aboutsummaryrefslogtreecommitdiff
path: root/www/chromium/files/patch-chrome_browser_enterprise_connectors_device__trust_device__trust__servi...
diff options
context:
space:
mode:
authorMatthias Wolf <matthias@rheinwolf.de>2021-06-17 09:22:35 +0000
committerRene Ladan <rene@FreeBSD.org>2021-06-17 09:32:02 +0000
commit9c8545d7801e5a5b68dd4c68d5f0dcb7109015d0 (patch)
treebd5ba927b4a7b2e0fc9aeef18b17d738079b2edd /www/chromium/files/patch-chrome_browser_enterprise_connectors_device__trust_device__trust__service.cc
parentccd805d32e3522eee71501f122f41f59f99fd1b5 (diff)
downloadports-9c8545d7801e5a5b68dd4c68d5f0dcb7109015d0.tar.gz
ports-9c8545d7801e5a5b68dd4c68d5f0dcb7109015d0.zip
www/chromium: update to 91.0.4472.101
Security: https://vuxml.freebsd.org/freebsd/20b3ab21-c9df-11eb-8558-3065ec8fd3ec.html (cherry picked from commit 06317815238060a3a7f5911f18a3dd7c95779c83)
Diffstat (limited to 'www/chromium/files/patch-chrome_browser_enterprise_connectors_device__trust_device__trust__service.cc')
-rw-r--r--www/chromium/files/patch-chrome_browser_enterprise_connectors_device__trust_device__trust__service.cc38
1 files changed, 38 insertions, 0 deletions
diff --git a/www/chromium/files/patch-chrome_browser_enterprise_connectors_device__trust_device__trust__service.cc b/www/chromium/files/patch-chrome_browser_enterprise_connectors_device__trust_device__trust__service.cc
new file mode 100644
index 000000000000..7b2bb199cc08
--- /dev/null
+++ b/www/chromium/files/patch-chrome_browser_enterprise_connectors_device__trust_device__trust__service.cc
@@ -0,0 +1,38 @@
+--- chrome/browser/enterprise/connectors/device_trust/device_trust_service.cc.orig 2021-06-10 11:07:22 UTC
++++ chrome/browser/enterprise/connectors/device_trust/device_trust_service.cc
+@@ -21,9 +21,9 @@ DeviceTrustService::DeviceTrustService(Profile* profil
+ signal_report_callback_(
+ base::BindOnce(&DeviceTrustService::OnSignalReported,
+ base::Unretained(this))) {
+-#if defined(OS_LINUX) || defined(OS_WIN) || defined(OS_MAC)
++#if defined(OS_LINUX) || defined(OS_WIN) || defined(OS_MAC) || defined(OS_BSD)
+ key_pair_ = std::make_unique<DeviceTrustKeyPair>();
+-#endif // defined(OS_LINUX) || defined(OS_WIN) || defined(OS_MAC)
++#endif // defined(OS_LINUX) || defined(OS_WIN) || defined(OS_MAC) || defined(OS_BSD)
+
+ pref_observer_.Init(prefs_);
+ pref_observer_.Add(kContextAwareAccessSignalsAllowlistPref,
+@@ -53,9 +53,9 @@ void DeviceTrustService::OnPolicyUpdated() {
+
+ if (!first_report_sent_ &&
+ IsEnabled()) { // Policy enabled for the first time.
+-#if defined(OS_LINUX) || defined(OS_WIN) || defined(OS_MAC)
++#if defined(OS_LINUX) || defined(OS_WIN) || defined(OS_MAC) || defined(OS_BSD)
+ key_pair_->Init();
+-#endif // defined(OS_LINUX) || defined(OS_WIN) || defined(OS_MAC)
++#endif // defined(OS_LINUX) || defined(OS_WIN) || defined(OS_MAC) || defined(OS_BSD)
+ reporter_->Init(
+ base::BindRepeating(
+ [](DeviceTrustService* self) { return self->IsEnabled(); },
+@@ -76,9 +76,9 @@ void DeviceTrustService::OnReporterInitialized(bool su
+
+ base::Value val(base::Value::Type::DICTIONARY);
+
+-#if defined(OS_LINUX) || defined(OS_WIN) || defined(OS_MAC)
++#if defined(OS_LINUX) || defined(OS_WIN) || defined(OS_MAC) || defined(OS_BSD)
+ val.SetStringKey("machine_attestion_key", key_pair_->ExportPEMPublicKey());
+-#endif // defined(OS_LINUX) || defined(OS_WIN) || defined(OS_MAC)
++#endif // defined(OS_LINUX) || defined(OS_WIN) || defined(OS_MAC) || defined(OS_BSD)
+
+ reporter_->SendReport(std::move(val), std::move(signal_report_callback_));
+ }