtools_protocol
|
|
- //content/child:child
|
|
- //content/common:common
|
|
- //content/gpu:gpu_sources
|
|
- //content/public/browser:browser_sources
|
|
- //content/public/child:child_sources
|
|
- //content/public/common:common_sources
|
|
- //content/public/renderer:renderer_sources
|
|
- //content/renderer:renderer
|
|
- //content/services/auction_worklet:auction_worklet
|
|
- //content/utility:utility
|
|
|
|
---
|
|
content/browser/BUILD.gn | 190 +++++++++++-------
|
|
.../aggregation_service_storage_sql.cc | 4 +
|
|
.../attribution_resolver_impl.cc | 6 +-
|
|
.../attribution_storage_sql.cc | 6 +
|
|
content/browser/btm/btm_database.h | 2 +-
|
|
.../browser/btm/btm_page_visit_observer.cc | 4 +
|
|
.../browser/btm/btm_short_visit_observer.cc | 4 +
|
|
content/browser/devtools/BUILD.gn | 2 +-
|
|
.../devtools/protocol/fedcm_handler.cc | 2 +-
|
|
.../render_frame_devtools_agent_host.cc | 4 +
|
|
.../web_contents_devtools_agent_host.cc | 4 +
|
|
.../direct_sockets_service_impl.cc | 4 +
|
|
.../file_system_access_change_source.cc | 4 +
|
|
.../file_system_access_watcher_manager.cc | 4 +
|
|
content/browser/find_request_manager.cc | 2 +-
|
|
.../frame_sensor_provider_proxy.cc | 2 +-
|
|
.../gpu/gpu_data_manager_impl_private.cc | 10 +-
|
|
content/browser/guest_page_holder_impl.cc | 2 +-
|
|
content/browser/hid/hid_service.cc | 4 +
|
|
content/browser/host_zoom_map_impl.cc | 2 +-
|
|
.../in_memory_federated_permission_context.cc | 2 +-
|
|
.../bidding_and_auction_response.cc | 4 +
|
|
.../bidding_and_auction_serializer.cc | 4 +
|
|
.../interest_group_manager_impl.cc | 4 +
|
|
.../interest_group_permissions_checker.cc | 4 +
|
|
.../interest_group_update_manager.cc | 4 +
|
|
.../interest_group/trusted_signals_fetcher.cc | 4 +
|
|
content/browser/media/cdm_storage_common.cc | 4 +
|
|
content/browser/media/cdm_storage_database.cc | 4 +
|
|
.../preloading/prefetch/prefetch_service.cc | 4 +
|
|
.../prefetch_url_loader_interceptor.cc | 4 +
|
|
.../prerender_commit_deferring_condition.cc | 4 +
|
|
..._vary_search_commit_deferring_condition.cc | 4 +
|
|
.../media/media_devices_manager.cc | 6 +
|
|
.../media/media_stream_manager.cc | 6 +
|
|
...render_frame_audio_input_stream_factory.cc | 4 +
|
|
.../partitioned_popins_navigation_throttle.cc | 2 +-
|
|
.../private_network_access_util.cc | 18 +-
|
|
.../randomized_confidence_utils.cc | 2 +-
|
|
.../renderer_host/render_frame_host_impl.cc | 52 ++---
|
|
.../render_frame_host_manager.cc | 64 +++---
|
|
.../renderer_host/render_frame_proxy_host.cc | 6 +-
|
|
.../renderer_host/render_message_filter.cc | 2 +-
|
|
.../renderer_host/render_process_host_impl.cc | 28 +--
|
|
.../renderer_host/render_view_host_impl.cc | 2 +-
|
|
.../renderer_host/render_widget_host_impl.cc | 2 +-
|
|
.../render_widget_host_view_aura.cc | 2 +-
|
|
.../spare_render_process_host_manager_impl.cc | 14 +-
|
|
.../cross_origin_opener_policy_reporter.cc | 4 +
|
|
.../dip/document_isolation_policy_reporter.cc | 4 +
|
|
.../webid/federated_auth_request_impl.cc | 4 +
|
|
content/child/BUILD.gn | 5 +-
|
|
content/common/BUILD.gn | 6 +-
|
|
content/gpu/BUILD.gn | 5 +-
|
|
content/public/browser/BUILD.gn | 3 +-
|
|
content/public/child/BUILD.gn | 3 +-
|
|
content/public/common/BUILD.gn | 3 +-
|
|
content/public/renderer/BUILD.gn | 5 +-
|
|
content/renderer/BUILD.gn | 5 +-
|
|
.../service_worker_subresource_loader.cc | 4 +
|
|
.../web_service_worker_provider_impl.cc | 4 +
|
|
content/services/auction_worklet/BUILD.gn | 7 +-
|
|
content/test/BUILD.gn | 5 +-
|
|
content/utility/BUILD.gn | 3 +-
|
|
64 files changed, 397 insertions(+), 195 deletions(-)
|
|
|
|
diff --git a/content/browser/BUILD.gn b/content/browser/BUILD.gn
|
|
index 933abcca12..a32e41518a 100644
|
|
--- a/content/browser/BUILD.gn
|
|
+++ b/content/browser/BUILD.gn
|
|
@@ -6,6 +6,7 @@ import("//base/allocator/partition_allocator/partition_alloc.gni")
|
|
import("//build/buildflag_header.gni")
|
|
import("//build/config/compiler/pgo/pgo.gni")
|
|
import("//build/config/features.gni")
|
|
+import("//build/config/jumbo.gni")
|
|
import("//build/config/linux/pangocairo/pangocairo.gni")
|
|
import("//build/config/ozone.gni")
|
|
import("//build/config/ui.gni")
|
|
@@ -55,7 +56,116 @@ if (is_ios) {
|
|
import("//build/config/apple/mobile_config.gni") # For `target_platform`
|
|
}
|
|
|
|
-source_set("browser") {
|
|
+jumbo_static_library("devtools_protocol") {
|
|
+ configs += [
|
|
+ "//build/config:precompiled_headers",
|
|
+ "//content:content_implementation",
|
|
+ ]
|
|
+
|
|
+ deps = [
|
|
+ "//base",
|
|
+ "//content/browser/devtools:devtools_background_services_proto",
|
|
+ "//content/browser/devtools:protocol_sources",
|
|
+ "//content/common:buildflags",
|
|
+ "//services/viz/privileged/mojom",
|
|
+ "//third_party/blink/public/mojom:mojom_platform",
|
|
+ "//third_party/inspector_protocol:crdtp",
|
|
+ ]
|
|
+
|
|
+ sources = [
|
|
+ "$target_gen_dir/devtools/protocol/audits.cc",
|
|
+ "$target_gen_dir/devtools/protocol/audits.h",
|
|
+ "$target_gen_dir/devtools/protocol/background_service.cc",
|
|
+ "$target_gen_dir/devtools/protocol/background_service.h",
|
|
+ "$target_gen_dir/devtools/protocol/browser.cc",
|
|
+ "$target_gen_dir/devtools/protocol/browser.h",
|
|
+ "$target_gen_dir/devtools/protocol/device_access.cc",
|
|
+ "$target_gen_dir/devtools/protocol/device_access.h",
|
|
+ "$target_gen_dir/devtools/protocol/device_orientation.cc",
|
|
+ "$target_gen_dir/devtools/protocol/device_orientation.h",
|
|
+ "$target_gen_dir/devtools/protocol/dom.cc",
|
|
+ "$target_gen_dir/devtools/protocol/dom.h",
|
|
+ "$target_gen_dir/devtools/protocol/emulation.cc",
|
|
+ "$target_gen_dir/devtools/protocol/emulation.h",
|
|
+ "$target_gen_dir/devtools/protocol/fed_cm.cc",
|
|
+ "$target_gen_dir/devtools/protocol/fed_cm.h",
|
|
+ "$target_gen_dir/devtools/protocol/fetch.cc",
|
|
+ "$target_gen_dir/devtools/protocol/fetch.h",
|
|
+ "$target_gen_dir/devtools/protocol/forward.h",
|
|
+ "$target_gen_dir/devtools/protocol/input.cc",
|
|
+ "$target_gen_dir/devtools/protocol/input.h",
|
|
+ "$target_gen_dir/devtools/protocol/inspector.cc",
|
|
+ "$target_gen_dir/devtools/protocol/inspector.h",
|
|
+ "$target_gen_dir/devtools/protocol/io.cc",
|
|
+ "$target_gen_dir/devtools/protocol/io.h",
|
|
+ "$target_gen_dir/devtools/protocol/log.cc",
|
|
+ "$target_gen_dir/devtools/protocol/log.h",
|
|
+ "$target_gen_dir/devtools/protocol/memory.cc",
|
|
+ "$target_gen_dir/devtools/protocol/memory.h",
|
|
+ "$target_gen_dir/devtools/protocol/network.cc",
|
|
+ "$target_gen_dir/devtools/protocol/network.h",
|
|
+ "$target_gen_dir/devtools/protocol/overlay.cc",
|
|
+ "$target_gen_dir/devtools/protocol/overlay.h",
|
|
+ "$target_gen_dir/devtools/protocol/page.cc",
|
|
+ "$target_gen_dir/devtools/protocol/page.h",
|
|
+ "$target_gen_dir/devtools/protocol/preload.cc",
|
|
+ "$target_gen_dir/devtools/protocol/preload.h",
|
|
+ "$target_gen_dir/devtools/protocol/protocol.h",
|
|
+ "$target_gen_dir/devtools/protocol/runtime.cc",
|
|
+ "$target_gen_dir/devtools/protocol/runtime.h",
|
|
+ "$target_gen_dir/devtools/protocol/schema.cc",
|
|
+ "$target_gen_dir/devtools/protocol/schema.h",
|
|
+ "$target_gen_dir/devtools/protocol/security.cc",
|
|
+ "$target_gen_dir/devtools/protocol/security.h",
|
|
+ "$target_gen_dir/devtools/protocol/service_worker.cc",
|
|
+ "$target_gen_dir/devtools/protocol/service_worker.h",
|
|
+ "$target_gen_dir/devtools/protocol/storage.cc",
|
|
+ "$target_gen_dir/devtools/protocol/storage.h",
|
|
+ "$target_gen_dir/devtools/protocol/system_info.cc",
|
|
+ "$target_gen_dir/devtools/protocol/system_info.h",
|
|
+ "$target_gen_dir/devtools/protocol/target.cc",
|
|
+ "$target_gen_dir/devtools/protocol/target.h",
|
|
+ "$target_gen_dir/devtools/protocol/tethering.cc",
|
|
+ "$target_gen_dir/devtools/protocol/tethering.h",
|
|
+ "$target_gen_dir/devtools/protocol/tracing.cc",
|
|
+ "$target_gen_dir/devtools/protocol/tracing.h",
|
|
+ ]
|
|
+ if (!is_android) {
|
|
+ # The WebAuthn devtools protocol API is not supported in Android yet.
|
|
+ sources += [
|
|
+ "$target_gen_dir/devtools/protocol/web_authn.cc",
|
|
+ "$target_gen_dir/devtools/protocol/web_authn.h",
|
|
+ ]
|
|
+ }
|
|
+
|
|
+ if (use_viz_debugger) {
|
|
+ sources += [
|
|
+ "$target_gen_dir/devtools/protocol/visual_debugger.cc",
|
|
+ "$target_gen_dir/devtools/protocol/visual_debugger.h",
|
|
+ ]
|
|
+ }
|
|
+
|
|
+ if (enable_bluetooth_emulation) {
|
|
+ deps += [
|
|
+ "//device/bluetooth:fake_bluetooth",
|
|
+ "//device/bluetooth/public/mojom:fake_bluetooth_interfaces",
|
|
+ ]
|
|
+
|
|
+ sources += [
|
|
+ "$target_gen_dir/devtools/protocol/bluetooth_emulation.cc",
|
|
+ "$target_gen_dir/devtools/protocol/bluetooth_emulation.h",
|
|
+ ]
|
|
+ }
|
|
+
|
|
+ if (use_clang_profiling_inside_sandbox && chrome_pgo_phase == 1) {
|
|
+ sources += [
|
|
+ "$target_gen_dir/devtools/protocol/native_profiling.cc",
|
|
+ "$target_gen_dir/devtools/protocol/native_profiling.h",
|
|
+ ]
|
|
+ }
|
|
+}
|
|
+
|
|
+jumbo_source_set("browser") {
|
|
# Only the public target should depend on this. All other targets (even
|
|
# internal content ones) should depend on the public one.
|
|
visibility = [
|
|
@@ -163,8 +273,6 @@ source_set("browser") {
|
|
"//content/browser/cache_storage:cache_storage_proto",
|
|
"//content/browser/content_index:content_index_proto",
|
|
"//content/browser/cookie_store:cookie_store_proto",
|
|
- "//content/browser/devtools:devtools_background_services_proto",
|
|
- "//content/browser/devtools:protocol_sources",
|
|
"//content/browser/download:proto",
|
|
"//content/browser/file_system_access:proto",
|
|
"//content/browser/indexed_db:internals_mojo_bindings",
|
|
@@ -329,6 +437,7 @@ source_set("browser") {
|
|
"//ui/webui/resources",
|
|
"//v8",
|
|
"//v8:v8_version",
|
|
+ ":devtools_protocol",
|
|
"//electron/build/config:generate_mas_config",
|
|
]
|
|
|
|
@@ -359,62 +468,6 @@ source_set("browser") {
|
|
]
|
|
|
|
sources = [
|
|
- "$target_gen_dir/devtools/protocol/audits.cc",
|
|
- "$target_gen_dir/devtools/protocol/audits.h",
|
|
- "$target_gen_dir/devtools/protocol/background_service.cc",
|
|
- "$target_gen_dir/devtools/protocol/background_service.h",
|
|
- "$target_gen_dir/devtools/protocol/browser.cc",
|
|
- "$target_gen_dir/devtools/protocol/browser.h",
|
|
- "$target_gen_dir/devtools/protocol/device_access.cc",
|
|
- "$target_gen_dir/devtools/protocol/device_access.h",
|
|
- "$target_gen_dir/devtools/protocol/device_orientation.cc",
|
|
- "$target_gen_dir/devtools/protocol/device_orientation.h",
|
|
- "$target_gen_dir/devtools/protocol/dom.cc",
|
|
- "$target_gen_dir/devtools/protocol/dom.h",
|
|
- "$target_gen_dir/devtools/protocol/emulation.cc",
|
|
- "$target_gen_dir/devtools/protocol/emulation.h",
|
|
- "$target_gen_dir/devtools/protocol/fed_cm.cc",
|
|
- "$target_gen_dir/devtools/protocol/fed_cm.h",
|
|
- "$target_gen_dir/devtools/protocol/fetch.cc",
|
|
- "$target_gen_dir/devtools/protocol/fetch.h",
|
|
- "$target_gen_dir/devtools/protocol/forward.h",
|
|
- "$target_gen_dir/devtools/protocol/input.cc",
|
|
- "$target_gen_dir/devtools/protocol/input.h",
|
|
- "$target_gen_dir/devtools/protocol/inspector.cc",
|
|
- "$target_gen_dir/devtools/protocol/inspector.h",
|
|
- "$target_gen_dir/devtools/protocol/io.cc",
|
|
- "$target_gen_dir/devtools/protocol/io.h",
|
|
- "$target_gen_dir/devtools/protocol/log.cc",
|
|
- "$target_gen_dir/devtools/protocol/log.h",
|
|
- "$target_gen_dir/devtools/protocol/memory.cc",
|
|
- "$target_gen_dir/devtools/protocol/memory.h",
|
|
- "$target_gen_dir/devtools/protocol/network.cc",
|
|
- "$target_gen_dir/devtools/protocol/network.h",
|
|
- "$target_gen_dir/devtools/protocol/overlay.cc",
|
|
- "$target_gen_dir/devtools/protocol/overlay.h",
|
|
- "$target_gen_dir/devtools/protocol/page.cc",
|
|
- "$target_gen_dir/devtools/protocol/page.h",
|
|
- "$target_gen_dir/devtools/protocol/preload.cc",
|
|
- "$target_gen_dir/devtools/protocol/preload.h",
|
|
- "$target_gen_dir/devtools/protocol/protocol.h",
|
|
- "$target_gen_dir/devtools/protocol/runtime.cc",
|
|
- "$target_gen_dir/devtools/protocol/runtime.h",
|
|
- "$target_gen_dir/devtools/protocol/schema.cc",
|
|
- "$target_gen_dir/devtools/protocol/schema.h",
|
|
- "$target_gen_dir/devtools/protocol/security.cc",
|
|
- "$target_gen_dir/devtools/protocol/security.h",
|
|
- "$target_gen_dir/devtools/protocol/service_worker.cc",
|
|
- "$target_gen_dir/devtools/protocol/service_worker.h",
|
|
- "$target_gen_dir/devtools/protocol/storage.cc",
|
|
- "$target_gen_dir/devtools/protocol/storage.h",
|
|
- "$target_gen_dir/devtools/protocol/system_info.cc",
|
|
- "$target_gen_dir/devtools/protocol/system_info.h",
|
|
- "$target_gen_dir/devtools/protocol/target.cc",
|
|
- "$target_gen_dir/devtools/protocol/target.h",
|
|
- "$target_gen_dir/devtools/protocol/tethering.cc",
|
|
- "$target_gen_dir/devtools/protocol/tethering.h",
|
|
- "$target_gen_dir/devtools/protocol/tracing.cc",
|
|
- "$target_gen_dir/devtools/protocol/tracing.h",
|
|
"about_url_loader_factory.cc",
|
|
"about_url_loader_factory.h",
|
|
"accessibility/accessibility_tree_formatter_blink.cc",
|
|
@@ -2505,6 +2558,7 @@ source_set("browser") {
|
|
"worker_host/worker_script_loader_factory.cc",
|
|
"worker_host/worker_script_loader_factory.h",
|
|
]
|
|
+ jumbo_excluded_sources = []
|
|
|
|
if (is_android) {
|
|
sources += [
|
|
@@ -2522,8 +2576,6 @@ source_set("browser") {
|
|
]
|
|
|
|
sources += [
|
|
- "$target_gen_dir/devtools/protocol/bluetooth_emulation.cc",
|
|
- "$target_gen_dir/devtools/protocol/bluetooth_emulation.h",
|
|
"devtools/protocol/bluetooth_emulation_handler.cc",
|
|
"devtools/protocol/bluetooth_emulation_handler.h",
|
|
]
|
|
@@ -2561,8 +2613,6 @@ source_set("browser") {
|
|
|
|
if (use_viz_debugger) {
|
|
sources += [
|
|
- "$target_gen_dir/devtools/protocol/visual_debugger.cc",
|
|
- "$target_gen_dir/devtools/protocol/visual_debugger.h",
|
|
"devtools/protocol/visual_debugger_handler.cc",
|
|
"devtools/protocol/visual_debugger_handler.h",
|
|
]
|
|
@@ -2956,6 +3006,9 @@ source_set("browser") {
|
|
]
|
|
public_deps += [ "//ui/base/cursor" ]
|
|
deps += [ "//third_party/webrtc_overrides:webrtc_component" ]
|
|
+ jumbo_excluded_sources += [
|
|
+ "media/capture/desktop_capture_device.cc",
|
|
+ ]
|
|
}
|
|
if (use_aura) {
|
|
sources += [
|
|
@@ -3414,6 +3467,12 @@ source_set("browser") {
|
|
"web_contents/web_contents_view_android.h",
|
|
]
|
|
|
|
+ jumbo_excluded_sources += [
|
|
+ # Files with kJavaLangClass and similar constants:
|
|
+ # Bug https://crbug.com/787557.
|
|
+ "android/java/java_method.cc", # and in gin_java_bound_object.cc.
|
|
+ ]
|
|
+
|
|
deps += [
|
|
":fontations_name_table_ffi",
|
|
":reflection_jni_headers",
|
|
@@ -3446,9 +3505,6 @@ source_set("browser") {
|
|
} else {
|
|
# Not Android.
|
|
sources += [
|
|
- # The WebAuthn devtools protocol API is not supported in Android yet.
|
|
- "$target_gen_dir/devtools/protocol/web_authn.cc",
|
|
- "$target_gen_dir/devtools/protocol/web_authn.h",
|
|
"devtools/protocol/webauthn_handler.cc",
|
|
"devtools/protocol/webauthn_handler.h",
|
|
"media/session/audio_focus_delegate_default.cc",
|
|
@@ -3695,8 +3751,6 @@ source_set("browser") {
|
|
|
|
if (use_clang_profiling_inside_sandbox && chrome_pgo_phase == 1) {
|
|
sources += [
|
|
- "$target_gen_dir/devtools/protocol/native_profiling.cc",
|
|
- "$target_gen_dir/devtools/protocol/native_profiling.h",
|
|
"devtools/protocol/native_profiling_handler.cc",
|
|
"devtools/protocol/native_profiling_handler.h",
|
|
"profiling_utils.cc",
|
|
diff --git a/content/browser/aggregation_service/aggregation_service_storage_sql.cc b/content/browser/aggregation_service/aggregation_service_storage_sql.cc
|
|
index 42604daf23..e06280aa5d 100644
|
|
--- a/content/browser/aggregation_service/aggregation_service_storage_sql.cc
|
|
+++ b/content/browser/aggregation_service/aggregation_service_storage_sql.cc
|
|
@@ -45,6 +45,8 @@
|
|
#include "url/gurl.h"
|
|
#include "url/origin.h"
|
|
|
|
+#define kDatabasePath kDatabasePath_AggregationServiceStorageSql
|
|
+
|
|
namespace content {
|
|
|
|
// Version number of the database.
|
|
@@ -1158,3 +1160,5 @@ void AggregationServiceStorageSql::DatabaseErrorCallback(int extended_error,
|
|
}
|
|
|
|
} // namespace content
|
|
+
|
|
+#undef kDatabasePath
|
|
diff --git a/content/browser/attribution_reporting/attribution_resolver_impl.cc b/content/browser/attribution_reporting/attribution_resolver_impl.cc
|
|
index 6fad864eb7..366cd2e21f 100644
|
|
--- a/content/browser/attribution_reporting/attribution_resolver_impl.cc
|
|
+++ b/content/browser/attribution_reporting/attribution_resolver_impl.cc
|
|
@@ -63,7 +63,7 @@ using AggregatableResult = AttributionTrigger::AggregatableResult;
|
|
using EventLevelResult = AttributionTrigger::EventLevelResult;
|
|
using StoredSourceData = AttributionStorageSql::StoredSourceData;
|
|
|
|
-constexpr int64_t kUnsetRecordId = -1;
|
|
+constexpr int64_t kUnsetRecordId_AttributionResolverImpl = -1;
|
|
|
|
// These values are persisted to logs. Entries should not be renumbered and
|
|
// numeric values should never be reused.
|
|
@@ -901,7 +901,7 @@ AttributionResolverImpl::MaybeCreateEventLevelReport(
|
|
|
|
return CreateReportResult::EventLevelSuccess(
|
|
AttributionReport(
|
|
- attribution_info, AttributionReport::Id(kUnsetRecordId), report_time,
|
|
+ attribution_info, AttributionReport::Id(kUnsetRecordId_AttributionResolverImpl), report_time,
|
|
/*initial_report_time=*/report_time, delegate_->NewReportID(),
|
|
/*failed_send_attempts=*/0,
|
|
AttributionReport::EventLevelData(*trigger_data,
|
|
@@ -983,7 +983,7 @@ AttributionResolverImpl::MaybeCreateAggregatableAttributionReport(
|
|
GetAggregatableReportTime(trigger, attribution_info.time);
|
|
|
|
return CreateReportResult::AggregatableSuccess(AttributionReport(
|
|
- attribution_info, AttributionReport::Id(kUnsetRecordId), report_time,
|
|
+ attribution_info, AttributionReport::Id(kUnsetRecordId_AttributionResolverImpl), report_time,
|
|
/*initial_report_time=*/report_time, delegate_->NewReportID(),
|
|
/*failed_send_attempts=*/0,
|
|
AttributionReport::AggregatableData(
|
|
diff --git a/content/browser/attribution_reporting/attribution_storage_sql.cc b/content/browser/attribution_reporting/attribution_storage_sql.cc
|
|
index c88ed1c92c..77d25f26a1 100644
|
|
--- a/content/browser/attribution_reporting/attribution_storage_sql.cc
|
|
+++ b/content/browser/attribution_reporting/attribution_storage_sql.cc
|
|
@@ -99,6 +99,9 @@
|
|
#include "third_party/blink/public/mojom/aggregation_service/aggregatable_report.mojom.h"
|
|
#include "url/origin.h"
|
|
|
|
+#define kDatabasePath kDatabasePath_AttributionStorageSQL
|
|
+#define kUnsetRecordId kUnsetRecordId_AttributionStorageSQL
|
|
+
|
|
namespace content {
|
|
|
|
namespace {
|
|
@@ -3175,3 +3178,6 @@ int64_t AttributionStorageSql::CountUniqueReportingOriginsPerSiteForAttribution(
|
|
}
|
|
|
|
} // namespace content
|
|
+
|
|
+#undef kDatabasePath
|
|
+#undef kUnsetRecordId
|
|
diff --git a/content/browser/btm/btm_database.h b/content/browser/btm/btm_database.h
|
|
index dfad2d4940..ca7a9b8d6c 100644
|
|
--- a/content/browser/btm/btm_database.h
|
|
+++ b/content/browser/btm/btm_database.h
|
|
@@ -73,7 +73,7 @@ class CONTENT_EXPORT BtmDatabase {
|
|
// This is implicitly `inline`. Don't move its definition to the .cc file.
|
|
bool HasExpired(std::optional<base::Time> time) {
|
|
return time.has_value() &&
|
|
- (time.value() + features::kBtmInteractionTtl.Get()) < clock_->Now();
|
|
+ (time.value() + ::features::kBtmInteractionTtl.Get()) < clock_->Now();
|
|
}
|
|
|
|
std::optional<StateValue> Read(const std::string& site);
|
|
diff --git a/content/browser/btm/btm_page_visit_observer.cc b/content/browser/btm/btm_page_visit_observer.cc
|
|
index c651d2b866..69a844d1ab 100644
|
|
--- a/content/browser/btm/btm_page_visit_observer.cc
|
|
+++ b/content/browser/btm/btm_page_visit_observer.cc
|
|
@@ -53,6 +53,8 @@ BtmPageVisitObserver::~BtmPageVisitObserver() {
|
|
}
|
|
}
|
|
|
|
+#define NavigationState NavigationState_PageVisit
|
|
+
|
|
namespace {
|
|
|
|
inline bool IsWrite(BtmDataAccessType t) {
|
|
@@ -385,3 +387,5 @@ void BtmPageVisitObserver::WebAuthnAssertionRequestSucceeded(
|
|
}
|
|
|
|
} // namespace content
|
|
+
|
|
+#undef NavigationState
|
|
diff --git a/content/browser/btm/btm_short_visit_observer.cc b/content/browser/btm/btm_short_visit_observer.cc
|
|
index c01dd31b37..69b91160bd 100644
|
|
--- a/content/browser/btm/btm_short_visit_observer.cc
|
|
+++ b/content/browser/btm/btm_short_visit_observer.cc
|
|
@@ -32,6 +32,8 @@
|
|
#include "url/gurl.h"
|
|
#include "url/origin.h"
|
|
|
|
+#define NavigationState NavigationState_ShortVisit
|
|
+
|
|
namespace content {
|
|
|
|
namespace {
|
|
@@ -401,3 +403,5 @@ void BtmShortVisitObserver::NotifyStorageAccessed(
|
|
}
|
|
|
|
} // namespace content
|
|
+
|
|
+#undef NavigationState
|
|
diff --git a/content/browser/devtools/BUILD.gn b/content/browser/devtools/BUILD.gn
|
|
index 4cecc088a0..5e5894fd4d 100644
|
|
--- a/content/browser/devtools/BUILD.gn
|
|
+++ b/content/browser/devtools/BUILD.gn
|
|
@@ -83,7 +83,7 @@ action("concatenate_protocols") {
|
|
}
|
|
|
|
inspector_protocol_generate("protocol_sources") {
|
|
- visibility = [ "//content/browser" ]
|
|
+ visibility = [ "//content/browser:*" ]
|
|
deps = [ ":concatenate_protocols" ]
|
|
inspector_protocol_dir = "//third_party/inspector_protocol"
|
|
out_dir = target_gen_dir
|
|
diff --git a/content/browser/devtools/protocol/fedcm_handler.cc b/content/browser/devtools/protocol/fedcm_handler.cc
|
|
index cee5a2097d..a076779b16 100644
|
|
--- a/content/browser/devtools/protocol/fedcm_handler.cc
|
|
+++ b/content/browser/devtools/protocol/fedcm_handler.cc
|
|
@@ -345,7 +345,7 @@ FederatedAuthRequestPageData* FedCmHandler::GetPageData() {
|
|
if (!frame_host_) {
|
|
return nullptr;
|
|
}
|
|
- Page& page = frame_host_->GetPage();
|
|
+ content::Page& page = frame_host_->GetPage();
|
|
return PageUserData<FederatedAuthRequestPageData>::GetOrCreateForPage(page);
|
|
}
|
|
|
|
diff --git a/content/browser/devtools/render_frame_devtools_agent_host.cc b/content/browser/devtools/render_frame_devtools_agent_host.cc
|
|
index ce011f0b1e..be0d8548e8 100644
|
|
--- a/content/browser/devtools/render_frame_devtools_agent_host.cc
|
|
+++ b/content/browser/devtools/render_frame_devtools_agent_host.cc
|
|
@@ -89,6 +89,8 @@
|
|
#include "content/browser/devtools/protocol/visual_debugger_handler.h"
|
|
#endif
|
|
|
|
+#define g_agent_host_instances g_agent_host_instances_render_frame_devtools_agent_host
|
|
+
|
|
namespace content {
|
|
|
|
namespace {
|
|
@@ -1102,3 +1104,5 @@ bool RenderFrameDevToolsAgentHost::HasSessionsWithoutTabTargetSupport() const {
|
|
}
|
|
|
|
} // namespace content
|
|
+
|
|
+#undef g_agent_host_instances
|
|
diff --git a/content/browser/devtools/web_contents_devtools_agent_host.cc b/content/browser/devtools/web_contents_devtools_agent_host.cc
|
|
index 15e5a7cd36..c65712e78f 100644
|
|
--- a/content/browser/devtools/web_contents_devtools_agent_host.cc
|
|
+++ b/content/browser/devtools/web_contents_devtools_agent_host.cc
|
|
@@ -15,6 +15,8 @@
|
|
#include "content/browser/web_contents/web_contents_impl.h"
|
|
#include "content/public/common/content_features.h"
|
|
|
|
+#define g_agent_host_instances g_agent_host_instances_web_contents_devtools_agent_host
|
|
+
|
|
namespace content {
|
|
|
|
namespace {
|
|
@@ -415,3 +417,5 @@ WebContentsDevToolsAgentHost::RevalidateSessionAccess() {
|
|
}
|
|
|
|
} // namespace content
|
|
+
|
|
+#undef g_agent_host_instances
|
|
diff --git a/content/browser/direct_sockets/direct_sockets_service_impl.cc b/content/browser/direct_sockets/direct_sockets_service_impl.cc
|
|
index 7765e9be7e..96bb53d4ab 100644
|
|
--- a/content/browser/direct_sockets/direct_sockets_service_impl.cc
|
|
+++ b/content/browser/direct_sockets/direct_sockets_service_impl.cc
|
|
@@ -58,6 +58,8 @@
|
|
#include "services/network/public/mojom/socket_connection_tracker.mojom.h"
|
|
#endif // BUILDFLAG(IS_CHROMEOS)
|
|
|
|
+#define DocumentHelper DocumentHelper_DirectSocketsServiceImpl
|
|
+
|
|
namespace content {
|
|
|
|
namespace {
|
|
@@ -835,3 +837,5 @@ void DirectSocketsServiceImpl::CreateRestrictedUDPSocketImpl(
|
|
}
|
|
|
|
} // namespace content
|
|
+
|
|
+#undef DocumentHelper
|
|
diff --git a/content/browser/file_system_access/file_system_access_change_source.cc b/content/browser/file_system_access/file_system_access_change_source.cc
|
|
index 566dc1ea40..d15da0acca 100644
|
|
--- a/content/browser/file_system_access/file_system_access_change_source.cc
|
|
+++ b/content/browser/file_system_access/file_system_access_change_source.cc
|
|
@@ -6,6 +6,8 @@
|
|
|
|
#include "base/functional/callback.h"
|
|
|
|
+#define ToFileSystemURL ToFileSystemURL_FileSystemAccessChangeSource
|
|
+
|
|
namespace content {
|
|
|
|
namespace {
|
|
@@ -133,3 +135,5 @@ void FileSystemAccessChangeSource::NotifyOfUsageChange(size_t old_usage,
|
|
}
|
|
|
|
} // namespace content
|
|
+
|
|
+#undef ToFileSystemURL
|
|
diff --git a/content/browser/file_system_access/file_system_access_watcher_manager.cc b/content/browser/file_system_access/file_system_access_watcher_manager.cc
|
|
index a73f255744..7686578279 100644
|
|
--- a/content/browser/file_system_access/file_system_access_watcher_manager.cc
|
|
+++ b/content/browser/file_system_access/file_system_access_watcher_manager.cc
|
|
@@ -38,6 +38,8 @@
|
|
#endif // !BUILDFLAG(IS_ANDROID) && !BUILDFLAG(IS_IOS) &&
|
|
// !BUILDFLAG(IS_FUCHSIA)
|
|
|
|
+#define ToFileSystemURL ToFileSystemURL_FileSystemAccessWatcherManager
|
|
+
|
|
namespace content {
|
|
|
|
using WatchType = FileSystemAccessWatchScope::WatchType;
|
|
@@ -569,3 +571,5 @@ FileSystemAccessWatcherManager::CreateOwnedSourceForScope(
|
|
}
|
|
|
|
} // namespace content
|
|
+
|
|
+#undef ToFileSystemURL
|
|
diff --git a/content/browser/find_request_manager.cc b/content/browser/find_request_manager.cc
|
|
index affdc0cb28..b382bafcfb 100644
|
|
--- a/content/browser/find_request_manager.cc
|
|
+++ b/content/browser/find_request_manager.cc
|
|
@@ -170,7 +170,7 @@ bool IsFindInPageDisabled(RenderFrameHost* rfh) {
|
|
}
|
|
|
|
bool IsUnattachedGuestView(RenderFrameHost* rfh) {
|
|
- if (base::FeatureList::IsEnabled(features::kGuestViewMPArch)) {
|
|
+ if (base::FeatureList::IsEnabled(::features::kGuestViewMPArch)) {
|
|
NOTIMPLEMENTED();
|
|
return false;
|
|
} else {
|
|
diff --git a/content/browser/generic_sensor/frame_sensor_provider_proxy.cc b/content/browser/generic_sensor/frame_sensor_provider_proxy.cc
|
|
index 2836e5233c..e03335155b 100644
|
|
--- a/content/browser/generic_sensor/frame_sensor_provider_proxy.cc
|
|
+++ b/content/browser/generic_sensor/frame_sensor_provider_proxy.cc
|
|
@@ -120,7 +120,7 @@ void FrameSensorProviderProxy::OnPermissionRequestCompleted(
|
|
break;
|
|
default:
|
|
if (!base::FeatureList::IsEnabled(
|
|
- features::kAllowSensorsToEnterBfcache)) {
|
|
+ ::features::kAllowSensorsToEnterBfcache)) {
|
|
static_cast<RenderFrameHostImpl*>(&render_frame_host())
|
|
->OnBackForwardCacheDisablingStickyFeatureUsed(
|
|
blink::scheduler::WebSchedulerTrackedFeature::
|
|
diff --git a/content/browser/gpu/gpu_data_manager_impl_private.cc b/content/browser/gpu/gpu_data_manager_impl_private.cc
|
|
index 9e30a243a9..5c6104b914 100644
|
|
--- a/content/browser/gpu/gpu_data_manager_impl_private.cc
|
|
+++ b/content/browser/gpu/gpu_data_manager_impl_private.cc
|
|
@@ -396,7 +396,7 @@ bool SoftwareGLAllowed() {
|
|
const base::CommandLine* command_line =
|
|
base::CommandLine::ForCurrentProcess();
|
|
return !command_line->HasSwitch(switches::kDisableSoftwareRasterizer) &&
|
|
- features::IsAnySoftwareGLAllowed(command_line);
|
|
+ ::features::IsAnySoftwareGLAllowed(command_line);
|
|
}
|
|
|
|
// These values are logged to UMA. Entries should not be renumbered and numeric
|
|
@@ -526,7 +526,7 @@ void GpuDataManagerImplPrivate::InitializeGpuModes() {
|
|
BUILDFLAG(IS_CHROMEOS)
|
|
NOTREACHED() << "GPU acceleration is required on certain platforms!";
|
|
#endif
|
|
- } else if (features::IsSkiaGraphiteEnabled(command_line)) {
|
|
+ } else if (::features::IsSkiaGraphiteEnabled(command_line)) {
|
|
// If Graphite is enabled, fall back to Ganesh/GL on platforms that do not
|
|
// support software compositing or sometimes fail dawn initialization.
|
|
// TODO(b/323953910): Eliminate this fallback on each platform once Graphite
|
|
@@ -542,7 +542,7 @@ void GpuDataManagerImplPrivate::InitializeGpuModes() {
|
|
#else
|
|
fallback_modes_.push_back(gpu::GpuMode::HARDWARE_GL);
|
|
// Prefer Vulkan over GL if enabled.
|
|
- if (features::IsUsingVulkan()) {
|
|
+ if (::features::IsUsingVulkan()) {
|
|
fallback_modes_.push_back(gpu::GpuMode::HARDWARE_VULKAN);
|
|
}
|
|
#endif // BUILDFLAG(IS_FUCHSIA)
|
|
@@ -1242,7 +1242,7 @@ void GpuDataManagerImplPrivate::UpdateGpuFeatureInfo(
|
|
}
|
|
|
|
is_gpu_rasterization_for_ui_enabled_ =
|
|
- features::IsUiGpuRasterizationEnabled() &&
|
|
+ ::features::IsUiGpuRasterizationEnabled() &&
|
|
gpu_feature_info_
|
|
.status_values[gpu::GPU_FEATURE_TYPE_GPU_TILE_RASTERIZATION] ==
|
|
gpu::kGpuFeatureStatusEnabled;
|
|
@@ -1677,7 +1677,7 @@ void GpuDataManagerImplPrivate::FallBackToNextGpuModeDueToCrash() {
|
|
// If we fell back to sofware GL due to crashes and it is disabled with a
|
|
// feature. Fall back again.
|
|
if (gpu_mode_ == gpu::GpuMode::SOFTWARE_GL &&
|
|
- !features::IsSoftwareGLFallbackDueToCrashesAllowed(
|
|
+ !::features::IsSoftwareGLFallbackDueToCrashesAllowed(
|
|
base::CommandLine::ForCurrentProcess())) {
|
|
FallBackToNextGpuMode();
|
|
DCHECK_NE(gpu_mode_, gpu::GpuMode::SOFTWARE_GL);
|
|
diff --git a/content/browser/guest_page_holder_impl.cc b/content/browser/guest_page_holder_impl.cc
|
|
index 6c8c488087..fb301afbf5 100644
|
|
--- a/content/browser/guest_page_holder_impl.cc
|
|
+++ b/content/browser/guest_page_holder_impl.cc
|
|
@@ -305,7 +305,7 @@ FrameTree* GuestPageHolderImpl::CreateNewWindow(
|
|
bool GuestPageHolderImpl::OnRenderFrameProxyVisibilityChanged(
|
|
RenderFrameProxyHost* render_frame_proxy_host,
|
|
blink::mojom::FrameVisibility visibility) {
|
|
- CHECK(base::FeatureList::IsEnabled(features::kGuestViewMPArch));
|
|
+ CHECK(base::FeatureList::IsEnabled(::features::kGuestViewMPArch));
|
|
|
|
if (render_frame_proxy_host->frame_tree_node() != frame_tree_.root()) {
|
|
return false;
|
|
diff --git a/content/browser/hid/hid_service.cc b/content/browser/hid/hid_service.cc
|
|
index 5c153a6996..9091357b31 100644
|
|
--- a/content/browser/hid/hid_service.cc
|
|
+++ b/content/browser/hid/hid_service.cc
|
|
@@ -26,6 +26,8 @@
|
|
#include "services/device/public/cpp/device_features.h"
|
|
#include "services/network/public/mojom/permissions_policy/permissions_policy_feature.mojom.h"
|
|
|
|
+#define DocumentHelper DocumentHelper_HidService
|
|
+
|
|
namespace content {
|
|
|
|
// Deletes the HidService when the connected document is destroyed.
|
|
@@ -595,3 +597,5 @@ BrowserContext* HidService::GetBrowserContext() {
|
|
}
|
|
|
|
} // namespace content
|
|
+
|
|
+#undef DocumentHelper
|
|
diff --git a/content/browser/host_zoom_map_impl.cc b/content/browser/host_zoom_map_impl.cc
|
|
index 5b75a5577d..bc3034362a 100644
|
|
--- a/content/browser/host_zoom_map_impl.cc
|
|
+++ b/content/browser/host_zoom_map_impl.cc
|
|
@@ -75,7 +75,7 @@ bool IsIndependentSubframeZoomEnabled() {
|
|
// only return true here if some feature that requires subframe zoom is also
|
|
// enabled.
|
|
return base::FeatureList::IsEnabled(kSubframeZoom) &&
|
|
- (base::FeatureList::IsEnabled(features::kGuestViewMPArch) ||
|
|
+ (base::FeatureList::IsEnabled(::features::kGuestViewMPArch) ||
|
|
GetContentClient()->browser()->ShouldEnableSubframeZoom());
|
|
}
|
|
|
|
diff --git a/content/browser/in_memory_federated_permission_context.cc b/content/browser/in_memory_federated_permission_context.cc
|
|
index fede9ac819..24fe22a7b7 100644
|
|
--- a/content/browser/in_memory_federated_permission_context.cc
|
|
+++ b/content/browser/in_memory_federated_permission_context.cc
|
|
@@ -28,7 +28,7 @@ InMemoryFederatedPermissionContext::~InMemoryFederatedPermissionContext() =
|
|
content::FederatedIdentityApiPermissionContextDelegate::PermissionStatus
|
|
InMemoryFederatedPermissionContext::GetApiPermissionStatus(
|
|
const url::Origin& relying_party_embedder) {
|
|
- if (!base::FeatureList::IsEnabled(features::kFedCm)) {
|
|
+ if (!base::FeatureList::IsEnabled(::features::kFedCm)) {
|
|
return PermissionStatus::BLOCKED_VARIATIONS;
|
|
}
|
|
|
|
diff --git a/content/browser/interest_group/bidding_and_auction_response.cc b/content/browser/interest_group/bidding_and_auction_response.cc
|
|
index 771736dea6..dbcbb60703 100644
|
|
--- a/content/browser/interest_group/bidding_and_auction_response.cc
|
|
+++ b/content/browser/interest_group/bidding_and_auction_response.cc
|
|
@@ -24,6 +24,8 @@
|
|
#include "third_party/blink/public/mojom/private_aggregation/private_aggregation_host.mojom.h"
|
|
#include "url/origin.h"
|
|
|
|
+#define kFramingHeaderSize kFramingHeaderSize_BiddingAndAuctionResponse
|
|
+
|
|
namespace content {
|
|
|
|
namespace {
|
|
@@ -971,3 +973,5 @@ BiddingAndAuctionResponse::ReportingURLs::TryParse(
|
|
}
|
|
|
|
} // namespace content
|
|
+
|
|
+#undef kFramingHeaderSize
|
|
diff --git a/content/browser/interest_group/bidding_and_auction_serializer.cc b/content/browser/interest_group/bidding_and_auction_serializer.cc
|
|
index f66cd503b4..5f02772233 100644
|
|
--- a/content/browser/interest_group/bidding_and_auction_serializer.cc
|
|
+++ b/content/browser/interest_group/bidding_and_auction_serializer.cc
|
|
@@ -41,6 +41,8 @@
|
|
#include "third_party/blink/public/mojom/interest_group/interest_group_types.mojom.h"
|
|
#include "third_party/zlib/google/compression_utils.h"
|
|
|
|
+#define kFramingHeaderSize kFramingHeaderSize_BiddingAndAuctionSerializer
|
|
+
|
|
namespace content {
|
|
|
|
namespace {
|
|
@@ -1218,3 +1220,5 @@ BiddingAndAuctionSerializer::BuildRequestFromMessage(const url::Origin& seller,
|
|
}
|
|
|
|
} // namespace content
|
|
+
|
|
+#undef kFramingHeaderSize
|
|
diff --git a/content/browser/interest_group/interest_group_manager_impl.cc b/content/browser/interest_group/interest_group_manager_impl.cc
|
|
index 12f64c3b28..c1c169c608 100644
|
|
--- a/content/browser/interest_group/interest_group_manager_impl.cc
|
|
+++ b/content/browser/interest_group/interest_group_manager_impl.cc
|
|
@@ -57,6 +57,8 @@
|
|
#include "url/gurl.h"
|
|
#include "url/origin.h"
|
|
|
|
+#define kTrafficAnnotation kTrafficAnnotation_InterestGroupManagerImpl
|
|
+
|
|
namespace content {
|
|
|
|
class BrowserContext;
|
|
@@ -1294,3 +1296,5 @@ InterestGroupManagerImpl::CreateNotifyInterestGroupAccessedCallback(
|
|
}
|
|
|
|
} // namespace content
|
|
+
|
|
+#undef kTrafficAnnotation
|
|
diff --git a/content/browser/interest_group/interest_group_permissions_checker.cc b/content/browser/interest_group/interest_group_permissions_checker.cc
|
|
index 7f240a09f9..83f5e81889 100644
|
|
--- a/content/browser/interest_group/interest_group_permissions_checker.cc
|
|
+++ b/content/browser/interest_group/interest_group_permissions_checker.cc
|
|
@@ -24,6 +24,8 @@
|
|
#include "url/origin.h"
|
|
#include "url/url_constants.h"
|
|
|
|
+#define kTrafficAnnotation kTrafficAnnotation_InterestGroupPermissionsChecker
|
|
+
|
|
namespace content {
|
|
|
|
namespace {
|
|
@@ -230,3 +232,5 @@ bool InterestGroupPermissionsChecker::AllowsOperation(Permissions permissions,
|
|
}
|
|
|
|
} // namespace content
|
|
+
|
|
+#undef kTrafficAnnotation
|
|
diff --git a/content/browser/interest_group/interest_group_update_manager.cc b/content/browser/interest_group/interest_group_update_manager.cc
|
|
index aa93392ed0..eed456c493 100644
|
|
--- a/content/browser/interest_group/interest_group_update_manager.cc
|
|
+++ b/content/browser/interest_group/interest_group_update_manager.cc
|
|
@@ -53,6 +53,8 @@
|
|
#include "url/origin.h"
|
|
#include "url/url_constants.h"
|
|
|
|
+#define kTrafficAnnotation kTrafficAnnotation_InterestGroupUpdateManager
|
|
+
|
|
namespace content {
|
|
|
|
namespace {
|
|
@@ -1355,3 +1357,5 @@ void InterestGroupUpdateManager::ReportUpdateFailed(
|
|
}
|
|
|
|
} // namespace content
|
|
+
|
|
+#undef kTrafficAnnotation
|
|
diff --git a/content/browser/interest_group/trusted_signals_fetcher.cc b/content/browser/interest_group/trusted_signals_fetcher.cc
|
|
index 4639e9ce9c..c75d1f9801 100644
|
|
--- a/content/browser/interest_group/trusted_signals_fetcher.cc
|
|
+++ b/content/browser/interest_group/trusted_signals_fetcher.cc
|
|
@@ -59,6 +59,8 @@
|
|
#include "url/gurl.h"
|
|
#include "url/origin.h"
|
|
|
|
+#define kOhttpHeaderSize kOhttpHeaderSize_TrustedSignalsFetcher
|
|
+
|
|
namespace content {
|
|
|
|
namespace {
|
|
@@ -722,3 +724,5 @@ std::string TrustedSignalsFetcher::CreateError(
|
|
}
|
|
|
|
} // namespace content
|
|
+
|
|
+#undef kOhttpHeaderSize
|
|
diff --git a/content/browser/media/cdm_storage_common.cc b/content/browser/media/cdm_storage_common.cc
|
|
index 342a066ec5..67937452f5 100644
|
|
--- a/content/browser/media/cdm_storage_common.cc
|
|
+++ b/content/browser/media/cdm_storage_common.cc
|
|
@@ -6,6 +6,8 @@
|
|
|
|
#include "content/public/common/content_features.h"
|
|
|
|
+#define kUmaPrefix kUmaPrefix_CdmStorageCommon
|
|
+
|
|
namespace content {
|
|
|
|
namespace {
|
|
@@ -36,3 +38,5 @@ std::string GetCdmStorageManagerHistogramName(const std::string& operation,
|
|
}
|
|
|
|
} // namespace content
|
|
+
|
|
+#undef kUmaPrefix
|
|
diff --git a/content/browser/media/cdm_storage_database.cc b/content/browser/media/cdm_storage_database.cc
|
|
index d3fac47497..24ac12eb77 100644
|
|
--- a/content/browser/media/cdm_storage_database.cc
|
|
+++ b/content/browser/media/cdm_storage_database.cc
|
|
@@ -13,6 +13,8 @@
|
|
#include "base/strings/string_number_conversions.h"
|
|
#include "sql/statement.h"
|
|
|
|
+#define kUmaPrefix kUmaPrefix_CdmStorageDatabase
|
|
+
|
|
namespace content {
|
|
|
|
namespace {
|
|
@@ -689,3 +691,5 @@ void CdmStorageDatabase::OnDatabaseError(int error, sql::Statement* stmt) {
|
|
}
|
|
|
|
} // namespace content
|
|
+
|
|
+#undef kUmaPrefix
|
|
diff --git a/content/browser/preloading/prefetch/prefetch_service.cc b/content/browser/preloading/prefetch/prefetch_service.cc
|
|
index 094f65438e..3e8057ba79 100644
|
|
--- a/content/browser/preloading/prefetch/prefetch_service.cc
|
|
+++ b/content/browser/preloading/prefetch/prefetch_service.cc
|
|
@@ -78,6 +78,8 @@
|
|
#include "url/origin.h"
|
|
#include "url/url_constants.h"
|
|
|
|
+#define BrowserContextFromFrameTreeNodeId BrowserContextFromFrameTreeNodeId_PrefetchService
|
|
+
|
|
namespace content {
|
|
|
|
namespace {
|
|
@@ -2129,3 +2131,5 @@ void PrefetchService::EvictPrefetchesForBrowsingDataRemoval(
|
|
}
|
|
|
|
} // namespace content
|
|
+
|
|
+#undef BrowserContextFromFrameTreeNodeId
|
|
diff --git a/content/browser/preloading/prefetch/prefetch_url_loader_interceptor.cc b/content/browser/preloading/prefetch/prefetch_url_loader_interceptor.cc
|
|
index 7b5682d768..67cb8fdebe 100644
|
|
--- a/content/browser/preloading/prefetch/prefetch_url_loader_interceptor.cc
|
|
+++ b/content/browser/preloading/prefetch/prefetch_url_loader_interceptor.cc
|
|
@@ -28,6 +28,8 @@
|
|
#include "services/network/public/cpp/resource_request.h"
|
|
#include "services/network/public/cpp/single_request_url_loader_factory.h"
|
|
|
|
+#define BrowserContextFromFrameTreeNodeId BrowserContextFromFrameTreeNodeId_PrefetchURLLoaderInterceptor
|
|
+
|
|
namespace content {
|
|
namespace {
|
|
|
|
@@ -304,3 +306,5 @@ void PrefetchURLLoaderInterceptor::OnGetPrefetchComplete(
|
|
}
|
|
|
|
} // namespace content
|
|
+
|
|
+#undef BrowserContextFromFrameTreeNodeId
|
|
diff --git a/content/browser/preloading/prerender/prerender_commit_deferring_condition.cc b/content/browser/preloading/prerender/prerender_commit_deferring_condition.cc
|
|
index 279d46371c..31076b1ef4 100644
|
|
--- a/content/browser/preloading/prerender/prerender_commit_deferring_condition.cc
|
|
+++ b/content/browser/preloading/prerender/prerender_commit_deferring_condition.cc
|
|
@@ -13,6 +13,8 @@
|
|
#include "content/browser/renderer_host/navigation_request.h"
|
|
#include "content/public/browser/render_frame_host.h"
|
|
|
|
+#define GetRootPrerenderFrameTreeNode GetRootPrerenderFrameTreeNode_PrerenderCommitDeferringCondition
|
|
+
|
|
namespace content {
|
|
|
|
namespace {
|
|
@@ -140,3 +142,5 @@ void PrerenderCommitDeferringCondition::DidFinishNavigation(
|
|
}
|
|
|
|
} // namespace content
|
|
+
|
|
+#undef GetRootPrerenderFrameTreeNode
|
|
diff --git a/content/browser/preloading/prerender/prerender_no_vary_search_commit_deferring_condition.cc b/content/browser/preloading/prerender/prerender_no_vary_search_commit_deferring_condition.cc
|
|
index 2eef5a66d3..3e9fe2e2c9 100644
|
|
--- a/content/browser/preloading/prerender/prerender_no_vary_search_commit_deferring_condition.cc
|
|
+++ b/content/browser/preloading/prerender/prerender_no_vary_search_commit_deferring_condition.cc
|
|
@@ -14,6 +14,8 @@
|
|
#include "content/browser/renderer_host/navigation_request.h"
|
|
#include "content/public/browser/render_frame_host.h"
|
|
|
|
+#define GetRootPrerenderFrameTreeNode GetRootPrerenderFrameTreeNode_PrerenderNoVarySearchCommitDeferringCondition
|
|
+
|
|
namespace content {
|
|
|
|
namespace {
|
|
@@ -134,3 +136,5 @@ const char* PrerenderNoVarySearchCommitDeferringCondition::TraceEventName()
|
|
}
|
|
|
|
} // namespace content
|
|
+
|
|
+#undef GetRootPrerenderFrameTreeNode
|
|
diff --git a/content/browser/renderer_host/media/media_devices_manager.cc b/content/browser/renderer_host/media/media_devices_manager.cc
|
|
index 20ca4a9894..29eba26c2a 100644
|
|
--- a/content/browser/renderer_host/media/media_devices_manager.cc
|
|
+++ b/content/browser/renderer_host/media/media_devices_manager.cc
|
|
@@ -56,6 +56,9 @@
|
|
#include "media/device_monitors/device_monitor_mac.h"
|
|
#endif
|
|
|
|
+#define DeviceTypeToString DeviceTypeToString_MediaDevicesManager
|
|
+#define SendLogMessage SendLogMessage_MediaDevicesManager
|
|
+
|
|
namespace content {
|
|
|
|
// Release video source provider in VideoCaptureDevicesChangedObserver
|
|
@@ -1730,3 +1733,6 @@ MediaDevicesManager::EnumerationState& MediaDevicesManager::EnumerationState::
|
|
operator=(EnumerationState&& other) = default;
|
|
|
|
} // namespace content
|
|
+
|
|
+#undef DeviceTypeToString
|
|
+#undef SendLogMessage
|
|
diff --git a/content/browser/renderer_host/media/media_stream_manager.cc b/content/browser/renderer_host/media/media_stream_manager.cc
|
|
index 61454ad42f..dd14960568 100644
|
|
--- a/content/browser/renderer_host/media/media_stream_manager.cc
|
|
+++ b/content/browser/renderer_host/media/media_stream_manager.cc
|
|
@@ -106,6 +106,9 @@
|
|
|
|
using ::blink::mojom::MediaDeviceType;
|
|
|
|
+#define DeviceTypeToString DeviceTypeToString_MediaStreamManager
|
|
+#define SendLogMessage SendLogMessage_MediaStreamManager
|
|
+
|
|
namespace content {
|
|
|
|
constinit thread_local MediaStreamManager* media_stream_manager = nullptr;
|
|
@@ -4659,3 +4662,6 @@ void MediaStreamManager::OnVideoCaptureHostConnectionError() {
|
|
#endif
|
|
|
|
} // namespace content
|
|
+
|
|
+#undef DeviceTypeToString
|
|
+#undef SendLogMessage
|
|
diff --git a/content/browser/renderer_host/media/render_frame_audio_input_stream_factory.cc b/content/browser/renderer_host/media/render_frame_audio_input_stream_factory.cc
|
|
index 9d68d830df..5fcd6376b2 100644
|
|
--- a/content/browser/renderer_host/media/render_frame_audio_input_stream_factory.cc
|
|
+++ b/content/browser/renderer_host/media/render_frame_audio_input_stream_factory.cc
|
|
@@ -42,6 +42,8 @@
|
|
|
|
using blink::mojom::MediaDeviceType;
|
|
|
|
+#define GotSaltAndOrigin GotSaltAndOrigin_RenderFrameAudioInputStreamFactory
|
|
+
|
|
namespace content {
|
|
|
|
namespace {
|
|
@@ -378,3 +380,5 @@ void RenderFrameAudioInputStreamFactory::Core::
|
|
}
|
|
|
|
} // namespace content
|
|
+
|
|
+#undef GotSaltAndOrigin
|
|
diff --git a/content/browser/renderer_host/partitioned_popins/partitioned_popins_navigation_throttle.cc b/content/browser/renderer_host/partitioned_popins/partitioned_popins_navigation_throttle.cc
|
|
index 5c35b86bdd..22a42d3716 100644
|
|
--- a/content/browser/renderer_host/partitioned_popins/partitioned_popins_navigation_throttle.cc
|
|
+++ b/content/browser/renderer_host/partitioned_popins/partitioned_popins_navigation_throttle.cc
|
|
@@ -85,7 +85,7 @@ PartitionedPopinsNavigationThrottle::PartitionedPopinsNavigationThrottle(
|
|
|
|
bool PartitionedPopinsNavigationThrottle::DoesPopinPolicyBlockResponse() {
|
|
if (base::FeatureList::IsEnabled(
|
|
- features::kPartitionedPopinsHeaderPolicyBypass)) {
|
|
+ ::features::kPartitionedPopinsHeaderPolicyBypass)) {
|
|
return false;
|
|
}
|
|
const net::HttpResponseHeaders* response_headers =
|
|
diff --git a/content/browser/renderer_host/private_network_access_util.cc b/content/browser/renderer_host/private_network_access_util.cc
|
|
index 870e65eaf0..1c33481d7e 100644
|
|
--- a/content/browser/renderer_host/private_network_access_util.cc
|
|
+++ b/content/browser/renderer_host/private_network_access_util.cc
|
|
@@ -39,24 +39,24 @@ FeatureState FeatureStateForContext(RequestContext request_context) {
|
|
return FeatureState::kEnabled;
|
|
case RequestContext::kWorker:
|
|
if (!base::FeatureList::IsEnabled(
|
|
- features::kPrivateNetworkAccessForWorkers)) {
|
|
+ ::features::kPrivateNetworkAccessForWorkers)) {
|
|
return FeatureState::kDisabled;
|
|
}
|
|
|
|
if (base::FeatureList::IsEnabled(
|
|
- features::kPrivateNetworkAccessForWorkersWarningOnly)) {
|
|
+ ::features::kPrivateNetworkAccessForWorkersWarningOnly)) {
|
|
return FeatureState::kWarningOnly;
|
|
}
|
|
|
|
return FeatureState::kEnabled;
|
|
case RequestContext::kNavigation:
|
|
if (!base::FeatureList::IsEnabled(
|
|
- features::kPrivateNetworkAccessForNavigations)) {
|
|
+ ::features::kPrivateNetworkAccessForNavigations)) {
|
|
return FeatureState::kDisabled;
|
|
}
|
|
|
|
if (base::FeatureList::IsEnabled(
|
|
- features::kPrivateNetworkAccessForNavigationsWarningOnly)) {
|
|
+ ::features::kPrivateNetworkAccessForNavigationsWarningOnly)) {
|
|
return FeatureState::kWarningOnly;
|
|
}
|
|
|
|
@@ -88,7 +88,7 @@ Policy DerivePolicyForNonSecureContext(
|
|
// because it is unclear why they happen in the first place. The goal is
|
|
// to reduce instances of this happening before enabling this feature.
|
|
return base::FeatureList::IsEnabled(
|
|
- features::kBlockInsecurePrivateNetworkRequestsFromUnknown)
|
|
+ ::features::kBlockInsecurePrivateNetworkRequestsFromUnknown)
|
|
? Policy::kBlock
|
|
: Policy::kAllow;
|
|
case AddressSpace::kPrivate:
|
|
@@ -97,7 +97,7 @@ Policy DerivePolicyForNonSecureContext(
|
|
// This is controlled separately because private network websites face
|
|
// additional hurdles compared to public websites. See crbug.com/1234044.
|
|
return base::FeatureList::IsEnabled(
|
|
- features::kBlockInsecurePrivateNetworkRequestsFromPrivate)
|
|
+ ::features::kBlockInsecurePrivateNetworkRequestsFromPrivate)
|
|
? Policy::kBlock
|
|
: Policy::kWarn;
|
|
case AddressSpace::kPublic:
|
|
@@ -110,7 +110,7 @@ Policy DerivePolicyForNonSecureContext(
|
|
// are never considered private network requests - they cannot target
|
|
// more-private address spaces.
|
|
return base::FeatureList::IsEnabled(
|
|
- features::kBlockInsecurePrivateNetworkRequests)
|
|
+ ::features::kBlockInsecurePrivateNetworkRequests)
|
|
? Policy::kBlock
|
|
: Policy::kWarn;
|
|
}
|
|
@@ -133,12 +133,12 @@ Policy DerivePolicyForSecureContext(AddressSpace ip_address_space,
|
|
}
|
|
|
|
if (base::FeatureList::IsEnabled(
|
|
- features::kPrivateNetworkAccessRespectPreflightResults)) {
|
|
+ ::features::kPrivateNetworkAccessRespectPreflightResults)) {
|
|
return Policy::kPreflightBlock;
|
|
}
|
|
|
|
if (base::FeatureList::IsEnabled(
|
|
- features::kPrivateNetworkAccessSendPreflights)) {
|
|
+ ::features::kPrivateNetworkAccessSendPreflights)) {
|
|
return Policy::kPreflightWarn;
|
|
}
|
|
|
|
diff --git a/content/browser/renderer_host/randomized_confidence_utils.cc b/content/browser/renderer_host/randomized_confidence_utils.cc
|
|
index 4297ff2a1a..a0a2f4bc1c 100644
|
|
--- a/content/browser/renderer_host/randomized_confidence_utils.cc
|
|
+++ b/content/browser/renderer_host/randomized_confidence_utils.cc
|
|
@@ -17,7 +17,7 @@ double GetConfidenceRandomizedTriggerRate() {
|
|
int32_t state_count = 1 + (int32_t)blink::mojom::ConfidenceLevel::kMaxValue;
|
|
double navigation_confidence_epsilon = std::max(
|
|
0.0, std::min(g_max_navigation_confidence_epsilon,
|
|
- features::kNavigationConfidenceEpsilonValue.Get()));
|
|
+ ::features::kNavigationConfidenceEpsilonValue.Get()));
|
|
double randomized_response_rate =
|
|
state_count /
|
|
((state_count - 1) + std::exp(navigation_confidence_epsilon));
|
|
diff --git a/content/browser/renderer_host/render_frame_host_impl.cc b/content/browser/renderer_host/render_frame_host_impl.cc
|
|
index 23cd457563..be5ab78534 100644
|
|
--- a/content/browser/renderer_host/render_frame_host_impl.cc
|
|
+++ b/content/browser/renderer_host/render_frame_host_impl.cc
|
|
@@ -460,9 +460,9 @@ using RoutingIDIsolatableSandboxedIframesSet =
|
|
base::LazyInstance<RoutingIDIsolatableSandboxedIframesSet>::DestructorAtExit
|
|
g_routing_id_isolatable_sandboxed_iframes_set = LAZY_INSTANCE_INITIALIZER;
|
|
|
|
-using TokenFrameMap =
|
|
+using TokenFrameMap_RenderFrameHostImpl =
|
|
absl::flat_hash_map<blink::LocalFrameToken, RenderFrameHostImpl*>;
|
|
-base::LazyInstance<TokenFrameMap>::Leaky g_token_frame_map =
|
|
+base::LazyInstance<TokenFrameMap_RenderFrameHostImpl>::Leaky g_token_frame_map =
|
|
LAZY_INSTANCE_INITIALIZER;
|
|
|
|
BackForwardCacheMetrics::NotRestoredReason
|
|
@@ -891,7 +891,7 @@ GURL GetLastDocumentURL(
|
|
// Return true when `mode` is enabled for kAvoidUnnecessaryBeforeUnloadCheckSync
|
|
// feature (see: https://crbug.com/396998476).
|
|
bool IsAvoidUnnecessaryBeforeUnloadCheckSyncEnabledFor(
|
|
- features::AvoidUnnecessaryBeforeUnloadCheckSyncMode mode) {
|
|
+ ::features::AvoidUnnecessaryBeforeUnloadCheckSyncMode mode) {
|
|
if (!GetContentClient()
|
|
->browser()
|
|
->SupportsAvoidUnnecessaryBeforeUnloadCheckSync()) {
|
|
@@ -899,11 +899,11 @@ bool IsAvoidUnnecessaryBeforeUnloadCheckSyncEnabledFor(
|
|
}
|
|
|
|
if (!base::FeatureList::IsEnabled(
|
|
- features::kAvoidUnnecessaryBeforeUnloadCheckSync)) {
|
|
+ ::features::kAvoidUnnecessaryBeforeUnloadCheckSync)) {
|
|
return false;
|
|
}
|
|
|
|
- return features::kAvoidUnnecessaryBeforeUnloadCheckSyncMode.Get() == mode;
|
|
+ return ::features::kAvoidUnnecessaryBeforeUnloadCheckSyncMode.Get() == mode;
|
|
}
|
|
|
|
// Returns true if `host` has the Window Management permission granted.
|
|
@@ -3795,7 +3795,7 @@ RenderFrameHostImpl::AccessibilityGetAcceleratedWidget() {
|
|
|
|
gfx::NativeViewAccessible
|
|
RenderFrameHostImpl::AccessibilityGetNativeViewAccessible() {
|
|
- if (base::FeatureList::IsEnabled(features::kEvictOnAXEvents) &&
|
|
+ if (base::FeatureList::IsEnabled(::features::kEvictOnAXEvents) &&
|
|
IsInactiveAndDisallowActivation(
|
|
DisallowActivationReasonId::kAXGetNativeView)) {
|
|
// |AccessibilityGetNativeViewAccessible()| should be only accessible when
|
|
@@ -4247,7 +4247,7 @@ bool RenderFrameHostImpl::CreateRenderFrame(
|
|
(navigation_request->commit_params()
|
|
.is_cross_site_cross_browsing_context_group &&
|
|
base::FeatureList::IsEnabled(
|
|
- features::kClearCrossSiteCrossBrowsingContextGroupWindowName) &&
|
|
+ ::features::kClearCrossSiteCrossBrowsingContextGroupWindowName) &&
|
|
GetContentClient()
|
|
->browser()
|
|
->IsClearWindowNameForNewBrowsingContextGroupAllowed(context)));
|
|
@@ -5758,7 +5758,7 @@ bool RenderFrameHostImpl::VerifyFencedFrameFocusChange(
|
|
// TODO(crbug.com/40274134): We will later badmessage the renderer, but, for
|
|
// now, we will dump without crashing to monitor if any legitimate cases are
|
|
// reaching this point.
|
|
- if (base::FeatureList::IsEnabled(features::kFencedFramesEnforceFocus)) {
|
|
+ if (base::FeatureList::IsEnabled(::features::kFencedFramesEnforceFocus)) {
|
|
bad_message::ReceivedBadMessage(
|
|
GetProcess(), bad_message::RFH_FOCUS_ACROSS_FENCED_BOUNDARY);
|
|
} else {
|
|
@@ -6471,7 +6471,7 @@ void RenderFrameHostImpl::SwapOuterDelegateFrame(
|
|
// `devtools_frame_token`) to indicate to DevTools clients that the guest has
|
|
// been attached to this placeholder iframe.
|
|
const bool should_swap_devtools_frame_token =
|
|
- base::FeatureList::IsEnabled(features::kGuestViewMPArch);
|
|
+ base::FeatureList::IsEnabled(::features::kGuestViewMPArch);
|
|
GetMojomFrameInRenderer()->Unload(
|
|
/*is_loading=*/false,
|
|
browsing_context_state_->current_replication_state().Clone(),
|
|
@@ -8550,14 +8550,14 @@ bool RenderFrameHostImpl::IsInactiveAndDisallowActivation(uint64_t reason) {
|
|
// back/forward cache, because |HandleAXevents()| will continue to process
|
|
// accessibility events without evicting unless the kEvictOnAXEvents flag
|
|
// is on.
|
|
- if (!base::FeatureList::IsEnabled(features::kEvictOnAXEvents))
|
|
+ if (!base::FeatureList::IsEnabled(::features::kEvictOnAXEvents))
|
|
CHECK_NE(reason, kAXEvent);
|
|
// This function should not be called with kAXLocationChange when the
|
|
// page is in back/forward cache, because `HandleAXLocationChange()` will
|
|
// continue to process accessibility location changes unless
|
|
// kDoNotEvictOnAXLocationChange is off.
|
|
if (base::FeatureList::IsEnabled(
|
|
- features::kDoNotEvictOnAXLocationChange)) {
|
|
+ ::features::kDoNotEvictOnAXLocationChange)) {
|
|
CHECK_NE(reason, kAXLocationChange);
|
|
}
|
|
BackForwardCacheCanStoreDocumentResult can_store_flat;
|
|
@@ -8595,7 +8595,7 @@ bool RenderFrameHostImpl::IsInactiveAndDisallowActivation(uint64_t reason) {
|
|
|
|
bool RenderFrameHostImpl::IsInactiveAndDisallowActivationForAXEvents(
|
|
const std::vector<ui::AXEvent>& events) {
|
|
- DCHECK(base::FeatureList::IsEnabled(features::kEvictOnAXEvents));
|
|
+ DCHECK(base::FeatureList::IsEnabled(::features::kEvictOnAXEvents));
|
|
if (lifecycle_state_ != LifecycleStateImpl::kInBackForwardCache) {
|
|
return IsInactiveAndDisallowActivation(
|
|
DisallowActivationReasonId::kAXEvent);
|
|
@@ -8996,7 +8996,7 @@ void RenderFrameHostImpl::MaybeIsolateForUserActivation() {
|
|
// the isolation eligibility checks, such as having the corresponding
|
|
// feature enabled or satisfying memory requirements.
|
|
DCHECK(base::FeatureList::IsEnabled(
|
|
- features::kSiteIsolationForCrossOriginOpenerPolicy));
|
|
+ ::features::kSiteIsolationForCrossOriginOpenerPolicy));
|
|
|
|
bool is_same_origin_activation =
|
|
GetParent() ? GetMainFrame()->GetLastCommittedOrigin().IsSameOriginWith(
|
|
@@ -11213,7 +11213,7 @@ void RenderFrameHostImpl::HandleAXEvents(
|
|
// TODO(accessibility): we should probably consolidate these two params.
|
|
updates_and_events.ax_tree_id = tree_id;
|
|
|
|
- if (base::FeatureList::IsEnabled(features::kEvictOnAXEvents)) {
|
|
+ if (base::FeatureList::IsEnabled(::features::kEvictOnAXEvents)) {
|
|
// If the flag is on, evict the bfcache entry now that AX events are
|
|
// received.
|
|
if (IsInactiveAndDisallowActivationForAXEvents(updates_and_events.events)) {
|
|
@@ -11317,7 +11317,7 @@ void RenderFrameHostImpl::HandleAXLocationChanges(
|
|
return;
|
|
}
|
|
|
|
- if (!base::FeatureList::IsEnabled(features::kDoNotEvictOnAXLocationChange)) {
|
|
+ if (!base::FeatureList::IsEnabled(::features::kDoNotEvictOnAXLocationChange)) {
|
|
// If the flag is off, we should evict the back/forward cache entry.
|
|
if (IsInactiveAndDisallowActivation(
|
|
DisallowActivationReasonId::kAXLocationChange)) {
|
|
@@ -11714,7 +11714,7 @@ RenderFrameHostImpl::CheckOrDispatchBeforeUnloadForFrame(
|
|
const bool run_beforeunload_for_legacy_frame =
|
|
rfh == this && !rfh->has_before_unload_handler_ &&
|
|
!IsAvoidUnnecessaryBeforeUnloadCheckSyncEnabledFor(
|
|
- features::AvoidUnnecessaryBeforeUnloadCheckSyncMode::
|
|
+ ::features::AvoidUnnecessaryBeforeUnloadCheckSyncMode::
|
|
kWithoutSendBeforeUnload);
|
|
const bool should_run_beforeunload =
|
|
rfh->has_before_unload_handler_ || run_beforeunload_for_legacy_frame;
|
|
@@ -13696,7 +13696,7 @@ void RenderFrameHostImpl::CreateSecurePaymentConfirmationService(
|
|
|
|
void RenderFrameHostImpl::CreateWebUsbService(
|
|
mojo::PendingReceiver<blink::mojom::WebUsbService> receiver) {
|
|
- if (!base::FeatureList::IsEnabled(features::kWebUsb)) {
|
|
+ if (!base::FeatureList::IsEnabled(::features::kWebUsb)) {
|
|
return;
|
|
}
|
|
if (!IsFeatureEnabled(network::mojom::PermissionsPolicyFeature::kUsb)) {
|
|
@@ -16016,7 +16016,7 @@ void RenderFrameHostImpl::SendCommitNavigation(
|
|
// TODO(crbug.com/40205612): Remove the kill switch for this check.
|
|
bool should_block_storage_access_for_pdf =
|
|
GetSiteInstance()->GetSiteInfo().is_pdf() &&
|
|
- base::FeatureList::IsEnabled(features::kPdfEnforcements);
|
|
+ base::FeatureList::IsEnabled(::features::kPdfEnforcements);
|
|
|
|
// Make sure the origin of the isolation info and origin to commit match,
|
|
// otherwise the cookie manager will crash. Sending the cookie manager here
|
|
@@ -16411,7 +16411,7 @@ void RenderFrameHostImpl::SendBeforeUnload(
|
|
const bool can_be_in_navigate_to_pending_entry =
|
|
is_eligible_for_avoid_unnecessary_beforeunload &&
|
|
IsAvoidUnnecessaryBeforeUnloadCheckSyncEnabledFor(
|
|
- features::AvoidUnnecessaryBeforeUnloadCheckSyncMode::
|
|
+ ::features::AvoidUnnecessaryBeforeUnloadCheckSyncMode::
|
|
kDumpWithoutCrashing) &&
|
|
frame_tree()->controller().in_navigate_to_pending_entry();
|
|
|
|
@@ -16419,7 +16419,7 @@ void RenderFrameHostImpl::SendBeforeUnload(
|
|
|
|
if (is_eligible_for_avoid_unnecessary_beforeunload &&
|
|
IsAvoidUnnecessaryBeforeUnloadCheckSyncEnabledFor(
|
|
- features::AvoidUnnecessaryBeforeUnloadCheckSyncMode::
|
|
+ ::features::AvoidUnnecessaryBeforeUnloadCheckSyncMode::
|
|
kWithSendBeforeUnload)) {
|
|
std::move(before_unload_closure)
|
|
.Run(/*proceed=*/true, send_before_unload_start_time_,
|
|
@@ -17014,7 +17014,7 @@ bool ShouldVerify(const std::string& param) {
|
|
// For other params, default to disable checking the param. However, it's
|
|
// possible to force-enable checking the param via the VerifyDidCommitParams
|
|
// flag's param.
|
|
- return GetFieldTrialParamByFeatureAsBool(features::kVerifyDidCommitParams,
|
|
+ return GetFieldTrialParamByFeatureAsBool(::features::kVerifyDidCommitParams,
|
|
param, false);
|
|
#endif
|
|
}
|
|
@@ -17063,7 +17063,7 @@ void RenderFrameHostImpl::
|
|
#if !DCHECK_IS_ON()
|
|
// Only check for the flag if DCHECK is not enabled, so that we will always
|
|
// verify the params for tests.
|
|
- if (!base::FeatureList::IsEnabled(features::kVerifyDidCommitParams))
|
|
+ if (!base::FeatureList::IsEnabled(::features::kVerifyDidCommitParams))
|
|
return;
|
|
#endif
|
|
// Check if these values from DidCommitProvisionalLoadParams sent by the
|
|
@@ -18280,14 +18280,14 @@ void RenderFrameHostImpl::SetFrameTreeNode(FrameTreeNode& frame_tree_node) {
|
|
// the new functionality for swapping BrowsingContext on cross
|
|
// BrowsingInstance navigations, the BrowsingContextState is the only field
|
|
// that will need to be swapped.
|
|
- switch (features::GetBrowsingContextMode()) {
|
|
- case (features::BrowsingContextStateImplementationType::
|
|
+ switch (::features::GetBrowsingContextMode()) {
|
|
+ case (::features::BrowsingContextStateImplementationType::
|
|
kLegacyOneToOneWithFrameTreeNode):
|
|
browsing_context_state_ = frame_tree_node_->render_manager()
|
|
->current_frame_host()
|
|
->browsing_context_state();
|
|
break;
|
|
- case (features::BrowsingContextStateImplementationType::
|
|
+ case (::features::BrowsingContextStateImplementationType::
|
|
kSwapForCrossBrowsingInstanceNavigations):
|
|
// TODO(crbug.com/40205442): implement functionality for swapping on cross
|
|
// browsing instance navigations as needed. This will likely be removed
|
|
@@ -18582,7 +18582,7 @@ bool RenderFrameHostImpl::ShouldReuseCompositing(
|
|
return false;
|
|
}
|
|
|
|
- if (!base::FeatureList::IsEnabled(features::kRenderDocumentCompositorReuse)) {
|
|
+ if (!base::FeatureList::IsEnabled(::features::kRenderDocumentCompositorReuse)) {
|
|
return false;
|
|
}
|
|
|
|
diff --git a/content/browser/renderer_host/render_frame_host_manager.cc b/content/browser/renderer_host/render_frame_host_manager.cc
|
|
index a194fbb2be..1d9f294388 100644
|
|
--- a/content/browser/renderer_host/render_frame_host_manager.cc
|
|
+++ b/content/browser/renderer_host/render_frame_host_manager.cc
|
|
@@ -390,7 +390,7 @@ void UpdateProcessReusePolicyForProcessPerSiteWithMainFrameThreshold(
|
|
return;
|
|
}
|
|
if (!base::FeatureList::IsEnabled(
|
|
- features::kProcessPerSiteUpToMainFrameThreshold)) {
|
|
+ ::features::kProcessPerSiteUpToMainFrameThreshold)) {
|
|
return;
|
|
}
|
|
if (!frame_tree_node->IsOutermostMainFrame()) {
|
|
@@ -402,12 +402,12 @@ void UpdateProcessReusePolicyForProcessPerSiteWithMainFrameThreshold(
|
|
if (!is_new_site_instance) {
|
|
return;
|
|
}
|
|
- if (base::FeatureList::IsEnabled(features::kDisableProcessReuse)) {
|
|
+ if (base::FeatureList::IsEnabled(::features::kDisableProcessReuse)) {
|
|
RecordProcessPerSiteWithMainFrameThresholdBlockReason(
|
|
ProcessPerSiteWithMainFrameThresholdBlockReason::kDisableProcessResuse);
|
|
return;
|
|
}
|
|
- if (!features::kProcessPerSiteMainFrameAllowDevToolsAttached.Get() &&
|
|
+ if (!::features::kProcessPerSiteMainFrameAllowDevToolsAttached.Get() &&
|
|
RenderFrameDevToolsAgentHost::WasEverAttachedToAnyFrame()) {
|
|
RecordProcessPerSiteWithMainFrameThresholdBlockReason(
|
|
ProcessPerSiteWithMainFrameThresholdBlockReason::
|
|
@@ -428,7 +428,7 @@ void UpdateProcessReusePolicyForProcessPerSiteWithMainFrameThreshold(
|
|
// for process reuse to work around the problem, unless a field parameter
|
|
// explicitly allows it.
|
|
const GURL& site_url = site_instance->GetSiteURL();
|
|
- if (!features::kProcessPerSiteMainFrameAllowIPAndLocalhost.Get() &&
|
|
+ if (!::features::kProcessPerSiteMainFrameAllowIPAndLocalhost.Get() &&
|
|
(site_url.HostIsIPAddress() || net::IsLocalHostname(site_url.host()))) {
|
|
RecordProcessPerSiteWithMainFrameThresholdBlockReason(
|
|
ProcessPerSiteWithMainFrameThresholdBlockReason::
|
|
@@ -672,8 +672,8 @@ void RenderFrameHostManager::InitRoot(
|
|
const std::string& name,
|
|
const base::UnguessableToken& devtools_frame_token) {
|
|
bool is_legacy_browsing_context_state_mode =
|
|
- features::GetBrowsingContextMode() ==
|
|
- features::BrowsingContextStateImplementationType::
|
|
+ ::features::GetBrowsingContextMode() ==
|
|
+ ::features::BrowsingContextStateImplementationType::
|
|
kLegacyOneToOneWithFrameTreeNode;
|
|
scoped_refptr<BrowsingContextState> browsing_context_state =
|
|
base::MakeRefCounted<BrowsingContextState>(
|
|
@@ -726,8 +726,8 @@ void RenderFrameHostManager::InitChild(
|
|
std::string frame_name,
|
|
std::string frame_unique_name) {
|
|
bool is_legacy_browsing_context_state_mode =
|
|
- features::GetBrowsingContextMode() ==
|
|
- features::BrowsingContextStateImplementationType::
|
|
+ ::features::GetBrowsingContextMode() ==
|
|
+ ::features::BrowsingContextStateImplementationType::
|
|
kLegacyOneToOneWithFrameTreeNode;
|
|
scoped_refptr<BrowsingContextState> browsing_context_state =
|
|
base::MakeRefCounted<BrowsingContextState>(
|
|
@@ -1098,14 +1098,14 @@ void RenderFrameHostManager::PrepareForCollectingPage(
|
|
// in FrameTree (which, for example, is shared between the new page and
|
|
// the page entering BFCache), so they have to be collected explicitly above.
|
|
// Since proxies are not collected, we can return early here.
|
|
- if (features::GetBrowsingContextMode() ==
|
|
- features::BrowsingContextStateImplementationType::
|
|
+ if (::features::GetBrowsingContextMode() ==
|
|
+ ::features::BrowsingContextStateImplementationType::
|
|
kSwapForCrossBrowsingInstanceNavigations) {
|
|
return;
|
|
}
|
|
|
|
- DCHECK_EQ(features::GetBrowsingContextMode(),
|
|
- features::BrowsingContextStateImplementationType::
|
|
+ DCHECK_EQ(::features::GetBrowsingContextMode(),
|
|
+ ::features::BrowsingContextStateImplementationType::
|
|
kLegacyOneToOneWithFrameTreeNode);
|
|
|
|
// Prepare the proxies.
|
|
@@ -1508,7 +1508,7 @@ void RenderFrameHostManager::DidCreateNavigationRequest(
|
|
frame_tree_node_->navigator().controller().GetBrowserContext();
|
|
DeferSpeculativeRFHAction defer_action =
|
|
DeferSpeculativeRFHAction::kNotDeferred;
|
|
- if (base::FeatureList::IsEnabled(features::kDeferSpeculativeRFHCreation) &&
|
|
+ if (base::FeatureList::IsEnabled(::features::kDeferSpeculativeRFHCreation) &&
|
|
CanIntentionallyDeferSpeculativeRFHForRequest(request, browser_context,
|
|
frame_tree_node_)) {
|
|
// By skipping GetFrameHostForNavigation(), we are no longer calculating
|
|
@@ -1517,7 +1517,7 @@ void RenderFrameHostManager::DidCreateNavigationRequest(
|
|
// on a very powerful workstation in a release build.
|
|
// The GetFrameHostForNavigation() function will be called in
|
|
// NavigationRequest::OnStartChecksComplete after staring the URL loader.
|
|
- if (features::kWarmupSpareProcessCreationWhenDeferRFH.Get() &&
|
|
+ if (::features::kWarmupSpareProcessCreationWhenDeferRFH.Get() &&
|
|
RenderProcessHostImpl::IsSpareProcessKeptAtAllTimes()) {
|
|
// Since Android does not create a spare renderer by default, we choose
|
|
// to check IsSpareProcessKeptAtAllTimes() before warming up a renderer.
|
|
@@ -1529,9 +1529,9 @@ void RenderFrameHostManager::DidCreateNavigationRequest(
|
|
// TODO(crbug.com/394973143): Move the timeout logic to
|
|
// SpareRenderProcessHostManagerImpl
|
|
if (base::FeatureList::IsEnabled(
|
|
- features::kAndroidWarmUpSpareRendererWithTimeout)) {
|
|
+ ::features::kAndroidWarmUpSpareRendererWithTimeout)) {
|
|
timeout = base::Seconds(
|
|
- features::kAndroidSpareRendererTimeoutSeconds.Get());
|
|
+ ::features::kAndroidSpareRendererTimeoutSeconds.Get());
|
|
}
|
|
SpareRenderProcessHostManagerImpl::Get().WarmupSpare(browser_context,
|
|
timeout);
|
|
@@ -1778,7 +1778,7 @@ RenderFrameHostManager::GetFrameHostForNavigation(
|
|
IsSameSiteGetter is_same_site_getter(is_same_site);
|
|
std::string site_instance_reason;
|
|
std::string* reason_output =
|
|
- base::FeatureList::IsEnabled(features::kHoldbackDebugReasonStringRemoval)
|
|
+ base::FeatureList::IsEnabled(::features::kHoldbackDebugReasonStringRemoval)
|
|
? &site_instance_reason
|
|
: reason;
|
|
scoped_refptr<SiteInstanceImpl> dest_site_instance =
|
|
@@ -1786,7 +1786,7 @@ RenderFrameHostManager::GetFrameHostForNavigation(
|
|
browsing_context_group_swap,
|
|
reason_output);
|
|
if (reason && base::FeatureList::IsEnabled(
|
|
- features::kHoldbackDebugReasonStringRemoval)) {
|
|
+ ::features::kHoldbackDebugReasonStringRemoval)) {
|
|
reason->append(site_instance_reason);
|
|
}
|
|
|
|
@@ -2755,8 +2755,8 @@ RenderFrameHostManager::ShouldSwapBrowsingInstancesForNavigation(
|
|
current_instance->GetRelatedActiveContentsCount()),
|
|
51);
|
|
if (base::FeatureList::IsEnabled(
|
|
- features::kPrefetchStateContaminationMitigation) &&
|
|
- features::kPrefetchStateContaminationSwapsBrowsingContextGroup.Get()) {
|
|
+ ::features::kPrefetchStateContaminationMitigation) &&
|
|
+ ::features::kPrefetchStateContaminationSwapsBrowsingContextGroup.Get()) {
|
|
return BrowsingContextGroupSwap::CreateSecuritySwap();
|
|
}
|
|
}
|
|
@@ -3110,7 +3110,7 @@ RenderFrameHostManager::GetSiteInstanceForNavigation(
|
|
// this decision. Certain frames have different enough workloads so that
|
|
// it's better to avoid placing a subframe into an existing process for
|
|
// better performance isolation. See https://crbug.com/899418.
|
|
- if (!base::FeatureList::IsEnabled(features::kDisableProcessReuse) &&
|
|
+ if (!base::FeatureList::IsEnabled(::features::kDisableProcessReuse) &&
|
|
GetContentClient()
|
|
->browser()
|
|
->ShouldEmbeddedFramesTryToReuseExistingProcess(
|
|
@@ -3217,7 +3217,7 @@ RenderFrameHostManager::GetSiteInstanceForNavigation(
|
|
ProcessReuseOnCOOPType::kSameSiteNavigationInSingleWebContents;
|
|
process_to_reuse = current_instance->GetProcess();
|
|
} else if (base::FeatureList::IsEnabled(
|
|
- features::kProcessReuseOnPrerenderCOOPSwap) &&
|
|
+ ::features::kProcessReuseOnPrerenderCOOPSwap) &&
|
|
frame_tree_node_->frame_tree().is_prerendering()) {
|
|
coop_process_reuse_type = ProcessReuseOnCOOPType::kPrerender;
|
|
process_to_reuse = current_instance->GetProcess();
|
|
@@ -4168,8 +4168,8 @@ RenderFrameHostManager::CreateRenderFrameHost(
|
|
if (!render_view_host) {
|
|
render_view_host = frame_tree.CreateRenderViewHost(
|
|
site_instance->group(), frame_routing_id, renderer_initiated_creation,
|
|
- features::GetBrowsingContextMode() ==
|
|
- features::BrowsingContextStateImplementationType::
|
|
+ ::features::GetBrowsingContextMode() ==
|
|
+ ::features::BrowsingContextStateImplementationType::
|
|
kSwapForCrossBrowsingInstanceNavigations
|
|
? browsing_context_state
|
|
: nullptr,
|
|
@@ -4237,8 +4237,8 @@ bool RenderFrameHostManager::CreateSpeculativeRenderFrameHost(
|
|
}
|
|
|
|
scoped_refptr<BrowsingContextState> browsing_context_state;
|
|
- if (features::GetBrowsingContextMode() ==
|
|
- features::BrowsingContextStateImplementationType::
|
|
+ if (::features::GetBrowsingContextMode() ==
|
|
+ ::features::BrowsingContextStateImplementationType::
|
|
kLegacyOneToOneWithFrameTreeNode) {
|
|
browsing_context_state = render_frame_host_->browsing_context_state();
|
|
} else {
|
|
@@ -4501,8 +4501,8 @@ void RenderFrameHostManager::CreateRenderFrameProxy(
|
|
render_view_host = frame_tree_node_->frame_tree().CreateRenderViewHost(
|
|
group, /*main_frame_routing_id=*/MSG_ROUTING_NONE,
|
|
/*renderer_initiated_creation=*/false,
|
|
- features::GetBrowsingContextMode() ==
|
|
- features::BrowsingContextStateImplementationType::
|
|
+ ::features::GetBrowsingContextMode() ==
|
|
+ ::features::BrowsingContextStateImplementationType::
|
|
kSwapForCrossBrowsingInstanceNavigations
|
|
? render_frame_host_->browsing_context_state()
|
|
: nullptr,
|
|
@@ -4934,8 +4934,8 @@ RenderFrameHostManager::GetFrameTokenForSiteInstanceGroup(
|
|
// instance after a browsing instance swap, and we want to ensure that this
|
|
// doesn't break anything, so we tie it to the GetBrowsingContextMode which
|
|
// needs it and is disabled-by-default)
|
|
- if (features::GetBrowsingContextMode() ==
|
|
- features::BrowsingContextStateImplementationType::
|
|
+ if (::features::GetBrowsingContextMode() ==
|
|
+ ::features::BrowsingContextStateImplementationType::
|
|
kSwapForCrossBrowsingInstanceNavigations &&
|
|
!render_frame_host_->GetSiteInstance()
|
|
->group()
|
|
@@ -5083,8 +5083,8 @@ void RenderFrameHostManager::CommitPending(
|
|
// because in the new implementation, proxies will be swapped/restored
|
|
// whenever the RenderFrameHost (and internal BrowsingContextState) is
|
|
// restored.
|
|
- if (features::GetBrowsingContextMode() ==
|
|
- features::BrowsingContextStateImplementationType::
|
|
+ if (::features::GetBrowsingContextMode() ==
|
|
+ ::features::BrowsingContextStateImplementationType::
|
|
kLegacyOneToOneWithFrameTreeNode) {
|
|
BrowsingContextState::RenderFrameProxyHostMap proxy_hosts_to_restore =
|
|
pending_stored_page->TakeProxyHosts();
|
|
diff --git a/content/browser/renderer_host/render_frame_proxy_host.cc b/content/browser/renderer_host/render_frame_proxy_host.cc
|
|
index 2c2e4c14b5..68a6199940 100644
|
|
--- a/content/browser/renderer_host/render_frame_proxy_host.cc
|
|
+++ b/content/browser/renderer_host/render_frame_proxy_host.cc
|
|
@@ -55,6 +55,8 @@
|
|
#include "third_party/blink/public/mojom/scroll/scroll_into_view_params.mojom.h"
|
|
#include "ui/gfx/geometry/rect_f.h"
|
|
|
|
+#define TokenFrameMap TokenFrameMap_RenderFrameProxyHost
|
|
+
|
|
namespace content {
|
|
|
|
namespace {
|
|
@@ -591,7 +593,7 @@ void RenderFrameProxyHost::RouteMessageEvent(
|
|
// origins once rollout is complete.
|
|
bool should_verify_source_origin =
|
|
base::FeatureList::IsEnabled(
|
|
- features::kAdditionalOpaqueOriginEnforcements) ||
|
|
+ ::features::kAdditionalOpaqueOriginEnforcements) ||
|
|
source_origin_string != u"null";
|
|
if (should_verify_source_origin) {
|
|
auto* policy = ChildProcessSecurityPolicyImpl::GetInstance();
|
|
@@ -1062,3 +1064,5 @@ base::SafeRef<RenderFrameProxyHost> RenderFrameProxyHost::GetSafeRef() {
|
|
}
|
|
|
|
} // namespace content
|
|
+
|
|
+#undef TokenFrameMap
|
|
diff --git a/content/browser/renderer_host/render_message_filter.cc b/content/browser/renderer_host/render_message_filter.cc
|
|
index 7517bdd84c..ca2d78e5b8 100644
|
|
--- a/content/browser/renderer_host/render_message_filter.cc
|
|
+++ b/content/browser/renderer_host/render_message_filter.cc
|
|
@@ -18,7 +18,7 @@ RenderMessageFilter::RenderMessageFilter(
|
|
RenderWidgetHelper* render_widget_helper)
|
|
: render_widget_helper_(render_widget_helper),
|
|
render_process_id_(render_process_id),
|
|
- cache_response_size_(features::kFrameRoutingCacheResponseSize.Get()) {
|
|
+ cache_response_size_(::features::kFrameRoutingCacheResponseSize.Get()) {
|
|
if (render_widget_helper) {
|
|
render_widget_helper_->Init(render_process_id_);
|
|
}
|
|
diff --git a/content/browser/renderer_host/render_process_host_impl.cc b/content/browser/renderer_host/render_process_host_impl.cc
|
|
index 67cdf0f30f..946a01d1b2 100644
|
|
--- a/content/browser/renderer_host/render_process_host_impl.cc
|
|
+++ b/content/browser/renderer_host/render_process_host_impl.cc
|
|
@@ -517,10 +517,10 @@ bool HasEnoughMemoryForAnotherMainFrame(RenderProcessHost* host,
|
|
private_memory_footprint /
|
|
std::max(main_frame_count, static_cast<size_t>(1));
|
|
uint64_t process_memory_limit = base::saturated_cast<uint64_t>(
|
|
- features::kProcessPerSiteMainFrameTotalMemoryLimit.Get());
|
|
+ ::features::kProcessPerSiteMainFrameTotalMemoryLimit.Get());
|
|
|
|
double frame_size_factor =
|
|
- features::kProcessPerSiteMainFrameSiteScalingFactor.Get();
|
|
+ ::features::kProcessPerSiteMainFrameSiteScalingFactor.Get();
|
|
// Check that we have a factor of at least 1.
|
|
if (frame_size_factor < 1.0f) {
|
|
frame_size_factor = 1.0f;
|
|
@@ -563,7 +563,7 @@ bool IsBelowReuseResourceThresholds(RenderProcessHost* host,
|
|
if (process_reuse_policy ==
|
|
ProcessReusePolicy::REUSE_PENDING_OR_COMMITTED_SITE_SUBFRAME &&
|
|
!base::FeatureList::IsEnabled(
|
|
- features::kSubframeProcessReuseThresholds)) {
|
|
+ ::features::kSubframeProcessReuseThresholds)) {
|
|
return true;
|
|
}
|
|
|
|
@@ -591,7 +591,7 @@ bool IsBelowReuseResourceThresholds(RenderProcessHost* host,
|
|
// If a threshold is specified, don't reuse `host` if it already hosts more
|
|
// main frames (including BFCached and prerendered) than the threshold.
|
|
size_t main_frame_threshold = base::checked_cast<size_t>(
|
|
- features::kProcessPerSiteMainFrameThreshold.Get());
|
|
+ ::features::kProcessPerSiteMainFrameThreshold.Get());
|
|
if (main_frame_count >= main_frame_threshold) {
|
|
return false;
|
|
}
|
|
@@ -621,7 +621,7 @@ bool IsBelowReuseResourceThresholds(RenderProcessHost* host,
|
|
// would be necessarily added to `host` later if the current frame were
|
|
// allowed to reuse it (e.g., as its subframes), etc.
|
|
uint64_t process_memory_limit = base::saturated_cast<uint64_t>(
|
|
- features::kSubframeProcessReuseMemoryThreshold.Get());
|
|
+ ::features::kSubframeProcessReuseMemoryThreshold.Get());
|
|
if (host->GetPrivateMemoryFootprint() < process_memory_limit) {
|
|
return true;
|
|
}
|
|
@@ -696,7 +696,7 @@ bool IsEmptyRendererProcessesReuseAllowed() {
|
|
return false;
|
|
}
|
|
return base::FeatureList::IsEnabled(
|
|
- features::kTrackEmptyRendererProcessesForReuse);
|
|
+ ::features::kTrackEmptyRendererProcessesForReuse);
|
|
}
|
|
|
|
class SiteProcessCountTracker : public base::SupportsUserData::Data,
|
|
@@ -3187,19 +3187,19 @@ bool RenderProcessHostImpl::IsSpareProcessKeptAtAllTimes() {
|
|
// ensure that devices with exactly 1GB of RAM won't get included because of
|
|
// inaccuracies or off-by-one errors.
|
|
if (base::SysInfo::AmountOfPhysicalMemoryMB() <=
|
|
- features::kAndroidSpareRendererMemoryThreshold.Get()) {
|
|
+ ::features::kAndroidSpareRendererMemoryThreshold.Get()) {
|
|
return false;
|
|
}
|
|
|
|
bool android_spare_process_override = base::FeatureList::IsEnabled(
|
|
- features::kAndroidWarmUpSpareRendererWithTimeout);
|
|
+ ::features::kAndroidWarmUpSpareRendererWithTimeout);
|
|
if (!SiteIsolationPolicy::UseDedicatedProcessesForAllSites() &&
|
|
!android_spare_process_override) {
|
|
return false;
|
|
}
|
|
|
|
if (!base::FeatureList::IsEnabled(
|
|
- features::kSpareRendererForSitePerProcess) &&
|
|
+ ::features::kSpareRendererForSitePerProcess) &&
|
|
!android_spare_process_override) {
|
|
return false;
|
|
}
|
|
@@ -3401,7 +3401,7 @@ void RenderProcessHostImpl::AppendRendererCommandLine(
|
|
command_line->AppendSwitch(switches::kDisallowV8FeatureFlagOverrides);
|
|
}
|
|
|
|
- if (features::IsTouchTextEditingRedesignEnabled()) {
|
|
+ if (::features::IsTouchTextEditingRedesignEnabled()) {
|
|
command_line->AppendSwitchASCII(
|
|
blink::switches::kTouchTextSelectionStrategy,
|
|
blink::switches::kTouchTextSelectionStrategy_Direction);
|
|
@@ -4755,7 +4755,7 @@ bool RenderProcessHost::IsProcessLimitReached() {
|
|
// users, as the experiment is configured with "starts_active" set to false
|
|
// (meaning it only collects data from users who reach this code).
|
|
#if !BUILDFLAG(IS_ANDROID)
|
|
- if (base::FeatureList::IsEnabled(features::kRemoveRendererProcessLimit)) {
|
|
+ if (base::FeatureList::IsEnabled(::features::kRemoveRendererProcessLimit)) {
|
|
// This is used for tests. To avoid changing test behaviors, don't
|
|
// change the behavior when it is set.
|
|
if (g_max_renderer_count_override) {
|
|
@@ -4889,7 +4889,7 @@ RenderProcessHost* RenderProcessHostImpl::GetProcessHostForSiteInstance(
|
|
case ProcessReusePolicy::
|
|
REUSE_PENDING_OR_COMMITTED_SITE_WITH_MAIN_FRAME_THRESHOLD: {
|
|
CHECK(base::FeatureList::IsEnabled(
|
|
- features::kProcessPerSiteUpToMainFrameThreshold));
|
|
+ ::features::kProcessPerSiteUpToMainFrameThreshold));
|
|
render_process_host = FindReusableProcessHostForSiteInstance(
|
|
site_instance, process_reuse_policy);
|
|
if (render_process_host) {
|
|
@@ -4963,7 +4963,7 @@ RenderProcessHost* RenderProcessHostImpl::GetProcessHostForSiteInstance(
|
|
base::UmaHistogramBoolean(
|
|
"BrowserRenderProcessHost.ExistingRendererIsInitializedAndNotDead",
|
|
render_process_host->IsInitializedAndNotDead());
|
|
- if (base::FeatureList::IsEnabled(features::kEnsureExistingRendererAlive)) {
|
|
+ if (base::FeatureList::IsEnabled(::features::kEnsureExistingRendererAlive)) {
|
|
render_process_host->Init();
|
|
}
|
|
}
|
|
@@ -5464,7 +5464,7 @@ void RenderProcessHostImpl::UpdateProcessPriority() {
|
|
}
|
|
#if BUILDFLAG(IS_MAC)
|
|
if (base::FeatureList::IsEnabled(
|
|
- features::kMacAllowBackgroundingRenderProcesses)) {
|
|
+ ::features::kMacAllowBackgroundingRenderProcesses)) {
|
|
child_process_launcher_->SetProcessPriority(process_priority);
|
|
}
|
|
#else // !BUILDFLAG(IS_MAC)
|
|
diff --git a/content/browser/renderer_host/render_view_host_impl.cc b/content/browser/renderer_host/render_view_host_impl.cc
|
|
index a0335fef25..a6547f7966 100644
|
|
--- a/content/browser/renderer_host/render_view_host_impl.cc
|
|
+++ b/content/browser/renderer_host/render_view_host_impl.cc
|
|
@@ -542,7 +542,7 @@ bool RenderViewHostImpl::CreateRenderView(
|
|
frame_tree_node->current_frame_host()->GetFrameToken()));
|
|
} else if (frame_tree_->is_prerendering() &&
|
|
(!base::FeatureList::IsEnabled(
|
|
- features::kPrerenderMoreCorrectSpeculativeRFHCreation) ||
|
|
+ ::features::kPrerenderMoreCorrectSpeculativeRFHCreation) ||
|
|
main_rfh->lifecycle_state() ==
|
|
RenderFrameHostImpl::LifecycleStateImpl::kSpeculative)) {
|
|
// During prerender, the browser may need to create new speculative local
|
|
diff --git a/content/browser/renderer_host/render_widget_host_impl.cc b/content/browser/renderer_host/render_widget_host_impl.cc
|
|
index 52f772876a..ccd78a6c37 100644
|
|
--- a/content/browser/renderer_host/render_widget_host_impl.cc
|
|
+++ b/content/browser/renderer_host/render_widget_host_impl.cc
|
|
@@ -2150,7 +2150,7 @@ void RenderWidgetHostImpl::GetSnapshotFromBrowser(
|
|
if (from_surface) {
|
|
pending_surface_browser_snapshots_.insert(
|
|
std::make_pair(snapshot_id, std::move(callback)));
|
|
- if (base::FeatureList::IsEnabled(features::kCDPScreenshotNewSurface)) {
|
|
+ if (base::FeatureList::IsEnabled(::features::kCDPScreenshotNewSurface)) {
|
|
// 1. Force content redraw in the renderer.
|
|
blink_widget_->ForceRedraw(base::DoNothing());
|
|
// 2. Force a repaint to ensure that surface is updated.
|
|
diff --git a/content/browser/renderer_host/render_widget_host_view_aura.cc b/content/browser/renderer_host/render_widget_host_view_aura.cc
|
|
index e6235611a2..8f2d10dc75 100644
|
|
--- a/content/browser/renderer_host/render_widget_host_view_aura.cc
|
|
+++ b/content/browser/renderer_host/render_widget_host_view_aura.cc
|
|
@@ -3071,7 +3071,7 @@ void RenderWidgetHostViewAura::CreateSelectionController() {
|
|
tsc_config.tap_slop = ui::GestureConfiguration::GetInstance()
|
|
->max_touch_move_in_pixels_for_click();
|
|
tsc_config.enable_longpress_drag_selection =
|
|
- features::IsTouchTextEditingRedesignEnabled();
|
|
+ ::features::IsTouchTextEditingRedesignEnabled();
|
|
selection_controller_ = std::make_unique<ui::TouchSelectionController>(
|
|
selection_controller_client_.get(), tsc_config);
|
|
}
|
|
diff --git a/content/browser/renderer_host/spare_render_process_host_manager_impl.cc b/content/browser/renderer_host/spare_render_process_host_manager_impl.cc
|
|
index debe95af98..a614ed6c5f 100644
|
|
--- a/content/browser/renderer_host/spare_render_process_host_manager_impl.cc
|
|
+++ b/content/browser/renderer_host/spare_render_process_host_manager_impl.cc
|
|
@@ -203,7 +203,7 @@ size_t GetSpareRPHCount() {
|
|
if (available_ram < 4 * 1024) {
|
|
return 1u;
|
|
}
|
|
- return features::kMultipleSpareRPHsCount.Get();
|
|
+ return ::features::kMultipleSpareRPHsCount.Get();
|
|
}
|
|
|
|
void LogAllocationContext(const std::string& source_uma_name,
|
|
@@ -705,17 +705,17 @@ void SpareRenderProcessHostManagerImpl::PrepareForFutureRequests(
|
|
if (RenderProcessHostImpl::IsSpareProcessKeptAtAllTimes()) {
|
|
std::optional<base::TimeDelta> timeout = std::nullopt;
|
|
if (base::FeatureList::IsEnabled(
|
|
- features::kAndroidWarmUpSpareRendererWithTimeout)) {
|
|
- if (features::kAndroidSpareRendererCreationTiming.Get() !=
|
|
- features::kAndroidSpareRendererCreationDelayedDuringLoading) {
|
|
+ ::features::kAndroidWarmUpSpareRendererWithTimeout)) {
|
|
+ if (::features::kAndroidSpareRendererCreationTiming.Get() !=
|
|
+ ::features::kAndroidSpareRendererCreationDelayedDuringLoading) {
|
|
// The creation of the spare renderer will be managed in
|
|
// WebContentsImpl::DidStopLoading or
|
|
// WebContentsImpl::OnFirstVisuallyNonEmptyPaint.
|
|
return;
|
|
}
|
|
- if (features::kAndroidSpareRendererTimeoutSeconds.Get() > 0) {
|
|
+ if (::features::kAndroidSpareRendererTimeoutSeconds.Get() > 0) {
|
|
timeout =
|
|
- base::Seconds(features::kAndroidSpareRendererTimeoutSeconds.Get());
|
|
+ base::Seconds(::features::kAndroidSpareRendererTimeoutSeconds.Get());
|
|
}
|
|
}
|
|
// Always keep around a spare process for the most recently requested
|
|
@@ -833,7 +833,7 @@ void SpareRenderProcessHostManagerImpl::RenderProcessReady(
|
|
UMA_HISTOGRAM_TIMES("BrowserRenderProcessHost.SpareProcessStartupTime",
|
|
process_startup_timer_->Elapsed());
|
|
|
|
- if (base::FeatureList::IsEnabled(features::kSpareRendererProcessPriority)) {
|
|
+ if (base::FeatureList::IsEnabled(::features::kSpareRendererProcessPriority)) {
|
|
host->SetHasSpareRendererPriority(true);
|
|
}
|
|
|
|
diff --git a/content/browser/security/coop/cross_origin_opener_policy_reporter.cc b/content/browser/security/coop/cross_origin_opener_policy_reporter.cc
|
|
index 27af8106d6..150541127c 100644
|
|
--- a/content/browser/security/coop/cross_origin_opener_policy_reporter.cc
|
|
+++ b/content/browser/security/coop/cross_origin_opener_policy_reporter.cc
|
|
@@ -19,6 +19,8 @@
|
|
#include "services/network/public/mojom/source_location.mojom.h"
|
|
#include "url/origin.h"
|
|
|
|
+#define kType kType_CrossOriginOpenerPolicyReporter
|
|
+
|
|
namespace content {
|
|
|
|
namespace {
|
|
@@ -293,3 +295,5 @@ void CrossOriginOpenerPolicyReporter::QueueNavigationReport(
|
|
}
|
|
|
|
} // namespace content
|
|
+
|
|
+#undef kType
|
|
diff --git a/content/browser/security/dip/document_isolation_policy_reporter.cc b/content/browser/security/dip/document_isolation_policy_reporter.cc
|
|
index 464954acf9..696389fd45 100644
|
|
--- a/content/browser/security/dip/document_isolation_policy_reporter.cc
|
|
+++ b/content/browser/security/dip/document_isolation_policy_reporter.cc
|
|
@@ -11,6 +11,8 @@
|
|
#include "services/network/public/cpp/request_destination.h"
|
|
#include "services/network/public/mojom/network_context.mojom.h"
|
|
|
|
+#define kType kType_DocumentIsolationPolicyReporter
|
|
+
|
|
namespace content {
|
|
|
|
namespace {
|
|
@@ -103,3 +105,5 @@ void DocumentIsolationPolicyReporter::QueueAndNotify(
|
|
}
|
|
|
|
} // namespace content
|
|
+
|
|
+#undef kType
|
|
diff --git a/content/browser/webid/federated_auth_request_impl.cc b/content/browser/webid/federated_auth_request_impl.cc
|
|
index 5458912939..4362cd0a6f 100644
|
|
--- a/content/browser/webid/federated_auth_request_impl.cc
|
|
+++ b/content/browser/webid/federated_auth_request_impl.cc
|
|
@@ -82,6 +82,8 @@ using CompleteRequestWithErrorCallback =
|
|
std::optional<content::FedCmRequestIdTokenStatus>,
|
|
bool)>;
|
|
|
|
+#define IsFrameActive IsFrameActive_FederatedAuthRequestImpl
|
|
+
|
|
namespace content {
|
|
|
|
namespace {
|
|
@@ -2730,3 +2732,5 @@ RelyingPartyData FederatedAuthRequestImpl::CreateRpData() const {
|
|
}
|
|
|
|
} // namespace content
|
|
+
|
|
+#undef IsFrameActive
|
|
diff --git a/content/child/BUILD.gn b/content/child/BUILD.gn
|
|
index cecc5e382a..7ab8f08117 100644
|
|
--- a/content/child/BUILD.gn
|
|
+++ b/content/child/BUILD.gn
|
|
@@ -3,6 +3,7 @@
|
|
# found in the LICENSE file.
|
|
|
|
import("//build/config/features.gni")
|
|
+import("//build/config/jumbo.gni")
|
|
import("//build/config/ui.gni")
|
|
import("//device/vr/buildflags/buildflags.gni")
|
|
import("//ppapi/buildflags/buildflags.gni")
|
|
@@ -12,9 +13,9 @@ if (is_android) {
|
|
}
|
|
|
|
if (is_component_build) {
|
|
- link_target_type = "source_set"
|
|
+ link_target_type = "jumbo_source_set"
|
|
} else {
|
|
- link_target_type = "static_library"
|
|
+ link_target_type = "jumbo_static_library"
|
|
}
|
|
target(link_target_type, "child") {
|
|
# Targets external to content should always link to the public API.
|
|
diff --git a/content/common/BUILD.gn b/content/common/BUILD.gn
|
|
index 9f40e65fa5..fe554377ab 100644
|
|
--- a/content/common/BUILD.gn
|
|
+++ b/content/common/BUILD.gn
|
|
@@ -60,7 +60,7 @@ if (is_linux || is_chromeos) {
|
|
}
|
|
}
|
|
|
|
-source_set("common") {
|
|
+jumbo_source_set("common") {
|
|
# Targets external to content should always link to the public API.
|
|
# In addition, targets outside of the content component (shell and tests)
|
|
# must not link to this because it will duplicate the code in the component
|
|
@@ -191,6 +191,10 @@ source_set("common") {
|
|
"webid/identity_url_loader_throttle.cc",
|
|
"webid/identity_url_loader_throttle.h",
|
|
]
|
|
+ jumbo_excluded_sources = [
|
|
+ "common_param_traits.cc",
|
|
+ "content_param_traits.cc",
|
|
+ ]
|
|
|
|
configs += [
|
|
"//content:content_implementation",
|
|
diff --git a/content/gpu/BUILD.gn b/content/gpu/BUILD.gn
|
|
index c6a90abae4..4c903cd958 100644
|
|
--- a/content/gpu/BUILD.gn
|
|
+++ b/content/gpu/BUILD.gn
|
|
@@ -3,6 +3,7 @@
|
|
# found in the LICENSE file.
|
|
|
|
import("//build/config/cast.gni")
|
|
+import("//build/config/jumbo.gni")
|
|
import("//build/config/ui.gni")
|
|
import("//gpu/vulkan/features.gni")
|
|
import("//media/media_options.gni")
|
|
@@ -19,9 +20,9 @@ group("gpu") {
|
|
}
|
|
|
|
if (is_component_build) {
|
|
- link_target_type = "source_set"
|
|
+ link_target_type = "jumbo_source_set"
|
|
} else {
|
|
- link_target_type = "static_library"
|
|
+ link_target_type = "jumbo_static_library"
|
|
}
|
|
|
|
target(link_target_type, "gpu_sources") {
|
|
diff --git a/content/public/browser/BUILD.gn b/content/public/browser/BUILD.gn
|
|
index 2714f3b881..863f4d5d81 100644
|
|
--- a/content/public/browser/BUILD.gn
|
|
+++ b/content/public/browser/BUILD.gn
|
|
@@ -2,6 +2,7 @@
|
|
# Use of this source code is governed by a BSD - style license that can be
|
|
# found in the LICENSE file.
|
|
|
|
+import("//build/config/jumbo.gni")
|
|
import("//build/config/ui.gni")
|
|
import("//content/common/features.gni")
|
|
import("//device/vr/buildflags/buildflags.gni")
|
|
@@ -24,7 +25,7 @@ group("browser") {
|
|
}
|
|
}
|
|
|
|
-source_set("browser_sources") {
|
|
+jumbo_source_set("browser_sources") {
|
|
# External code should depend on via ":browser" above.
|
|
visibility = [ "//content/*" ]
|
|
sources = [
|
|
diff --git a/content/public/child/BUILD.gn b/content/public/child/BUILD.gn
|
|
index 73fce2d993..2f298f5cda 100644
|
|
--- a/content/public/child/BUILD.gn
|
|
+++ b/content/public/child/BUILD.gn
|
|
@@ -2,6 +2,7 @@
|
|
# Use of this source code is governed by a BSD-style license that can be
|
|
# found in the LICENSE file.
|
|
|
|
+import("//build/config/jumbo.gni")
|
|
import("//ppapi/buildflags/buildflags.gni")
|
|
|
|
# See //content/BUILD.gn for how this works.
|
|
@@ -19,7 +20,7 @@ group("child") {
|
|
}
|
|
}
|
|
|
|
-source_set("child_sources") {
|
|
+jumbo_source_set("child_sources") {
|
|
# External code should depend in via ":child" above.
|
|
visibility = [ "//content/*" ]
|
|
|
|
diff --git a/content/public/common/BUILD.gn b/content/public/common/BUILD.gn
|
|
index 35fc76646e..6c640da094 100644
|
|
--- a/content/public/common/BUILD.gn
|
|
+++ b/content/public/common/BUILD.gn
|
|
@@ -4,6 +4,7 @@
|
|
|
|
import("//build/buildflag_header.gni")
|
|
import("//build/config/features.gni")
|
|
+import("//build/config/jumbo.gni")
|
|
import("//build/config/ui.gni")
|
|
import("//content/browser/devtools/features.gni")
|
|
import("//content/public/common/features.gni")
|
|
@@ -160,7 +161,7 @@ component("main_function_params") {
|
|
configs += [ "//content:content_implementation" ]
|
|
}
|
|
|
|
-source_set("common_sources") {
|
|
+jumbo_source_set("common_sources") {
|
|
# External code should depend on via ":common" above.
|
|
visibility = [ "//content/*" ]
|
|
|
|
diff --git a/content/public/renderer/BUILD.gn b/content/public/renderer/BUILD.gn
|
|
index 1708aa82d3..8b39b24ca7 100644
|
|
--- a/content/public/renderer/BUILD.gn
|
|
+++ b/content/public/renderer/BUILD.gn
|
|
@@ -3,6 +3,7 @@
|
|
# found in the LICENSE file.
|
|
|
|
import("//build/config/features.gni")
|
|
+import("//build/config/jumbo.gni")
|
|
import("//media/media_options.gni")
|
|
import("//ppapi/buildflags/buildflags.gni")
|
|
|
|
@@ -19,9 +20,9 @@ group("renderer") {
|
|
}
|
|
|
|
if (is_component_build) {
|
|
- link_target_type = "source_set"
|
|
+ link_target_type = "jumbo_source_set"
|
|
} else {
|
|
- link_target_type = "static_library"
|
|
+ link_target_type = "jumbo_static_library"
|
|
}
|
|
target(link_target_type, "renderer_sources") {
|
|
# External code should depend on via ":renderer" above.
|
|
diff --git a/content/renderer/BUILD.gn b/content/renderer/BUILD.gn
|
|
index b8fd955057..b20ef5cdf5 100644
|
|
--- a/content/renderer/BUILD.gn
|
|
+++ b/content/renderer/BUILD.gn
|
|
@@ -5,6 +5,7 @@
|
|
import("//build/config/cast.gni")
|
|
import("//build/config/chromeos/ui_mode.gni")
|
|
import("//build/config/features.gni")
|
|
+import("//build/config/jumbo.gni")
|
|
import("//build/config/ui.gni")
|
|
import("//content/common/features.gni")
|
|
import("//media/media_options.gni")
|
|
@@ -16,9 +17,9 @@ import("//third_party/webrtc/webrtc.gni")
|
|
import("//tools/ipc_fuzzer/ipc_fuzzer.gni")
|
|
|
|
if (is_component_build) {
|
|
- link_target_type = "source_set"
|
|
+ link_target_type = "jumbo_source_set"
|
|
} else {
|
|
- link_target_type = "static_library"
|
|
+ link_target_type = "jumbo_static_library"
|
|
}
|
|
|
|
target(link_target_type, "renderer") {
|
|
diff --git a/content/renderer/service_worker/service_worker_subresource_loader.cc b/content/renderer/service_worker/service_worker_subresource_loader.cc
|
|
index b9761791e1..2b5026b05a 100644
|
|
--- a/content/renderer/service_worker/service_worker_subresource_loader.cc
|
|
+++ b/content/renderer/service_worker/service_worker_subresource_loader.cc
|
|
@@ -44,6 +44,8 @@
|
|
#include "third_party/blink/public/mojom/service_worker/service_worker_stream_handle.mojom.h"
|
|
#include "third_party/blink/public/platform/web_url_response.h"
|
|
|
|
+#define MojoEnumToString MojoEnumToString_ServiceWorkerSubresourceLoader
|
|
+
|
|
namespace content {
|
|
|
|
namespace {
|
|
@@ -1543,3 +1545,5 @@ void ServiceWorkerSubresourceLoader::DidCacheStorageMatch(
|
|
}
|
|
|
|
} // namespace content
|
|
+
|
|
+#undef MojoEnumToString
|
|
diff --git a/content/renderer/service_worker/web_service_worker_provider_impl.cc b/content/renderer/service_worker/web_service_worker_provider_impl.cc
|
|
index 22c2752f46..f2c17c84b2 100644
|
|
--- a/content/renderer/service_worker/web_service_worker_provider_impl.cc
|
|
+++ b/content/renderer/service_worker/web_service_worker_provider_impl.cc
|
|
@@ -25,6 +25,8 @@
|
|
|
|
using blink::WebURL;
|
|
|
|
+#define MojoEnumToString MojoEnumToString_WebServiceWorkerProviderImpl
|
|
+
|
|
namespace content {
|
|
|
|
namespace {
|
|
@@ -331,3 +333,5 @@ void WebServiceWorkerProviderImpl::OnDidGetRegistrationForReady(
|
|
}
|
|
|
|
} // namespace content
|
|
+
|
|
+#undef MojoEnumToString
|
|
diff --git a/content/services/auction_worklet/BUILD.gn b/content/services/auction_worklet/BUILD.gn
|
|
index 8cfa702b80..8035501301 100644
|
|
--- a/content/services/auction_worklet/BUILD.gn
|
|
+++ b/content/services/auction_worklet/BUILD.gn
|
|
@@ -2,6 +2,7 @@
|
|
# Use of this source code is governed by a BSD-style license that can be
|
|
# found in the LICENSE file.
|
|
|
|
+import("//build/config/jumbo.gni")
|
|
import("//third_party/inspector_protocol/inspector_protocol.gni")
|
|
import("//v8/gni/v8.gni")
|
|
|
|
@@ -30,7 +31,7 @@ inspector_protocol_generate("protocol_sources") {
|
|
]
|
|
}
|
|
|
|
-source_set("auction_worklet") {
|
|
+jumbo_source_set("auction_worklet") {
|
|
sources = [
|
|
"auction_v8_devtools_agent.cc",
|
|
"auction_v8_devtools_agent.h",
|
|
@@ -114,6 +115,10 @@ source_set("auction_worklet") {
|
|
|
|
sources += get_target_outputs(":protocol_sources")
|
|
|
|
+ jumbo_excluded_sources = [
|
|
+ "seller_worklet.cc",
|
|
+ ]
|
|
+
|
|
configs += [
|
|
"//build/config/compiler:wexit_time_destructors",
|
|
"//v8:external_startup_data",
|
|
diff --git a/content/test/BUILD.gn b/content/test/BUILD.gn
|
|
index d7cea6b7ef..53113e5fb6 100644
|
|
--- a/content/test/BUILD.gn
|
|
+++ b/content/test/BUILD.gn
|
|
@@ -7,6 +7,7 @@ import("//build/config/chrome_build.gni")
|
|
import("//build/config/chromeos/ui_mode.gni")
|
|
import("//build/config/compiler/compiler.gni")
|
|
import("//build/config/features.gni")
|
|
+import("//build/config/jumbo.gni")
|
|
import("//build/config/ui.gni")
|
|
import("//build/nocompile.gni")
|
|
import("//components/viz/common/debugger/viz_debugger.gni")
|
|
@@ -44,7 +45,7 @@ if (is_ios) {
|
|
|
|
# Use a static library here because many test binaries depend on this but don't
|
|
# require many files from it. This makes linking more efficient.
|
|
-static_library("test_support") {
|
|
+jumbo_static_library("test_support") {
|
|
testonly = true
|
|
|
|
# See comment at the top of //content/BUILD.gn for why this is disabled in
|
|
@@ -1033,7 +1034,7 @@ source_set("default_content_test_launcher") {
|
|
|
|
# browsertest_support can be used by targets that run content_shell based
|
|
# browser tests.
|
|
-static_library("browsertest_support") {
|
|
+jumbo_static_library("browsertest_support") {
|
|
testonly = true
|
|
|
|
# See comment at the top of //content/BUILD.gn for why this is disabled in
|
|
diff --git a/content/utility/BUILD.gn b/content/utility/BUILD.gn
|
|
index 5ff547b646..c2bcf80199 100644
|
|
--- a/content/utility/BUILD.gn
|
|
+++ b/content/utility/BUILD.gn
|
|
@@ -3,6 +3,7 @@
|
|
# found in the LICENSE file.
|
|
|
|
import("//build/config/chromeos/ui_mode.gni")
|
|
+import("//build/config/jumbo.gni")
|
|
import("//chromeos/ash/components/assistant/assistant.gni")
|
|
import("//components/services/on_device_translation/buildflags/features.gni")
|
|
import("//device/vr/buildflags/buildflags.gni")
|
|
@@ -14,7 +15,7 @@ import("//services/accessibility/buildflags.gni")
|
|
import("//services/screen_ai/buildflags/features.gni")
|
|
import("//services/video_effects/args.gni")
|
|
|
|
-source_set("utility") {
|
|
+jumbo_source_set("utility") {
|
|
# Only the public target should depend on this. All other targets (even
|
|
# internal content ones other than test) should depend on the public one.
|
|
visibility = [
|
|
--- a/content/browser/devtools/protocol/page_handler.cc
|
|
+++ b/content/browser/devtools/protocol/page_handler.cc
|
|
@@ -88,6 +88,8 @@
|
|
#include "content/browser/renderer_host/compositor_impl_android.h"
|
|
#endif
|
|
|
|
+#define kCommandIsOnlyAvailableAtTopTarget kCommandIsOnlyAvailableAtTopTarget_PageHandler
|
|
+
|
|
namespace content {
|
|
namespace protocol {
|
|
|
|
@@ -2426,3 +2428,5 @@
|
|
|
|
} // namespace protocol
|
|
} // namespace content
|
|
+
|
|
+#undef kCommandIsOnlyAvailableAtTopTarget
|
|
--- a/content/browser/installedapp/installed_app_provider_impl.cc
|
|
+++ b/content/browser/installedapp/installed_app_provider_impl.cc
|
|
@@ -62,7 +62,7 @@
|
|
bool add_saved_related_applications,
|
|
FilterInstalledAppsCallback callback) {
|
|
DCHECK_CALLED_ON_VALID_SEQUENCE(sequence_checker_);
|
|
- if (!base::FeatureList::IsEnabled(features::kInstalledAppProvider)) {
|
|
+ if (!base::FeatureList::IsEnabled(::features::kInstalledAppProvider)) {
|
|
base::SequencedTaskRunner::GetCurrentDefault()->PostTask(
|
|
FROM_HERE,
|
|
base::BindOnce(std::move(callback),
|
|
@@ -92,7 +92,7 @@
|
|
base::ConcurrentCallbacks<FetchRelatedAppsTaskResult> concurrent;
|
|
|
|
#if BUILDFLAG(IS_WIN)
|
|
- if (base::FeatureList::IsEnabled(features::kFilterInstalledAppsWinMatching)) {
|
|
+ if (base::FeatureList::IsEnabled(::features::kFilterInstalledAppsWinMatching)) {
|
|
StartTask(std::make_unique<FetchRelatedWinAppsTask>(
|
|
native_win_app_fetcher_factory_.Run()),
|
|
related_apps, concurrent.CreateCallback());
|
|
@@ -101,7 +101,7 @@
|
|
|
|
#if !BUILDFLAG(IS_ANDROID)
|
|
if (base::FeatureList::IsEnabled(
|
|
- features::kFilterInstalledAppsWebAppMatching)) {
|
|
+ ::features::kFilterInstalledAppsWebAppMatching)) {
|
|
StartTask(std::make_unique<FetchRelatedWebAppsTask>(
|
|
render_frame_host().GetBrowserContext()),
|
|
related_apps, concurrent.CreateCallback());
|
|
--- a/content/browser/interest_group/ad_auction_service_impl.cc
|
|
+++ b/content/browser/interest_group/ad_auction_service_impl.cc
|
|
@@ -427,7 +427,7 @@
|
|
// been invalidated or the current frame's `PageImpl` has changed to a
|
|
// different one, abort the auction.
|
|
// See crbug.com/1422301.
|
|
- if (base::FeatureList::IsEnabled(features::kDetectInconsistentPageImpl) &&
|
|
+ if (base::FeatureList::IsEnabled(::features::kDetectInconsistentPageImpl) &&
|
|
(!GetFrame()->auction_initiator_page() ||
|
|
GetFrame()->auction_initiator_page().get() !=
|
|
&(GetFrame()->GetPage()))) {
|
|
@@ -465,7 +465,7 @@
|
|
|
|
// Try to preconnect to owner and bidding signals origins if this is an
|
|
// on-device auction.
|
|
- if (base::FeatureList::IsEnabled(features::kFledgeUsePreconnectCache) &&
|
|
+ if (base::FeatureList::IsEnabled(::features::kFledgeUsePreconnectCache) &&
|
|
!config.server_response.has_value()) {
|
|
size_t n_owners_cached = PreconnectToBuyerOrigins(config);
|
|
for (const blink::AuctionConfig& component_config :
|
|
@@ -747,7 +747,7 @@
|
|
network::mojom::ClientSecurityStatePtr
|
|
AdAuctionServiceImpl::GetClientSecurityState() {
|
|
if (base::FeatureList::IsEnabled(
|
|
- features::kFledgeOnlyUseIpAddressSpaceInClientSecurityState)) {
|
|
+ ::features::kFledgeOnlyUseIpAddressSpaceInClientSecurityState)) {
|
|
PolicyContainerHost* policies = GetFrame()->policy_container_host();
|
|
// This matches what GetFrame()->BuildClientSecurityState() does, in the no
|
|
// PolicyContainer case. According to comments there, PolicyContainerHost
|
|
@@ -769,7 +769,7 @@
|
|
|
|
std::optional<std::string> AdAuctionServiceImpl::GetCookieDeprecationLabel() {
|
|
if (!base::FeatureList::IsEnabled(
|
|
- features::kFledgeFacilitatedTestingSignalsHeaders)) {
|
|
+ ::features::kFledgeFacilitatedTestingSignalsHeaders)) {
|
|
return std::nullopt;
|
|
}
|
|
|
|
@@ -891,7 +891,7 @@
|
|
kCrossOriginOwnerInterestGroupSubframeCheckFailed);
|
|
|
|
if (base::FeatureList::IsEnabled(
|
|
- features::kFledgeModifyInterestGroupPolicyCheckOnOwner)) {
|
|
+ ::features::kFledgeModifyInterestGroupPolicyCheckOnOwner)) {
|
|
return false;
|
|
}
|
|
}
|
|
@@ -969,7 +969,7 @@
|
|
// been invalidated or the current frame's `PageImpl` has changed to a
|
|
// different one, abort the auction.
|
|
// See crbug.com/1422301.
|
|
- if (base::FeatureList::IsEnabled(features::kDetectInconsistentPageImpl) &&
|
|
+ if (base::FeatureList::IsEnabled(::features::kDetectInconsistentPageImpl) &&
|
|
(!GetFrame()->auction_initiator_page() ||
|
|
GetFrame()->auction_initiator_page().get() !=
|
|
&(GetFrame()->GetPage()))) {
|
|
@@ -1390,7 +1390,7 @@
|
|
// been invalidated or the current frame's `PageImpl` has changed to a
|
|
// different one, signal that state is no longer available.
|
|
// See crbug.com/1422301.
|
|
- if (base::FeatureList::IsEnabled(features::kDetectInconsistentPageImpl) &&
|
|
+ if (base::FeatureList::IsEnabled(::features::kDetectInconsistentPageImpl) &&
|
|
(!GetFrame()->auction_initiator_page() ||
|
|
GetFrame()->auction_initiator_page().get() !=
|
|
&(GetFrame()->GetPage()))) {
|
|
--- a/content/browser/interest_group/auction_process_manager.cc
|
|
+++ b/content/browser/interest_group/auction_process_manager.cc
|
|
@@ -99,7 +99,7 @@
|
|
if (is_idle_) {
|
|
remove_idle_process_from_manager_timer_.Start(
|
|
FROM_HERE,
|
|
- features::kFledgeStartAnticipatoryProcessExpirationTime.Get(),
|
|
+ ::features::kFledgeStartAnticipatoryProcessExpirationTime.Get(),
|
|
base::BindOnce(&RecordIdleProcessExpiredUma, true)
|
|
.Then(base::BindOnce(&WorkletProcess::RemoveFromProcessManager,
|
|
base::Unretained(this),
|
|
@@ -393,7 +393,7 @@
|
|
SiteInstance* frame_site_instance,
|
|
WorkletType worklet_type) {
|
|
if (!base::FeatureList::IsEnabled(
|
|
- features::kFledgeStartAnticipatoryProcesses)) {
|
|
+ ::features::kFledgeStartAnticipatoryProcesses)) {
|
|
return;
|
|
}
|
|
|
|
--- a/content/browser/interest_group/auction_runner.cc
|
|
+++ b/content/browser/interest_group/auction_runner.cc
|
|
@@ -45,7 +45,7 @@
|
|
auction_worklet::mojom::KAnonymityBidMode DetermineKAnonMode() {
|
|
// K-anonymity enforcement is always disabled for the testing population.
|
|
if (base::FeatureList::IsEnabled(
|
|
- features::kCookieDeprecationFacilitatedTesting)) {
|
|
+ ::features::kCookieDeprecationFacilitatedTesting)) {
|
|
return auction_worklet::mojom::KAnonymityBidMode::kNone;
|
|
}
|
|
if (base::FeatureList::IsEnabled(
|
|
@@ -762,7 +762,7 @@
|
|
});
|
|
|
|
if (base::FeatureList::IsEnabled(
|
|
- features::kFledgeDelayPostAuctionInterestGroupUpdate)) {
|
|
+ ::features::kFledgeDelayPostAuctionInterestGroupUpdate)) {
|
|
interest_group_manager_->UpdateInterestGroupsOfOwnersWithDelay(
|
|
std::move(update_owners), client_security_state_.Clone(),
|
|
std::move(user_agent_override_), std::move(attestation_callback_),
|
|
--- a/content/browser/interest_group/auction_url_loader_factory_proxy.cc
|
|
+++ b/content/browser/interest_group/auction_url_loader_factory_proxy.cc
|
|
@@ -63,7 +63,7 @@
|
|
const url::Origin& top_frame_origin,
|
|
const url::Origin& seller_origin) {
|
|
if (base::FeatureList::IsEnabled(
|
|
- features::kFledgeUseNonTransientNIKForSeller)) {
|
|
+ ::features::kFledgeUseNonTransientNIKForSeller)) {
|
|
return net::IsolationInfo::Create(
|
|
net::IsolationInfo::RequestType::kOther, top_frame_origin,
|
|
seller_origin, net::SiteForCookies(), /*nonce=*/std::nullopt,
|
|
--- a/content/browser/interest_group/auction_worklet_manager.cc
|
|
+++ b/content/browser/interest_group/auction_worklet_manager.cc
|
|
@@ -338,7 +338,7 @@
|
|
// When `kFledgeUseKVv2SignalsCache` is enabled, the TrustedSignalsCache
|
|
// manages KVv2 fetches in the browser process, so don't need get a key to
|
|
// pass to the worklet process.
|
|
- if (!base::FeatureList::IsEnabled(features::kFledgeUseKVv2SignalsCache)) {
|
|
+ if (!base::FeatureList::IsEnabled(::features::kFledgeUseKVv2SignalsCache)) {
|
|
waiting_on_trusted_signals_kvv2_public_key_ = true;
|
|
worklet_manager_->delegate()->GetTrustedKeyValueServerKey(
|
|
url::Origin::Create(worklet_info_.signals_url.value_or(GURL())),
|
|
@@ -689,7 +689,7 @@
|
|
|
|
for (size_t i = 0;
|
|
i < static_cast<size_t>(
|
|
- features::kFledgeSellerWorkletThreadPoolSize.Get());
|
|
+ ::features::kFledgeSellerWorkletThreadPoolSize.Get());
|
|
++i) {
|
|
worklet_debugs_.emplace_back(new DebuggableAuctionWorklet(
|
|
delegate->GetFrame(), process_handle_, worklet_info_.script_url,
|
|
@@ -723,7 +723,7 @@
|
|
worklet_info_.trusted_signals_coordinator &&
|
|
base::FeatureList::IsEnabled(
|
|
blink::features::kFledgeTrustedSignalsKVv2Support) &&
|
|
- base::FeatureList::IsEnabled(features::kFledgeUseKVv2SignalsCache)) {
|
|
+ base::FeatureList::IsEnabled(::features::kFledgeUseKVv2SignalsCache)) {
|
|
if (url::Origin::Create(worklet_info_.script_url)
|
|
.IsSameOriginWith(*worklet_info_.signals_url)) {
|
|
// If the script and signals URLs are same-origin, they may always be
|
|
--- a/content/browser/interest_group/ad_auction_headers_util.cc
|
|
+++ b/content/browser/interest_group/ad_auction_headers_util.cc
|
|
@@ -344,7 +344,7 @@
|
|
// We intentionally leave the `Ad-Auction-Result` response header in place.
|
|
|
|
if (base::FeatureList::IsEnabled(
|
|
- features::kFledgeBiddingAndAuctionNonceSupport)) {
|
|
+ ::features::kFledgeBiddingAndAuctionNonceSupport)) {
|
|
if (std::optional<std::string> ad_auction_results =
|
|
headers->GetNormalizedHeader(
|
|
kAdAuctionResultNonceResponseHeaderKey)) {
|
|
--- a/content/browser/interest_group/ad_auction_result_metrics.cc
|
|
+++ b/content/browser/interest_group/ad_auction_result_metrics.cc
|
|
@@ -53,9 +53,9 @@
|
|
|
|
bool AdAuctionResultMetrics::ShouldRunAuction() {
|
|
num_requested_auctions_++;
|
|
- if (!base::FeatureList::IsEnabled(features::kFledgeLimitNumAuctions))
|
|
+ if (!base::FeatureList::IsEnabled(::features::kFledgeLimitNumAuctions))
|
|
return true;
|
|
- if (num_requested_auctions_ > features::kFledgeLimitNumAuctionsParam.Get()) {
|
|
+ if (num_requested_auctions_ > ::features::kFledgeLimitNumAuctionsParam.Get()) {
|
|
num_auctions_not_run_due_to_auction_limit_++;
|
|
return false;
|
|
}
|
|
--- a/content/browser/interest_group/bidding_and_auction_response.cc
|
|
+++ b/content/browser/interest_group/bidding_and_auction_response.cc
|
|
@@ -113,7 +113,7 @@
|
|
}
|
|
|
|
if (base::FeatureList::IsEnabled(
|
|
- features::kFledgeBiddingAndAuctionNonceSupport)) {
|
|
+ ::features::kFledgeBiddingAndAuctionNonceSupport)) {
|
|
const std::string* nonce = input_dict->FindString("nonce");
|
|
if (nonce) {
|
|
base::Uuid nonce_uuid = base::Uuid::ParseCaseInsensitive(*nonce);
|
|
@@ -313,7 +313,7 @@
|
|
}
|
|
}
|
|
|
|
- if (base::FeatureList::IsEnabled(features::kEnableBandAKAnonEnforcement)) {
|
|
+ if (base::FeatureList::IsEnabled(::features::kEnableBandAKAnonEnforcement)) {
|
|
base::Value::Dict* k_anon_winner_join_candidate =
|
|
input_dict->FindDict("kAnonWinnerJoinCandidates");
|
|
if (k_anon_winner_join_candidate) {
|
|
@@ -331,7 +331,7 @@
|
|
|
|
if (base::FeatureList::IsEnabled(blink::features::kPrivateAggregationApi) &&
|
|
blink::features::kPrivateAggregationApiEnabledInProtectedAudience.Get() &&
|
|
- base::FeatureList::IsEnabled(features::kEnableBandAPrivateAggregation)) {
|
|
+ base::FeatureList::IsEnabled(::features::kEnableBandAPrivateAggregation)) {
|
|
const base::Value::List* pagg_response =
|
|
input_dict->FindList("paggResponse");
|
|
if (pagg_response) {
|
|
@@ -340,7 +340,7 @@
|
|
}
|
|
}
|
|
|
|
- if (base::FeatureList::IsEnabled(features::kEnableBandASampleDebugReports)) {
|
|
+ if (base::FeatureList::IsEnabled(::features::kEnableBandASampleDebugReports)) {
|
|
base::Value::List* for_debugging_only_reports =
|
|
input_dict->FindList("debugReports");
|
|
if (for_debugging_only_reports) {
|
|
@@ -349,7 +349,7 @@
|
|
}
|
|
|
|
base::Value::Dict* triggered_updates = input_dict->FindDict("updateGroups");
|
|
- if (base::FeatureList::IsEnabled(features::kEnableBandATriggeredUpdates) &&
|
|
+ if (base::FeatureList::IsEnabled(::features::kEnableBandATriggeredUpdates) &&
|
|
triggered_updates) {
|
|
for (const auto owner_groups : *triggered_updates) {
|
|
url::Origin owner = url::Origin::Create(GURL(owner_groups.first));
|
|
--- a/content/browser/interest_group/bidding_and_auction_serializer.cc
|
|
+++ b/content/browser/interest_group/bidding_and_auction_serializer.cc
|
|
@@ -114,7 +114,7 @@
|
|
bool KAnonIsEnabled() {
|
|
// K-anonymity enforcement is always disabled for the testing population.
|
|
if (base::FeatureList::IsEnabled(
|
|
- features::kCookieDeprecationFacilitatedTesting)) {
|
|
+ ::features::kCookieDeprecationFacilitatedTesting)) {
|
|
return false;
|
|
}
|
|
return base::FeatureList::IsEnabled(
|
|
@@ -350,7 +350,7 @@
|
|
TaggedSIntLength(recency);
|
|
|
|
if (group->bidding_browser_signals->view_and_click_counts &&
|
|
- base::FeatureList::IsEnabled(features::kEnableBandAClickiness)) {
|
|
+ base::FeatureList::IsEnabled(::features::kEnableBandAClickiness)) {
|
|
if (group->bidding_browser_signals->view_and_click_counts->view_counts) {
|
|
std::pair<cbor::Value::ArrayValue, size_t> views = BuildClickinessArray(
|
|
*group->bidding_browser_signals->view_and_click_counts->view_counts);
|
|
@@ -448,7 +448,7 @@
|
|
cbor::Value(std::move(browser_signals));
|
|
|
|
if (base::FeatureList::IsEnabled(
|
|
- features::kFledgeSendDebugReportCooldownsToBandA)) {
|
|
+ ::features::kFledgeSendDebugReportCooldownsToBandA)) {
|
|
group_elements_size +=
|
|
TaggedStringLength(constexpr_strlen("inCooldownOrLockout")) + 1;
|
|
group_obj[cbor::Value("inCooldownOrLockout")] =
|
|
@@ -1034,7 +1034,7 @@
|
|
TaggedStringLength(constexpr_strlen("enableDebugReporting")) + 1;
|
|
|
|
if (base::FeatureList::IsEnabled(
|
|
- features::kFledgeSendDebugReportCooldownsToBandA)) {
|
|
+ ::features::kFledgeSendDebugReportCooldownsToBandA)) {
|
|
// Note: here this field's value is set false as a placeholder only, but it
|
|
// will be overwritten in
|
|
// `InterestGroupManagerImpl::OnAdAuctionDataLoadComplete` to its real
|
|
@@ -1081,7 +1081,7 @@
|
|
TaggedStringLength(constexpr_strlen("requestTimestampMs")) +
|
|
TaggedSIntLength(timestamp);
|
|
|
|
- if (base::FeatureList::IsEnabled(features::kEnableBandAKAnonEnforcement) &&
|
|
+ if (base::FeatureList::IsEnabled(::features::kEnableBandAKAnonEnforcement) &&
|
|
KAnonIsEnabled()) {
|
|
message_obj[cbor::Value("enforceKAnon")] = cbor::Value(true);
|
|
message_elements_size +=
|
|
@@ -1153,7 +1153,7 @@
|
|
NOTREACHED(base::NotFatalUntil::M138);
|
|
}
|
|
if (base::FeatureList::IsEnabled(
|
|
- features::kFledgeSendDebugReportCooldownsToBandA)) {
|
|
+ ::features::kFledgeSendDebugReportCooldownsToBandA)) {
|
|
bool debug_report_in_cooldown_or_lockout =
|
|
debug_report_in_lockout_ ||
|
|
IsInDebugReportCooldown(seller, debug_report_cooldown_map_, now);
|