lists.torproject.org
Sign In Sign Up
Manage this list Sign In Sign Up

Keyboard Shortcuts

Thread View

  • j: Next unread message
  • k: Previous unread message
  • j a: Jump to all threads
  • j l: Jump to MailingList overview

tbb-commits

Thread Start a new thread
Download
Threads by month
  • ----- 2025 -----
  • May
  • April
  • March
  • February
  • January
  • ----- 2024 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2023 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2022 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2021 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2020 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2019 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2018 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2017 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2016 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2015 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2014 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
tbb-commits@lists.torproject.org

October 2022

  • 2 participants
  • 177 discussions
[tor-browser] branch tor-browser-102.4.0esr-12.0-1 updated (836aa1709778 -> 3cb75bc95e49)
by gitolite role 27 Oct '22

27 Oct '22
This is an automated email from the git hooks/post-receive script. pierov pushed a change to branch tor-browser-102.4.0esr-12.0-1 in repository tor-browser. from 836aa1709778 fixup! Bug 40562: Added Tor-related preferences to 000-tor-browser.js new dcbd56483f29 fixup! Bug 40209: Implement Basic Crypto Safety new 75b9985f4bdb fixup! Bug 30237: Add v3 onion services client authentication prompt new 3cb75bc95e49 fixup! Bug 40458: Implement .tor.onion aliases The 3 revisions listed above as "new" are entirely new to this repository and will be described in separate emails. The revisions listed as "add" were already present in the repository and have only been added to this reference. Summary of changes: browser/actors/CryptoSafetyParent.jsm | 2 +- .../components/onionservices/content/authPreferences.css | 6 +++++- browser/components/rulesets/content/aboutRulesets.css | 14 -------------- browser/components/rulesets/content/aboutRulesets.html | 3 --- 4 files changed, 6 insertions(+), 19 deletions(-) -- To stop receiving notification emails like this one, please contact the administrator of this repository.
1 3
0 0
[builders/tor-browser-build] branch main updated: Bug 40655: Published tor-expert-bundle tar.gz files should not include their tor-browser-build build id
by gitolite role 27 Oct '22

27 Oct '22
This is an automated email from the git hooks/post-receive script. boklm pushed a commit to branch main in repository builders/tor-browser-build. The following commit(s) were added to refs/heads/main by this push: new 4ad3333c Bug 40655: Published tor-expert-bundle tar.gz files should not include their tor-browser-build build id 4ad3333c is described below commit 4ad3333c2d10355407603593a01432c79647e006 Author: Richard Pospesel <richard(a)torproject.org> AuthorDate: Fri Oct 21 19:35:40 2022 +0000 Bug 40655: Published tor-expert-bundle tar.gz files should not include their tor-browser-build build id --- projects/browser/build | 5 ++++- projects/browser/build.android | 5 ++++- 2 files changed, 8 insertions(+), 2 deletions(-) diff --git a/projects/browser/build b/projects/browser/build index 52e62b59..c14e38f9 100644 --- a/projects/browser/build +++ b/projects/browser/build @@ -324,7 +324,10 @@ cp $rootdir/[% c('input_files_by_name/firefox') %]/mar-tools-*.zip "$OUTDIR"/ [% END -%] [% END -%] [%IF c("var/tor-browser") -%] - cp $rootdir/[% c("input_files_by_name/tor-expert-bundle") %] "$OUTDIR"/ + tor_expert_bundle_src="[% c("input_files_by_name/tor-expert-bundle") %]" + # strip off trailing "$buildid.tar.gz" + tor_expert_bundle_dest=${tor_expert_bundle_src:0:-14}.tar.gz + cp $rootdir/[% c("input_files_by_name/tor-expert-bundle") %] "$OUTDIR"/$tor_expert_bundle_dest [% END -%] [% IF c("var/build_infos_json") -%] cp $rootdir/[% c('input_files_by_name/firefox') %]/build-infos.json "$OUTDIR"/build-infos-[% c("var/mar_osname") %].json diff --git a/projects/browser/build.android b/projects/browser/build.android index 08a40468..ee23d698 100644 --- a/projects/browser/build.android +++ b/projects/browser/build.android @@ -42,5 +42,8 @@ apksigner sign --verbose --min-sdk-version [% c("var/android_min_api") %] --ks $ apksigner sign --verbose --min-sdk-version [% c("var/android_min_api") %] --ks $rootdir/android-qa.keystore --out $test_out_apk --in $test_in_apk --ks-key-alias androidqakey --key-pass pass:android --ks-pass pass:android [%IF c("var/tor-browser") -%] - cp $rootdir/[% c("input_files_by_name/tor-expert-bundle") %] [% dest_dir %]/[% c('filename') %]/ + tor_expert_bundle_src="[% c("input_files_by_name/tor-expert-bundle") %]" + # strip off trailing "$buildid.tar.gz" + tor_expert_bundle_dest=${tor_expert_bundle_src:0:-14}.tar.gz + cp $rootdir/$tor_expert_bundle_src [% dest_dir %]/[% c('filename') %]/$tor_expert_bundle_dest [% END -%] -- To stop receiving notification emails like this one, please contact the administrator of this repository.
1 0
0 0
[tor-browser-spec] branch main updated: Bug 40035: FF100 Audit
by gitolite role 26 Oct '22

26 Oct '22
This is an automated email from the git hooks/post-receive script. richard pushed a commit to branch main in repository tor-browser-spec. The following commit(s) were added to refs/heads/main by this push: new c520bc2 Bug 40035: FF100 Audit c520bc2 is described below commit c520bc2955dac2999d05128b3abb74441229474f Author: Richard Pospesel <richard(a)torproject.org> AuthorDate: Wed Oct 26 23:12:17 2022 +0000 Bug 40035: FF100 Audit --- audits/FF100_AUDIT | 78 ++++++++++++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 78 insertions(+) diff --git a/audits/FF100_AUDIT b/audits/FF100_AUDIT new file mode 100644 index 0000000..726f689 --- /dev/null +++ b/audits/FF100_AUDIT @@ -0,0 +1,78 @@ +Tracking issue: https://gitlab.torproject.org/tpo/applications/tor-browser-spec/-/issues/40… + +# General + +The audit begins at the commit hash where the previous audit ended. Use code_audit.sh for creating the diff and highlighting potentially problematic code. The audit is scoped to a specific language (currently C/C++, Rust, Java/Kotlin, and Javascript). + +The output includes the entire patch where the new problematic code was introduced. Search for `XXX MATCH XXX` to find the next potential violation. + +`code_audit.sh` contains the list of known problematic APIs. New usage of these functions are documented and analyzed in this audit. + +## Firefox: https://github.com/mozilla/gecko-dev.git + +- Start: `cd4dcd48476d8cb29f4770f6fb659e440ff84345` ( `FIREFOX_RELEASE_100_BASE` ) +- End: `59930a20119813ea25546eaca75dcc3bbc500039` ( `FIREFOX_RELEASE_101_BASE` ) + +### Languages: +- [x] java +- [x] cpp +- [x] js +- [x] rust + +Nothing of interest (using `code_audit.sh`) + +--- + +## Application Services: https://github.com/mozilla/application-services.git + +- Start: `21f2904245a956366cae798e16035156c8232cad` ( `v93.0.2` ) +- End: `6a4737d1c043d71dfac67e270ee4afa4fb6c73b4` ( `v93.2.1` ) + +### Languages: +- [x] java +- [x] cpp +- [x] js +- [x] rust + +Nothing of interest (using `code_audit.sh`) + +## Android Components: https://github.com/mozilla-mobile/android-components.git + +- Start: `ba604c57073b3ed91cc863e5d9a7aa9d7e7a4b95` ( `v100.0.0` ) +- End: `7b24cbd76371562a9e9a842ca351dae7599d53f3` ( `v100.0.12` ) + +### Languages: +- [x] java +- [x] cpp +- [x] js +- [x] rust + +Nothing of interest (using `code_audit.sh`) + +## Fenix: https://github.com/mozilla-mobile/fenix.git + +- Start: `89d64fc0e8204b6f2f442a656108ee2dc9bffbef` ( `v100.0.0-beta.1` ) +- End: `827b01341f76e9ee8c152260992eb5f22a775791` ( `releases_v100.0.0` ) + +### Languages: +- [x] java +- [x] cpp +- [x] js +- [x] rust + +Nothing of interest (using `code_audit.sh`) + +## Ticket Review ## + +### 100 https://bugzilla.mozilla.org/buglist.cgi?query_format=advanced&resolution=F… + +- https://bugzilla.mozilla.org/show_bug.cgi?id=1760621 : @boklm https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/41142 + - Nothing to do here +- https://bugzilla.mozilla.org/show_bug.cgi?id=1758781 : @pierov https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/41143 + - Nothing to do here +- https://bugzilla.mozilla.org/show_bug.cgi?id=1752906 : @ma1 https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/41144 + - Disabled the WebMIDI feature : https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/41144 +- https://bugzilla.mozilla.org/show_bug.cgi?id=1759592 : @dan https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/41145 + - Nothing to do here +- https://bugzilla.mozilla.org/show_bug.cgi?id=1699658 : @dan https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/41146 + - Nothing to do here -- To stop receiving notification emails like this one, please contact the administrator of this repository.
1 0
0 0
[tor-browser-spec] branch main updated: Bug 40044: FF92/93 Audit
by gitolite role 26 Oct '22

26 Oct '22
This is an automated email from the git hooks/post-receive script. richard pushed a commit to branch main in repository tor-browser-spec. The following commit(s) were added to refs/heads/main by this push: new 8776a7c Bug 40044: FF92/93 Audit 8776a7c is described below commit 8776a7cc0707f381858221ef6e73e8984c45d223 Author: Richard Pospesel <richard(a)torproject.org> AuthorDate: Wed Oct 26 22:02:18 2022 +0000 Bug 40044: FF92/93 Audit --- audits/FF92_93_AUDIT | 85 ++++++++++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 85 insertions(+) diff --git a/audits/FF92_93_AUDIT b/audits/FF92_93_AUDIT new file mode 100644 index 0000000..1f2f38e --- /dev/null +++ b/audits/FF92_93_AUDIT @@ -0,0 +1,85 @@ +Tracking issue: https://gitlab.torproject.org/tpo/applications/tor-browser-spec/-/issues/40… + +# General + +The audit begins at the commit hash where the previous audit ended. Use code_audit.sh for creating the diff and highlighting potentially problematic code. The audit is scoped to a specific language (currently C/C++, Rust, Java/Kotlin, and Javascript). + +The output includes the entire patch where the new problematic code was introduced. Search for `XXX MATCH XXX` to find the next potential violation. + +`code_audit.sh` contains the list of known problematic APIs. New usage of these functions are documented and analyzed in this audit. + +## Firefox: https://github.com/mozilla/gecko-dev.git ( https://hg.mozilla.org/releases/ ) + +- Start: `be2c584eacac4f7fe827c1d2409399fe13ba614a` ( `FIREFOX_RELEASE_92_BASE` ) +- End: `7ea8b05d021fc8e0194e1b8eb9d37a351c9bdc5f` ( `FIREFOX_RELEASE_93_END` ) + +### Languages: +- [x] java +- [x] cpp +- [x] js +- [x] rust + +Nothing of interest (using `code_audit.sh`) +--- + +## Application Services: https://github.com/mozilla/application-services.git + +- Start: `11f7a4b079c83d37505067bd00e17e96ed52ed64` ( `v82.3.0` ) +- End: `b1f371719ca20db642b64a0e860b4ecb0aaf316f` ( `v86.1.0` ) + +### Languages: +- [x] java +- [x] cpp +- [x] js +- [x] rust + +Nothing of interest (using `code_audit.sh`) + +## Android Components: https://github.com/mozilla-mobile/android-components.git + +- Start: `84553b30da506c656f2a323aed66f8d335fcbf2b` +- End: `e39f5dba3f9c29b46856d700701f6715adc261c5` ( `v93.0.12` ) + +### Languages: +- [x] java +- [x] cpp +- [x] js +- [x] rust + +Nothing of interest (using `code_audit.sh`) + +## Fenix: https://github.com/mozilla-mobile/fenix.git + +- Start: `9552ae0ab75c81bf72637b27f59031f1d088a7bf` +- End: `bcd31c22cd5460867092c71382392f13aeb95e64` ( `v93.2.0` ) + +### Languages: +- [x] java +- [x] cpp +- [x] js +- [x] rust + +Nothing of interest (using `code_audit.sh`) + +## Ticket Review ## + +### Review List + +#### 92 (https://bugzilla.mozilla.org/buglist.cgi?query_format=advanced&resolution=F… ) + +- https://bugzilla.mozilla.org/show_bug.cgi?id=1226042 : @pierov https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/41116 + - Fixed in tor-browser and patchin proces of uplift: https://bugzilla.mozilla.org/show_bug.cgi?id=1787790 +- https://bugzilla.mozilla.org/show_bug.cgi?id=1512851 : @dan https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/41117 + - Made functionality dependent on MOZ_PROXY_BYPASS_PROTECTION, may uplift +- https://bugzilla.mozilla.org/show_bug.cgi?id=1714583 : @ma1 https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/41118 + - Nothing to do here +- https://bugzilla.mozilla.org/show_bug.cgi?id=1721178 : @dan https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/41119 + - Nothing to do here +- https://bugzilla.mozilla.org/show_bug.cgi?id=1723869 : @boklm https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/41120 + - Nothing to do here +- https://bugzilla.mozilla.org/show_bug.cgi?id=516362 : @pierov https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/41121 + - Tweaked this patch slightly to prevent Tor Browser from running with elevated privileges + +#### 93 (https://bugzilla.mozilla.org/buglist.cgi?query_format=advanced&resolution=F… ) + +none! -- To stop receiving notification emails like this one, please contact the administrator of this repository.
1 0
0 0
[tor-browser] branch tor-browser-102.4.0esr-12.0-1 updated: fixup! Bug 40562: Added Tor-related preferences to 000-tor-browser.js
by gitolite role 26 Oct '22

26 Oct '22
This is an automated email from the git hooks/post-receive script. richard pushed a commit to branch tor-browser-102.4.0esr-12.0-1 in repository tor-browser. The following commit(s) were added to refs/heads/tor-browser-102.4.0esr-12.0-1 by this push: new 836aa1709778 fixup! Bug 40562: Added Tor-related preferences to 000-tor-browser.js 836aa1709778 is described below commit 836aa1709778a37390a9977123700818d8026656 Author: Richard Pospesel <richard(a)torproject.org> AuthorDate: Wed Oct 26 16:28:52 2022 +0000 fixup! Bug 40562: Added Tor-related preferences to 000-tor-browser.js Bug 41317: Tor Browser leaks banned ports in network.security.ports.banned --- browser/app/profile/000-tor-browser.js | 5 ++++- 1 file changed, 4 insertions(+), 1 deletion(-) diff --git a/browser/app/profile/000-tor-browser.js b/browser/app/profile/000-tor-browser.js index 65d6bc26a8b9..be6473555aa2 100644 --- a/browser/app/profile/000-tor-browser.js +++ b/browser/app/profile/000-tor-browser.js @@ -23,7 +23,10 @@ pref("network.proxy.allow_hijacking_localhost", true); // Allow proxies for loca pref("network.proxy.type", 1); // Bug 40548: Disable proxy-bypass pref("network.proxy.failover_direct", false); -pref("network.security.ports.banned", "9050,9051,9150,9151"); +// localhost is already blocked by setting `network.proxy.allow_hijacking_localhost` to +// true, allowing users to explicitly block ports makes them fingerprintable; for details, see +// Bug 41317: Tor Browser leaks banned ports in network.security.ports.banned +pref("network.security.ports.banned", "", locked); pref("network.dns.disabled", true); // This should cover the #5741 patch for DNS leaks pref("network.http.max-persistent-connections-per-proxy", 256); -- To stop receiving notification emails like this one, please contact the administrator of this repository.
1 0
0 0
[builders/tor-browser-build] branch main updated: Bug 41317: Remove now deprecated advice regarding network.security.ports.banned from start-torbrowser script
by gitolite role 26 Oct '22

26 Oct '22
This is an automated email from the git hooks/post-receive script. richard pushed a commit to branch main in repository builders/tor-browser-build. The following commit(s) were added to refs/heads/main by this push: new c13f0484 Bug 41317: Remove now deprecated advice regarding network.security.ports.banned from start-torbrowser script c13f0484 is described below commit c13f0484e5c6d80689b581e4723a035bde50a165 Author: Richard Pospesel <richard(a)torproject.org> AuthorDate: Wed Oct 26 16:33:53 2022 +0000 Bug 41317: Remove now deprecated advice regarding network.security.ports.banned from start-torbrowser script --- projects/browser/RelativeLink/start-browser | 1 - 1 file changed, 1 deletion(-) diff --git a/projects/browser/RelativeLink/start-browser b/projects/browser/RelativeLink/start-browser index 14b50e15..b0c9b2d5 100755 --- a/projects/browser/RelativeLink/start-browser +++ b/projects/browser/RelativeLink/start-browser @@ -317,7 +317,6 @@ TOR_CONTROL_PASSWD environment variable." # torrc): # # SETTING NAME VALUE -# network.security.ports.banned [...],<SocksPort>,<ControlPort> # network.proxy.socks 127.0.0.1 # network.proxy.socks_port <SocksPort> # extensions.torbutton.inserted_button true -- To stop receiving notification emails like this one, please contact the administrator of this repository.
1 0
0 0
[tor-browser] branch tor-browser-102.4.0esr-12.0-1 updated: fixup! Bug 30237: Add v3 onion services client authentication prompt
by gitolite role 26 Oct '22

26 Oct '22
This is an automated email from the git hooks/post-receive script. richard pushed a commit to branch tor-browser-102.4.0esr-12.0-1 in repository tor-browser. The following commit(s) were added to refs/heads/tor-browser-102.4.0esr-12.0-1 by this push: new 64453c569f86 fixup! Bug 30237: Add v3 onion services client authentication prompt 64453c569f86 is described below commit 64453c569f86ce08870947237a57aa01c34d04e1 Author: Henry Wilkes <henry(a)torproject.org> AuthorDate: Wed Oct 26 16:30:11 2022 +0100 fixup! Bug 30237: Add v3 onion services client authentication prompt --- browser/components/onionservices/content/authPrompt.js | 5 +---- browser/components/onionservices/content/savedKeysDialog.js | 9 ++------- 2 files changed, 3 insertions(+), 11 deletions(-) diff --git a/browser/components/onionservices/content/authPrompt.js b/browser/components/onionservices/content/authPrompt.js index 889acc2c6f67..771c7e58f667 100644 --- a/browser/components/onionservices/content/authPrompt.js +++ b/browser/components/onionservices/content/authPrompt.js @@ -192,10 +192,7 @@ const OnionAuthPrompt = (function() { let { controller } = ChromeUtils.import( "resource://torbutton/modules/tor-control-port.js" ); - let torController = await controller(aError => { - console.error(controllerFailureMsg, aError); - this.show(controllerFailureMsg); - }); + let torController = await controller(); // ^(subdomain.)*onionserviceid.onion$ (case-insensitive) const onionServiceIdRegExp = /^(.*\.)*(?<onionServiceId>[a-z2-7]{56})\.onion$/i; // match() will return null on bad match, causing throw diff --git a/browser/components/onionservices/content/savedKeysDialog.js b/browser/components/onionservices/content/savedKeysDialog.js index f102e4e89bca..fd8b477a395d 100644 --- a/browser/components/onionservices/content/savedKeysDialog.js +++ b/browser/components/onionservices/content/savedKeysDialog.js @@ -49,9 +49,7 @@ var gOnionServicesSavedKeysDialog = { const controllerFailureMsg = TorStrings.onionServices.authPreferences.failedToRemoveKey; try { - const torController = controller(aError => { - this._showError(controllerFailureMsg); - }); + const torController = await controller(); // Remove in reverse index order to avoid issues caused by index changes. for (let i = indexesToDelete.length - 1; i >= 0; --i) { @@ -129,10 +127,7 @@ var gOnionServicesSavedKeysDialog = { try { this._tree.view = this; - const torController = controller(aError => { - this._showError(controllerFailureMsg); - }); - + const torController = await controller(); const keyInfoList = await torController.onionAuthViewKeys(); if (keyInfoList) { // Filter out temporary keys. -- To stop receiving notification emails like this one, please contact the administrator of this repository.
1 0
0 0
[Git][tpo/applications/android-components][android-components-102.0.14-12.0-1] squash! Add support for new GeckoView interfaces
by Pier Angelo Vendrame (@pierov) 26 Oct '22

26 Oct '22
Pier Angelo Vendrame pushed to branch android-components-102.0.14-12.0-1 at The Tor Project / Applications / android-components Commits: 43499dfb by Pier Angelo Vendrame at 2022-10-26T10:46:22+02:00 squash! Add support for new GeckoView interfaces Bug 41394: Expose privacy.prioritizeonions.enabled to Android. - - - - - 2 changed files: - components/browser/engine-gecko/src/main/java/mozilla/components/browser/engine/gecko/GeckoEngine.kt - components/concept/engine/src/main/java/mozilla/components/concept/engine/Settings.kt Changes: ===================================== components/browser/engine-gecko/src/main/java/mozilla/components/browser/engine/gecko/GeckoEngine.kt ===================================== @@ -741,6 +741,13 @@ class GeckoEngine( localeUpdater.updateValue() } } + override var prioritizeOnions: Boolean + get() = runtime.settings.prioritizeOnions + set(value) { + value.let { + runtime.settings.prioritizeOnions = it + } + } }.apply { defaultSettings?.let { this.javascriptEnabled = it.javascriptEnabled @@ -762,6 +769,7 @@ class GeckoEngine( this.httpsOnlyMode = it.httpsOnlyMode this.torSecurityLevel = it.torSecurityLevel this.spoofEnglish = it.spoofEnglish + this.prioritizeOnions = it.prioritizeOnions } } ===================================== components/concept/engine/src/main/java/mozilla/components/concept/engine/Settings.kt ===================================== @@ -196,6 +196,8 @@ abstract class Settings { open var torSecurityLevel: Int by UnsupportedSetting() open var spoofEnglish: Boolean by UnsupportedSetting() + + open var prioritizeOnions: Boolean by UnsupportedSetting() } /** @@ -235,7 +237,8 @@ data class DefaultSettings( override var enterpriseRootsEnabled: Boolean = false, override var httpsOnlyMode: Engine.HttpsOnlyMode = Engine.HttpsOnlyMode.DISABLED, override var torSecurityLevel: Int = 4, - override var spoofEnglish: Boolean = false + override var spoofEnglish: Boolean = false, + override var prioritizeOnions: Boolean = false ) : Settings() class UnsupportedSetting<T> { View it on GitLab: https://gitlab.torproject.org/tpo/applications/android-components/-/commit/… -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/android-components/-/commit/… You're receiving this email because of your account on gitlab.torproject.org.
1 0
0 0
[tor-browser] branch tor-browser-102.4.0esr-12.0-1 updated (f1029024c484 -> d632a5f4cc14)
by gitolite role 26 Oct '22

26 Oct '22
This is an automated email from the git hooks/post-receive script. pierov pushed a change to branch tor-browser-102.4.0esr-12.0-1 in repository tor-browser. from f1029024c484 squash! Bug 2176: Rebrand Firefox to TorBrowser new 21b34a4edcd3 fixup! Bug 40925: Implemented the Security Level component new d632a5f4cc14 fixup! Bug 21952: Implement Onion-Location The 2 revisions listed above as "new" are entirely new to this repository and will be described in separate emails. The revisions listed as "add" were already present in the repository and have only been added to this reference. Summary of changes: mobile/android/geckoview/api.txt | 3 ++ .../mozilla/geckoview/GeckoRuntimeSettings.java | 36 +++++++++++++++++++++- 2 files changed, 38 insertions(+), 1 deletion(-) -- To stop receiving notification emails like this one, please contact the administrator of this repository.
1 2
0 0
[tor-browser] branch tor-browser-102.4.0esr-12.0-1 updated: squash! Bug 2176: Rebrand Firefox to TorBrowser
by gitolite role 26 Oct '22

26 Oct '22
This is an automated email from the git hooks/post-receive script. richard pushed a commit to branch tor-browser-102.4.0esr-12.0-1 in repository tor-browser. The following commit(s) were added to refs/heads/tor-browser-102.4.0esr-12.0-1 by this push: new f1029024c484 squash! Bug 2176: Rebrand Firefox to TorBrowser f1029024c484 is described below commit f1029024c48454105ec02992f7203341d6cd3be9 Author: Richard Pospesel <richard(a)torproject.org> AuthorDate: Tue Oct 25 22:06:52 2022 +0000 squash! Bug 2176: Rebrand Firefox to TorBrowser Bug 41278: Create Tor Browser styled pdf logo similar to the vanilla Firefox one --- browser/branding/alpha/document_pdf.ico | Bin 19994 -> 20011 bytes browser/branding/nightly/document_pdf.ico | Bin 19994 -> 20011 bytes browser/branding/official/document_pdf.ico | Bin 19994 -> 20011 bytes 3 files changed, 0 insertions(+), 0 deletions(-) diff --git a/browser/branding/alpha/document_pdf.ico b/browser/branding/alpha/document_pdf.ico index d6fe7c5bded9..dc74ba85f69d 100644 Binary files a/browser/branding/alpha/document_pdf.ico and b/browser/branding/alpha/document_pdf.ico differ diff --git a/browser/branding/nightly/document_pdf.ico b/browser/branding/nightly/document_pdf.ico index d6fe7c5bded9..dc74ba85f69d 100644 Binary files a/browser/branding/nightly/document_pdf.ico and b/browser/branding/nightly/document_pdf.ico differ diff --git a/browser/branding/official/document_pdf.ico b/browser/branding/official/document_pdf.ico index d6fe7c5bded9..dc74ba85f69d 100644 Binary files a/browser/branding/official/document_pdf.ico and b/browser/branding/official/document_pdf.ico differ -- To stop receiving notification emails like this one, please contact the administrator of this repository.
1 0
0 0
  • ← Newer
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • ...
  • 18
  • Older →

HyperKitty Powered by HyperKitty version 1.3.12.