ma1 pushed to branch tor-browser-128.2.0esr-14.0-1 at The Tor Project / Applications / Tor Browser
Commits:
13a575c8 by Roger Yang at 2024-09-16T22:28:43+02:00
Bug 1862537 - Do not try to go back when it's a initial load r=android-reviewers,harrisono, a=pascalc
Differential Revision: https://phabricator.services.mozilla.com/D219782
- - - - -
2 changed files:
- mobile/android/android-components/components/browser/engine-gecko/src/main/java/mozilla/components/browser/engine/gecko/GeckoEngineSession.kt
- mobile/android/android-components/components/browser/engine-gecko/src/test/java/mozilla/components/browser/engine/gecko/GeckoEngineSessionTest.kt
Changes:
=====================================
mobile/android/android-components/components/browser/engine-gecko/src/main/java/mozilla/components/browser/engine/gecko/GeckoEngineSession.kt
=====================================
@@ -1120,10 +1120,13 @@ class GeckoEngineSession(
return
}
- appRedirectUrl?.let {
- if (url == appRedirectUrl) {
- goBack(false)
- return
+ // if it is an initial load then we can't go back. We should update the URL.
+ if (!initialLoad) {
+ appRedirectUrl?.let {
+ if (url == appRedirectUrl) {
+ goBack(false)
+ return
+ }
}
}
=====================================
mobile/android/android-components/components/browser/engine-gecko/src/test/java/mozilla/components/browser/engine/gecko/GeckoEngineSessionTest.kt
=====================================
@@ -1049,6 +1049,7 @@ class GeckoEngineSessionTest {
)
engineSession.settings.historyTrackingDelegate = historyTrackingDelegate
engineSession.appRedirectUrl = emptyPageUrl
+ engineSession.initialLoad = false
class MockHistoryList(
items: List<GeckoSession.HistoryDelegate.HistoryItem>,
View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/13a575c…
--
View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/13a575c…
You're receiving this email because of your account on gitlab.torproject.org.
morgan pushed to branch firefox-android-115.2.1-13.5-1 at The Tor Project / Applications / firefox-android
Commits:
070534b9 by hackademix at 2024-09-16T21:37:26+02:00
Bug 1862537 - Do not try to go back when it's a initial load r=android-reviewers,harrisono, a=pascalc
Differential Revision: https://phabricator.services.mozilla.com/D219782
- - - - -
2 changed files:
- android-components/components/browser/engine-gecko/src/main/java/mozilla/components/browser/engine/gecko/GeckoEngineSession.kt
- android-components/components/browser/engine-gecko/src/test/java/mozilla/components/browser/engine/gecko/GeckoEngineSessionTest.kt
Changes:
=====================================
android-components/components/browser/engine-gecko/src/main/java/mozilla/components/browser/engine/gecko/GeckoEngineSession.kt
=====================================
@@ -869,9 +869,12 @@ class GeckoEngineSession(
return GeckoResult.fromValue(false)
}
- appRedirectUrl?.let {
- if (url == appRedirectUrl) {
- return GeckoResult.fromValue(false)
+ // if it is an initial load then we can't go back. We should update the URL.
+ if (!initialLoad) {
+ appRedirectUrl?.let {
+ if (url == appRedirectUrl) {
+ return GeckoResult.fromValue(false)
+ }
}
}
=====================================
android-components/components/browser/engine-gecko/src/test/java/mozilla/components/browser/engine/gecko/GeckoEngineSessionTest.kt
=====================================
@@ -968,6 +968,7 @@ class GeckoEngineSessionTest {
)
engineSession.settings.historyTrackingDelegate = historyTrackingDelegate
engineSession.appRedirectUrl = emptyPageUrl
+ engineSession.initialLoad = false
class MockHistoryList(
items: List<GeckoSession.HistoryDelegate.HistoryItem>,
View it on GitLab: https://gitlab.torproject.org/tpo/applications/firefox-android/-/commit/070…
--
View it on GitLab: https://gitlab.torproject.org/tpo/applications/firefox-android/-/commit/070…
You're receiving this email because of your account on gitlab.torproject.org.
morgan pushed to branch mullvad-browser-128.2.0esr-14.0-1 at The Tor Project / Applications / Mullvad Browser
Commits:
cb96eb04 by Henry Wilkes at 2024-09-16T18:07:55+00:00
fixup! Firefox preference overrides.
Bug 42777: Ensure non-privacy browsing also sets the GPC header.
- - - - -
1 changed file:
- browser/app/profile/001-base-profile.js
Changes:
=====================================
browser/app/profile/001-base-profile.js
=====================================
@@ -662,6 +662,11 @@ pref("privacy.query_stripping.enabled", true);
pref("privacy.query_stripping.enabled.pbmode", true);
pref("privacy.query_stripping.strip_on_share.enabled", true);
+// Ensure global privacy control headers are consistent in private browsing and
+// non-private browsing (tor-browser#42777).
+pref("privacy.globalprivacycontrol.enabled", true);
+pref("privacy.globalprivacycontrol.pbmode.enabled", true);
+
// Disable platform text recogniition functionality (tor-browser#42057)
pref("dom.text-recognition.enabled", false);
View it on GitLab: https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/cb9…
--
View it on GitLab: https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/cb9…
You're receiving this email because of your account on gitlab.torproject.org.
morgan pushed to branch base-browser-128.2.0esr-14.0-1 at The Tor Project / Applications / Tor Browser
Commits:
5f0e5e21 by Henry Wilkes at 2024-09-16T18:07:18+00:00
fixup! Firefox preference overrides.
Bug 42777: Ensure non-privacy browsing also sets the GPC header.
- - - - -
1 changed file:
- browser/app/profile/001-base-profile.js
Changes:
=====================================
browser/app/profile/001-base-profile.js
=====================================
@@ -666,6 +666,11 @@ pref("privacy.query_stripping.enabled", true);
pref("privacy.query_stripping.enabled.pbmode", true);
pref("privacy.query_stripping.strip_on_share.enabled", true);
+// Ensure global privacy control headers are consistent in private browsing and
+// non-private browsing (tor-browser#42777).
+pref("privacy.globalprivacycontrol.enabled", true);
+pref("privacy.globalprivacycontrol.pbmode.enabled", true);
+
// Disable platform text recogniition functionality (tor-browser#42057)
pref("dom.text-recognition.enabled", false);
View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/5f0e5e2…
--
View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/5f0e5e2…
You're receiving this email because of your account on gitlab.torproject.org.
morgan pushed to branch tor-browser-128.2.0esr-14.0-1 at The Tor Project / Applications / Tor Browser
Commits:
192b9bf7 by Henry Wilkes at 2024-09-16T18:02:12+00:00
fixup! Firefox preference overrides.
Bug 42777: Ensure non-privacy browsing also sets the GPC header.
- - - - -
1 changed file:
- browser/app/profile/001-base-profile.js
Changes:
=====================================
browser/app/profile/001-base-profile.js
=====================================
@@ -666,6 +666,11 @@ pref("privacy.query_stripping.enabled", true);
pref("privacy.query_stripping.enabled.pbmode", true);
pref("privacy.query_stripping.strip_on_share.enabled", true);
+// Ensure global privacy control headers are consistent in private browsing and
+// non-private browsing (tor-browser#42777).
+pref("privacy.globalprivacycontrol.enabled", true);
+pref("privacy.globalprivacycontrol.pbmode.enabled", true);
+
// Disable platform text recogniition functionality (tor-browser#42057)
pref("dom.text-recognition.enabled", false);
View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/192b9bf…
--
View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/192b9bf…
You're receiving this email because of your account on gitlab.torproject.org.
morgan pushed to branch mullvad-browser-128.2.0esr-14.0-1 at The Tor Project / Applications / Mullvad Browser
Commits:
09e84f60 by Pier Angelo Vendrame at 2024-09-16T17:49:07+00:00
fixup! MB 38: Mullvad Browser configuration
MB 344: Remove media.navigator.enabled = false on MB.
RFP spoof the values protected by this preference.
We do not do the same on Tor Browser because this functionality depends
on WebRTC, which is disabled at build time on TBB.
- - - - -
1 changed file:
- browser/app/profile/001-base-profile.js
Changes:
=====================================
browser/app/profile/001-base-profile.js
=====================================
@@ -533,9 +533,6 @@ pref("media.peerconnection.ice.default_address_only", true);
pref("media.peerconnection.ice.no_host", true);
pref("media.peerconnection.ice.proxy_only_if_behind_proxy", true);
-// Disables media devices but only if `media.peerconnection.enabled` is set to
-// `false` as well. (see bug 16328 for this defense-in-depth measure)
-pref("media.navigator.enabled", false);
// GMPs (Gecko Media Plugins, https://wiki.mozilla.org/GeckoMediaPlugins)
// We make sure they don't show up on the Add-on panel and confuse users.
// And the external update/donwload server must not get pinged. We apply a
View it on GitLab: https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/09e…
--
View it on GitLab: https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/09e…
You're receiving this email because of your account on gitlab.torproject.org.
morgan pushed to branch mullvad-browser-128.2.0esr-14.0-1 at The Tor Project / Applications / Mullvad Browser
Commits:
b3c475ab by Pier Angelo Vendrame at 2024-09-16T17:42:36+00:00
squash! Bug 41043: Hardcode the UI font on Linux
Bug 43141: Hardcode system-ui to Arimo.
- - - - -
2 changed files:
- gfx/thebes/gfxPlatformFontList.cpp
- layout/base/nsLayoutUtils.cpp
Changes:
=====================================
gfx/thebes/gfxPlatformFontList.cpp
=====================================
@@ -2055,6 +2055,11 @@ static void GetSystemUIFontFamilies(const nsPresContext* aPresContext,
#if defined(XP_MACOSX) || defined(MOZ_WIDGET_UIKIT)
*aFamilies.AppendElement() = "-apple-system"_ns;
return;
+#elif defined(MOZ_WIDGET_GTK)
+ // tor-browser#43141: Hardcode Arimo in case our custom fontconfig is
+ // missing.
+ *aFamilies.AppendElement() = "Arimo"_ns;
+ return;
#elif !defined(MOZ_WIDGET_ANDROID)
*aFamilies.AppendElement() = "sans-serif"_ns;
return;
=====================================
layout/base/nsLayoutUtils.cpp
=====================================
@@ -9720,7 +9720,9 @@ static void GetSpoofedSystemFontForRFP(LookAndFeel::FontID aFontID,
// In general, Linux uses some sans-serif, but its size can vary between
// 12px and 16px. We chose 15px because it is what Firefox is doing for the
// UI font-size.
- aName = u"sans-serif"_ns;
+ // tor-browser#43141: Hardcode Arimo in case our custom fontconfig is
+ // missing.
+ aName = u"Arimo"_ns;
aStyle.size = 15;
#else
# error "Unknown platform"
View it on GitLab: https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/b3c…
--
View it on GitLab: https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/b3c…
You're receiving this email because of your account on gitlab.torproject.org.
morgan pushed to branch base-browser-128.2.0esr-14.0-1 at The Tor Project / Applications / Tor Browser
Commits:
cfed101d by Pier Angelo Vendrame at 2024-09-16T17:42:17+00:00
squash! Bug 41043: Hardcode the UI font on Linux
Bug 43141: Hardcode system-ui to Arimo.
- - - - -
2 changed files:
- gfx/thebes/gfxPlatformFontList.cpp
- layout/base/nsLayoutUtils.cpp
Changes:
=====================================
gfx/thebes/gfxPlatformFontList.cpp
=====================================
@@ -2055,6 +2055,11 @@ static void GetSystemUIFontFamilies(const nsPresContext* aPresContext,
#if defined(XP_MACOSX) || defined(MOZ_WIDGET_UIKIT)
*aFamilies.AppendElement() = "-apple-system"_ns;
return;
+#elif defined(MOZ_WIDGET_GTK)
+ // tor-browser#43141: Hardcode Arimo in case our custom fontconfig is
+ // missing.
+ *aFamilies.AppendElement() = "Arimo"_ns;
+ return;
#elif !defined(MOZ_WIDGET_ANDROID)
*aFamilies.AppendElement() = "sans-serif"_ns;
return;
=====================================
layout/base/nsLayoutUtils.cpp
=====================================
@@ -9720,7 +9720,9 @@ static void GetSpoofedSystemFontForRFP(LookAndFeel::FontID aFontID,
// In general, Linux uses some sans-serif, but its size can vary between
// 12px and 16px. We chose 15px because it is what Firefox is doing for the
// UI font-size.
- aName = u"sans-serif"_ns;
+ // tor-browser#43141: Hardcode Arimo in case our custom fontconfig is
+ // missing.
+ aName = u"Arimo"_ns;
aStyle.size = 15;
#else
# error "Unknown platform"
View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/cfed101…
--
View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/cfed101…
You're receiving this email because of your account on gitlab.torproject.org.