flags = [ "CRONET_BUILD=$is_cronet_build" ]
}
-use_epoll = is_linux || is_chromeos || is_android
+use_epoll = is_linux || is_chromeos || is_android || is_tizen
# Base and everything it depends on should be a static library rather than
# a source set. Base is more of a "library" in the classic sense in that many
# Don't check in changes that set this to false for more platforms; doing so
# is not supported.
use_custom_libcxx = is_fuchsia || is_android || is_apple || is_linux ||
- is_chromeos || (is_win && is_clang) || is_tizen
+ is_chromeos || (is_win && is_clang)
# Use libc++ instead of stdlibc++ when using the host_cpu toolchain, even if
# use_custom_libcxx is false. This is useful for cross-compiles where a custom
# Adds a dependency on the Clang runtime library clang_rt.builtins.
clang_lib("compiler_builtins") {
- if (is_mac) {
+ if (!toolchain_has_rust) {
+ # Since there's no Rust in the toolchain, there's no concern that we'll use
+ # the Rust stdlib's intrinsics here.
+ #
+ # Don't define libname which makes this target do nothing.
+ } else if (is_mac) {
libname = "osx"
} else if (is_ios) {
if (target_environment == "simulator") {
"-Wenum-compare-conditional",
]
- if (!is_nacl) {
+ if (!is_nacl && !is_tizen) {
cflags_cc += [
# TODO(crbug.com/41486292): Fix and re-enable.
"-Wno-c++11-narrowing-const-reference",
[ "//chrome/browser/enterprise/connectors/analysis:sdk_manager" ]
}
- if (is_linux || is_win || is_mac) {
+ if (is_linux || is_win || is_mac || is_tizen) {
sources += [
"enterprise/chrome_browser_main_extra_parts_enterprise.cc",
"enterprise/chrome_browser_main_extra_parts_enterprise.h",
[ "//third_party/webrtc/modules/desktop_capture:pipewire_config" ]
}
- if (is_linux && use_dbus) {
+ if ((is_linux && use_dbus) || is_tizen) {
sources += [
"notifications/notification_platform_bridge_linux.cc",
"notifications/notification_platform_bridge_linux.h",
]
}
- if (is_win || is_android || is_linux) {
+ if (is_win || is_android || is_linux || is_tizen) {
sources += [
"metrics/chrome_metrics_service_crash_reporter.cc",
"metrics/chrome_metrics_service_crash_reporter.h",
public_deps += [ "//chrome/browser/win/conflicts:module_list_proto" ]
}
}
- if (is_win || is_mac || is_linux) {
+ if (is_win || is_mac || is_linux || is_tizen) {
public_deps += [
"//chrome/browser/enterprise/connectors/device_trust/attestation/common/proto:attestation_ca_proto",
"//chrome/browser/enterprise/connectors/device_trust/attestation/common/proto:google_key_proto",
"//chrome/browser/ui/webui/whats_new:mojo_bindings",
]
}
- if (is_win || is_mac || is_linux || is_chromeos_ash) {
+ if (is_win || is_mac || is_linux || is_chromeos_ash || is_tizen) {
public_deps +=
[ "//chrome/browser/ui/webui/connectors_internals:mojo_bindings" ]
}
"//ui/webui/resources/cr_components/app_management:mojo_bindings",
]
- if (is_win || is_mac || is_linux) {
+ if (is_win || is_mac || is_linux || is_tizen) {
public_deps += [ "//chrome/browser/ui/webui/app_home:mojo_bindings" ]
}
}
}
}
-if (is_win || is_mac || is_linux) {
+if (is_win || is_mac || is_linux || is_tizen) {
fuzzer_test("browser_switcher_ieem_sitelist_parser_fuzzer") {
sources = [ "browser_switcher/ieem_sitelist_parser_fuzzer.cc" ]
deps = [
flag_descriptions::kHideIncognitoMediaMetadataDescription, kOsAll,
FEATURE_VALUE_TYPE(media::kHideIncognitoMediaMetadata)},
-#if BUILDFLAG(IS_LINUX) || BUILDFLAG(IS_MAC) || BUILDFLAG(IS_WIN)
+#if BUILDFLAG(IS_LINUX) || BUILDFLAG(IS_MAC) || BUILDFLAG(IS_WIN) || \
+ BUILDFLAG(IS_TIZEN)
{"third-party-profile-management",
flag_descriptions::kThirdPartyProfileManagementName,
flag_descriptions::kThirdPartyProfileManagementDescription,
# Use of this source code is governed by a BSD-style license that can be
# found in the LICENSE file.
-assert(is_win || is_mac || is_linux || is_chromeos || is_android)
+assert(is_win || is_mac || is_linux || is_chromeos || is_android || is_tizen)
source_set("ai") {
sources = [
# Use of this source code is governed by a BSD-style license that can be
# found in the LICENSE file.
-assert(is_win || is_mac || is_linux || is_chromeos || is_android)
+assert(is_win || is_mac || is_linux || is_chromeos || is_android || is_tizen)
source_set("commerce") {
sources = [
# Use of this source code is governed by a BSD-style license that can be
# found in the LICENSE file.
-assert(is_win || is_mac || is_linux || is_chromeos)
+assert(is_win || is_mac || is_linux || is_chromeos || is_tizen)
source_set("unit_tests") {
testonly = true
# Use of this source code is governed by a BSD - style license that can be
# found in the LICENSE file.
-assert(is_win || is_mac || is_linux || is_chromeos)
+assert(is_win || is_mac || is_linux || is_chromeos || is_tizen)
static_library("core") {
sources = [
# Use of this source code is governed by a BSD-style license that can be
# found in the LICENSE file.
-assert(is_win || is_mac || is_linux || is_chromeos || is_android)
+assert(is_win || is_mac || is_linux || is_chromeos || is_android || is_tizen)
import("//mojo/public/tools/bindings/mojom.gni")
# TODO(crbug.com/40149439) This is currently disabled due to Windows DLL
# thunking issues. Fix & re-enable.
-assert(is_linux || is_chromeos)
+assert(is_linux || is_chromeos || is_tizen)
source_set("constants") {
sources = [
content::BrowserContext* context)
: context_(context) {
event_router_ = EventRouter::Get(context_);
+#if BUILDFLAG(ENTERPRISE_CLOUD_CONTENT_ANALYSIS)
reporting_client_ =
enterprise_connectors::RealtimeReportingClientFactory::GetForProfile(
context);
+#endif // BUILDFLAG(ENTERPRISE_CLOUD_CONTENT_ANALYSIS)
}
SafeBrowsingPrivateEventRouter::~SafeBrowsingPrivateEventRouter() = default;
event_router_->BroadcastEvent(std::move(extension_event));
}
+#if BUILDFLAG(ENTERPRISE_CLOUD_CONTENT_ANALYSIS)
std::optional<enterprise_connectors::ReportingSettings> settings =
reporting_client_->GetReportingSettings();
if (!settings.has_value() ||
reporting_client_->ReportRealtimeEvent(
enterprise_connectors::kKeyDangerousDownloadEvent,
std::move(settings.value()), std::move(event));
+#endif // BUILDFLAG(ENTERPRISE_CLOUD_CONTENT_ANALYSIS)
}
void SafeBrowsingPrivateEventRouter::OnSecurityInterstitialShown(
# Use of this source code is governed by a BSD-style license that can be
# found in the LICENSE file.
-assert(is_win || is_mac || is_linux || is_chromeos || is_android)
+assert(is_win || is_mac || is_linux || is_chromeos || is_android || is_tizen)
import("//build/config/chromeos/ui_mode.gni")
import("//components/enterprise/buildflags/buildflags.gni")
import("//components/safe_browsing/buildflags.gni")
-assert(is_win || is_mac || is_linux || is_chromeos || is_android)
+assert(is_win || is_mac || is_linux || is_chromeos || is_android || is_tizen)
source_set("file_system_access") {
sources = [
# Use of this source code is governed by a BSD-style license that can be
# found in the LICENSE file.
-assert(is_win || is_mac || is_linux || is_chromeos || is_android)
+assert(is_win || is_mac || is_linux || is_chromeos || is_android || is_tizen)
import("//build/config/ozone.gni")
import("//build/config/ui.gni")
deps += [ "//components/remote_cocoa/browser" ]
}
- if ((is_linux || is_chromeos_lacros) && use_ozone) {
+ if ((is_linux || is_tizen || is_chromeos_lacros) && use_ozone) {
sources += [ "window_icon_util_ozone.cc" ]
deps += [ "//ui/ozone" ]
}
return;
}
- const CpuPercent total_system_cpu_usage{cpu_sample.value().cpu_utilization *
- 100};
+ const CpuPercent total_system_cpu_usage{
+ static_cast<int>(cpu_sample.value().cpu_utilization * 100)};
if (GetHealthLevelForMeasurement(total_system_cpu_usage) !=
HealthLevel::kHealthy) {
// Query for tab CPU usage to determine actionability
import("//chrome/common/features.gni")
-assert(is_win || is_mac || is_linux || is_chromeos || is_android)
+assert(is_win || is_mac || is_linux || is_chromeos || is_android || is_tizen)
source_set("picture_in_picture") {
sources = [
import("//ui/webui/resources/tools/build_webui.gni")
-assert(is_win || is_mac || is_linux)
+assert(is_win || is_mac || is_linux || is_tizen)
build_webui("build") {
grd_prefix = "app_home"
# Use of this source code is governed by a BSD-style license that can be
# found in the LICENSE file.
-assert(is_win || is_mac || is_linux || is_chromeos || is_android)
+assert(is_win || is_mac || is_linux || is_chromeos || is_android || is_tizen)
source_set("search") {
sources = [
# Use of this source code is governed by a BSD-style license that can be
# found in the LICENSE file.
-assert(is_win || is_mac || is_linux || is_chromeos)
+assert(is_win || is_mac || is_linux || is_chromeos || is_tizen)
import("//third_party/protobuf/proto_library.gni")
import("//build/config/chrome_build.gni")
import("//build/config/chromeos/args.gni")
-assert(is_win || is_mac || is_linux || is_chromeos || is_android)
+assert(is_win || is_mac || is_linux || is_chromeos || is_android || is_tizen)
source_set("search_engine_choice") {
sources = [ "search_engine_choice_service_factory.h" ]
import("//rlz/buildflags/buildflags.gni")
-assert(is_win || is_mac || is_linux || is_chromeos || is_android)
+assert(is_win || is_mac || is_linux || is_chromeos || is_android || is_tizen)
source_set("search_engines") {
public = [
import("//build/config/chromeos/ui_mode.gni")
import("//extensions/buildflags/buildflags.gni")
-assert(is_win || is_mac || is_linux || is_chromeos || is_android)
+assert(is_win || is_mac || is_linux || is_chromeos || is_android || is_tizen)
source_set("sync") {
sources = [
# Use of this source code is governed by a BSD-style license that can be
# found in the LICENSE file.
-assert(is_win || is_mac || is_linux || is_chromeos)
+assert(is_win || is_mac || is_linux || is_chromeos || is_tizen)
import("//build/config/chromeos/ui_mode.gni")
import("//components/nacl/features.gni")
import("//extensions/buildflags/buildflags.gni")
-assert(is_win || is_mac || is_linux || is_chromeos)
+assert(is_win || is_mac || is_linux || is_chromeos || is_tizen)
source_set("themes") {
public = [
]
deps += [ "//extensions/browser" ]
}
- if (is_win || is_mac || is_linux) {
+ if (is_win || is_mac || is_linux || is_tizen) {
public += [ "theme_color_policy_handler.h" ]
sources += [ "theme_color_policy_handler.cc" ]
deps += [
]
deps += [ "//chrome/browser/win:mica_titlebar" ]
}
- if (is_linux) {
+ if (is_linux || is_tizen) {
public += [ "theme_service_aura_linux.h" ]
sources += [ "theme_service_aura_linux.cc" ]
deps += [
import("//build/config/chromeos/ui_mode.gni")
-assert(is_win || is_mac || is_linux || is_chromeos)
+assert(is_win || is_mac || is_linux || is_chromeos || is_tizen)
source_set("apps") {
sources = [
import("//build/util/branding.gni")
import("//components/signin/features.gni")
-assert(is_win || is_mac || is_linux || is_chromeos || is_android)
+assert(is_win || is_mac || is_linux || is_chromeos || is_android || is_tizen)
source_set("autofill") {
sources = [
import("//build/config/ui.gni")
-assert(is_win || is_mac || is_linux || is_chromeos || is_android)
+assert(is_win || is_mac || is_linux || is_chromeos || is_android || is_tizen)
source_set("payments") {
sources = [
import("//build/config/ozone.gni")
-assert(is_win || is_mac || is_linux || is_chromeos || is_android)
+assert(is_win || is_mac || is_linux || is_chromeos || is_android || is_tizen)
source_set("blocked_content") {
sources = [
# Use of this source code is governed by a BSD-style license that can be
# found in the LICENSE file.
-assert(is_win || is_mac || is_linux || is_chromeos || is_android)
+assert(is_win || is_mac || is_linux || is_chromeos || is_android || is_tizen)
source_set("bluetooth") {
sources = [ "bluetooth_dialogs.h" ]
# Use of this source code is governed by a BSD-style license that can be
# found in the LICENSE file.
-assert(is_win || is_mac || is_linux || is_chromeos)
+assert(is_win || is_mac || is_linux || is_chromeos || is_tizen)
# This is the public interface for a browser window. Most features in
# //chrome/browser depend on this interface, and thus to prevent circular
# Use of this source code is governed by a BSD-style license that can be
# found in the LICENSE file.
-assert(is_win || is_mac || is_linux || is_chromeos)
+assert(is_win || is_mac || is_linux || is_chromeos || is_tizen)
source_set("commerce") {
sources = [
# Use of this source code is governed by a BSD-style license that can be
# found in the LICENSE file.
-assert(is_win || is_mac || is_linux || is_chromeos)
+assert(is_win || is_mac || is_linux || is_chromeos || is_tizen)
source_set("content_settings") {
sources = []
# Use of this source code is governed by a BSD-style license that can be
# found in the LICENSE file.
-assert(is_win || is_mac || is_linux || is_chromeos || is_android)
+assert(is_win || is_mac || is_linux || is_chromeos || is_android || is_tizen)
source_set("cookie_controls") {
sources = [
# Use of this source code is governed by a BSD-style license that can be
# found in the LICENSE file.
-assert(is_win || is_mac || is_linux || is_chromeos)
+assert(is_win || is_mac || is_linux || is_chromeos || is_tizen)
source_set("customize_chrome") {
sources = [ "side_panel_controller.h" ]
# Use of this source code is governed by a BSD-style license that can be
# found in the LICENSE file.
-assert(is_win || is_mac || is_linux || is_chromeos)
+assert(is_win || is_mac || is_linux || is_chromeos || is_tizen)
source_set("device_signals_consent") {
sources = [ "consent_requester.h" ]
# Use of this source code is governed by a BSD-style license that can be
# found in the LICENSE file.
-assert(is_win || is_mac || is_linux || is_chromeos || is_android)
+assert(is_win || is_mac || is_linux || is_chromeos || is_android || is_tizen)
source_set("digital_credentials") {
sources = [ "digital_identity_safety_interstitial_controller.h" ]
import("//build/config/ozone.gni")
import("//extensions/buildflags/buildflags.gni")
-assert(is_win || is_mac || is_linux || is_chromeos)
+assert(is_win || is_mac || is_linux || is_chromeos || is_tizen)
source_set("exclusive_access") {
sources = [
# Use of this source code is governed by a BSD-style license that can be
# found in the LICENSE file.
-assert(is_win || is_mac || is_linux || is_chromeos || is_android)
+assert(is_win || is_mac || is_linux || is_chromeos || is_android || is_tizen)
source_set("file_system_access") {
sources = [
import("//build/config/chromeos/args.gni")
-assert(is_win || is_mac || is_linux || is_chromeos || is_android)
+assert(is_win || is_mac || is_linux || is_chromeos || is_android || is_tizen)
source_set("find_bar") {
sources = [
# Use of this source code is governed by a BSD-style license that can be
# found in the LICENSE file.
-assert(is_win || is_mac || is_linux || is_chromeos)
+assert(is_win || is_mac || is_linux || is_chromeos || is_tizen)
source_set("frame") {
sources = [
# Use of this source code is governed by a BSD-style license that can be
# found in the LICENSE file.
-assert(is_win || is_mac || is_linux || is_chromeos || is_android)
+assert(is_win || is_mac || is_linux || is_chromeos || is_android || is_tizen)
# The public interface has no circular dependencies.
source_set("omnibox") {
# Use of this source code is governed by a BSD-style license that can be
# found in the LICENSE file.
-assert(is_win || is_mac || is_linux || is_chromeos || is_android)
+assert(is_win || is_mac || is_linux || is_chromeos || is_android || is_tizen)
source_set("icon_type") {
sources = [ "page_action_icon_type.h" ]
# Use of this source code is governed by a BSD-style license that can be
# found in the LICENSE file.
-assert(is_win || is_mac || is_linux || is_chromeos)
+assert(is_win || is_mac || is_linux || is_chromeos || is_tizen)
source_set("permission_bubble") {
sources = [ "permission_prompt.h" ]
# Use of this source code is governed by a BSD-style license that can be
# found in the LICENSE file.
-assert(is_win || is_mac || is_linux || is_chromeos)
+assert(is_win || is_mac || is_linux || is_chromeos || is_tizen)
import("//build/config/ui.gni")
# Use of this source code is governed by a BSD-style license that can be
# found in the LICENSE file.
-assert(is_win || is_mac || is_linux || is_chromeos)
+assert(is_win || is_mac || is_linux || is_chromeos || is_tizen)
import("//build/config/ui.gni")
# Use of this source code is governed by a BSD - style license that can be
# found in the LICENSE file.
-assert(is_win || is_mac || is_linux || is_chromeos)
+assert(is_win || is_mac || is_linux || is_chromeos || is_tizen)
import("//components/lens/features.gni")
import("//extensions/buildflags/buildflags.gni")
# Use of this source code is governed by a BSD-style license that can be
# found in the LICENSE file.
-assert(is_win || is_mac || is_linux || is_chromeos)
+assert(is_win || is_mac || is_linux || is_chromeos || is_tizen)
import("//build/config/ui.gni")
import("//ui/webui/webui_features.gni")
import("//mojo/public/tools/bindings/mojom.gni")
-assert(is_win || is_mac || is_linux)
+assert(is_win || is_mac || is_linux || is_tizen)
mojom("mojo_bindings") {
sources = [ "app_home.mojom" ]
# Use of this source code is governed by a BSD-style license that can be
# found in the LICENSE file.
-assert(is_win || is_mac || is_linux || is_chromeos)
+assert(is_win || is_mac || is_linux || is_chromeos || is_tizen)
source_set("searchbox") {
sources = [
# Use of this source code is governed by a BSD-style license that can be
# found in the LICENSE file.
-assert(is_win || is_mac || is_linux || is_chromeos)
+assert(is_win || is_mac || is_linux || is_chromeos || is_tizen)
source_set("util") {
public = [ "image_util.h" ]
# Use of this source code is governed by a BSD-style license that can be
# found in the LICENSE file.
-assert(is_win || is_mac || is_linux || is_chromeos || is_android)
+assert(is_win || is_mac || is_linux || is_chromeos || is_android || is_tizen)
source_set("zoom") {
sources = [
CrashKeyWithName(CrashKeyWithName&&) = delete;
CrashKeyWithName& operator=(CrashKeyWithName&&) = delete;
~CrashKeyWithName() = delete;
-
+#if BUILDFLAG(USE_CRASHPAD_ANNOTATION)
std::string_view Name() const { return name_; }
std::string_view Value() const { return crash_key_.value(); }
+#endif
void Clear() { crash_key_.Clear(); }
void Set(std::string_view value) { crash_key_.Set(value); }
}
void AppendStringAnnotationsCommandLineSwitch(base::CommandLine* command_line) {
+#if !defined(EWK_BRINGUP) // FIXME: m130 bringup
std::string string_annotations;
for (const auto& crash_key : GetCommandLineStringAnnotations()) {
if (!string_annotations.empty()) {
{string_annotations, crash_key.Name(), "=", crash_key.Value()});
}
command_line->AppendSwitchASCII(kStringAnnotationsSwitch, string_annotations);
+#endif
}
void SetCrashKeysFromCommandLine(const base::CommandLine& command_line) {
#include "build/chromeos_buildflags.h"
#include "content/public/gpu/content_gpu_client.h"
+#if BUILDFLAG(IS_TIZEN)
+#include "components/sampling_profiler/thread_profiler.h"
+#endif
+
#if BUILDFLAG(IS_CHROMEOS_ASH)
namespace arc {
class ProtectedBufferManager;
# Whether the browser provides a speech recognition service
# (//media/mojo/mojom/speech_recognition_service.mojom) to the renderer.
# TODO(crbug.com/40244098) Enable on Fuchsia.
- enable_speech_service = is_chromeos || is_linux || is_mac || is_win
+ enable_speech_service =
+ is_chromeos || is_linux || is_mac || is_win || is_tizen
}
declare_args() {
import("../build_webui_tests.gni")
-assert(is_win || is_mac || is_linux)
+assert(is_win || is_mac || is_linux || is_tizen)
assert(!is_fuchsia, "Fuchsia shouldn't use anything in //chrome")
build_webui_tests("build") {
import("../build_webui_tests.gni")
-assert(is_win || is_mac || is_linux)
+assert(is_win || is_mac || is_linux || is_tizen)
assert(!is_fuchsia, "Fuchsia shouldn't use anything in //chrome")
#include <string>
#include <string_view>
+#include "build/build_config.h"
+#if BUILDFLAG(IS_TIZEN)
+#include <optional>
+#endif
+
enum class AccountType {
// Unspecified account (eg. other domains)
UNKNOWN,
#include "components/autofill/core/browser/ui/payments/card_unmask_prompt_options.h"
#include "components/autofill/core/browser/ui/suggestion.h"
+#if BUILDFLAG(IS_TIZEN)
+#include "components/webauthn/core/browser/internal_authenticator.h"
+#endif
+
namespace autofill::payments {
PaymentsAutofillClient::~PaymentsAutofillClient() = default;
# Indicates support for content analysis against a cloud agent for Enterprise
# Connector policies.
enterprise_cloud_content_analysis =
- is_win || is_mac || is_linux || is_chromeos
+ is_win || is_mac || is_linux || is_chromeos || is_tizen
# Indicates support for content analysis against a cloud agent for Enterprise
# Connector policies.
#ifndef COMPONENTS_IP_PROTECTION_COMMON_IP_PROTECTION_DATA_TYPES_H_
#define COMPONENTS_IP_PROTECTION_COMMON_IP_PROTECTION_DATA_TYPES_H_
+#include "build/build_config.h"
+#if BUILDFLAG(IS_TIZEN)
+#include <optional>
+#endif
+
#include "base/time/time.h"
namespace ip_protection {
}
}
-if (is_linux && use_dbus) {
+if ((is_linux && use_dbus) || is_tizen) {
source_set("secret_portal_key_provider") {
sources = [
"secret_portal_key_provider.cc",
#include "third_party/blink/public/mojom/badging/badging.mojom.h"
#endif
-#if BUILDFLAG(IS_TIZEN)
+#if BUILDFLAG(IS_TIZEN) && defined(ENABLE_WRT_JS)
#include "components/xwalk_extensions/browser/xwalk_extension_manager.h"
#endif
base::BindRepeating(&BindSharedWorkerConnector, base::Unretained(host)));
#if defined(TIZEN_WEB_SPEECH_RECOGNITION)
- map->Add<blink::mojom::SpeechRecognizer>(
+ map->Add<media::mojom::SpeechRecognizer>(
base::BindRepeating(&SpeechRecognitionDispatcherHost::Create,
host->GetProcess()->GetID(), host->GetRoutingID()),
GetIOThreadTaskRunner({}));
host->GetAncestorRenderFrameHostId(),
RenderProcessHost::NotificationServiceCreatorType::kDedicatedWorker,
host));
-#if BUILDFLAG(IS_TIZEN)
+#if BUILDFLAG(IS_TIZEN) && defined(ENABLE_WRT_JS)
map->Add<wrt::mojom::XWalkExtensionBrowser>(base::BindRepeating(
&wrt::XWalkExtensionManager::Bind));
#endif
}
void PipelineImpl::RendererWrapper::OnRequestSuspend(bool resource_conflict) {
- if (state_ == kSuspending || state_ == kSuspended)
+ if (state_ == State::kSuspending || state_ == State::kSuspended) {
return;
+ }
LOG(INFO) << "(" << static_cast<void*>(this) << ") " << __func__;
request_suspend_task_handle_ = main_task_runner_->PostCancelableDelayedTask(
weak_factory_.GetWeakPtr(), time));
}
- SetState(kSeeking);
+ SetState(State::kSeeking);
SerialRunner::Queue bound_fns;
demuxer_->AbortPendingReads();
// data in the high bits, zeros in the low bits, little-endian.
PIXEL_FORMAT_P410LE = 43,
- PIXEL_FORMAT_MAX =
- PIXEL_FORMAT_P410LE, // Must always be equal to largest entry logged.
-
// Please update UMA histogram enumeration when adding new formats here.
#if BUILDFLAG(IS_TIZEN)
PIXEL_FORMAT_ENCODED = 44, // encoded pixels, 1 plane
PIXEL_FORMAT_MAX =
PIXEL_FORMAT_ENCODED, // Must always be equal to largest entry logged.
#endif // defined(TIZEN_TBM_SUPPORT)
+#else
+ PIXEL_FORMAT_MAX =
+ PIXEL_FORMAT_P410LE, // Must always be equal to largest entry logged.
#endif //BUILDFLAG(IS_TIZEN)
-
};
// These values are persisted to logs. Entries should not be renumbered and
#include <algorithm>
+#if BUILDFLAG(IS_TIZEN)
+#include <bitset>
+#endif
+
#include "base/command_line.h"
#include "build/build_config.h"
#include "media/base/media_switches.h"
media_log_(log->Clone()),
site_for_cookies_(std::move(site_for_cookies)),
top_frame_origin_(std::move(top_frame_origin)),
-#if BUILDFLAG(IS_ANDROID)
+#if BUILDFLAG(IS_ANDROID) || defined(TIZEN_MULTIMEDIA)
storage_access_api_status_(storage_access_api_status),
#endif // BUILDFLAG(IS_ANDROID)
enable_instant_source_buffer_gc_(enable_instant_source_buffer_gc),
.Run(demuxer_.get(), suspended_mode, IsStreaming(), is_static);
}
-#if BUILDFLAG(IS_ANDROID)
+#if BUILDFLAG(IS_ANDROID) || defined(TIZEN_MULTIMEDIA)
void DemuxerManager::SetAllowMediaPlayerRendererCredentials(bool allow) {
allow_media_player_renderer_credentials_ = allow;
}
DemuxerCreatedCB on_demuxer_created,
base::flat_map<std::string, std::string> headers);
-#if BUILDFLAG(IS_ANDROID)
+#if BUILDFLAG(IS_ANDROID) || defined(TIZEN_MULTIMEDIA)
void SetAllowMediaPlayerRendererCredentials(bool allow);
#endif // BUILDFLAG(IS_ANDROID)
// Android's MediaUrlDemuxer needs access to these.
net::SiteForCookies site_for_cookies_;
url::Origin top_frame_origin_;
-#if BUILDFLAG(IS_ANDROID)
+#if BUILDFLAG(IS_ANDROID) || defined(TIZEN_MULTIMEDIA)
net::StorageAccessApiStatus storage_access_api_status_;
#endif // BUILDFLAG(IS_ANDROID)
// RAII member for notifying demuxers of memory pressure.
std::unique_ptr<base::MemoryPressureListener> memory_pressure_listener_;
-#if BUILDFLAG(IS_ANDROID)
+#if BUILDFLAG(IS_ANDROID) || defined(TIZEN_MULTIMEDIA)
// Used to determine whether to allow credentials or not for
// MediaPlayerRenderer.
bool allow_media_player_renderer_credentials_ = false;
break;
}
-#if defined(TIZEN_VIDEO_HOLE)
+#if defined(TIZEN_VIDEO_HOLE) && !defined(EWK_BRINGUP) // Fixme : M130 Bringup
case VideoFrameResourceType::HOLE: {
DCHECK_EQ(frame_resources_.size(), 0u);
auto* solid_color_draw_quad =
scoped_refptr<VideoFrame> video_frame) {
#if defined(TIZEN_VIDEO_HOLE)
if (video_frame->storage_type() == media::VideoFrame::STORAGE_HOLE) {
- VideoFrameExternalResources external_resources;
+ VideoFrameExternalResource external_resources;
external_resources.type = VideoFrameResourceType::HOLE;
return external_resources;
}
disable_zstd_filter = is_cronet_build
# Multicast DNS.
- enable_mdns = is_win || is_linux || is_chromeos || is_fuchsia || is_apple
+ enable_mdns =
+ is_win || is_linux || is_chromeos || is_fuchsia || is_apple || is_tizen
# Reporting not used on iOS.
enable_reporting = !is_ios
# Platforms for which certificate verification can only be performed using
# the builtin cert verifier with the Chrome Root Store.
- chrome_root_store_only = is_win || is_mac || is_linux || is_chromeos || is_tizen
+ chrome_root_store_only =
+ is_win || is_mac || is_linux || is_chromeos || is_tizen
# DBSC is only supported on windows for now
enable_device_bound_sessions = is_win
Summary: Chromium EFL
# Version: {TPK_VERSION}.{INTERNAL_API_REVISION}.{CHROMIUM_MAJOR_VERSION}
# The {INTERNAL_API_REVISION} is used for compatibility check with wrtjs.
-Version: 1.1.126
+Version: 1.1.130
# Set by ./tizen_src/scripts/update_chromium_version.sh
-%define upstream_chromium_version 126.0.6478.126
+%define upstream_chromium_version 130.0.6723.116
Release: 1
# The 'Group' should be specified as one of the following valid group list.
# https://wiki.tizen.org/wiki/Packaging/Guidelines#Group_Tag
%define __use_clang 0
%endif
-%define __enable_wrt_js 1
+%define __enable_wrt_js 0
%if 0%{?_disable_wrt_js}
%define __enable_wrt_js 0
%endif
install -m 0644 "%{OUTPUT_FOLDER}"/resources/*.edj "%{buildroot}"%{CHROMIUM_LIB_DIR}/res/themes/
-%if %{__build_chrome} != 1
cp -r "%{OUTPUT_FOLDER}"/locale/* "%{buildroot}"%{CHROMIUM_LIB_DIR}/res/locale/
chmod -R a=r,u+w,a+X "%{buildroot}"%{CHROMIUM_LIB_DIR}/res/locale/*
-%endif
%if "%{?__use_system_icu}" != "1"
install -m 0644 "%{OUTPUT_FOLDER}"/icudtl.dat "%{buildroot}"%{CHROMIUM_LIB_DIR}/bin/
%{CHROMIUM_LIB_DIR}/bin/snapshot_blob.bin
%{CHROMIUM_LIB_DIR}/bin/content_shell.pak
%{CHROMIUM_LIB_DIR}/bin/locales/*.pak
-%{CHROMIUM_LIB_DIR}/res/themes/*.edj
+%{CHROMIUM_LIB_DIR}/res/locale/*
%if %{__build_chrome} == 1
%{CHROMIUM_LIB_DIR}/bin/chrome_100_percent.pak
%{CHROMIUM_LIB_DIR}/bin/chrome_crashpad_handler
%{_bindir}/chrome_crashpad_handler
%endif
- %{CHROMIUM_LIB_DIR}/res/locale/*
%{_libdir}/libchromium-ewk.so
%{_libdir}/libtest_trace_processor.so
%{_libdir}/libewebkit2.so*
%{CHROMIUM_LIB_DIR}/res/images/*.png
%{CHROMIUM_LIB_DIR}/res/themes/*.edj
-%{CHROMIUM_LIB_DIR}/res/locale/*
%if "%{?__use_system_icu}" != "1"
%{CHROMIUM_LIB_DIR}/bin/icudtl.dat
%files devel
%defattr(-,root,root,-)
%{_includedir}/chromium-ewk/*.h
-%{_libdir}/pkgconfig/chromium-efl.pc
%{_libdir}/pkgconfig/*.pc
%{_includedir}/v8/*
# GTest. It unconditionally #includes any.h if pretty-print support
# for absl types is enabled.
"//third_party/googletest/*",
+ "//third_party/webrtc/*",
# WebRTC binary to run PSNR and SSIM video quality analysis. It
# statically links absl and it is used by "browser_tests" when
#include "base/unguessable_token.h"
#include "third_party/blink/renderer/core/css/parser/css_parser_token_stream.h"
+#if BUILDFLAG(IS_TIZEN)
+#include <mutex>
+#endif
+
namespace blink {
class CSSParserTokenStream;
? static_cast<SkColor>(0x00000000)
: static_cast<SkColor>(0xFFFFFFFF);
- webview->SetPageBaseBackgroundColor(absl::make_optional(backgroundColor));
+ webview->SetPageBaseBackgroundColor(std::make_optional(backgroundColor));
// set transparent bg for Render process
if (draws_transparent_background) {
widget_base_->LayerTreeHost()->set_background_color(SkColors::kTransparent);
}
}
+
+void WebFrameWidgetImpl::SetBackgroundColor(int32_t red,
+ int32_t green,
+ int32_t blue,
+ int32_t alpha) {
+ WebViewImpl* webview = View();
+ if (!webview) {
+ return;
+ }
+
+ SkColor backgroundColor = SkColorSetARGB(alpha, red, green, blue);
+ webview->SetPageBaseBackgroundColor(std::make_optional(backgroundColor));
+}
#endif
bool WebFrameWidgetImpl::WillBeDestroyed() const {
#if defined(TIZEN_MULTIMEDIA)
void HTMLMediaElement::SuspendPlayer() {
progress_event_timer_.Stop();
- ScheduleEvent(event_type_names::kSuspend);
+ ScheduleNamedEvent(event_type_names::kSuspend);
SetShouldDelayLoadEvent(false);
SetNetworkState(kNetworkIdle);
}
#ifndef THIRD_PARTY_BLINK_RENDERER_CORE_HTML_TRACK_VTT_VTT_SCANNER_H_
#define THIRD_PARTY_BLINK_RENDERER_CORE_HTML_TRACK_VTT_VTT_SCANNER_H_
+#include "build/build_config.h"
+#if BUILDFLAG(IS_TIZEN)
+#include <variant>
+#endif
+
#include "base/check_op.h"
#include "third_party/blink/renderer/core/core_export.h"
#include "third_party/blink/renderer/platform/wtf/allocator/allocator.h"
if (parent_frame) {
ContentSecurityPolicy* parent_policy =
parent_frame->DomWindow()->GetContentSecurityPolicy();
- const absl::optional<ResourceRequest::RedirectInfo>& redirect_info =
+ const std::optional<ResourceRequest::RedirectInfo>& redirect_info =
request.GetRedirectInfo();
const KURL& url_before_redirects =
redirect_info ? redirect_info->original_url : request.Url();
mojom::blink::ScrollBehavior scroll_behavior) override {
if (!should_restore_scroll)
return;
+#if !defined(EWK_BRINGUP) // FIXME: m130 bringup
+#if BUILDFLAG(IS_TIZEN)
+ pending_view_state_.emplace(PendingViewState());
+#else
pending_view_state_.emplace();
+#endif
+#endif
pending_view_state_->state = view_state;
pending_view_state_->scroll_behavior = scroll_behavior;
}
#ifndef THIRD_PARTY_BLINK_RENDERER_PLATFORM_BINDINGS_EXCEPTION_CONTEXT_H_
#define THIRD_PARTY_BLINK_RENDERER_PLATFORM_BINDINGS_EXCEPTION_CONTEXT_H_
+#if BUILDFLAG(IS_TIZEN)
+#include <variant>
+#endif
+
#include "base/check_op.h"
#include "base/dcheck_is_on.h"
#include "base/notreached.h"
base::OnceClosure WebVideoCaptureImplManager::UseDevice(
const media::VideoCaptureSessionId& id,
- const BrowserInterfaceBrokerProxy& browser_interface_broker) {
+ const BrowserInterfaceBrokerProxy& browser_interface_broker
+#if defined(TIZEN_MULTIMEDIA)
+ ,
+ bool lazy_start
+#endif
+) {
DVLOG(1) << __func__ << " session id: " << id;
DCHECK(render_main_task_runner_->BelongsToCurrentThread());
auto it = base::ranges::find(devices_, id, &DeviceEntry::session_id);
#include <limits>
+#if BUILDFLAG(IS_TIZEN)
+#include <stack>
+#endif
+
#include "third_party/blink/renderer/platform/image-decoders/segment_stream.h"
#include "third_party/skia/include/codec/SkCodec.h"
#include "third_party/skia/include/codec/SkCodecAnimation.h"
def GetBinaryPath():
- if platform.machine() == 'arm64':
+ f = open(os_path.dirname(__file__) + "/target.txt", 'r')
+ str = f.read().strip()
+ if (str == "tizen") :
+ return os_path.join(os_path.dirname(__file__), "tizen/", "node")
+ elif platform.machine() == 'arm64':
darwin_path = 'mac_arm64'
darwin_name = 'node-darwin-arm64'
else:
#include <queue>
#include <stack>
+#include "build/build_config.h"
#include "perfetto/base/status.h"
#include "src/trace_processor/perfetto_sql/engine/perfetto_sql_engine.h"
#include "src/trace_processor/perfetto_sql/parser/function_util.h"
// the destructors run correctly for non-trivial members of the
// union.
using Data =
+#if BUILDFLAG(IS_TIZEN)
+ std::variant<int64_t, double, OwnedString, OwnedBytes, std::nullptr_t>;
+#else
std::variant<int64_t, double, OwnedString, OwnedBytes, nullptr_t>;
+#endif
StoredSqlValue(SqlValue value) {
switch (value.type) {
}
SqlValue AsSqlValue() {
+#if BUILDFLAG(IS_TIZEN)
+ if (std::holds_alternative<std::nullptr_t>(data)) {
+#else
if (std::holds_alternative<nullptr_t>(data)) {
+#endif
return SqlValue();
} else if (std::holds_alternative<int64_t>(data)) {
return SqlValue::Long(std::get<int64_t>(data));
// VK_KHR_video_encode_h264 is a preprocessor guard. Do not pass it to API calls.
#define VK_KHR_video_encode_h264 1
-#include "vk_video/vulkan_video_codec_h264std.h"
-#include "vk_video/vulkan_video_codec_h264std_encode.h"
+#include "third_party/swiftshader/include/vk_video/vulkan_video_codec_h264std.h"
+#include "third_party/swiftshader/include/vk_video/vulkan_video_codec_h264std_encode.h"
#define VK_KHR_VIDEO_ENCODE_H264_SPEC_VERSION 14
#define VK_KHR_VIDEO_ENCODE_H264_EXTENSION_NAME "VK_KHR_video_encode_h264"
// VK_KHR_video_encode_h265 is a preprocessor guard. Do not pass it to API calls.
#define VK_KHR_video_encode_h265 1
-#include "vk_video/vulkan_video_codec_h265std.h"
-#include "vk_video/vulkan_video_codec_h265std_encode.h"
+#include "third_party/swiftshader/include/vk_video/vulkan_video_codec_h265std.h"
+#include "third_party/swiftshader/include/vk_video/vulkan_video_codec_h265std_encode.h"
#define VK_KHR_VIDEO_ENCODE_H265_SPEC_VERSION 14
#define VK_KHR_VIDEO_ENCODE_H265_EXTENSION_NAME "VK_KHR_video_encode_h265"
// VK_KHR_video_decode_h264 is a preprocessor guard. Do not pass it to API calls.
#define VK_KHR_video_decode_h264 1
-#include "vk_video/vulkan_video_codec_h264std_decode.h"
+#include "third_party/swiftshader/include/vk_video/vulkan_video_codec_h264std_decode.h"
#define VK_KHR_VIDEO_DECODE_H264_SPEC_VERSION 9
#define VK_KHR_VIDEO_DECODE_H264_EXTENSION_NAME "VK_KHR_video_decode_h264"
// VK_KHR_video_decode_h265 is a preprocessor guard. Do not pass it to API calls.
#define VK_KHR_video_decode_h265 1
-#include "vk_video/vulkan_video_codec_h265std_decode.h"
+#include "third_party/swiftshader/include/vk_video/vulkan_video_codec_h265std_decode.h"
#define VK_KHR_VIDEO_DECODE_H265_SPEC_VERSION 8
#define VK_KHR_VIDEO_DECODE_H265_EXTENSION_NAME "VK_KHR_video_decode_h265"
typedef struct VkVideoDecodeH265ProfileInfoKHR {
// VK_KHR_video_decode_av1 is a preprocessor guard. Do not pass it to API calls.
#define VK_KHR_video_decode_av1 1
-#include "vk_video/vulkan_video_codec_av1std.h"
-#include "vk_video/vulkan_video_codec_av1std_decode.h"
+#include "third_party/swiftshader/include/vk_video/vulkan_video_codec_av1std.h"
+#include "third_party/swiftshader/include/vk_video/vulkan_video_codec_av1std_decode.h"
#define VK_MAX_VIDEO_AV1_REFERENCES_PER_FRAME_KHR 7U
#define VK_KHR_VIDEO_DECODE_AV1_SPEC_VERSION 1
#define VK_KHR_VIDEO_DECODE_AV1_EXTENSION_NAME "VK_KHR_video_decode_av1"
"EXTRASYSCONFDIR=\"/pkg/data\"",
]
}
- if (is_linux || is_chromeos || is_mac) {
+ if (is_linux || is_chromeos || is_mac || is_tizen) {
defines += [
"SYSCONFDIR=\"/etc\"",
"FALLBACK_CONFIG_DIRS=\"/etc/xdg\"",
rtc_source_set("track_id_stream_info_map") {
visibility = [ "*" ]
sources = [ "test/track_id_stream_info_map.h" ]
- deps = [ "//third_party/abseil-cpp/absl/strings:string_view" ]
+ if (!use_efl) {
+ deps = [ "//third_party/abseil-cpp/absl/strings:string_view" ]
+ }
}
rtc_source_set("rtp_transceiver_direction") {
rtc_source_set("libjingle_logging_api") {
visibility = [ "*" ]
sources = [ "rtc_event_log_output.h" ]
- deps = [ "//third_party/abseil-cpp/absl/strings:string_view" ]
+ if (!use_efl) {
+ deps = [ "//third_party/abseil-cpp/absl/strings:string_view" ]
+ }
}
rtc_library("rtc_event_log_output_file") {
deps = [
"../rtc_base/system:rtc_export",
"//third_party/abseil-cpp/absl/strings",
- "//third_party/abseil-cpp/absl/strings:string_view",
]
+ if (!use_efl) {
+ deps += [ "//third_party/abseil-cpp/absl/strings:string_view" ]
+ }
}
rtc_source_set("webrtc_key_value_config") {
"..:refcountedbase",
"..:scoped_refptr",
"../../rtc_base/system:rtc_export",
- "//third_party/abseil-cpp/absl/base:nullability",
]
+ if (!use_efl) {
+ deps += [ "//third_party/abseil-cpp/absl/base:nullability" ]
+ }
}
rtc_library("environment_factory") {
"audio_device_name.cc",
"audio_device_name.h",
]
- deps = [ "//third_party/abseil-cpp/absl/strings:string_view" ]
+ if (!use_efl) {
+ deps = [ "//third_party/abseil-cpp/absl/strings:string_view" ]
+ }
}
rtc_source_set("windows_core_audio_utility") {
"media_protocol_names.cc",
"media_protocol_names.h",
]
- deps = [ "//third_party/abseil-cpp/absl/strings:string_view" ]
+ if (!use_efl) {
+ deps = [ "//third_party/abseil-cpp/absl/strings:string_view" ]
+ }
}
rtc_library("sctp_data_channel") {
rtc_source_set("sanitizer") {
sources = [ "sanitizer.h" ]
- deps = [ "//third_party/abseil-cpp/absl/meta:type_traits" ]
+ if (!use_efl) {
+ deps = [ "//third_party/abseil-cpp/absl/meta:type_traits" ]
+ }
}
rtc_source_set("bounded_inline_vector") {
"net_helpers.cc",
"net_helpers.h",
]
- deps = [
- "system:rtc_export",
- "//third_party/abseil-cpp/absl/strings:string_view",
- ]
+ deps = [ "system:rtc_export" ]
+ if (!use_efl) {
+ deps += [ "//third_party/abseil-cpp/absl/strings:string_view" ]
+ }
+
if (is_android) {
deps += [ ":ifaddrs_android" ]
}
}
if (is_tizen) {
- import("//tizen_src/build/config/tizen_features.gni")
+ import("//tizen_src/build/config/tizen_features.gni")
}
if (build_with_chromium) {
#
# Enabling H264 when building with MSVC is currently not supported, see
# bugs.webrtc.org/9213#c13 for more info.
- rtc_use_h264 =
- proprietary_codecs && !is_android && !is_ios && !(is_win && !is_clang) && tizen_multimedia
+ rtc_use_h264 = proprietary_codecs && !is_android && !is_ios &&
+ !(is_win && !is_clang) && tizen_multimedia
# Use system OpenH264
rtc_system_openh264 = false
"`absl_deps` has been deprecated, add your Abseil dependencies to the `deps` variable.")
# Abseil dependencies need to be converted to //third_party/abseil-cpp:absl when build_with_chromium=true
- if (build_with_chromium && defined(deps)) {
+ if (build_with_chromium && defined(deps) && !use_efl) {
absl_dependencies =
filter_labels_include(deps, [ "//third_party/abseil-cpp/*" ])
if (absl_dependencies != []) {
"`absl_deps` has been deprecated, add your Abseil dependencies to the `deps` variable.")
# Abseil dependencies need to be converted to //third_party/abseil-cpp:absl when build_with_chromium=true
- if (build_with_chromium && defined(deps)) {
+ if (build_with_chromium && defined(deps) && !use_efl) {
absl_dependencies =
filter_labels_include(deps, [ "//third_party/abseil-cpp/*" ])
if (absl_dependencies != []) {
"`absl_deps` has been deprecated, add your Abseil dependencies to the `deps` variable.")
# Abseil dependencies need to be converted to //third_party/abseil-cpp:absl when build_with_chromium=true
- if (build_with_chromium && defined(deps)) {
+ if (build_with_chromium && defined(deps) && !use_efl) {
absl_dependencies =
filter_labels_include(deps, [ "//third_party/abseil-cpp/*" ])
if (absl_dependencies != []) {
"`absl_deps` has been deprecated, add your Abseil dependencies to the `deps` variable.")
# Abseil dependencies need to be converted to //third_party/abseil-cpp:absl when build_with_chromium=true
- if (build_with_chromium && defined(deps)) {
+ if (build_with_chromium && defined(deps) && !use_efl) {
absl_dependencies =
filter_labels_include(deps, [ "//third_party/abseil-cpp/*" ])
if (absl_dependencies != []) {
#include "content/public/browser/speech_recognition_event_listener.h"
#include "content/public/browser/speech_recognition_manager.h"
#include "content/public/browser/speech_recognition_session_config.h"
-#include "third_party/blink/public/mojom/speech/speech_recognition_error.mojom.h"
+#include "media/mojo/mojom/speech_recognition_error.mojom.h"
#define RUN_ON_BROWSER_IO_THREAD(METHOD, ...) \
do { \
namespace content {
-blink::mojom::SpeechRecognitionErrorCode GetErrorCode(stt_error_e reason) {
+media::mojom::SpeechRecognitionErrorCode GetErrorCode(stt_error_e reason) {
switch (reason) {
case STT_ERROR_NONE:
- return blink::mojom::SpeechRecognitionErrorCode::kNone;
+ return media::mojom::SpeechRecognitionErrorCode::kNone;
case STT_ERROR_NO_SPEECH:
- return blink::mojom::SpeechRecognitionErrorCode::kNoSpeech;
+ return media::mojom::SpeechRecognitionErrorCode::kNoSpeech;
case STT_ERROR_RECORDING_TIMED_OUT:
case STT_ERROR_IO_ERROR:
case STT_ERROR_RECORDER_BUSY:
- return blink::mojom::SpeechRecognitionErrorCode::kAudioCapture;
+ return media::mojom::SpeechRecognitionErrorCode::kAudioCapture;
case STT_ERROR_OUT_OF_NETWORK:
- return blink::mojom::SpeechRecognitionErrorCode::kNetwork;
+ return media::mojom::SpeechRecognitionErrorCode::kNetwork;
case STT_ERROR_PERMISSION_DENIED:
- return blink::mojom::SpeechRecognitionErrorCode::kNotAllowed;
+ return media::mojom::SpeechRecognitionErrorCode::kNotAllowed;
case STT_ERROR_INVALID_LANGUAGE:
- return blink::mojom::SpeechRecognitionErrorCode::kLanguageNotSupported;
+ return media::mojom::SpeechRecognitionErrorCode::kLanguageNotSupported;
case STT_ERROR_NOT_SUPPORTED:
- return blink::mojom::SpeechRecognitionErrorCode::kServiceNotAllowed;
+ return media::mojom::SpeechRecognitionErrorCode::kServiceNotAllowed;
default:
- return blink::mojom::SpeechRecognitionErrorCode::kAborted;
+ return media::mojom::SpeechRecognitionErrorCode::kAborted;
}
}
void SpeechRecognizerImplTizen::RecognitionResults(
bool no_speech,
- std::vector<blink::mojom::SpeechRecognitionResultPtr>& results) {
+ std::vector<media::mojom::WebSpeechRecognitionResultPtr>& results) {
{
base::AutoLock auto_lock(abort_lock_);
if (is_aborted_) {
return;
}
- blink::mojom::SpeechRecognitionError recognition_error;
+ media::mojom::SpeechRecognitionError recognition_error;
recognition_error.code = GetErrorCode(static_cast<stt_error_e>(error));
- recognition_error.details = blink::mojom::SpeechAudioErrorDetails::kNone;
+ recognition_error.details = media::mojom::SpeechAudioErrorDetails::kNone;
listener()->OnRecognitionError(session_id(), recognition_error);
EndRecognition(FROM_HERE);
error == STT_RESULT_MESSAGE_ERROR_TOO_QUIET ||
error == STT_RESULT_MESSAGE_ERROR_TOO_LOUD ||
error == STT_RESULT_MESSAGE_ERROR_TOO_FAST) {
- blink::mojom::SpeechRecognitionError recognition_error;
- recognition_error.code = blink::mojom::SpeechRecognitionErrorCode::kNoMatch;
- recognition_error.details = blink::mojom::SpeechAudioErrorDetails::kNone;
+ media::mojom::SpeechRecognitionError recognition_error;
+ recognition_error.code = media::mojom::SpeechRecognitionErrorCode::kNoMatch;
+ recognition_error.details = media::mojom::SpeechAudioErrorDetails::kNone;
listener()->OnRecognitionError(session_id(), recognition_error);
}
}
}
bool no_speech = true;
- blink::mojom::SpeechRecognitionResultPtr result =
- blink::mojom::SpeechRecognitionResult::New();
+ media::mojom::WebSpeechRecognitionResultPtr result =
+ media::mojom::WebSpeechRecognitionResult::New();
for (int i = 0; i < data_count; i++) {
if (data[i] && data[i][0] != ' ') {
no_speech = false;
std::u16string utterance;
base::UTF8ToUTF16(data[i], strlen(data[i]), &utterance);
result->hypotheses.push_back(
- blink::mojom::SpeechRecognitionHypothesis::New(utterance, 1.0));
+ media::mojom::SpeechRecognitionHypothesis::New(utterance, 1.0));
}
}
result->is_provisional =
(event == STT_RESULT_EVENT_FINAL_RESULT) ? false : true;
- std::vector<blink::mojom::SpeechRecognitionResultPtr> results;
+ std::vector<media::mojom::WebSpeechRecognitionResultPtr> results;
results.push_back(std::move(result));
speech->RecognitionResults(no_speech, results);
#include "base/location.h"
#include "content/browser/speech/speech_recognizer.h"
-#include "third_party/blink/public/mojom/speech/speech_recognition_result.mojom.h"
+#include "media/mojo/mojom/speech_recognition_result.mojom.h"
#if BUILDFLAG(IS_TIZEN_TV)
#include <stt-wrapper.h>
bool ShouldStartRecognition() const;
void RecognitionResults(
bool no_speech,
- std::vector<blink::mojom::SpeechRecognitionResultPtr>& results);
+ std::vector<media::mojom::WebSpeechRecognitionResultPtr>& results);
void HandleSttError(stt_error_e error, const base::Location& location);
void HandleSttResultError(const std::string error);
void RecognitionStarted();
SpeechRecognitionEventListener* GetEventListener() override {
return nullptr;
}
- bool FilterProfanities(int render_process_id) override { return false; }
void BindSpeechRecognitionContext(
mojo::PendingReceiver<media::mojom::SpeechRecognitionContext> receiver)
override {}
#include "eweb_accessibility_object.h"
-#include "content/browser/accessibility/browser_accessibility.h"
-#include "content/browser/accessibility/browser_accessibility_auralinux.h"
-#include "content/browser/accessibility/browser_accessibility_manager_auralinux.h"
#include "content/browser/renderer_host/render_frame_host_impl.h"
#include "content/browser/web_contents/web_contents_impl_efl.h"
#include "content/common/content_export.h"
#include "content/public/browser/web_contents.h"
#include "tizen/system_info.h"
#include "ui/accessibility/platform/ax_platform_node_auralinux.h"
+#include "ui/accessibility/platform/browser_accessibility.h"
+#include "ui/accessibility/platform/browser_accessibility_auralinux.h"
+#include "ui/accessibility/platform/browser_accessibility_manager_auralinux.h"
static const char* const kWebViewAccessibilityObjectName = "eweb accessibility";
static const char* const kWebViewAccessibilityObjectDescription =
ATK_STATE_SHOWING, FALSE);
}
-content::BrowserAccessibilityManager*
+ui::BrowserAccessibilityManager*
EWebAccessibilityObject::GetBrowserAccessibilityManager() const {
auto frame = static_cast<content::RenderFrameHostImpl*>(
web_contents_->GetPrimaryMainFrame());
return efl_atk_obj_;
}
-content::BrowserAccessibilityAuraLinux* EWebAccessibilityObject::GetRootObject()
+ui::BrowserAccessibilityAuraLinux* EWebAccessibilityObject::GetRootObject()
const {
auto manager = GetBrowserAccessibilityManager();
if (!manager) {
return nullptr;
}
- content::BrowserAccessibility* obj =
- static_cast<content::BrowserAccessibility*>(manager->RootDelegate());
+ ui::BrowserAccessibility* obj =
+ static_cast<ui::BrowserAccessibility*>(manager->RootDelegate());
if (!obj) {
LOG(ERROR) << "Unable to get root object from accessibility manager";
return nullptr;
}
- content::BrowserAccessibilityAuraLinux* root_object =
+ ui::BrowserAccessibilityAuraLinux* root_object =
ToBrowserAccessibilityAuraLinux(obj);
return root_object;
namespace ui {
class AXPlatformNodeAuraLinux;
-}
-
-namespace content {
class BrowserAccessibility;
class BrowserAccessibilityManager;
class BrowserAccessibilityAuraLinux;
class BrowserAccessibilityManagerAuraLinux;
class BrowserAccessibilityManager;
+} // namespace ui
+
+namespace content {
class WebContents;
-} // namespace content
+}
G_BEGIN_DECLS
gint GetNChildren() const;
AtkObject* RefChild(gint index) const;
AtkStateSet* RefStateSet() const;
- content::BrowserAccessibilityManager* GetBrowserAccessibilityManager() const;
- content::BrowserAccessibilityAuraLinux* GetRootObject() const;
+ ui::BrowserAccessibilityManager* GetBrowserAccessibilityManager() const;
+ ui::BrowserAccessibilityAuraLinux* GetRootObject() const;
void InvalidateHighlighted(bool focus);
private:
std::optional<std::pair<int, int>> GetEmbeddedObjectIndices();
#if defined(TIZEN_ATK_SUPPORT)
- AtkObject* GetAtkObject() { return atk_object_; }
+ AtkObject* GetAtkObject() { return atk_object_.get(); }
// We own a reference to these ref-counted objects.
- AtkObject* atk_object_ = nullptr;
+ raw_ptr<AtkObject, DanglingUntriaged> atk_object_ = nullptr;
// Keep information of latest ImplementedAtkInterfaces mask to rebuild the
// ATK object accordingly when the platform node changes.
// We own a reference to these ref-counted objects.
// RAW_PTR_EXCLUSION: in-out-arg usage.
- RAW_PTR_EXCLUSION AtkObject* atk_object_ = nullptr;
+ raw_ptr<AtkObject, DanglingUntriaged> atk_object_ = nullptr;
#endif
- RAW_PTR_EXCLUSION AtkHyperlink* atk_hyperlink_ = nullptr;
+ raw_ptr<AtkHyperlink, DanglingUntriaged> atk_hyperlink_ = nullptr;
// A weak pointer which help us track the ATK embeds relation.
// RAW_PTR_EXCLUSION: #addr-of and not much we can do about it (see
// crbug.com/346693629).
int y,
int* view_x,
int* view_y) {
- auto view =
- static_cast<RenderWidgetHostViewAura*>(delegate_->AccessibilityGetView());
+ auto view = static_cast<content::RenderWidgetHostViewAura*>(
+ delegate_->AccessibilityGetView());
if (!view)
return;
}
void BrowserAccessibilityManager::CheckFocusOnEwebview() {
- auto view =
- static_cast<RenderWidgetHostViewAura*>(delegate_->AccessibilityGetView());
+ auto view = static_cast<content::RenderWidgetHostViewAura*>(
+ delegate_->AccessibilityGetView());
if (!view || !view->offscreen_helper())
return;