Pier Angelo Vendrame pushed to branch base-browser-115.10.0esr-13.5-1 at The Tor Project / Applications / Tor Browser
Commits:
fd04a394 by Pier Angelo Vendrame at 2024-04-22T16:36:35+02:00
fixup! Bug 9173: Change the default Firefox profile directory to be relative.
Bug 42536: Fix !985 on macOS.
- - - - -
1 changed file:
- toolkit/xre/nsXREDirProvider.cpp
Changes:
=====================================
toolkit/xre/nsXREDirProvider.cpp
=====================================
@@ -1323,6 +1323,7 @@ nsresult nsXREDirProvider::GetPortableDataDir(nsIFile** aFile,
# if defined(XP_MACOSX)
// On macOS we try to create the directory immediately to switch to
// system-install mode if needed (e.g., when running from the DMG).
+ bool exists = false;
rv = localDir->Exists(&exists);
NS_ENSURE_SUCCESS(rv, rv);
if (!exists) {
View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/fd04a39…
--
This project does not include diff previews in email notifications.
View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/fd04a39…
You're receiving this email because of your account on gitlab.torproject.org.
Pier Angelo Vendrame pushed to branch tor-browser-115.10.0esr-13.5-1 at The Tor Project / Applications / Tor Browser
Commits:
22873387 by Pier Angelo Vendrame at 2024-04-22T09:23:12+02:00
fixup! Bug 9173: Change the default Firefox profile directory to be relative.
Bug 42536: Fix !985 on macOS.
- - - - -
1 changed file:
- toolkit/xre/nsXREDirProvider.cpp
Changes:
=====================================
toolkit/xre/nsXREDirProvider.cpp
=====================================
@@ -1326,6 +1326,7 @@ nsresult nsXREDirProvider::GetPortableDataDir(nsIFile** aFile,
# if defined(XP_MACOSX)
// On macOS we try to create the directory immediately to switch to
// system-install mode if needed (e.g., when running from the DMG).
+ bool exists = false;
rv = localDir->Exists(&exists);
NS_ENSURE_SUCCESS(rv, rv);
if (!exists) {
View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/2287338…
--
This project does not include diff previews in email notifications.
View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/2287338…
You're receiving this email because of your account on gitlab.torproject.org.
boklm pushed to branch main at The Tor Project / Applications / tor-browser-build
Commits:
e47404c6 by Nicolas Vigier at 2024-04-17T21:17:49+02:00
Bug 41127: Update default browser_release_date for nightly
In nightly builds, when a date cannot be extracted from
`var/torbrowser_version` (for example when doing a testbuild), we set a
default date. However `firefox-android` fails to build when the date
from `MOZ_BUILD_DATE` (which is based on `var/browser_release_date`) is
too old. So we change the default date to something more recent.
- - - - -
1 changed file:
- rbm.conf
Changes:
=====================================
rbm.conf
=====================================
@@ -256,7 +256,7 @@ targets:
IF (matches = c("var/torbrowser_version").match('^tbb-nightly\.(\d\d\d\d)\.(\d\d)\.(\d\d)$'));
GET matches.0 _ "/" _ matches.1 _ "/" _ matches.2 _ " 01:01:01";
ELSE;
- GET "2000/01/01 01:01:01";
+ GET "2024/01/01 01:01:01";
END
-%]
max_torbrowser_incremental_from: 2
View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/commit/e…
--
View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/commit/e…
You're receiving this email because of your account on gitlab.torproject.org.
Dan Ballard pushed to branch firefox-android-115.2.1-13.5-1 at The Tor Project / Applications / firefox-android
Commits:
8cc03c8e by Dan Ballard at 2024-04-17T14:08:42-07:00
fixup! Add Tor integration and UI
Bug 42486: Fixing controller use of TorSettings so cleanupSettings doesn't reject partial states
- - - - -
1 changed file:
- fenix/app/src/main/java/org/mozilla/fenix/tor/TorControllerGV.kt
Changes:
=====================================
fenix/app/src/main/java/org/mozilla/fenix/tor/TorControllerGV.kt
=====================================
@@ -88,15 +88,21 @@ class TorControllerGV(
return getTorIntegration().getSettings()
}
+
+ // Bridges Enabled is a cache variable. The TorController interface we are locked into at the
+ // moment to support the TAS backend calls setting `bridgesEnabled = true` and setting
+ // the bridge type seperately so to support that,
+ // while at the same time it being invalid states to not submit them together to the TorSettings
+ // backend where TorSettings.sys.mjs's #cleanupSettings will remove a lone bridgeEnabled
+ // we thus have to hold it here to support the UI but not submit to the backend until
+ // bridgeTransport is also set (below)
+ private var _bridgesEnabled: Boolean? = null
override var bridgesEnabled: Boolean
get() {
- return getTorSettings()?.bridgesEnabled ?: false
+ return _bridgesEnabled ?: getTorSettings()?.bridgesEnabled ?: false
}
set(value) {
- getTorSettings()?.let {
- it.bridgesEnabled = value
- getTorIntegration().setSettings(it, true, true)
- }
+ _bridgesEnabled = value
}
@@ -119,9 +125,13 @@ class TorControllerGV(
}
set(value) {
getTorSettings()?.let {
+ it.bridgesEnabled = true
if (value == TorBridgeTransportConfig.USER_PROVIDED) {
- it.bridgesSource = BridgeSource.BuiltIn
+ // NOOP: all settings will be set in call to set userProvidedBridges and submited
+ // at the same time to clear TorSettings.sys.mjs #cleanupSettings
+ return
} else {
+ it.bridgesSource = BridgeSource.BuiltIn
val bbt: BridgeBuiltinType = when (value) {
TorBridgeTransportConfig.BUILTIN_OBFS4 -> BridgeBuiltinType.Obfs4
TorBridgeTransportConfig.BUILTIN_MEEK_AZURE -> BridgeBuiltinType.MeekAzure
@@ -135,12 +145,16 @@ class TorControllerGV(
}
+ // Currently the UI takes a user provided string and sets this in one step so there is where we
+ // actually set it.bridgesSource = BridgeSource.UserProvided, not above, as TorSettings.sys.mjs #cleanupSettings
+ // could reject BridgeSource.UserProvided with no bridge strings
override var userProvidedBridges: String?
get() {
return getTorSettings()?.bridgeBridgeStrings?.joinToString("\r\n")
}
set(value) {
getTorSettings()?.let {
+ it.bridgesSource = BridgeSource.UserProvided
it.bridgeBridgeStrings = value?.split("\r\n")?.toTypedArray() ?: arrayOf<String>()
getTorIntegration().setSettings(it, true, true)
}
View it on GitLab: https://gitlab.torproject.org/tpo/applications/firefox-android/-/commit/8cc…
--
View it on GitLab: https://gitlab.torproject.org/tpo/applications/firefox-android/-/commit/8cc…
You're receiving this email because of your account on gitlab.torproject.org.