lists.torproject.org
Sign In Sign Up
Manage this list Sign In Sign Up

Keyboard Shortcuts

Thread View

  • j: Next unread message
  • k: Previous unread message
  • j a: Jump to all threads
  • j l: Jump to MailingList overview

tbb-commits

Thread Start a new thread
Download
Threads by month
  • ----- 2025 -----
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2024 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2023 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2022 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2021 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2020 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2019 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2018 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2017 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2016 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2015 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2014 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
tbb-commits@lists.torproject.org

June 2022

  • 1 participants
  • 56 discussions
[builders/tor-browser-build] branch maint-11.0 updated: Bug 40497: Check that directory does not exist before starting macOS signing
by gitolite role 08 Jun '22

08 Jun '22
This is an automated email from the git hooks/post-receive script. boklm pushed a commit to branch maint-11.0 in repository builders/tor-browser-build. The following commit(s) were added to refs/heads/maint-11.0 by this push: new bfb21a2 Bug 40497: Check that directory does not exist before starting macOS signing bfb21a2 is described below commit bfb21a2a023767583a3a8963caf8681e9cb57643 Author: Nicolas Vigier <boklm(a)torproject.org> AuthorDate: Mon Jun 6 12:36:58 2022 +0200 Bug 40497: Check that directory does not exist before starting macOS signing --- tools/signing/do-all-signing | 13 +++++++++++++ 1 file changed, 13 insertions(+) diff --git a/tools/signing/do-all-signing b/tools/signing/do-all-signing index dcf6a02..784255c 100755 --- a/tools/signing/do-all-signing +++ b/tools/signing/do-all-signing @@ -31,6 +31,18 @@ function sync-builder-unsigned-to-local-signed { "$script_dir/sync-builder-unsigned-to-local-signed" } +function macos-signer-directory-not-present { + # To avoid doing two signings at the same time, or to avoid unknowingly + # using parts from a previous signing attempt, we check that the + # directory does not exist yet (see tor-browser-build#40497) + if ssh "$ssh_host_macos_signer" "test -d $tbb_version" + then + echo "The directory $tbb_version already exists on $ssh_host_macos_signer" + return 1 + fi + return 0 +} + function sync-scripts-to-macos-signer { "$script_dir/sync-scripts-to-macos-signer" } @@ -168,6 +180,7 @@ function do_step { do_step wait-for-finished-build do_step sync-builder-unsigned-to-local-signed +do_step macos-signer-directory-not-present do_step sync-scripts-to-macos-signer do_step macos-signer-enable-network-proxy-settings do_step macos-signer-gatekeeper-signing -- To stop receiving notification emails like this one, please contact the administrator of this repository.
1 0
0 0
[builders/tor-browser-build] branch master updated: Bug 40497: Check that directory does not exist before starting macOS signing
by gitolite role 08 Jun '22

08 Jun '22
This is an automated email from the git hooks/post-receive script. boklm pushed a commit to branch master in repository builders/tor-browser-build. The following commit(s) were added to refs/heads/master by this push: new e94220d Bug 40497: Check that directory does not exist before starting macOS signing e94220d is described below commit e94220d6600b97ced499c6d23b95abbf329a4455 Author: Nicolas Vigier <boklm(a)torproject.org> AuthorDate: Mon Jun 6 12:36:58 2022 +0200 Bug 40497: Check that directory does not exist before starting macOS signing --- tools/signing/do-all-signing | 13 +++++++++++++ 1 file changed, 13 insertions(+) diff --git a/tools/signing/do-all-signing b/tools/signing/do-all-signing index dcf6a02..784255c 100755 --- a/tools/signing/do-all-signing +++ b/tools/signing/do-all-signing @@ -31,6 +31,18 @@ function sync-builder-unsigned-to-local-signed { "$script_dir/sync-builder-unsigned-to-local-signed" } +function macos-signer-directory-not-present { + # To avoid doing two signings at the same time, or to avoid unknowingly + # using parts from a previous signing attempt, we check that the + # directory does not exist yet (see tor-browser-build#40497) + if ssh "$ssh_host_macos_signer" "test -d $tbb_version" + then + echo "The directory $tbb_version already exists on $ssh_host_macos_signer" + return 1 + fi + return 0 +} + function sync-scripts-to-macos-signer { "$script_dir/sync-scripts-to-macos-signer" } @@ -168,6 +180,7 @@ function do_step { do_step wait-for-finished-build do_step sync-builder-unsigned-to-local-signed +do_step macos-signer-directory-not-present do_step sync-scripts-to-macos-signer do_step macos-signer-enable-network-proxy-settings do_step macos-signer-gatekeeper-signing -- To stop receiving notification emails like this one, please contact the administrator of this repository.
1 0
0 0
[tor-browser] branch tor-browser-91.9.0esr-11.5-1 updated: fixup! Bug 10760: Integrate TorButton to TorBrowser core
by gitolite role 08 Jun '22

08 Jun '22
This is an automated email from the git hooks/post-receive script. pierov pushed a commit to branch tor-browser-91.9.0esr-11.5-1 in repository tor-browser. The following commit(s) were added to refs/heads/tor-browser-91.9.0esr-11.5-1 by this push: new 3d0f16e51360b fixup! Bug 10760: Integrate TorButton to TorBrowser core 3d0f16e51360b is described below commit 3d0f16e51360b67fc9d80190014402a0c2095147 Author: Pier Angelo Vendrame <pierov(a)torproject.org> AuthorDate: Wed Jun 8 09:46:24 2022 +0200 fixup! Bug 10760: Integrate TorButton to TorBrowser core Bug 40458: Implement .tor.onion aliases Bug 40921: Differentiate the about:tor strings accordingly to the update channel --- toolkit/torproject/torbutton | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/toolkit/torproject/torbutton b/toolkit/torproject/torbutton index 155294a0c4e23..f1df5ea1890d3 160000 --- a/toolkit/torproject/torbutton +++ b/toolkit/torproject/torbutton @@ -1 +1 @@ -Subproject commit 155294a0c4e23923ac8ed55d248d9c804230a0f8 +Subproject commit f1df5ea1890d35be7d557bf227028fce0eb1a8da -- To stop receiving notification emails like this one, please contact the administrator of this repository.
1 0
0 0
[torbutton] branch master updated: Bug 40921: Differentiate the about:tor strings accordingly to the update channel
by gitolite role 07 Jun '22

07 Jun '22
This is an automated email from the git hooks/post-receive script. pierov pushed a commit to branch master in repository torbutton. The following commit(s) were added to refs/heads/master by this push: new f1df5ea1 Bug 40921: Differentiate the about:tor strings accordingly to the update channel f1df5ea1 is described below commit f1df5ea1890d35be7d557bf227028fce0eb1a8da Author: Pier Angelo Vendrame <pierov(a)torproject.org> AuthorDate: Tue Jun 7 16:56:31 2022 +0200 Bug 40921: Differentiate the about:tor strings accordingly to the update channel Also, changed a padding that was incorrect with RTL locales. --- chrome/content/aboutTor/aboutTor.xhtml | 16 ++++++++++++++++ chrome/locale/en-US/aboutTor.dtd | 7 ++++++- chrome/skin/aboutTor.css | 3 ++- 3 files changed, 24 insertions(+), 2 deletions(-) diff --git a/chrome/content/aboutTor/aboutTor.xhtml b/chrome/content/aboutTor/aboutTor.xhtml index 79b10f32..12244f9b 100644 --- a/chrome/content/aboutTor/aboutTor.xhtml +++ b/chrome/content/aboutTor/aboutTor.xhtml @@ -36,9 +36,19 @@ <img class="torcontent-logo" src="resource://torbutton-assets/torbrowser_mobile_logo.png"/> <div id="torstatus" class="top"> <div class="hideIfTorOff hideIfHasBeenUpdated torstatus-container"> +#if MOZ_UPDATE_CHANNEL == alpha <div class="heading1">&aboutTor.alpha.ready.label;</div> <br/> <div class="heading2">&aboutTor.alpha.ready2.label;</div> +#elif MOZ_UPDATE_CHANNEL == nightly + <div class="heading1">&aboutTor.nightly.ready.label;</div> + <br/> + <div class="heading2">&aboutTor.nightly.ready2.label;</div> +#else + <div class="heading1">&aboutTor.ready.label;</div> + <br/> + <div class="heading2">&aboutTor.ready2.label;</div> +#endif </div> <div class="showIfHasBeenUpdated torstatus-container"> <div class="heading1">&aboutTBUpdate.updated;</div> @@ -70,9 +80,15 @@ <div id="bannerTextCol"> <!--<div id="bannerHeader"></div> <br />--> +#if MOZ_UPDATE_CHANNEL == alpha <div id="bannerDescription">&aboutTor.alpha.bannerDescription;</div> <br /> <a id="bannerLink" target="_blank" href="https://forum.torproject.net/">&aboutTor.alpha.bannerLink;</a> +#else + <div id="bannerDescription">&aboutTor.nightly.bannerDescription;</div> + <br /> + <a id="bannerLink" target="_blank" href="https://forum.torproject.net/">&aboutTor.nightly.bannerLink;</a> +#endif </div> </div> diff --git a/chrome/locale/en-US/aboutTor.dtd b/chrome/locale/en-US/aboutTor.dtd index 2d565737..5ccf1396 100644 --- a/chrome/locale/en-US/aboutTor.dtd +++ b/chrome/locale/en-US/aboutTor.dtd @@ -33,4 +33,9 @@ <!ENTITY aboutTor.alpha.ready.label "Test. Thoroughly."> <!ENTITY aboutTor.alpha.ready2.label "You’re ready to test the world’s most private browsing experience."> <!ENTITY aboutTor.alpha.bannerDescription "Tor Browser Alpha is an unstable version of Tor Browser you can use to preview new features, test their performance and provide feedback before release."> -<!ENTITY aboutTor.alpha.bannerLink "Report a bug on the Tor Forum"> \ No newline at end of file +<!ENTITY aboutTor.alpha.bannerLink "Report a bug on the Tor Forum"> + +<!ENTITY aboutTor.nightly.ready.label "Test. Thoroughly."> +<!ENTITY aboutTor.nightly.ready2.label "You’re ready to test the world’s most private browsing experience."> +<!ENTITY aboutTor.nightly.bannerDescription "Tor Browser Nightly is an unstable version of Tor Browser you can use to preview new features, test their performance and provide feedback before release."> +<!ENTITY aboutTor.nightly.bannerLink "Report a bug on the Tor Forum"> \ No newline at end of file diff --git a/chrome/skin/aboutTor.css b/chrome/skin/aboutTor.css index 81b6453e..2712b9f1 100644 --- a/chrome/skin/aboutTor.css +++ b/chrome/skin/aboutTor.css @@ -223,7 +223,8 @@ body:not([showmanual]) .showForManual { } #bannerTextCol { - padding: 8px 0px 0px 15px; + padding-top: 8px; + padding-inline-start: 15px; font-size: 15px; line-height: normal; color: #FFFFFF; -- To stop receiving notification emails like this one, please contact the administrator of this repository.
1 0
0 0
[torbutton] branch master updated: Bug 40458: Implement .tor.onion aliases
by gitolite role 07 Jun '22

07 Jun '22
This is an automated email from the git hooks/post-receive script. pierov pushed a commit to branch master in repository torbutton. The following commit(s) were added to refs/heads/master by this push: new 3f613cc8 Bug 40458: Implement .tor.onion aliases 3f613cc8 is described below commit 3f613cc84cd48fb06f12163d79550c36b354a2a5 Author: Pier Angelo Vendrame <pierov(a)torproject.org> AuthorDate: Fri Mar 11 10:45:53 2022 +0100 Bug 40458: Implement .tor.onion aliases Show the real .onion domain on the circuit display when using a .tor.onion alias. --- chrome/content/tor-circuit-display.js | 6 ++++++ chrome/locale/en-US/torbutton.properties | 31 +++++++++++++++++++++++++++++++ 2 files changed, 37 insertions(+) diff --git a/chrome/content/tor-circuit-display.js b/chrome/content/tor-circuit-display.js index f6dd9ace..14e3da5b 100644 --- a/chrome/content/tor-circuit-display.js +++ b/chrome/content/tor-circuit-display.js @@ -285,6 +285,12 @@ let currentCircuitData = function (browser) { let [SOCKS_username, SOCKS_password] = credentials; let nodeData = credentialsToNodeDataMap.get(`${SOCKS_username}|${SOCKS_password}`); let domain = SOCKS_username; + if (browser.documentURI.host.endsWith(".tor.onion")) { + const service = Cc["@torproject.org/onion-alias-service;1"].getService( + Ci.IOnionAliasService + ); + domain = service.getOnionAlias(browser.documentURI.host); + } return { domain, nodeData }; } } diff --git a/chrome/locale/en-US/torbutton.properties b/chrome/locale/en-US/torbutton.properties index 22db4f4b..5a01d1ba 100644 --- a/chrome/locale/en-US/torbutton.properties +++ b/chrome/locale/en-US/torbutton.properties @@ -154,3 +154,34 @@ cryptoSafetyPrompt.primaryAction=Reload Tab with a New Circuit cryptoSafetyPrompt.primaryActionAccessKey=R cryptoSafetyPrompt.secondaryAction=Dismiss Warning cryptoSafetyPrompt.secondaryActionAccessKey=B + +# about:rulesets strings. +rulesets.warningTitle=Proceed with Caution +rulesets.warningDescription=Adding or modifying rulesets can cause attackers to hijack your browser. Proceed only if you know what you are doing. +rulesets.warningEnable=Warn me when I attempt to access these preferences +rulesets.warningButton=Accept the Risk and Continue +# Ruleset list +rulesets.rulesets=Rulesets +rulesets.noRulesets=No rulesets found +rulesets.noRulesetsDescr=When you save a ruleset in Tor Browser, it will show up here. +# LOCALIZATION NOTE: %S will be replaced by the update date (automatically formatted by Firefox's l10n component) +rulesets.lastUpdated=Last updated %S +rulesets.neverUpdated=Never updated, or last update failed +rulesets.enabled=Enabled +rulesets.disabled=Disabled +# Ruleset details/edit ruleset +rulesets.edit=Edit +rulesets.name=Name +rulesets.jwk=JWK +rulesets.pathPrefix=Path Prefix +rulesets.scope=Scope +rulesets.enable=Enable this ruleset +rulesets.checkUpdates=Check for Updates +rulesets.jwkPlaceholder=The key used to sign this ruleset in the JWK (JSON Web Key) format +rulesets.jwkInvalid=The JWK could not be parsed, or it is not a valid key +rulesets.pathPrefixPlaceholder=URL prefix that contains the files needed by the ruleset +rulesets.pathPrefixInvalid=The path prefix is not a valid HTTP(S) URL +rulesets.scopePlaceholder=Regular expression for the scope of the rules +rulesets.scopeInvalid=The scope could not be parsed as a regular expression +rulesets.save=Save +rulesets.cancel=Cancel \ No newline at end of file -- To stop receiving notification emails like this one, please contact the administrator of this repository.
1 0
0 0
[builders/tor-browser-build] branch maint-11.0 updated: Bug 40516: Remove aguestuser from tb_builders and torbutton.gpg
by gitolite role 07 Jun '22

07 Jun '22
This is an automated email from the git hooks/post-receive script. richard pushed a commit to branch maint-11.0 in repository builders/tor-browser-build. The following commit(s) were added to refs/heads/maint-11.0 by this push: new 643fce4 Bug 40516: Remove aguestuser from tb_builders and torbutton.gpg 643fce4 is described below commit 643fce43b611381dd1c034ad015f97f23d12f4fa Author: Nicolas Vigier <boklm(a)torproject.org> AuthorDate: Tue Jun 7 10:24:07 2022 +0200 Bug 40516: Remove aguestuser from tb_builders and torbutton.gpg --- keyring/torbutton.gpg | Bin 234748 -> 222093 bytes tools/signing/set-config | 2 +- 2 files changed, 1 insertion(+), 1 deletion(-) diff --git a/keyring/torbutton.gpg b/keyring/torbutton.gpg index 9fed395..2a16391 100644 Binary files a/keyring/torbutton.gpg and b/keyring/torbutton.gpg differ diff --git a/tools/signing/set-config b/tools/signing/set-config index 70bd311..bad1009 100644 --- a/tools/signing/set-config +++ b/tools/signing/set-config @@ -14,4 +14,4 @@ echo "${BASH_ARGV0:-}" | grep -q '\.dry-run$' && DRY_RUN='--dry-run' test -z "${NON_INTERACTIVE:-}" || rsync_progress="--progress" rsync_options="-avH ${rsync_progress:-} ${DRY_RUN:-}" -tb_builders='aguestuser boklm gk pierov richard sysrqb' +tb_builders='boklm gk pierov richard sysrqb' -- To stop receiving notification emails like this one, please contact the administrator of this repository.
1 0
0 0
[builders/tor-browser-build] branch master updated: Bug 40516: Remove aguestuser from tb_builders and torbutton.gpg
by gitolite role 07 Jun '22

07 Jun '22
This is an automated email from the git hooks/post-receive script. richard pushed a commit to branch master in repository builders/tor-browser-build. The following commit(s) were added to refs/heads/master by this push: new 7bb4413 Bug 40516: Remove aguestuser from tb_builders and torbutton.gpg 7bb4413 is described below commit 7bb44137b4a9c27f6057b97e4fc0026fd6eb66dd Author: Nicolas Vigier <boklm(a)torproject.org> AuthorDate: Tue Jun 7 10:24:07 2022 +0200 Bug 40516: Remove aguestuser from tb_builders and torbutton.gpg --- keyring/torbutton.gpg | Bin 234748 -> 222093 bytes tools/signing/set-config | 2 +- 2 files changed, 1 insertion(+), 1 deletion(-) diff --git a/keyring/torbutton.gpg b/keyring/torbutton.gpg index 9fed395..2a16391 100644 Binary files a/keyring/torbutton.gpg and b/keyring/torbutton.gpg differ diff --git a/tools/signing/set-config b/tools/signing/set-config index 70bd311..bad1009 100644 --- a/tools/signing/set-config +++ b/tools/signing/set-config @@ -14,4 +14,4 @@ echo "${BASH_ARGV0:-}" | grep -q '\.dry-run$' && DRY_RUN='--dry-run' test -z "${NON_INTERACTIVE:-}" || rsync_progress="--progress" rsync_options="-avH ${rsync_progress:-} ${DRY_RUN:-}" -tb_builders='aguestuser boklm gk pierov richard sysrqb' +tb_builders='boklm gk pierov richard sysrqb' -- To stop receiving notification emails like this one, please contact the administrator of this repository.
1 0
0 0
[tor-browser] branch tor-browser-91.9.0esr-11.5-1 updated (16e50d4adb966 -> f4a2fa31273b7)
by gitolite role 07 Jun '22

07 Jun '22
This is an automated email from the git hooks/post-receive script. pierov pushed a change to branch tor-browser-91.9.0esr-11.5-1 in repository tor-browser. from 16e50d4adb966 fixup! Bug 31286: Implementation of bridge, proxy, and firewall settings in about:preferences#connection new 7c3b775c6efca Fixed a Firefox include problem new a4f7580cfdaf1 fixup! Bug 28005: Implement .onion alias urlbar rewrites new 47e2e10954dd6 Bug 40458: Implement .tor.onion aliases new f4a2fa31273b7 fixup! Add TorStrings module for localization The 4 revisions listed above as "new" are entirely new to this repository and will be described in separate emails. The revisions listed as "add" were already present in the repository and have only been added to this reference. Summary of changes: browser/actors/ClickHandlerChild.jsm | 20 - browser/actors/ClickHandlerParent.jsm | 1 - browser/actors/ContextMenuChild.jsm | 4 - browser/base/content/browser-places.js | 12 +- browser/base/content/browser-siteIdentity.js | 16 +- browser/base/content/browser.js | 43 +- browser/base/content/nsContextMenu.js | 18 - browser/base/content/pageinfo/pageInfo.js | 2 +- browser/base/content/pageinfo/pageInfo.xhtml | 10 - browser/base/content/pageinfo/security.js | 17 +- browser/base/content/tabbrowser.js | 7 - browser/base/content/utilityOverlay.js | 12 - browser/components/BrowserGlue.jsm | 13 + browser/components/about/AboutRedirector.cpp | 4 + browser/components/about/components.conf | 1 + browser/components/moz.build | 1 + .../onionservices/HttpsEverywhereControl.jsm | 69 +-- .../components/onionservices/OnionAliasStore.jsm | 569 ++++++++++++++++----- browser/components/rulesets/RulesetsChild.jsm | 11 + browser/components/rulesets/RulesetsParent.jsm | 79 +++ .../components/rulesets/content/aboutRulesets.css | 319 ++++++++++++ .../components/rulesets/content/aboutRulesets.html | 110 ++++ .../components/rulesets/content/aboutRulesets.js | 531 +++++++++++++++++++ browser/components/rulesets/content/securedrop.svg | 173 +++++++ browser/components/rulesets/jar.mn | 5 + browser/components/rulesets/moz.build | 6 + browser/components/urlbar/UrlbarInput.jsm | 13 +- browser/modules/TorStrings.jsm | 76 +++ docshell/base/nsDocShell.cpp | 52 -- docshell/base/nsDocShell.h | 6 - docshell/base/nsDocShellLoadState.cpp | 4 - docshell/base/nsIDocShell.idl | 5 - docshell/base/nsIWebNavigation.idl | 5 - docshell/shistory/SessionHistoryEntry.cpp | 14 - docshell/shistory/SessionHistoryEntry.h | 1 - docshell/shistory/nsISHEntry.idl | 5 - docshell/shistory/nsSHEntry.cpp | 22 +- docshell/shistory/nsSHEntry.h | 1 - dom/interfaces/base/nsIBrowser.idl | 3 +- dom/ipc/BrowserChild.cpp | 2 - dom/ipc/BrowserParent.cpp | 3 +- dom/ipc/PBrowser.ipdl | 1 - modules/libpref/init/StaticPrefList.yaml | 6 - netwerk/build/components.conf | 11 + netwerk/build/nsNetCID.h | 10 + netwerk/dns/IOnionAliasService.idl | 34 ++ netwerk/dns/OnionAliasService.cpp | 94 ++++ netwerk/dns/OnionAliasService.h | 36 ++ netwerk/dns/TRR.cpp | 2 + netwerk/dns/effective_tld_names.dat | 2 - netwerk/dns/moz.build | 4 + netwerk/ipc/DocumentLoadListener.cpp | 10 - netwerk/socket/nsSOCKSIOLayer.cpp | 24 +- security/manager/ssl/SSLServerCertVerification.cpp | 9 + security/manager/ssl/SSLServerCertVerification.h | 4 +- toolkit/content/widgets/browser-custom-element.js | 13 +- toolkit/modules/RemotePageAccessManager.jsm | 14 + toolkit/modules/sessionstore/SessionHistory.jsm | 5 - xpcom/reflect/xptinfo/xptinfo.h | 3 +- 59 files changed, 2051 insertions(+), 496 deletions(-) create mode 100644 browser/components/rulesets/RulesetsChild.jsm create mode 100644 browser/components/rulesets/RulesetsParent.jsm create mode 100644 browser/components/rulesets/content/aboutRulesets.css create mode 100644 browser/components/rulesets/content/aboutRulesets.html create mode 100644 browser/components/rulesets/content/aboutRulesets.js create mode 100644 browser/components/rulesets/content/securedrop.svg create mode 100644 browser/components/rulesets/jar.mn create mode 100644 browser/components/rulesets/moz.build create mode 100644 netwerk/dns/IOnionAliasService.idl create mode 100644 netwerk/dns/OnionAliasService.cpp create mode 100644 netwerk/dns/OnionAliasService.h -- To stop receiving notification emails like this one, please contact the administrator of this repository.
1 4
0 0
[builders/tor-browser-build] branch master updated: Update bug numbers in start-tor-browser
by gitolite role 07 Jun '22

07 Jun '22
This is an automated email from the git hooks/post-receive script. boklm pushed a commit to branch master in repository builders/tor-browser-build. The following commit(s) were added to refs/heads/master by this push: new cc3a5e0 Update bug numbers in start-tor-browser cc3a5e0 is described below commit cc3a5e03b975d21fe55740ec925aa987acd0e806 Author: Nicolas Vigier <boklm(a)torproject.org> AuthorDate: Tue Jun 7 10:06:15 2022 +0200 Update bug numbers in start-tor-browser --- projects/tor-browser/RelativeLink/start-tor-browser | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/projects/tor-browser/RelativeLink/start-tor-browser b/projects/tor-browser/RelativeLink/start-tor-browser index d7b4b05..8f0764c 100755 --- a/projects/tor-browser/RelativeLink/start-tor-browser +++ b/projects/tor-browser/RelativeLink/start-tor-browser @@ -344,8 +344,8 @@ cd "${HOME}" # We pass all additional command-line arguments we get to Firefox. # -# The --class parameter was added to fix bug 11102 (X11). -# The --name parameter was added to fix bug 41015 (Wayland). +# The --class parameter was added to fix bug trac#11102 (X11). +# The --name parameter was added to fix bug tor-browser-build#40517 (Wayland). # --class and --name parameters are used to make sure WM_CLASS is set # up correctly, to identify itself from plain Firefox windows (and # prevent from mixing up with them). -- To stop receiving notification emails like this one, please contact the administrator of this repository.
1 0
0 0
[builders/tor-browser-build] branch master updated: Bug 41015: Add --name parameter to correctly setup WM_CLASS when running as native Wayland client
by gitolite role 07 Jun '22

07 Jun '22
This is an automated email from the git hooks/post-receive script. boklm pushed a commit to branch master in repository builders/tor-browser-build. The following commit(s) were added to refs/heads/master by this push: new 13e1fa1 Bug 41015: Add --name parameter to correctly setup WM_CLASS when running as native Wayland client 13e1fa1 is described below commit 13e1fa1d3cfaeeef58ec344337a367528807094f Author: dragjkngj <goldenhashtag(a)hotmail.com> AuthorDate: Mon Jun 6 03:51:06 2022 +0000 Bug 41015: Add --name parameter to correctly setup WM_CLASS when running as native Wayland client --- .../tor-browser/RelativeLink/start-tor-browser | 23 +++++++++++++++------- 1 file changed, 16 insertions(+), 7 deletions(-) diff --git a/projects/tor-browser/RelativeLink/start-tor-browser b/projects/tor-browser/RelativeLink/start-tor-browser index cd70765..d7b4b05 100755 --- a/projects/tor-browser/RelativeLink/start-tor-browser +++ b/projects/tor-browser/RelativeLink/start-tor-browser @@ -344,26 +344,35 @@ cd "${HOME}" # We pass all additional command-line arguments we get to Firefox. # -# The --class parameter was added to fix bug 11102. +# The --class parameter was added to fix bug 11102 (X11). +# The --name parameter was added to fix bug 41015 (Wayland). +# --class and --name parameters are used to make sure WM_CLASS is set +# up correctly, to identify itself from plain Firefox windows (and +# prevent from mixing up with them). if [ "$show_usage" -eq 1 ]; then # Display Firefox help, then our help - TOR_CONTROL_PASSWD=${TOR_CONTROL_PASSWD} ./firefox --class "Tor Browser" \ + TOR_CONTROL_PASSWD=${TOR_CONTROL_PASSWD} ./firefox \ + --class "Tor Browser" --name "Tor Browser" \ -profile TorBrowser/Data/Browser/profile.default --help 2>/dev/null tbb_usage elif [ "$detach" -eq 1 ] ; then - TOR_CONTROL_PASSWD=${TOR_CONTROL_PASSWD} ./firefox --class "Tor Browser" \ - -profile TorBrowser/Data/Browser/profile.default "${@}" > "$logfile" 2>&1 </dev/null & + TOR_CONTROL_PASSWD=${TOR_CONTROL_PASSWD} ./firefox \ + --class "Tor Browser" --name "Tor Browser" \ + -profile TorBrowser/Data/Browser/profile.default "${@}" > "$logfile" 2>&1 </dev/null & disown "$!" elif [ "$log_output" -eq 1 -a "$show_output" -eq 1 ]; then - TOR_CONTROL_PASSWD=${TOR_CONTROL_PASSWD} ./firefox --class "Tor Browser" \ + TOR_CONTROL_PASSWD=${TOR_CONTROL_PASSWD} ./firefox \ + --class "Tor Browser" --name "Tor Browser" \ -profile TorBrowser/Data/Browser/profile.default "${@}" 2>&1 </dev/null | \ tee "$logfile" elif [ "$show_output" -eq 1 ]; then - TOR_CONTROL_PASSWD=${TOR_CONTROL_PASSWD} ./firefox --class "Tor Browser" \ + TOR_CONTROL_PASSWD=${TOR_CONTROL_PASSWD} ./firefox \ + --class "Tor Browser" --name "Tor Browser" \ -profile TorBrowser/Data/Browser/profile.default "${@}" < /dev/null else - TOR_CONTROL_PASSWD=${TOR_CONTROL_PASSWD} ./firefox --class "Tor Browser" \ + TOR_CONTROL_PASSWD=${TOR_CONTROL_PASSWD} ./firefox \ + --class "Tor Browser" --name "Tor Browser" \ -profile TorBrowser/Data/Browser/profile.default "${@}" > "$logfile" 2>&1 </dev/null fi -- To stop receiving notification emails like this one, please contact the administrator of this repository.
1 0
0 0
  • ← Newer
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • Older →

HyperKitty Powered by HyperKitty version 1.3.12.