lists.torproject.org
Sign In Sign Up
Manage this list Sign In Sign Up

Keyboard Shortcuts

Thread View

  • j: Next unread message
  • k: Previous unread message
  • j a: Jump to all threads
  • j l: Jump to MailingList overview

tbb-commits

Thread Start a new thread
Download
Threads by month
  • ----- 2025 -----
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2024 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2023 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2022 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2021 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2020 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2019 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2018 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2017 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2016 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2015 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2014 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
tbb-commits@lists.torproject.org

February 2024

  • 1 participants
  • 119 discussions
[Git][tpo/applications/tor-browser][base-browser-115.7.0esr-13.5-1] Bug 42376: Pass the locale list when constructing l10n in datetimebox
by Pier Angelo Vendrame (@pierov) 13 Feb '24

13 Feb '24
Pier Angelo Vendrame pushed to branch base-browser-115.7.0esr-13.5-1 at The Tor Project / Applications / Tor Browser Commits: c0f52a3e by Pier Angelo Vendrame at 2024-02-13T15:16:17+01:00 Bug 42376: Pass the locale list when constructing l10n in datetimebox The datetime input is inconsistent with other inputs when using spoof English: its placeholder is not translated, unlike the default values and texts of all the other inputs. - - - - - 1 changed file: - toolkit/content/widgets/datetimebox.js Changes: ===================================== toolkit/content/widgets/datetimebox.js ===================================== @@ -22,7 +22,9 @@ this.DateTimeBoxWidget = class { // createEditFieldAndAppend() call. this.l10n = new this.window.DOMLocalization( ["toolkit/global/datetimebox.ftl"], - /* aSync = */ true + /* aSync = */ true, + undefined, + this.window.getWebExposedLocales() ); } View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/c0f52a3… -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/c0f52a3… You're receiving this email because of your account on gitlab.torproject.org.
1 0
0 0
[Git][tpo/applications/tor-browser][tor-browser-115.7.0esr-13.5-1] Bug 42376: Pass the locale list when constructing l10n in datetimebox
by Pier Angelo Vendrame (@pierov) 13 Feb '24

13 Feb '24
Pier Angelo Vendrame pushed to branch tor-browser-115.7.0esr-13.5-1 at The Tor Project / Applications / Tor Browser Commits: a7f6c970 by Pier Angelo Vendrame at 2024-02-13T14:59:52+01:00 Bug 42376: Pass the locale list when constructing l10n in datetimebox The datetime input is inconsistent with other inputs when using spoof English: its placeholder is not translated, unlike the default values and texts of all the other inputs. - - - - - 1 changed file: - toolkit/content/widgets/datetimebox.js Changes: ===================================== toolkit/content/widgets/datetimebox.js ===================================== @@ -22,7 +22,9 @@ this.DateTimeBoxWidget = class { // createEditFieldAndAppend() call. this.l10n = new this.window.DOMLocalization( ["toolkit/global/datetimebox.ftl"], - /* aSync = */ true + /* aSync = */ true, + undefined, + this.window.getWebExposedLocales() ); } View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/a7f6c97… -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/a7f6c97… You're receiving this email because of your account on gitlab.torproject.org.
1 0
0 0
[Git][tpo/applications/tor-browser-build][main] Bug 41080: Re-pack omni.ja with 7-zip on Android.
by boklm (@boklm) 09 Feb '24

09 Feb '24
boklm pushed to branch main at The Tor Project / Applications / tor-browser-build Commits: 56df6e4c by Pier Angelo Vendrame at 2024-02-08T16:06:11+01:00 Bug 41080: Re-pack omni.ja with 7-zip on Android. In this way we can shave a few additional MBs, and get further from the APK size limit. - - - - - 2 changed files: - projects/browser/build.android - rbm Changes: ===================================== projects/browser/build.android ===================================== @@ -24,18 +24,23 @@ cd /var/tmp/build mv $rootdir/[% c('input_files_by_name/noscript') %] "$noscript_path" [%IF c("var/tor-browser") -%] - unzip -j "$apk" assets/omni.ja tar -xaf "$rootdir/[% c("input_files_by_name/tor-expert-bundle") %]" tor/pluggable_transports/pt_config.json - mkdir omni - pushd omni - unzip ../omni.ja - cp ../tor/pluggable_transports/pt_config.json chrome/toolkit/content/global/pt_config.json - [% c('zip', { - zip_src => [ '.' ], - zip_args => '../assets/omni.ja', - }) %] - popd [% END -%] +unzip -j "$apk" assets/omni.ja +mkdir omni +pushd omni +unzip ../omni.ja +[%IF c("var/tor-browser") -%] + cp -a ../tor/pluggable_transports/pt_config.json chrome/toolkit/content/global/pt_config.json +[% END -%] +[% c('zip', { + zip_src => [ '.' ], + zip_args => '../assets/omni.ja', + use_7z => 1, + '7z_bin' => '7zz', + '7z_opts' => '-mx9', + }) %] +popd [% IF c("var/verify_allowed_addons") %] ===================================== rbm ===================================== @@ -1 +1 @@ -Subproject commit b5e5b04aaf677c4bacfb5ace45598313286bfdf6 +Subproject commit 10c6b24e90e3dc9c2578290a7d82a87b7f4eb9a3 View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/commit/5… -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/commit/5… You're receiving this email because of your account on gitlab.torproject.org.
1 0
0 0
[Git][tpo/applications/rbm][main] Bug 40071: Add an option to create zip files using 7z
by boklm (@boklm) 09 Feb '24

09 Feb '24
boklm pushed to branch main at The Tor Project / Applications / RBM Commits: 10c6b24e by Nicolas Vigier at 2024-02-08T13:26:40+01:00 Bug 40071: Add an option to create zip files using 7z - - - - - 2 changed files: - doc/options_misc.asc - lib/RBM/DefaultConfig.pm Changes: ===================================== doc/options_misc.asc ===================================== @@ -41,6 +41,11 @@ zip:: and a +zip_args+ arguments which is usually the destination zip file, and optionally other zip options. By default, GNU options are used in find, but you can disable that with +gnu_utils+. + The 'zip' command will be used to create the zip file, unless + +use_7z+ is set, in which case '7z' will be used instead. In this + case, +7z_bin+ can be used to select the '7z' command (for cases + where the command is '7zz' instead of '7z') and +7z_opts+ can + be used to set additional options to the '7z' command. install_package:: This option can be used in a script when you need to install a ===================================== lib/RBM/DefaultConfig.pm ===================================== @@ -597,14 +597,24 @@ TAR_END #### #### #### - zip => <<ZIP_END, + '7z_bin' => '7z', + zip => <<ZIP_END, [%- SET src = c('zip_src', { error_if_undef => 1 }) -%] [% USE date -%] +[% IF c("use_7z") -%] + tmp7z=\$(mktemp) +[% END -%] find [% src.join(' ') %] -exec touch -m -t [% date.format(c('timestamp'), format = '%Y%m%d%H%M') %] -- {} + find [% src.join(' ') %] [% IF c('gnu_utils') %]-executable[% ELSE %]-perm +0111[% END %] -exec chmod 700 {} \\; find [% src.join(' ') %] ! [% IF c('gnu_utils') %]-executable[% ELSE %]-perm +0111[% END %] -exec chmod 600 {} \\; find [% src.join(' ') %] | sort | \ +[% IF c("use_7z") -%] + cat > "\$tmp7z" + [% c('7z_bin') %] a -tzip -spf [% c('7z_opts') %] [% c('zip_args', { error_if_undef => 1 }) %] "@\$tmp7z" + rm -f "\$tmp7z" +[% ELSE -%] zip -q -@ -X [% c('zip_args', { error_if_undef => 1 }) %] +[% END -%] ZIP_END #### #### View it on GitLab: https://gitlab.torproject.org/tpo/applications/rbm/-/commit/10c6b24e90e3dc9… -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/rbm/-/commit/10c6b24e90e3dc9… You're receiving this email because of your account on gitlab.torproject.org.
1 0
0 0
[Git][tpo/applications/rbm][main] Bug 40072: Move capture_exec to a separate module
by boklm (@boklm) 09 Feb '24

09 Feb '24
boklm pushed to branch main at The Tor Project / Applications / RBM Commits: efd874ab by Nicolas Vigier at 2024-02-08T13:13:58+01:00 Bug 40072: Move capture_exec to a separate module Because the RBM and RBM::DefaultConfig modules have circular dependencies, exporting functions from RBM to RBM::DefaultConfig doesn&#39;t work, which means that part of the changes for rbm#40068 didn&#39;t work. We could fix that by using `RBM::capture_exec` instead of `capture_exec`. An other solution is to make a separate module for `capture_exec`. Since the RBM modules is becoming big, I think it&#39;s a good idea to move independent parts to a separate modules. - - - - - 3 changed files: - lib/RBM.pm - + lib/RBM/CaptureExec.pm - lib/RBM/DefaultConfig.pm Changes: ===================================== lib/RBM.pm ===================================== @@ -10,7 +10,6 @@ use YAML::XS qw(LoadFile); use Template; use File::Basename; use IO::Handle; -use Capture::Tiny qw(capture); use File::Temp; use File::Copy; use File::Copy::Recursive qw(fcopy); @@ -18,6 +17,7 @@ use File::Path qw(make_path); use File::Basename; use String::ShellQuote; use Sort::Versions; +use RBM::CaptureExec qw(capture_exec); use RBM::DefaultConfig; use Digest::SHA qw(sha256_hex); use Data::UUID; @@ -29,7 +29,7 @@ use feature "state"; BEGIN { require Exporter; our @ISA = qw(Exporter); - our @EXPORT = qw(exit_error capture_exec); + our @EXPORT = qw(exit_error); } our $config; @@ -308,15 +308,6 @@ sub exit_error { exit (exists $_[1] ? $_[1] : 1); } -sub capture_exec { - my @cmd = @_; - my ($stdout, $stderr, $exit) = capture { - system(@cmd); - }; - return ($stdout, $stderr, $exit == 0, $exit) if wantarray(); - return $stdout; -} - sub set_git_gpg_wrapper { my ($project) = @_; my $w = project_config($project, 'gpg_wrapper'); ===================================== lib/RBM/CaptureExec.pm ===================================== @@ -0,0 +1,21 @@ +package RBM::CaptureExec; + +use Capture::Tiny qw(capture); + +BEGIN { + require Exporter; + our @ISA = qw(Exporter); + our @EXPORT = qw(capture_exec); + our @EXPORT_OK = qw(capture_exec); +} + +sub capture_exec { + my @cmd = @_; + my ($stdout, $stderr, $exit) = capture { + system(@cmd); + }; + return ($stdout, $stderr, $exit == 0, $exit) if wantarray(); + return $stdout; +} + +1; ===================================== lib/RBM/DefaultConfig.pm ===================================== @@ -10,7 +10,8 @@ BEGIN { } use File::Basename; -use RBM qw(capture_exec); +use RBM; +use RBM::CaptureExec qw(capture_exec); use Cwd qw(getcwd); use File::Temp; use File::Path qw(make_path); View it on GitLab: https://gitlab.torproject.org/tpo/applications/rbm/-/commit/efd874abee2d4af… -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/rbm/-/commit/efd874abee2d4af… You're receiving this email because of your account on gitlab.torproject.org.
1 0
0 0
[Git][tpo/applications/mullvad-browser][mullvad-browser-115.7.0esr-13.5-1] fixup! Bug 32308: use direct browser sizing for letterboxing.
by richard (@richard) 08 Feb '24

08 Feb '24
richard pushed to branch mullvad-browser-115.7.0esr-13.5-1 at The Tor Project / Applications / Mullvad Browser Commits: 21866d39 by hackademix at 2024-02-08T14:48:08+00:00 fixup! Bug 32308: use direct browser sizing for letterboxing. Bug 42390: hide the browser border decorator when corners are flat. - - - - - 2 changed files: - browser/base/content/browser.css - toolkit/components/resistfingerprinting/RFPHelper.sys.mjs Changes: ===================================== browser/base/content/browser.css ===================================== @@ -159,6 +159,7 @@ body { --letterboxing-gradient-color1: var(--letterboxing-bgcolor); --letterboxing-gradient-color2: color-mix(in srgb, var(--chrome-content-separator-color) 50%, var(--letterboxing-bgcolor)); --letterboxing-border-color: var(--letterboxing-bgcolor); + --letterboxing-decorator-visibility: visible; } .letterboxing.letterboxing-vcenter .browserContainer:not(.responsive-mode) > .browserStack:not(.exclude-letterboxing) { @@ -174,7 +175,7 @@ body { > .browserStack:not(.exclude-letterboxing) > .browserDecorator { display: initial; - visibility: visible; + visibility: var(--letterboxing-decorator-visibility); border-radius: var(--letterboxing-border-radius); border-top-left-radius: var(--letterboxing-border-top-radius); border-top-right-radius: var(--letterboxing-border-top-radius); ===================================== toolkit/components/resistfingerprinting/RFPHelper.sys.mjs ===================================== @@ -684,6 +684,7 @@ class _RFPHelper { borderRadius = ""; } styleChanges.queueIfNeeded(browserParent, { + "--letterboxing-decorator-visibility": borderRadius === 0 ? "hidden" : "", '--letterboxing-border-radius': borderRadius }); } View it on GitLab: https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/218… -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/218… You're receiving this email because of your account on gitlab.torproject.org.
1 0
0 0
[Git][tpo/applications/tor-browser][base-browser-115.7.0esr-13.5-1] fixup! Bug 32308: use direct browser sizing for letterboxing.
by richard (@richard) 08 Feb '24

08 Feb '24
richard pushed to branch base-browser-115.7.0esr-13.5-1 at The Tor Project / Applications / Tor Browser Commits: c87452dd by hackademix at 2024-02-08T14:47:01+00:00 fixup! Bug 32308: use direct browser sizing for letterboxing. Bug 42390: hide the browser border decorator when corners are flat. - - - - - 2 changed files: - browser/base/content/browser.css - toolkit/components/resistfingerprinting/RFPHelper.sys.mjs Changes: ===================================== browser/base/content/browser.css ===================================== @@ -159,6 +159,7 @@ body { --letterboxing-gradient-color1: var(--letterboxing-bgcolor); --letterboxing-gradient-color2: color-mix(in srgb, var(--chrome-content-separator-color) 50%, var(--letterboxing-bgcolor)); --letterboxing-border-color: var(--letterboxing-bgcolor); + --letterboxing-decorator-visibility: visible; } .letterboxing.letterboxing-vcenter .browserContainer:not(.responsive-mode) > .browserStack:not(.exclude-letterboxing) { @@ -174,7 +175,7 @@ body { > .browserStack:not(.exclude-letterboxing) > .browserDecorator { display: initial; - visibility: visible; + visibility: var(--letterboxing-decorator-visibility); border-radius: var(--letterboxing-border-radius); border-top-left-radius: var(--letterboxing-border-top-radius); border-top-right-radius: var(--letterboxing-border-top-radius); ===================================== toolkit/components/resistfingerprinting/RFPHelper.sys.mjs ===================================== @@ -684,6 +684,7 @@ class _RFPHelper { borderRadius = ""; } styleChanges.queueIfNeeded(browserParent, { + "--letterboxing-decorator-visibility": borderRadius === 0 ? "hidden" : "", '--letterboxing-border-radius': borderRadius }); } View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/c87452d… -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/c87452d… You're receiving this email because of your account on gitlab.torproject.org.
1 0
0 0
[Git][tpo/applications/tor-browser][tor-browser-115.7.0esr-13.5-1] fixup! Bug 32308: use direct browser sizing for letterboxing.
by richard (@richard) 08 Feb '24

08 Feb '24
richard pushed to branch tor-browser-115.7.0esr-13.5-1 at The Tor Project / Applications / Tor Browser Commits: 0efa3dd9 by hackademix at 2024-02-08T14:44:25+00:00 fixup! Bug 32308: use direct browser sizing for letterboxing. Bug 42390: hide the browser border decorator when corners are flat. - - - - - 2 changed files: - browser/base/content/browser.css - toolkit/components/resistfingerprinting/RFPHelper.sys.mjs Changes: ===================================== browser/base/content/browser.css ===================================== @@ -159,6 +159,7 @@ body { --letterboxing-gradient-color1: var(--letterboxing-bgcolor); --letterboxing-gradient-color2: color-mix(in srgb, var(--chrome-content-separator-color) 50%, var(--letterboxing-bgcolor)); --letterboxing-border-color: var(--letterboxing-bgcolor); + --letterboxing-decorator-visibility: visible; } .letterboxing.letterboxing-vcenter .browserContainer:not(.responsive-mode) > .browserStack:not(.exclude-letterboxing) { @@ -174,7 +175,7 @@ body { > .browserStack:not(.exclude-letterboxing) > .browserDecorator { display: initial; - visibility: visible; + visibility: var(--letterboxing-decorator-visibility); border-radius: var(--letterboxing-border-radius); border-top-left-radius: var(--letterboxing-border-top-radius); border-top-right-radius: var(--letterboxing-border-top-radius); ===================================== toolkit/components/resistfingerprinting/RFPHelper.sys.mjs ===================================== @@ -684,6 +684,7 @@ class _RFPHelper { borderRadius = ""; } styleChanges.queueIfNeeded(browserParent, { + "--letterboxing-decorator-visibility": borderRadius === 0 ? "hidden" : "", '--letterboxing-border-radius': borderRadius }); } View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/0efa3dd… -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/0efa3dd… You're receiving this email because of your account on gitlab.torproject.org.
1 0
0 0
[Git][tpo/applications/tor-browser][tor-browser-115.7.0esr-13.5-1] fixup! Bug 31286: Implementation of bridge, proxy, and firewall settings in...
by richard (@richard) 08 Feb '24

08 Feb '24
richard pushed to branch tor-browser-115.7.0esr-13.5-1 at The Tor Project / Applications / Tor Browser Commits: 5e1675f4 by Henry Wilkes at 2024-02-08T14:40:56+00:00 fixup! Bug 31286: Implementation of bridge, proxy, and firewall settings in about:preferences#connection Bug 42036: New QR code design. - - - - - 5 changed files: - − browser/components/torpreferences/content/bridge-qr-onion-mask.svg - browser/components/torpreferences/content/bridgeQrDialog.js - browser/components/torpreferences/content/bridgeQrDialog.xhtml - browser/components/torpreferences/content/torPreferences.css - browser/components/torpreferences/jar.mn Changes: ===================================== browser/components/torpreferences/content/bridge-qr-onion-mask.svg deleted ===================================== @@ -1,4 +0,0 @@ -<?xml version="1.0" encoding="UTF-8" standalone="no"?> -<svg viewBox="0 0 16 16" width="16" height="16" xmlns="http://www.w3.org/2000/svg"> - <path d="M 8 0.5 C 3.85786 0.5 0.5 3.85786 0.5 8 C 0.5 12.1421 3.85786 15.5 8 15.5 C 12.1421 15.5 15.5 12.1421 15.5 8 C 15.5 3.85786 12.1421 0.5 8 0.5 z M 8 1.671875 C 11.4949 1.671875 14.328125 4.50507 14.328125 8 C 14.328125 11.4949 11.4949 14.328125 8 14.328125 L 8 13.25 C 10.89951 13.25 13.25 10.89951 13.25 8 C 13.25 5.10051 10.89951 2.75 8 2.75 L 8 1.671875 z M 8 3.921875 C 10.25231 3.921875 12.078125 5.74772 12.078125 8 C 12.078125 10.25231 10.25231 12.078125 8 12.078125 L 8 11 C 9.65686 11 11 9.65686 11 8 C 11 6.34315 9.65686 5 8 5 L 8 3.921875 z M 8 6.171875 C 9.00965 6.171875 9.828125 6.99036 9.828125 8 C 9.828125 9.00965 9.00965 9.828125 8 9.828125 L 8 6.171875 z " clip-rule="evenodd" fill-rule="evenodd" fill="#000000"/> -</svg> ===================================== browser/components/torpreferences/content/bridgeQrDialog.js ===================================== @@ -19,15 +19,18 @@ window.addEventListener( ); const target = document.getElementById("bridgeQr-target"); const style = window.getComputedStyle(target); - const width = style.width.substr(0, style.width.length - 2); - const height = style.height.substr(0, style.height.length - 2); + // We are assuming that the style width and height have "px" units. + // Trailing "px" is not parsed. + // NOTE: Our QRCode module doesn't seem to use the width or height + // attributes. + const width = parseInt(style.width, 10); + const height = parseInt(style.height, 10); new QRCode(target, { text: bridgeString, width, height, colorDark: style.color, colorLight: style.backgroundColor, - document, }); }, { once: true } ===================================== browser/components/torpreferences/content/bridgeQrDialog.xhtml ===================================== @@ -11,12 +11,9 @@ <dialog id="bridgeQr-dialog" buttons="accept"> <script src="chrome://browser/content/torpreferences/bridgeQrDialog.js" /> - <html:div> - <html:div id="bridgeQr"> - <html:div id="bridgeQr-target" /> - <html:div id="bridgeQr-onionBox" /> - <html:div id="bridgeQr-onion" /> - </html:div> + <html:div id="bridgeQr"> + <html:div id="bridgeQr-target"></html:div> + <html:div id="bridgeQr-icon"></html:div> </html:div> </dialog> </window> ===================================== browser/components/torpreferences/content/torPreferences.css ===================================== @@ -775,21 +775,25 @@ dialog#torPreferences-requestBridge-dialog > hbox { } /* Show bridge QR dialog */ + #bridgeQr { + flex: 0 0 auto; + align-self: center; /* Some readers don't recognize QRs with inverted colors, so let's make the ones are darker than zeroes. See https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/41049 */ --qr-one: black; --qr-zero: white; background: var(--qr-zero); - position: relative; /* Padding is needed in case the dark theme is used so the bits don't blend with whatever the default background color is. */ padding: 10px; - margin: auto; - margin-bottom: 20px; - max-width: max-content; - border-radius: 5px; + margin-block: 4px 8px; + border-radius: 4px; + display: grid; + align-items: center; + justify-items: center; + grid-template: "qr" max-content / max-content; } #bridgeQr-target { @@ -797,27 +801,21 @@ dialog#torPreferences-requestBridge-dialog > hbox { height: 300px; background: var(--qr-zero); color: var(--qr-one); + grid-area: qr; } -#bridgeQr-onionBox { - position: absolute; - width: 70px; - height: 70px; - top: calc(50% - 35px); - left: calc(50% - 35px); - background-color: var(--qr-zero); -} - -#bridgeQr-onion { - position: absolute; - width: 38px; - height: 38px; - top: calc(50% - 19px); - left: calc(50% - 19px); - mask: url("chrome://browser/content/torpreferences/bridge-qr-onion-mask.svg"); - mask-repeat: no-repeat; - mask-size: 38px; - background: var(--qr-one); +#bridgeQr-icon { + /* Share the same grid area as #bridgeQr-target. */ + grid-area: qr; + content: url("chrome://browser/content/torpreferences/bridge.svg"); + padding: 10px; + border-radius: 8px; + box-sizing: content-box; + width: 52px; + height: 52px; + background: var(--qr-zero); + -moz-context-properties: fill; + fill: var(--qr-one); } /* Lox invite dialog */ ===================================== browser/components/torpreferences/jar.mn ===================================== @@ -29,7 +29,6 @@ browser.jar: content/browser/torpreferences/connectionPane.js (content/connectionPane.js) content/browser/torpreferences/connectionPane.xhtml (content/connectionPane.xhtml) content/browser/torpreferences/torPreferences.css (content/torPreferences.css) - content/browser/torpreferences/bridge-qr-onion-mask.svg (content/bridge-qr-onion-mask.svg) content/browser/torpreferences/bridgemoji/BridgeEmoji.js (content/bridgemoji/BridgeEmoji.js) content/browser/torpreferences/bridgemoji/bridge-emojis.json (content/bridgemoji/bridge-emojis.json) content/browser/torpreferences/bridgemoji/annotations.json (content/bridgemoji/annotations.json) View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/5e1675f… -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/5e1675f… You're receiving this email because of your account on gitlab.torproject.org.
1 0
0 0
[Git][tpo/applications/tor-browser][tor-browser-115.7.0esr-13.5-1] fixup! Bug 41668: Tweaks to the Base Browser updater for Tor Browser
by richard (@richard) 08 Feb '24

08 Feb '24
richard pushed to branch tor-browser-115.7.0esr-13.5-1 at The Tor Project / Applications / Tor Browser Commits: 614fe28a by Pier Angelo Vendrame at 2024-02-08T14:13:14+00:00 fixup! Bug 41668: Tweaks to the Base Browser updater for Tor Browser Keep the postupdate disabled on Tor Browser - - - - - 1 changed file: - toolkit/mozapps/update/updater/updater.cpp Changes: ===================================== toolkit/mozapps/update/updater/updater.cpp ===================================== @@ -2955,7 +2955,7 @@ int LaunchCallbackAndPostProcessApps(int argc, NS_tchar** argv, #endif if (argc > callbackIndex) { -#if defined(XP_WIN) && !defined(BASE_BROWSER_UPDATE) +#if defined(XP_WIN) && !defined(TOR_BROWSER) if (gSucceeded) { if (!LaunchWinPostProcess(gInstallDirPath, gPatchDirPath)) { fprintf(stderr, "The post update process was not launched"); View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/614fe28… -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/614fe28… You're receiving this email because of your account on gitlab.torproject.org.
1 0
0 0
  • ← Newer
  • 1
  • ...
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • Older →

HyperKitty Powered by HyperKitty version 1.3.12.