morgan pushed to branch main at The Tor Project / Applications / tor-browser-build
Commits:
3f075f68 by Nicolas Vigier at 2024-10-03T18:09:53+00:00
Bug 41256: Re-generate update-responses in upload-update_responses-to-staticiforme
The script was not re-generating update-responses if it had been
generated before. In some case this can be a problem:
https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/issues/4…
- - - - -
1 changed file:
- tools/signing/upload-update_responses-to-staticiforme
Changes:
=====================================
tools/signing/upload-update_responses-to-staticiforme
=====================================
@@ -8,15 +8,12 @@ check_torbrowser_version_var
update_responses_tar_filename="update-responses-$tbb_version_type-$tbb_version.tar"
update_responses_tar="$script_dir/../../$SIGNING_PROJECTNAME/$tbb_version_type/update-responses/$update_responses_tar_filename"
-if test -f "$update_responses_tar"
-then
- echo "$update_responses_tar_filename already exists: not running 'make $SIGNING_PROJECTNAME-update_responses-$tbb_version_type'"
-else
- echo "Running 'make $SIGNING_PROJECTNAME-update_responses-$tbb_version_type'"
- pushd "$script_dir/../.." > /dev/null
- make $SIGNING_PROJECTNAME-update_responses-$tbb_version_type
- popd > /dev/null
-fi
+test -f "$update_responses_tar" && \
+ echo "warning: $update_responses_tar_filename already exists. It will be re-generated."
+echo "Running 'make $SIGNING_PROJECTNAME-update_responses-$tbb_version_type'"
+pushd "$script_dir/../.." > /dev/null
+make $SIGNING_PROJECTNAME-update_responses-$tbb_version_type
+popd > /dev/null
cd $update_responses_repository_dir
git checkout main
View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/commit/3…
--
View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/commit/3…
You're receiving this email because of your account on gitlab.torproject.org.
morgan pushed to branch mullvad-browser-128.3.0esr-14.0-1 at The Tor Project / Applications / Mullvad Browser
Commits:
b4eaca29 by Pier Angelo Vendrame at 2024-10-03T17:57:36+00:00
fixup! Base Browser's .mozconfigs.
Bug 43151: Uniform the behavior of the android-all mozconfig.
- - - - -
2 changed files:
- browser/config/mozconfigs/base-browser-android
- mozconfig-android-all
Changes:
=====================================
browser/config/mozconfigs/base-browser-android
=====================================
@@ -1,3 +1,6 @@
+# Changes on this file might need to be synchronized with mozconfig-android-all!
+# See also tor-browser#43151.
+
export MOZILLA_OFFICIAL=1
ac_add_options --enable-optimize
@@ -29,6 +32,9 @@ ac_add_options --disable-parental-controls
ac_add_options --enable-proxy-bypass-protection
ac_add_options --disable-system-policies
+# See tor-browser#41131
+ac_add_options --disable-backgroundtasks
+
# Disable telemetry
ac_add_options MOZ_TELEMETRY_REPORTING=
=====================================
mozconfig-android-all
=====================================
@@ -1,18 +1,41 @@
+# Changes on this file might need to be synchronized with
+# browser/config/mozconfigs/base-browser-android!
+# See also tor-browser#43151.
+
export MOZILLA_OFFICIAL=1
ac_add_options --enable-application=mobile/android
+
ac_add_options --disable-compile-environment
+ac_add_options --with-java-bin-path=$JAVA_HOME/bin
+ac_add_options --with-android-sdk=$ANDROID_HOME
+ac_add_options --with-gradle=$GRADLE_HOME/bin/gradle
+
+ac_add_options --disable-tests
+ac_add_options --disable-debug
+
+ac_add_options --disable-updater
+ac_add_options --disable-crashreporter
+ac_add_options --disable-webrtc
+ac_add_options --disable-parental-controls
+
+ac_add_options --enable-proxy-bypass-protection
+ac_add_options --disable-system-policies
+
+# See tor-browser#41131
+ac_add_options --disable-backgroundtasks
+
+# Disable telemetry
+ac_add_options MOZ_TELEMETRY_REPORTING=
+
if test -n "$LOCAL_DEV_BUILD"; then
# You must use the "default" bogus channel for dev builds
ac_add_options --enable-update-channel=default
- ac_add_options --without-wasm-sandboxed-libraries
ac_add_options --with-base-browser-version=dev-build
ac_add_options --disable-minify
fi
-ac_add_options --with-tor-browser-version=dev-build
-
-ac_add_options --with-java-bin-path=$JAVA_HOME/bin
-ac_add_options --with-android-sdk=$ANDROID_HOME
-ac_add_options --with-gradle=$GRADLE_HOME/bin/gradle
+if test -z "$WASI_SYSROOT"; then
+ ac_add_options --without-wasm-sandboxed-libraries
+fi
View it on GitLab: https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/b4e…
--
View it on GitLab: https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/b4e…
You're receiving this email because of your account on gitlab.torproject.org.
morgan pushed to branch base-browser-128.3.0esr-14.0-1 at The Tor Project / Applications / Tor Browser
Commits:
0287abcb by Pier Angelo Vendrame at 2024-10-03T17:56:38+00:00
fixup! Base Browser's .mozconfigs.
Bug 43151: Uniform the behavior of the android-all mozconfig.
- - - - -
2 changed files:
- browser/config/mozconfigs/base-browser-android
- mozconfig-android-all
Changes:
=====================================
browser/config/mozconfigs/base-browser-android
=====================================
@@ -1,3 +1,6 @@
+# Changes on this file might need to be synchronized with mozconfig-android-all!
+# See also tor-browser#43151.
+
export MOZILLA_OFFICIAL=1
ac_add_options --enable-optimize
@@ -29,6 +32,9 @@ ac_add_options --disable-parental-controls
ac_add_options --enable-proxy-bypass-protection
ac_add_options --disable-system-policies
+# See tor-browser#41131
+ac_add_options --disable-backgroundtasks
+
# Disable telemetry
ac_add_options MOZ_TELEMETRY_REPORTING=
=====================================
mozconfig-android-all
=====================================
@@ -1,18 +1,41 @@
+# Changes on this file might need to be synchronized with
+# browser/config/mozconfigs/base-browser-android!
+# See also tor-browser#43151.
+
export MOZILLA_OFFICIAL=1
ac_add_options --enable-application=mobile/android
+
ac_add_options --disable-compile-environment
+ac_add_options --with-java-bin-path=$JAVA_HOME/bin
+ac_add_options --with-android-sdk=$ANDROID_HOME
+ac_add_options --with-gradle=$GRADLE_HOME/bin/gradle
+
+ac_add_options --disable-tests
+ac_add_options --disable-debug
+
+ac_add_options --disable-updater
+ac_add_options --disable-crashreporter
+ac_add_options --disable-webrtc
+ac_add_options --disable-parental-controls
+
+ac_add_options --enable-proxy-bypass-protection
+ac_add_options --disable-system-policies
+
+# See tor-browser#41131
+ac_add_options --disable-backgroundtasks
+
+# Disable telemetry
+ac_add_options MOZ_TELEMETRY_REPORTING=
+
if test -n "$LOCAL_DEV_BUILD"; then
# You must use the "default" bogus channel for dev builds
ac_add_options --enable-update-channel=default
- ac_add_options --without-wasm-sandboxed-libraries
ac_add_options --with-base-browser-version=dev-build
ac_add_options --disable-minify
fi
-ac_add_options --with-tor-browser-version=dev-build
-
-ac_add_options --with-java-bin-path=$JAVA_HOME/bin
-ac_add_options --with-android-sdk=$ANDROID_HOME
-ac_add_options --with-gradle=$GRADLE_HOME/bin/gradle
+if test -z "$WASI_SYSROOT"; then
+ ac_add_options --without-wasm-sandboxed-libraries
+fi
View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/0287abc…
--
View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/0287abc…
You're receiving this email because of your account on gitlab.torproject.org.
morgan pushed to branch tor-browser-128.3.0esr-14.0-1 at The Tor Project / Applications / Tor Browser
Commits:
72a8c0c8 by Pier Angelo Vendrame at 2024-10-03T17:44:50+00:00
fixup! TB3: Tor Browser's official .mozconfigs.
Bug 43151: Uniform the behavior of the android-all mozconfig.
- - - - -
58271a0c by Pier Angelo Vendrame at 2024-10-03T17:44:50+00:00
fixup! Base Browser's .mozconfigs.
Bug 43151: Uniform the behavior of the android-all mozconfig.
- - - - -
2 changed files:
- browser/config/mozconfigs/base-browser-android
- mozconfig-android-all
Changes:
=====================================
browser/config/mozconfigs/base-browser-android
=====================================
@@ -1,3 +1,6 @@
+# Changes on this file might need to be synchronized with mozconfig-android-all!
+# See also tor-browser#43151.
+
export MOZILLA_OFFICIAL=1
ac_add_options --enable-optimize
@@ -29,6 +32,9 @@ ac_add_options --disable-parental-controls
ac_add_options --enable-proxy-bypass-protection
ac_add_options --disable-system-policies
+# See tor-browser#41131
+ac_add_options --disable-backgroundtasks
+
# Disable telemetry
ac_add_options MOZ_TELEMETRY_REPORTING=
=====================================
mozconfig-android-all
=====================================
@@ -1,16 +1,41 @@
+# Changes on this file might need to be synchronized with
+# browser/config/mozconfigs/base-browser-android!
+# See also tor-browser#43151.
+
export MOZILLA_OFFICIAL=1
ac_add_options --enable-application=mobile/android
+
ac_add_options --disable-compile-environment
+ac_add_options --with-java-bin-path=$JAVA_HOME/bin
+ac_add_options --with-android-sdk=$ANDROID_HOME
+ac_add_options --with-gradle=$GRADLE_HOME/bin/gradle
+
+ac_add_options --disable-tests
+ac_add_options --disable-debug
+
+ac_add_options --disable-updater
+ac_add_options --disable-crashreporter
+ac_add_options --disable-webrtc
+ac_add_options --disable-parental-controls
+
+ac_add_options --enable-proxy-bypass-protection
+ac_add_options --disable-system-policies
+
+# See tor-browser#41131
+ac_add_options --disable-backgroundtasks
+
+# Disable telemetry
+ac_add_options MOZ_TELEMETRY_REPORTING=
+
if test -n "$LOCAL_DEV_BUILD"; then
# You must use the "default" bogus channel for dev builds
ac_add_options --enable-update-channel=default
- ac_add_options --without-wasm-sandboxed-libraries
ac_add_options --with-base-browser-version=dev-build
ac_add_options --disable-minify
fi
-ac_add_options --with-java-bin-path=$JAVA_HOME/bin
-ac_add_options --with-android-sdk=$ANDROID_HOME
-ac_add_options --with-gradle=$GRADLE_HOME/bin/gradle
+if test -z "$WASI_SYSROOT"; then
+ ac_add_options --without-wasm-sandboxed-libraries
+fi
View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/compare/816dae…
--
View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/compare/816dae…
You're receiving this email because of your account on gitlab.torproject.org.
morgan pushed to branch mullvad-browser-128.3.0esr-14.0-1 at The Tor Project / Applications / Mullvad Browser
Commits:
8523387b by Pier Angelo Vendrame at 2024-10-02T19:53:07+00:00
fixup! Firefox preference overrides.
Bug 42054: ESR128: investigate - thorin's list.
Set or remove some preferences as suggested by Thorin.
- - - - -
1 changed file:
- browser/app/profile/001-base-profile.js
Changes:
=====================================
browser/app/profile/001-base-profile.js
=====================================
@@ -101,6 +101,12 @@ pref("browser.pagethumbnails.capturing_disabled", true);
// pref("privacy.exposeContentTitleInWindow", false);
// pref("privacy.exposeContentTitleInWindow.pbm", false);
+// tor-browser#42054: Opt-out from any built-in backup system, even though
+// local, as it might be a violation of our standalone mode.
+// Users can still opt-in if they wish.
+pref("browser.backup.enabled", false);
+pref("browser.backup.scheduled.enabled", false);
+
// Empty clipboard content from private windows on exit (tor-browser#42154)
pref("browser.privatebrowsing.preserveClipboard", false);
@@ -251,6 +257,9 @@ pref("privacy.trackingprotection.fingerprinting.enabled", false);
pref("privacy.trackingprotection.socialtracking.enabled", false);
pref("privacy.socialtracking.block_cookies.enabled", false);
pref("privacy.annotate_channels.strict_list.enabled", false);
+// tor-browser#43178: for defense-in-depth, avoid remote overrides to FPP.
+// Notice that it should not apply to RFP anyway...
+pref("privacy.fingerprintingProtection.remoteOverrides.enabled", false);
// Disable the Pocket extension (Bug #18886 and #31602)
pref("extensions.pocket.enabled", false);
@@ -284,6 +293,9 @@ pref("browser.newtabpage.activity-stream.asrouter.providers.messaging-experiment
// Disable fetching asrouter.ftl and related console errors (tor-browser#40763).
pref("browser.newtabpage.activity-stream.asrouter.useRemoteL10n", false);
+// tor-browser#42054: make sure search result telemetry is disabled.
+pref("browser.search.serpEventTelemetryCategorization.enabled", false);
+
// tor-browser#42872, #42555: Disable translations.
// Translation have a bad UX in 128 (and with our config). Maybe we will
// re-enable after auditing and fixing the UX.
@@ -444,9 +456,6 @@ pref("pdfjs.disabled", false, locked);
#endif
// Bug 40057: Ensure system colors are not used for CSS4 colors
pref("browser.display.use_system_colors", false);
-// Enforce non-native widget theme (true by default, defense in depth).
-// Provides a uniform look and feel across platforms. Added with tor-browser#41496.
-pref("widget.non-native-theme.enabled", true);
// tor-browser#41676: Set the TZ environment variable as a defense-in-depth.
// TODO: Remove this in ESR-128, as it has been removed in 116 with Bug 1837582.
pref("privacy.resistFingerprinting.testing.setTZtoUTC", true);
@@ -524,7 +533,9 @@ pref("network.http.http2.websockets", true, locked);
pref("network.http.http2.enable-hpack-dump", false, locked);
// tor-browser#23044: Make sure we don't have any GIO supported protocols
-// (defense in depth measure)
+// (defense in depth measure).
+// As of Firefox 118 (Bug 1843763), upstream does not add any protocol by
+// default, but setting it to blank seems a good idea (tor-browser#42054).
pref("network.gio.supported-protocols", "");
// Mullvad Browser enables WebRTC by default, meaning that there the following prefs
// are first-line defense, rather than "in depth" (mullvad-browser#40)
@@ -627,9 +638,6 @@ pref("security.cert_pinning.enforcement_level", 2);
// Don't load OS client certs.
pref("security.osclientcerts.autoload", false);
-// Don't allow MitM via Microsoft Family Safety, see bug 21686
-pref("security.family_safety.mode", 0);
-
// Don't allow MitM via enterprise roots, see bug 30681
pref("security.enterprise_roots.enabled", false);
View it on GitLab: https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/852…
--
View it on GitLab: https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/852…
You're receiving this email because of your account on gitlab.torproject.org.
morgan pushed to branch base-browser-128.3.0esr-14.0-1 at The Tor Project / Applications / Tor Browser
Commits:
b8610ea4 by Pier Angelo Vendrame at 2024-10-02T19:52:38+00:00
fixup! Firefox preference overrides.
Bug 42054: ESR128: investigate - thorin's list.
Set or remove some preferences as suggested by Thorin.
- - - - -
1 changed file:
- browser/app/profile/001-base-profile.js
Changes:
=====================================
browser/app/profile/001-base-profile.js
=====================================
@@ -101,6 +101,12 @@ pref("browser.pagethumbnails.capturing_disabled", true);
// pref("privacy.exposeContentTitleInWindow", false);
// pref("privacy.exposeContentTitleInWindow.pbm", false);
+// tor-browser#42054: Opt-out from any built-in backup system, even though
+// local, as it might be a violation of our standalone mode.
+// Users can still opt-in if they wish.
+pref("browser.backup.enabled", false);
+pref("browser.backup.scheduled.enabled", false);
+
// Empty clipboard content from private windows on exit (tor-browser#42154)
pref("browser.privatebrowsing.preserveClipboard", false);
@@ -251,6 +257,9 @@ pref("privacy.trackingprotection.fingerprinting.enabled", false);
pref("privacy.trackingprotection.socialtracking.enabled", false);
pref("privacy.socialtracking.block_cookies.enabled", false);
pref("privacy.annotate_channels.strict_list.enabled", false);
+// tor-browser#43178: for defense-in-depth, avoid remote overrides to FPP.
+// Notice that it should not apply to RFP anyway...
+pref("privacy.fingerprintingProtection.remoteOverrides.enabled", false);
// Disable the Pocket extension (Bug #18886 and #31602)
pref("extensions.pocket.enabled", false);
@@ -284,6 +293,9 @@ pref("browser.newtabpage.activity-stream.asrouter.providers.messaging-experiment
// Disable fetching asrouter.ftl and related console errors (tor-browser#40763).
pref("browser.newtabpage.activity-stream.asrouter.useRemoteL10n", false);
+// tor-browser#42054: make sure search result telemetry is disabled.
+pref("browser.search.serpEventTelemetryCategorization.enabled", false);
+
// tor-browser#42872, #42555: Disable translations.
// Translation have a bad UX in 128 (and with our config). Maybe we will
// re-enable after auditing and fixing the UX.
@@ -444,9 +456,6 @@ pref("pdfjs.disabled", false, locked);
#endif
// Bug 40057: Ensure system colors are not used for CSS4 colors
pref("browser.display.use_system_colors", false);
-// Enforce non-native widget theme (true by default, defense in depth).
-// Provides a uniform look and feel across platforms. Added with tor-browser#41496.
-pref("widget.non-native-theme.enabled", true);
// tor-browser#41676: Set the TZ environment variable as a defense-in-depth.
// TODO: Remove this in ESR-128, as it has been removed in 116 with Bug 1837582.
pref("privacy.resistFingerprinting.testing.setTZtoUTC", true);
@@ -524,7 +533,9 @@ pref("network.http.http2.websockets", true, locked);
pref("network.http.http2.enable-hpack-dump", false, locked);
// tor-browser#23044: Make sure we don't have any GIO supported protocols
-// (defense in depth measure)
+// (defense in depth measure).
+// As of Firefox 118 (Bug 1843763), upstream does not add any protocol by
+// default, but setting it to blank seems a good idea (tor-browser#42054).
pref("network.gio.supported-protocols", "");
pref("media.peerconnection.enabled", false); // Disable WebRTC interfaces
// Mullvad Browser enables WebRTC by default, meaning that there the following prefs
@@ -631,9 +642,6 @@ pref("security.cert_pinning.enforcement_level", 2);
// Don't load OS client certs.
pref("security.osclientcerts.autoload", false);
-// Don't allow MitM via Microsoft Family Safety, see bug 21686
-pref("security.family_safety.mode", 0);
-
// Don't allow MitM via enterprise roots, see bug 30681
pref("security.enterprise_roots.enabled", false);
View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/b8610ea…
--
View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/b8610ea…
You're receiving this email because of your account on gitlab.torproject.org.
morgan pushed to branch tor-browser-128.3.0esr-14.0-1 at The Tor Project / Applications / Tor Browser
Commits:
816dae39 by Pier Angelo Vendrame at 2024-10-02T19:32:59+00:00
fixup! Firefox preference overrides.
Bug 42054: ESR128: investigate - thorin's list.
Set or remove some preferences as suggested by Thorin.
- - - - -
1 changed file:
- browser/app/profile/001-base-profile.js
Changes:
=====================================
browser/app/profile/001-base-profile.js
=====================================
@@ -101,6 +101,12 @@ pref("browser.pagethumbnails.capturing_disabled", true);
// pref("privacy.exposeContentTitleInWindow", false);
// pref("privacy.exposeContentTitleInWindow.pbm", false);
+// tor-browser#42054: Opt-out from any built-in backup system, even though
+// local, as it might be a violation of our standalone mode.
+// Users can still opt-in if they wish.
+pref("browser.backup.enabled", false);
+pref("browser.backup.scheduled.enabled", false);
+
// Empty clipboard content from private windows on exit (tor-browser#42154)
pref("browser.privatebrowsing.preserveClipboard", false);
@@ -251,6 +257,9 @@ pref("privacy.trackingprotection.fingerprinting.enabled", false);
pref("privacy.trackingprotection.socialtracking.enabled", false);
pref("privacy.socialtracking.block_cookies.enabled", false);
pref("privacy.annotate_channels.strict_list.enabled", false);
+// tor-browser#43178: for defense-in-depth, avoid remote overrides to FPP.
+// Notice that it should not apply to RFP anyway...
+pref("privacy.fingerprintingProtection.remoteOverrides.enabled", false);
// Disable the Pocket extension (Bug #18886 and #31602)
pref("extensions.pocket.enabled", false);
@@ -284,6 +293,9 @@ pref("browser.newtabpage.activity-stream.asrouter.providers.messaging-experiment
// Disable fetching asrouter.ftl and related console errors (tor-browser#40763).
pref("browser.newtabpage.activity-stream.asrouter.useRemoteL10n", false);
+// tor-browser#42054: make sure search result telemetry is disabled.
+pref("browser.search.serpEventTelemetryCategorization.enabled", false);
+
// tor-browser#42872, #42555: Disable translations.
// Translation have a bad UX in 128 (and with our config). Maybe we will
// re-enable after auditing and fixing the UX.
@@ -444,9 +456,6 @@ pref("pdfjs.disabled", false, locked);
#endif
// Bug 40057: Ensure system colors are not used for CSS4 colors
pref("browser.display.use_system_colors", false);
-// Enforce non-native widget theme (true by default, defense in depth).
-// Provides a uniform look and feel across platforms. Added with tor-browser#41496.
-pref("widget.non-native-theme.enabled", true);
// tor-browser#41676: Set the TZ environment variable as a defense-in-depth.
// TODO: Remove this in ESR-128, as it has been removed in 116 with Bug 1837582.
pref("privacy.resistFingerprinting.testing.setTZtoUTC", true);
@@ -524,7 +533,9 @@ pref("network.http.http2.websockets", true, locked);
pref("network.http.http2.enable-hpack-dump", false, locked);
// tor-browser#23044: Make sure we don't have any GIO supported protocols
-// (defense in depth measure)
+// (defense in depth measure).
+// As of Firefox 118 (Bug 1843763), upstream does not add any protocol by
+// default, but setting it to blank seems a good idea (tor-browser#42054).
pref("network.gio.supported-protocols", "");
pref("media.peerconnection.enabled", false); // Disable WebRTC interfaces
// Mullvad Browser enables WebRTC by default, meaning that there the following prefs
@@ -631,9 +642,6 @@ pref("security.cert_pinning.enforcement_level", 2);
// Don't load OS client certs.
pref("security.osclientcerts.autoload", false);
-// Don't allow MitM via Microsoft Family Safety, see bug 21686
-pref("security.family_safety.mode", 0);
-
// Don't allow MitM via enterprise roots, see bug 30681
pref("security.enterprise_roots.enabled", false);
View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/816dae3…
--
View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/816dae3…
You're receiving this email because of your account on gitlab.torproject.org.