Pier Angelo Vendrame pushed to branch tor-browser-115.6.0esr-13.5-1 at The Tor Project / Applications / Tor Browser
Commits:
afe1be79 by Pier Angelo Vendrame at 2024-01-09T17:57:06+01:00
fixup! Bug 40597: Implement TorSettings module
Bug 42359: Handle firewall and proxy in setSettings.
- - - - -
1 changed file:
- toolkit/modules/TorSettings.sys.mjs
Changes:
=====================================
toolkit/modules/TorSettings.sys.mjs
=====================================
@@ -301,8 +301,12 @@ class TorSettingsImpl {
return this.#parsePort(val, false) ?? 0;
},
},
- username: {},
- password: {},
+ username: {
+ transform: val => val ?? "",
+ },
+ password: {
+ transform: val => val ?? "",
+ },
uri: {
getter: () => {
const { type, address, port, username, password } = this.proxy;
@@ -910,7 +914,11 @@ class TorSettingsImpl {
}
/**
- * Set all of our settings at once from a settings object.
+ * Set blocks of settings at once from an object.
+ *
+ * It is possible to set all settings, or only some sections (e.g., only
+ * bridges), but if a key is present, its settings must make sense (e.g., if
+ * bridges are enabled, a valid source must be provided).
*
* @param {object} settings The settings object to set
*/
@@ -924,35 +932,59 @@ class TorSettingsImpl {
// Hold off on lots of notifications until all settings are changed.
this.freezeNotifications();
try {
- this.bridges.enabled = !!settings.bridges.enabled;
- this.bridges.source = settings.bridges.source;
- switch (settings.bridges.source) {
- case TorBridgeSource.BridgeDB:
- case TorBridgeSource.UserProvided:
- this.bridges.bridge_strings = settings.bridges.bridge_strings;
- break;
- case TorBridgeSource.BuiltIn: {
- this.bridges.builtin_type = settings.bridges.builtin_type;
- if (!this.bridges.bridge_strings.length) {
- // No bridges were found when setting the builtin_type.
- throw new Error(
- `No available builtin bridges of type ${settings.bridges.builtin_type}`
- );
- }
- break;
+ if ("bridges" in settings) {
+ this.bridges.enabled = !!settings.bridges.enabled;
+ // Currently, disabling bridges in the UI does not remove the lines,
+ // because we call only the `enabled` setter.
+ // So, if the bridge source is undefined but bridges are disabled,
+ // do not force Invalid. Instead, keep the current source.
+ if (this.bridges.enabled || settings.bridges.source !== undefined) {
+ this.bridges.source = settings.bridges.source;
}
- case TorBridgeSource.Invalid:
- break;
- default:
- if (settings.bridges.enabled) {
- throw new Error(
- `Bridge source '${settings.source}' is not a valid source`
- );
+ switch (settings.bridges.source) {
+ case TorBridgeSource.BridgeDB:
+ case TorBridgeSource.UserProvided:
+ this.bridges.bridge_strings = settings.bridges.bridge_strings;
+ break;
+ case TorBridgeSource.BuiltIn: {
+ this.bridges.builtin_type = settings.bridges.builtin_type;
+ if (!this.bridges.bridge_strings.length) {
+ // No bridges were found when setting the builtin_type.
+ throw new Error(
+ `No available builtin bridges of type ${settings.bridges.builtin_type}`
+ );
+ }
+ break;
}
- break;
+ case TorBridgeSource.Invalid:
+ break;
+ default:
+ if (settings.bridges.enabled) {
+ throw new Error(
+ `Bridge source '${settings.source}' is not a valid source`
+ );
+ }
+ break;
+ }
}
- // TODO: proxy and firewall
+ if ("proxy" in settings) {
+ this.proxy.enabled = !!settings.proxy.enabled;
+ if (this.proxy.enabled) {
+ this.proxy.type = settings.proxy.type;
+ this.proxy.address = settings.proxy.address;
+ this.proxy.port = settings.proxy.port;
+ this.proxy.username = settings.proxy.username;
+ this.proxy.password = settings.proxy.password;
+ }
+ }
+
+ if ("firewall" in settings) {
+ this.firewall.enabled = !!settings.firewall.enabled;
+ if (this.firewall.enabled) {
+ this.firewall.allowed_ports = settings.firewall.allowed_ports;
+ }
+ }
} catch (ex) {
// Restore the old settings without any new notifications generated from
// the above code.
View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/afe1be7…
--
View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/afe1be7…
You're receiving this email because of your account on gitlab.torproject.org.
richard pushed to branch tor-browser-115.6.0esr-13.5-1 at The Tor Project / Applications / Tor Browser
Commits:
0ee68de7 by Pier Angelo Vendrame at 2024-01-09T12:39:59+01:00
fixup! Bug 3455: Add DomainIsolator, for isolating circuit by domain.
Bug 42338: Make TorDomainIsolator.newCircuitForDomain public again
- - - - -
1 changed file:
- toolkit/components/tor-launcher/TorDomainIsolator.sys.mjs
Changes:
=====================================
toolkit/components/tor-launcher/TorDomainIsolator.sys.mjs
=====================================
@@ -224,7 +224,7 @@ class TorDomainIsolatorImpl {
newCircuitForBrowser(globalBrowser) {
const browser = globalBrowser.selectedBrowser;
const firstPartyDomain = getDomainForBrowser(browser);
- this.#newCircuitForDomain(firstPartyDomain);
+ this.newCircuitForDomain(firstPartyDomain);
const { username, password } = this.#getSocksProxyCredentials(
firstPartyDomain,
browser.contentPrincipal.originAttributes.userContextId
@@ -329,7 +329,7 @@ class TorDomainIsolatorImpl {
logger.info(
"tor catchall circuit has reached its maximum lifetime. Rotating."
);
- this.#newCircuitForDomain(CATCHALL_DOMAIN);
+ this.newCircuitForDomain(CATCHALL_DOMAIN);
}
}
const { username, password } = this.#getSocksProxyCredentials(
@@ -437,7 +437,7 @@ class TorDomainIsolatorImpl {
* @param {string?} domain The first-party domain to re-create the nonce for.
* If empty or null, the catchall domain will be used.
*/
- #newCircuitForDomain(domain) {
+ newCircuitForDomain(domain) {
if (!domain) {
domain = CATCHALL_DOMAIN;
}
View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/0ee68de…
--
View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/0ee68de…
You're receiving this email because of your account on gitlab.torproject.org.
Pier Angelo Vendrame pushed to branch maint-13.0 at The Tor Project / Applications / tor-browser-build
Commits:
2dc972fd by Pier Angelo Vendrame at 2024-01-09T14:33:16+01:00
Bug 41016: Switch from bullseye to bookworm on macOS+Windows.
Debian bookworm became the new stable in June 2023, so we should update
our containers to use it.
On macOS the update did not cause any issue, and just updating the
suite name worked.
On Windows, it caused some problems where we used the strip provided by
the OS (only for tor, it seems), because the new version of strip seems
to update the timestamps by default.
We are delaying the process for Android because there are still a
couple of projects that require Java 11, which is not available on
bookworm.
- - - - -
d5376ce1 by Pier Angelo Vendrame at 2024-01-09T14:33:18+01:00
Bug 41015: Enable std::filesystem on libc++ on Windows
We need to do some path manipulation in some Firefox code that is run
before initializing XPCOM.
So, the alternatives are either Path* functions from shlwapi, or
std::filesystem, which is disabled in Firefox 115.
Mozilla enabled it starting from 116, but we have been told it is okay
to enable it also in 115, so we do it with this patch.
- - - - -
6 changed files:
- projects/manual/config
- projects/mingw-w64-clang/build
- projects/mmdebstrap-image/config
- projects/mmdebstrap/config
- projects/tor/build
- rbm.conf
Changes:
=====================================
projects/manual/config
=====================================
@@ -13,7 +13,7 @@ compress_tar: 'gz'
var:
container:
- suite: bullseye
+ suite: bookworm
arch: amd64
deps:
- python3
=====================================
projects/mingw-w64-clang/build
=====================================
@@ -175,7 +175,7 @@ EOF
-DLIBCXX_SUPPORTS_STD_EQ_CXX11_FLAG=TRUE \
-DLIBCXX_HAVE_CXX_ATOMICS_WITHOUT_LIB=TRUE \
-DLIBCXX_ENABLE_EXPERIMENTAL_LIBRARY=OFF \
- -DLIBCXX_ENABLE_FILESYSTEM=OFF \
+ -DLIBCXX_ENABLE_FILESYSTEM=ON \
-DLIBCXX_ENABLE_STATIC_ABI_LIBRARY=TRUE \
-DLIBCXX_CXX_ABI=libcxxabi \
-DLIBCXX_CXX_ABI_INCLUDE_PATHS=$builddir/clang-source/libcxxabi/include \
=====================================
projects/mmdebstrap-image/config
=====================================
@@ -7,7 +7,7 @@ container:
use_container: 1
var:
- ubuntu_version: 22.04.2
+ ubuntu_version: 22.04.3
pre: |
#!/bin/sh
@@ -50,9 +50,16 @@ targets:
suite: bullseye
arch: amd64
+ bookworm-amd64:
+ var:
+ minimal_apt_version: 2.6.1
+ container:
+ suite: bookworm
+ arch: amd64
+
input_files:
- project: mmdebstrap
name: mmdebstrap
- URL: 'https://cdimage.ubuntu.com/ubuntu-base/releases/[% c("var/ubuntu_version") %]/release/ubuntu-base-[% c("var/ubuntu_version") %]-base-amd64.tar.gz'
filename: 'container-image_ubuntu-base-[% c("var/ubuntu_version") %]-base-amd64.tar.gz'
- sha256sum: 373f064df30519adc3344a08d774f437caabd1479d846fa2ca6fed727ea7a53d
+ sha256sum: ad33b7ae47b75c92c2e2fe21fd4612e15357e67679d8751d6ce892a475be24fe
=====================================
projects/mmdebstrap/config
=====================================
@@ -1,6 +1,6 @@
# vim: filetype=yaml sw=2
filename: '[% project %]-src-[% c("version") %]-[% c("var/build_id") %].tar.gz'
-version: 0.8.6
+version: 1.4.0
git_hash: '[% c("version") %]'
git_url: https://gitlab.mister-muffin.de/josch/mmdebstrap.git
gpg_keyring: mmdebstrap.gpg
=====================================
projects/tor/build
=====================================
@@ -97,8 +97,9 @@ cp $distdir/share/tor/geoip6 "$TORDATADIR"
cd $distdir
[% IF c("var/windows") %]
- install -s $distdir/bin/tor.exe "$TORBINDIR"
- install -s $distdir/bin/tor-gencert.exe "$TORBINDIR"
+ # With Debian bookworm strip changes the date time, llvm-strip doesn't do it.
+ install -s --strip-program=llvm-strip $distdir/bin/tor.exe "$TORBINDIR"
+ install -s --strip-program=llvm-strip $distdir/bin/tor-gencert.exe "$TORBINDIR"
[% END %]
[% IF c("var/linux") %]
=====================================
rbm.conf
=====================================
@@ -578,7 +578,7 @@ targets:
windows: 1
platform: windows
container:
- suite: bullseye
+ suite: bookworm
arch: amd64
configure_opt: '--host=[% c("arch") %]-w64-mingw32 CFLAGS="[% c("var/CFLAGS") %]" LDFLAGS="[% c("var/LDFLAGS") %]" [% c("var/configure_opt_project") %]'
CFLAGS: '-fstack-protector-strong -fno-strict-overflow -Wno-missing-field-initializers -Wformat -Wformat-security [% c("var/flag_mwindows") %]'
@@ -661,7 +661,7 @@ targets:
platform: macos
osname: macos
container:
- suite: bullseye
+ suite: bookworm
arch: amd64
compiler: 'macosx-toolchain'
configure_opt: '--host=[% c("var/build_target") %] CC="[% c("var/build_target") %]-clang [% c("var/FLAGS") %]" CXX="[% c("var/build_target") %]-clang++ [% c("var/FLAGS") %]" [% c("var/configure_opt_project") %]'
View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/compare/…
--
View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/compare/…
You're receiving this email because of your account on gitlab.torproject.org.
Pier Angelo Vendrame pushed to branch mullvad-browser-115.6.0esr-13.0-1 at The Tor Project / Applications / Mullvad Browser
Commits:
4f0e3266 by Kagami Sascha Rosylight at 2024-01-09T14:28:40+01:00
Bug 1865238 - Use One UI Sans KR VF for Korean sans-serif font on Android r=jfkthame
Per /etc/fonts.xml, there are now only two `<family lang="ko">` nodes there:
* OneUISansKRVF series
* SECCJK series (but no KR postfix anymore?)
This patch uses One UI Sans KR VF as the replacement as this is newer and is a variable font (tested with https://codepen.io/SaschaNaz/pen/ExrdYXJ)
Differential Revision: https://phabricator.services.mozilla.com/D195078
- - - - -
e99bdee9 by Pier Angelo Vendrame at 2024-01-09T14:28:42+01:00
Bug 1860020 - Remove the assertion on the value of toolkit.telemetry.enabled. r=KrisWright,chutten
Bug 1444275 introduced an assertion on the parent process to check that
the value of toolkit.telemetry.enabled is the expected one.
However, this expected value could be different from the one set and
locked e.g. in some forks. Therefore, the assertion prevented debug
builds from working in these cases.
Differential Revision: https://phabricator.services.mozilla.com/D195080
- - - - -
2 changed files:
- modules/libpref/Preferences.cpp
- modules/libpref/init/all.js
Changes:
=====================================
modules/libpref/Preferences.cpp
=====================================
@@ -3637,16 +3637,6 @@ void Preferences::SetupTelemetryPref() {
Preferences::Lock(kTelemetryPref);
}
-static void CheckTelemetryPref() {
- MOZ_ASSERT(!XRE_IsParentProcess());
-
- // Make sure the children got passed the right telemetry pref details.
- DebugOnly<bool> value;
- MOZ_ASSERT(NS_SUCCEEDED(Preferences::GetBool(kTelemetryPref, &value)) &&
- value == TelemetryPrefValue());
- MOZ_ASSERT(Preferences::IsLocked(kTelemetryPref));
-}
-
#endif // MOZ_WIDGET_ANDROID
/* static */
@@ -3687,11 +3677,6 @@ already_AddRefed<Preferences> Preferences::GetInstanceForService() {
Preferences::SetPreference(gChangedDomPrefs->ElementAt(i));
}
gChangedDomPrefs = nullptr;
-
-#ifndef MOZ_WIDGET_ANDROID
- CheckTelemetryPref();
-#endif
-
} else {
// Check if there is a deployment configuration file. If so, set up the
// pref config machinery, which will actually read the file.
=====================================
modules/libpref/init/all.js
=====================================
@@ -3053,7 +3053,7 @@ pref("font.size.monospace.x-math", 13);
pref("font.name-list.monospace.ja", "MotoyaLMaru, MotoyaLCedar, Noto Sans Mono CJK JP, SEC Mono CJK JP, Droid Sans Mono");
pref("font.name-list.serif.ko", "Charis SIL Compact, Noto Serif CJK KR, Noto Serif, Droid Serif, HYSerif");
- pref("font.name-list.sans-serif.ko", "Roboto, Google Sans, SmartGothic, NanumGothic, Noto Sans KR, Noto Sans CJK KR, SamsungKorean_v2.0, SEC CJK KR, DroidSansFallback, Droid Sans Fallback");
+ pref("font.name-list.sans-serif.ko", "Roboto, Google Sans, SmartGothic, NanumGothic, Noto Sans KR, Noto Sans CJK KR, One UI Sans KR VF, SamsungKorean_v2.0, SEC CJK KR, DroidSansFallback, Droid Sans Fallback");
pref("font.name-list.monospace.ko", "Droid Sans Mono, Noto Sans Mono CJK KR, SEC Mono CJK KR");
pref("font.name-list.serif.th", "Charis SIL Compact, Noto Serif, Noto Serif Thai, Droid Serif");
View it on GitLab: https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/compare/65…
--
View it on GitLab: https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/compare/65…
You're receiving this email because of your account on gitlab.torproject.org.
Pier Angelo Vendrame pushed to branch tor-browser-115.6.0esr-13.0-1 at The Tor Project / Applications / Tor Browser
Commits:
4c246c84 by Pier Angelo Vendrame at 2024-01-09T14:27:30+01:00
Bug 1860020 - Remove the assertion on the value of toolkit.telemetry.enabled. r=KrisWright,chutten
Bug 1444275 introduced an assertion on the parent process to check that
the value of toolkit.telemetry.enabled is the expected one.
However, this expected value could be different from the one set and
locked e.g. in some forks. Therefore, the assertion prevented debug
builds from working in these cases.
Differential Revision: https://phabricator.services.mozilla.com/D195080
- - - - -
1 changed file:
- modules/libpref/Preferences.cpp
Changes:
=====================================
modules/libpref/Preferences.cpp
=====================================
@@ -3637,16 +3637,6 @@ void Preferences::SetupTelemetryPref() {
Preferences::Lock(kTelemetryPref);
}
-static void CheckTelemetryPref() {
- MOZ_ASSERT(!XRE_IsParentProcess());
-
- // Make sure the children got passed the right telemetry pref details.
- DebugOnly<bool> value;
- MOZ_ASSERT(NS_SUCCEEDED(Preferences::GetBool(kTelemetryPref, &value)) &&
- value == TelemetryPrefValue());
- MOZ_ASSERT(Preferences::IsLocked(kTelemetryPref));
-}
-
#endif // MOZ_WIDGET_ANDROID
/* static */
@@ -3687,11 +3677,6 @@ already_AddRefed<Preferences> Preferences::GetInstanceForService() {
Preferences::SetPreference(gChangedDomPrefs->ElementAt(i));
}
gChangedDomPrefs = nullptr;
-
-#ifndef MOZ_WIDGET_ANDROID
- CheckTelemetryPref();
-#endif
-
} else {
// Check if there is a deployment configuration file. If so, set up the
// pref config machinery, which will actually read the file.
View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/4c246c8…
--
View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/4c246c8…
You're receiving this email because of your account on gitlab.torproject.org.
Pier Angelo Vendrame pushed to branch base-browser-115.6.0esr-13.0-1 at The Tor Project / Applications / Tor Browser
Commits:
ff2a5e97 by Pier Angelo Vendrame at 2024-01-09T14:26:49+01:00
Bug 1860020 - Remove the assertion on the value of toolkit.telemetry.enabled. r=KrisWright,chutten
Bug 1444275 introduced an assertion on the parent process to check that
the value of toolkit.telemetry.enabled is the expected one.
However, this expected value could be different from the one set and
locked e.g. in some forks. Therefore, the assertion prevented debug
builds from working in these cases.
Differential Revision: https://phabricator.services.mozilla.com/D195080
- - - - -
1 changed file:
- modules/libpref/Preferences.cpp
Changes:
=====================================
modules/libpref/Preferences.cpp
=====================================
@@ -3637,16 +3637,6 @@ void Preferences::SetupTelemetryPref() {
Preferences::Lock(kTelemetryPref);
}
-static void CheckTelemetryPref() {
- MOZ_ASSERT(!XRE_IsParentProcess());
-
- // Make sure the children got passed the right telemetry pref details.
- DebugOnly<bool> value;
- MOZ_ASSERT(NS_SUCCEEDED(Preferences::GetBool(kTelemetryPref, &value)) &&
- value == TelemetryPrefValue());
- MOZ_ASSERT(Preferences::IsLocked(kTelemetryPref));
-}
-
#endif // MOZ_WIDGET_ANDROID
/* static */
@@ -3687,11 +3677,6 @@ already_AddRefed<Preferences> Preferences::GetInstanceForService() {
Preferences::SetPreference(gChangedDomPrefs->ElementAt(i));
}
gChangedDomPrefs = nullptr;
-
-#ifndef MOZ_WIDGET_ANDROID
- CheckTelemetryPref();
-#endif
-
} else {
// Check if there is a deployment configuration file. If so, set up the
// pref config machinery, which will actually read the file.
View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/ff2a5e9…
--
View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/ff2a5e9…
You're receiving this email because of your account on gitlab.torproject.org.
Pier Angelo Vendrame pushed to branch base-browser-115.6.0esr-13.0-1 at The Tor Project / Applications / Tor Browser
Commits:
23604adf by Kagami Sascha Rosylight at 2024-01-09T14:24:52+01:00
Bug 1865238 - Use One UI Sans KR VF for Korean sans-serif font on Android r=jfkthame
Per /etc/fonts.xml, there are now only two `<family lang="ko">` nodes there:
* OneUISansKRVF series
* SECCJK series (but no KR postfix anymore?)
This patch uses One UI Sans KR VF as the replacement as this is newer and is a variable font (tested with https://codepen.io/SaschaNaz/pen/ExrdYXJ)
Differential Revision: https://phabricator.services.mozilla.com/D195078
- - - - -
1 changed file:
- modules/libpref/init/all.js
Changes:
=====================================
modules/libpref/init/all.js
=====================================
@@ -3053,7 +3053,7 @@ pref("font.size.monospace.x-math", 13);
pref("font.name-list.monospace.ja", "MotoyaLMaru, MotoyaLCedar, Noto Sans Mono CJK JP, SEC Mono CJK JP, Droid Sans Mono");
pref("font.name-list.serif.ko", "Charis SIL Compact, Noto Serif CJK KR, Noto Serif, Droid Serif, HYSerif");
- pref("font.name-list.sans-serif.ko", "Roboto, Google Sans, SmartGothic, NanumGothic, Noto Sans KR, Noto Sans CJK KR, SamsungKorean_v2.0, SEC CJK KR, DroidSansFallback, Droid Sans Fallback");
+ pref("font.name-list.sans-serif.ko", "Roboto, Google Sans, SmartGothic, NanumGothic, Noto Sans KR, Noto Sans CJK KR, One UI Sans KR VF, SamsungKorean_v2.0, SEC CJK KR, DroidSansFallback, Droid Sans Fallback");
pref("font.name-list.monospace.ko", "Droid Sans Mono, Noto Sans Mono CJK KR, SEC Mono CJK KR");
pref("font.name-list.serif.th", "Charis SIL Compact, Noto Serif, Noto Serif Thai, Droid Serif");
View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/23604ad…
--
View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/23604ad…
You're receiving this email because of your account on gitlab.torproject.org.
Pier Angelo Vendrame pushed to branch tor-browser-115.6.0esr-13.0-1 at The Tor Project / Applications / Tor Browser
Commits:
15bfca64 by Kagami Sascha Rosylight at 2024-01-09T14:24:03+01:00
Bug 1865238 - Use One UI Sans KR VF for Korean sans-serif font on Android r=jfkthame
Per /etc/fonts.xml, there are now only two `<family lang="ko">` nodes there:
* OneUISansKRVF series
* SECCJK series (but no KR postfix anymore?)
This patch uses One UI Sans KR VF as the replacement as this is newer and is a variable font (tested with https://codepen.io/SaschaNaz/pen/ExrdYXJ)
Differential Revision: https://phabricator.services.mozilla.com/D195078
- - - - -
1 changed file:
- modules/libpref/init/all.js
Changes:
=====================================
modules/libpref/init/all.js
=====================================
@@ -3053,7 +3053,7 @@ pref("font.size.monospace.x-math", 13);
pref("font.name-list.monospace.ja", "MotoyaLMaru, MotoyaLCedar, Noto Sans Mono CJK JP, SEC Mono CJK JP, Droid Sans Mono");
pref("font.name-list.serif.ko", "Charis SIL Compact, Noto Serif CJK KR, Noto Serif, Droid Serif, HYSerif");
- pref("font.name-list.sans-serif.ko", "Roboto, Google Sans, SmartGothic, NanumGothic, Noto Sans KR, Noto Sans CJK KR, SamsungKorean_v2.0, SEC CJK KR, DroidSansFallback, Droid Sans Fallback");
+ pref("font.name-list.sans-serif.ko", "Roboto, Google Sans, SmartGothic, NanumGothic, Noto Sans KR, Noto Sans CJK KR, One UI Sans KR VF, SamsungKorean_v2.0, SEC CJK KR, DroidSansFallback, Droid Sans Fallback");
pref("font.name-list.monospace.ko", "Droid Sans Mono, Noto Sans Mono CJK KR, SEC Mono CJK KR");
pref("font.name-list.serif.th", "Charis SIL Compact, Noto Serif, Noto Serif Thai, Droid Serif");
View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/15bfca6…
--
View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/15bfca6…
You're receiving this email because of your account on gitlab.torproject.org.