ma1 pushed to branch base-browser-115.4.0esr-13.5-1 at The Tor Project / Applications / Tor Browser
Commits:
d2547154 by hackademix at 2023-11-14T16:48:51+01:00
fixup! Firefox preference overrides.
- - - - -
1 changed file:
- browser/app/profile/001-base-profile.js
Changes:
=====================================
browser/app/profile/001-base-profile.js
=====================================
@@ -568,8 +568,6 @@ pref("extensions.abuseReport.enabled", false);
// Therefore, do not allow download of additional language packs. They are not a
// privacy/security threat, we are disabling them for UX reasons. See bug 41377.
pref("intl.multilingual.downloadEnabled", false);
-// Disk activity: Disable storage.sync (tor-browser#41424)
-pref("webextensions.storage.sync.enabled", false);
// Enforce certificate pinning, see: https://bugs.torproject.org/16206
pref("security.cert_pinning.enforcement_level", 2);
View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/d254715…
--
View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/d254715…
You're receiving this email because of your account on gitlab.torproject.org.
ma1 pushed to branch mullvad-browser-115.4.0esr-13.5-1 at The Tor Project / Applications / Mullvad Browser
Commits:
c4345c65 by hackademix at 2023-11-14T10:55:14+01:00
fixup! Firefox preference overrides.
- - - - -
1 changed file:
- browser/app/profile/001-base-profile.js
Changes:
=====================================
browser/app/profile/001-base-profile.js
=====================================
@@ -566,8 +566,6 @@ pref("extensions.abuseReport.enabled", false);
// Therefore, do not allow download of additional language packs. They are not a
// privacy/security threat, we are disabling them for UX reasons. See bug 41377.
pref("intl.multilingual.downloadEnabled", false);
-// Disk activity: Disable storage.sync (tor-browser#41424)
-pref("webextensions.storage.sync.enabled", false);
// Enforce certificate pinning, see: https://bugs.torproject.org/16206
pref("security.cert_pinning.enforcement_level", 2);
View it on GitLab: https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/c43…
--
View it on GitLab: https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/c43…
You're receiving this email because of your account on gitlab.torproject.org.
Pier Angelo Vendrame pushed to branch tor-browser-115.4.0esr-13.0-1 at The Tor Project / Applications / Tor Browser
Commits:
2f901371 by Pier Angelo Vendrame at 2023-11-13T17:55:50+01:00
fixup! Bug 40933: Add tor-launcher functionality
Bug 42108: Use the sentconnect event to update the circuit display
In this way, the circuit might be updated more often, because some
circuits will not work for some sites, but it might be what users want,
especially when the browser fails and you would like to know the exit
node that has been blocked.
- - - - -
934aa459 by Pier Angelo Vendrame at 2023-11-13T17:55:51+01:00
fixup! Bug 3455: Add DomainIsolator, for isolating circuit by domain.
Bug 42108: Use the sentconnect event to update the circuit display
Use the new topic name in the domain isolator.
- - - - -
4 changed files:
- toolkit/components/tor-launcher/TorControlPort.sys.mjs
- toolkit/components/tor-launcher/TorDomainIsolator.sys.mjs
- toolkit/components/tor-launcher/TorProvider.sys.mjs
- toolkit/components/tor-launcher/TorProviderBuilder.sys.mjs
Changes:
=====================================
toolkit/components/tor-launcher/TorControlPort.sys.mjs
=====================================
@@ -1043,15 +1043,15 @@ export class TorController {
}
break;
case "STREAM":
- const succeeedEvent =
- /^(?<StreamID>[a-zA-Z0-9]{1,16})\sSUCCEEDED\s(?<CircuitID>[a-zA-Z0-9]{1,16})/.exec(
+ const sentConnectEvent =
+ /^(?<StreamID>[a-zA-Z0-9]{1,16})\sSENTCONNECT\s(?<CircuitID>[a-zA-Z0-9]{1,16})/.exec(
data.groups.data
);
- if (succeeedEvent) {
+ if (sentConnectEvent) {
const credentials = this.#parseCredentials(data.groups.data);
- this.#eventHandler.onStreamSucceeded(
- succeeedEvent.groups.StreamID,
- succeeedEvent.groups.CircuitID,
+ this.#eventHandler.onStreamSentConnect(
+ sentConnectEvent.groups.StreamID,
+ sentConnectEvent.groups.CircuitID,
credentials?.username ?? null,
credentials?.password ?? null
);
@@ -1190,8 +1190,9 @@ export class TorController {
* (i.e., a CIRC event with a BUILT status)
* @property {OnCircuitClosed} onCircuitClosed Called when a circuit is closed
* (i.e., a CIRC event with a CLOSED status)
- * @property {OnStreamSucceeded} onStreamSucceeded Called when a stream receives
- * a reply (i.e., a STREAM event with a SUCCEEDED status)
+ * @property {OnStreamSentConnect} onStreamSentConnect Called when a stream sent
+ * a connect cell along a circuit (i.e., a STREAM event with a SENTCONNECT
+ * status)
*/
/**
* @callback OnBootstrapStatus
@@ -1217,7 +1218,7 @@ export class TorController {
* @param {CircuitID} id The id of the circuit that has been closed
*/
/**
- * @callback OnStreamSucceeded
+ * @callback OnStreamSentConnect
*
* @param {StreamID} streamId The id of the stream that switched to the succeeded
* state
=====================================
toolkit/components/tor-launcher/TorDomainIsolator.sys.mjs
=====================================
@@ -146,7 +146,10 @@ class TorDomainIsolatorImpl {
Services.prefs.addObserver(NON_TOR_PROXY_PREF, this);
Services.obs.addObserver(this, NEW_IDENTITY_TOPIC);
- Services.obs.addObserver(this, lazy.TorProviderTopics.StreamSucceeded);
+ Services.obs.addObserver(
+ this,
+ lazy.TorProviderTopics.CircuitCredentialsMatched
+ );
this.#cleanupIntervalId = setInterval(
this.#clearKnownCircuits.bind(this),
@@ -161,7 +164,10 @@ class TorDomainIsolatorImpl {
uninit() {
Services.prefs.removeObserver(NON_TOR_PROXY_PREF, this);
Services.obs.removeObserver(this, NEW_IDENTITY_TOPIC);
- Services.obs.removeObserver(this, lazy.TorProviderTopics.StreamSucceeded);
+ Services.obs.removeObserver(
+ this,
+ lazy.TorProviderTopics.CircuitCredentialsMatched
+ );
clearInterval(this.#cleanupIntervalId);
this.#cleanupIntervalId = null;
this.clearIsolation();
@@ -266,7 +272,7 @@ class TorDomainIsolatorImpl {
logger.error("Could not send the newnym command", e);
// TODO: What UX to use here? See tor-browser#41708
}
- } else if (topic === lazy.TorProviderTopics.StreamSucceeded) {
+ } else if (topic === lazy.TorProviderTopics.CircuitCredentialsMatched) {
const { username, password, circuit } = subject.wrappedJSObject;
this.#updateCircuit(username, password, circuit);
}
=====================================
toolkit/components/tor-launcher/TorProvider.sys.mjs
=====================================
@@ -991,19 +991,19 @@ export class TorProvider {
}
/**
- * Handle a notification about a stream switching to the succeeded state.
+ * Handle a notification about a stream switching to the sentconnect status.
*
* @param {StreamID} streamId The ID of the stream that switched to the
- * succeeded state.
+ * sentconnect status.
* @param {CircuitID} circuitId The ID of the circuit used by the stream
* @param {string} username The SOCKS username
* @param {string} password The SOCKS password
*/
- async onStreamSucceeded(streamId, circuitId, username, password) {
+ async onStreamSentConnect(streamId, circuitId, username, password) {
if (!username || !password) {
return;
}
- logger.debug("Stream succeeded event", username, password, circuitId);
+ logger.debug("Stream sentconnect event", username, password, circuitId);
let circuit = this.#circuits.get(circuitId);
if (!circuit) {
circuit = new Promise((resolve, reject) => {
@@ -1017,7 +1017,7 @@ export class TorProvider {
this.#circuits.set(id, nodes);
}
logger.error(
- `Seen a STREAM SUCCEEDED with circuit ${circuitId}, but Tor did not send information about it.`
+ `Seen a STREAM SENTCONNECT with circuit ${circuitId}, but Tor did not send information about it.`
);
reject();
});
@@ -1037,7 +1037,7 @@ export class TorProvider {
circuit,
},
},
- TorProviderTopics.StreamSucceeded
+ TorProviderTopics.CircuitCredentialsMatched
);
}
}
=====================================
toolkit/components/tor-launcher/TorProviderBuilder.sys.mjs
=====================================
@@ -15,7 +15,7 @@ export const TorProviderTopics = Object.freeze({
BootstrapError: "TorBootstrapError",
HasWarnOrErr: "TorLogHasWarnOrErr",
BridgeChanged: "TorBridgeChanged",
- StreamSucceeded: "TorStreamSucceeded",
+ CircuitCredentialsMatched: "TorCircuitCredentialsMatched",
});
export const TorProviders = Object.freeze({
View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/compare/20f764…
--
View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/compare/20f764…
You're receiving this email because of your account on gitlab.torproject.org.
richard pushed to branch main at The Tor Project / Applications / RBM
Commits:
4fd67eea by Nicolas Vigier at 2023-11-08T08:51:23+01:00
Bug 40064: Fix usage of exec without git_url/hg_url
- - - - -
2 changed files:
- doc/rbm_templates.asc
- lib/RBM.pm
Changes:
=====================================
doc/rbm_templates.asc
=====================================
@@ -107,7 +107,9 @@ exec::
considered to be a script, which will be written to a temporary
file and executed. The second argument of the exec function is
an optional $options hash, used to override values of 'git_url',
- 'hg_url', 'fetch', 'git_hash' or 'hg_hash'.
+ 'hg_url', 'fetch', 'git_hash' or 'hg_hash'. If neither 'git_url'
+ nor 'hg_url' is set, the command is executed from the directory
+ where the 'rbm.conf' file is located.
path::
A function to return an absolute path. It takes a path as first
=====================================
lib/RBM.pm
=====================================
@@ -549,7 +549,7 @@ sub git_submodule_init_sync_update {
sub execute {
my ($project, $cmd, $options) = @_;
CORE::state %cache;
- my $res_name;
+ my $res_name = '';
my $old_cwd = getcwd;
if (project_config($project, 'git_url', $options)) {
my $git_hash = project_config($project, 'git_hash', $options)
@@ -571,6 +571,8 @@ sub execute {
my ($stdout, $stderr, $success, $exit_code)
= capture_exec('hg', 'update', '-C', $hg_hash);
exit_error "Cannot checkout $hg_hash:\n$stderr" unless $success;
+ } else {
+ chdir($config->{basedir});
}
my ($stdout, $stderr, $success, $exit_code)
= run_script($project, $cmd, \&capture_exec);
View it on GitLab: https://gitlab.torproject.org/tpo/applications/rbm/-/commit/4fd67eea510a680…
--
View it on GitLab: https://gitlab.torproject.org/tpo/applications/rbm/-/commit/4fd67eea510a680…
You're receiving this email because of your account on gitlab.torproject.org.
Pier Angelo Vendrame pushed to branch base-browser-115.4.0esr-13.5-1 at The Tor Project / Applications / Tor Browser
Commits:
a7078534 by Pier Angelo Vendrame at 2023-11-13T15:11:18+01:00
fixup! Firefox preference overrides.
Bug 42153: Drop dom.enable_resource_timing = false
- - - - -
1 changed file:
- browser/app/profile/001-base-profile.js
Changes:
=====================================
browser/app/profile/001-base-profile.js
=====================================
@@ -344,7 +344,6 @@ pref("browser.link.open_newwindow.restriction", 0); // Bug 9881: Open popups in
pref("dom.disable_window_move_resize", true);
// Set video VP9 to 0 for everyone (bug 22548)
pref("media.benchmark.vp9.threshold", 0);
-pref("dom.enable_resource_timing", false); // Bug 13024: To hell with this API
pref("privacy.resistFingerprinting.block_mozAddonManager", true); // Bug 26114
pref("dom.webaudio.enabled", false); // Bug 13017: Disable Web Audio API
pref("dom.webmidi.enabled", false); // Bug 41398: Disable Web MIDI API
View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/a707853…
--
View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/a707853…
You're receiving this email because of your account on gitlab.torproject.org.
Pier Angelo Vendrame pushed to branch mullvad-browser-115.4.0esr-13.5-1 at The Tor Project / Applications / Mullvad Browser
Commits:
8c9191c8 by Pier Angelo Vendrame at 2023-11-13T15:10:56+01:00
fixup! Firefox preference overrides.
Bug 42153: Drop dom.enable_resource_timing = false
- - - - -
1 changed file:
- browser/app/profile/001-base-profile.js
Changes:
=====================================
browser/app/profile/001-base-profile.js
=====================================
@@ -344,7 +344,6 @@ pref("browser.link.open_newwindow.restriction", 0); // Bug 9881: Open popups in
pref("dom.disable_window_move_resize", true);
// Set video VP9 to 0 for everyone (bug 22548)
pref("media.benchmark.vp9.threshold", 0);
-pref("dom.enable_resource_timing", false); // Bug 13024: To hell with this API
pref("privacy.resistFingerprinting.block_mozAddonManager", true); // Bug 26114
pref("dom.webmidi.enabled", false); // Bug 41398: Disable Web MIDI API
// tor-browser#42043: Stop reporting device IDs (and spoof their number without
View it on GitLab: https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/8c9…
--
View it on GitLab: https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/8c9…
You're receiving this email because of your account on gitlab.torproject.org.