lists.torproject.org
Sign In Sign Up
Manage this list Sign In Sign Up

Keyboard Shortcuts

Thread View

  • j: Next unread message
  • k: Previous unread message
  • j a: Jump to all threads
  • j l: Jump to MailingList overview

tbb-commits

Thread Start a new thread
Download
Threads by month
  • ----- 2025 -----
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2024 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2023 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2022 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2021 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2020 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2019 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2018 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2017 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2016 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2015 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2014 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
tbb-commits@lists.torproject.org

January 2025

  • 1 participants
  • 165 discussions
[Git][tpo/applications/tor-browser][tor-browser-128.7.0esr-14.0-1] fixup! Firefox preference overrides.
by Pier Angelo Vendrame (@pierov) 28 Jan '25

28 Jan '25
Pier Angelo Vendrame pushed to branch tor-browser-128.7.0esr-14.0-1 at The Tor Project / Applications / Tor Browser Commits: 22f2382b by Pier Angelo Vendrame at 2025-01-28T17:14:29+01:00 fixup! Firefox preference overrides. BB 43366: Do not use system accent color in inputs. We did not manage to write a reliable proof of concept for fingerprinting this, but I managed to get the color once (with Firefox on Android, which is the worse case, as the system offers to use colors from the wallpaper). - - - - - 1 changed file: - browser/app/profile/001-base-profile.js Changes: ===================================== browser/app/profile/001-base-profile.js ===================================== @@ -475,6 +475,9 @@ pref("pdfjs.disabled", false, locked); #endif // Bug 40057: Ensure system colors are not used for CSS4 colors pref("browser.display.use_system_colors", false); +// tor-browser#43366: do not use system accent color in inputs. +// See also https://bugzilla.mozilla.org/show_bug.cgi?id=1861362. +pref("widget.non-native-theme.use-theme-accent", false); // tor-browser#43236: Disable vsync on Wayland to prevent refresh rate leaks. pref("widget.wayland.vsync.enabled", false); View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/22f2382… -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/22f2382… You're receiving this email because of your account on gitlab.torproject.org.
1 0
0 0
[Git][tpo/applications/tor-browser][base-browser-128.7.0esr-14.0-1] fixup! Firefox preference overrides.
by Pier Angelo Vendrame (@pierov) 28 Jan '25

28 Jan '25
Pier Angelo Vendrame pushed to branch base-browser-128.7.0esr-14.0-1 at The Tor Project / Applications / Tor Browser Commits: faf55dd5 by Pier Angelo Vendrame at 2025-01-28T17:14:53+01:00 fixup! Firefox preference overrides. BB 43366: Do not use system accent color in inputs. We did not manage to write a reliable proof of concept for fingerprinting this, but I managed to get the color once (with Firefox on Android, which is the worse case, as the system offers to use colors from the wallpaper). - - - - - 1 changed file: - browser/app/profile/001-base-profile.js Changes: ===================================== browser/app/profile/001-base-profile.js ===================================== @@ -475,6 +475,9 @@ pref("pdfjs.disabled", false, locked); #endif // Bug 40057: Ensure system colors are not used for CSS4 colors pref("browser.display.use_system_colors", false); +// tor-browser#43366: do not use system accent color in inputs. +// See also https://bugzilla.mozilla.org/show_bug.cgi?id=1861362. +pref("widget.non-native-theme.use-theme-accent", false); // tor-browser#43236: Disable vsync on Wayland to prevent refresh rate leaks. pref("widget.wayland.vsync.enabled", false); View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/faf55dd… -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/faf55dd… You're receiving this email because of your account on gitlab.torproject.org.
1 0
0 0
[Git][tpo/applications/tor-browser-build][main] Bug 41356: Make 14.0a4 a watershed alpha release
by boklm (@boklm) 28 Jan '25

28 Jan '25
boklm pushed to branch main at The Tor Project / Applications / tor-browser-build Commits: 69f1477f by Nicolas Vigier at 2025-01-28T16:51:43+01:00 Bug 41356: Make 14.0a4 a watershed alpha release - - - - - 1 changed file: - projects/release/update_responses_config.yml Changes: ===================================== projects/release/update_responses_config.yml ===================================== @@ -89,6 +89,8 @@ htaccess_rewrite_rules: RewriteRule ^[^/]+/1[012]\..*/.* https://aus1.torproject.org/torbrowser/update_pre13.5a10/alpha/$0 [last] RewriteRule ^[^/]+/13\.0.*/.* https://aus1.torproject.org/torbrowser/update_pre13.5a10/alpha/$0 [last] RewriteRule ^[^/]+/13\.5a\d/.* https://aus1.torproject.org/torbrowser/update_pre13.5a10/alpha/$0 [last] + # tor-browser-build41356: Make 14.0a4 a watershed alpha release + RewriteRule ^[^/]+/14\.0a[123]/.* https://aus1.torproject.org/torbrowser/update_pre14.0a4/alpha/$0 [last] release: | # bug 26570: Redirect pre-8.0 stable users to a separate update directory RewriteRule ^[^/]+/[4567]\..*/.* https://aus1.torproject.org/torbrowser/update_pre8.0/release/$0 [last] View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/commit/6… -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/commit/6… You're receiving this email because of your account on gitlab.torproject.org.
1 0
0 0
[Git][tpo/applications/tor-browser-build][maint-14.0] Bug 41328: Exclude tor dependencies from LD_LIBRARY_PATH.
by Pier Angelo Vendrame (@pierov) 28 Jan '25

28 Jan '25
Pier Angelo Vendrame pushed to branch maint-14.0 at The Tor Project / Applications / tor-browser-build Commits: 3451c57c by Pier Angelo Vendrame at 2025-01-28T16:46:30+01:00 Bug 41328: Exclude tor dependencies from LD_LIBRARY_PATH. We discovered in tor-browser#43326 that adding our OpenSSL to LD_LIBRARY_PATH might cause the browser not to work in some distros. So, we decided to add them to LD_LIBRARY_PATH only for the tor daemon, instead. - - - - - 1 changed file: - projects/firefox/start-firefox Changes: ===================================== projects/firefox/start-firefox ===================================== @@ -17,9 +17,6 @@ add_LD_LIBRARY_PATH() { if [ $? -ne 0 ]; then add_LD_LIBRARY_PATH "$basedir/[% IF c("var/tor-browser") -%]TorBrowser/Tor/[% END -%]libstdc++/" fi -[% IF c("var/tor-browser") -%] -add_LD_LIBRARY_PATH "$basedir/TorBrowser/Tor/" -[% END -%] export LD_LIBRARY_PATH exec "$basedir/[% c("var/exe_name") %].real" "$@" View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/commit/3… -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/commit/3… You're receiving this email because of your account on gitlab.torproject.org.
1 0
0 0
[Git][tpo/applications/mullvad-browser][mullvad-browser-128.7.0esr-14.0-1] 3 commits: fixup! Firefox preference overrides.
by Pier Angelo Vendrame (@pierov) 28 Jan '25

28 Jan '25
Pier Angelo Vendrame pushed to branch mullvad-browser-128.7.0esr-14.0-1 at The Tor Project / Applications / Mullvad Browser Commits: c0e63369 by Pier Angelo Vendrame at 2025-01-28T16:41:32+01:00 fixup! Firefox preference overrides. BB 41065: Hardcode the limit of storage quota. Currently, we return min(10GB, 0.2 * available space in the fs). This is bad for systems that have less than 50GB free, especially live systems, such as Tails. Set a pref to replace the available space with a hardcoded limit (5GiB). - - - - - 59e74f2f by Pier Angelo Vendrame at 2025-01-28T16:41:34+01:00 Bug 43386: Use Firefox in the UA in RFP-exempt request. XHR requests initiated by extensions are exempt from RFP. Therefore, they report the actual app name, instead of Firefox, and the actual Firefox minor version. This happens whenever the app name has been customized and does not match a hardcoded "Firefox". - - - - - 59a91478 by Pier Angelo Vendrame at 2025-01-28T16:41:35+01:00 fixup! Firefox preference overrides. BB 43236: Disable vsync on Wayland. Vsync leaks the monitor refresh rate, therefore it is already disabled on other platforms, including Linux/X11 and Windows. - - - - - 2 changed files: - browser/app/profile/001-base-profile.js - netwerk/protocol/http/nsHttpHandler.cpp Changes: ===================================== browser/app/profile/001-base-profile.js ===================================== @@ -87,6 +87,15 @@ pref("browser.sessionstore.privacy_level", 2); // Use the in-memory media cache and increase its maximum size (#29120) pref("browser.privatebrowsing.forceMediaMemoryCache", true); pref("media.memory_cache_max_size", 65536); +// tor-browser#41065: lie about the available quota. +// This value is in KiB, and will be divided by 5. Currently: 50GiB, to be +// coherent with Firefox's usual value. However, this might be too much for live +// systems. +// This will be the limit also after granting the persistent storage permission, +// but we are not interested in it, since we support only PBM. +// We can come back to it, and hardcode the two spaced differently, if we ever +// think we need it. +pref("dom.quotaManager.temporaryStorage.fixedLimit", 52428800); // Disable restore in case of crash (tor-browser#41503) // This should not be needed in PBM, but we added it anyway like other options. pref("browser.sessionstore.resume_from_crash", false); @@ -466,6 +475,8 @@ pref("pdfjs.disabled", false, locked); #endif // Bug 40057: Ensure system colors are not used for CSS4 colors pref("browser.display.use_system_colors", false); +// tor-browser#43236: Disable vsync on Wayland to prevent refresh rate leaks. +pref("widget.wayland.vsync.enabled", false); // tor-browser#41943: defense-in-depth, but do not lock anymore (enabled in Firefox 119, http://bugzil.la/1851162) pref("javascript.options.spectre.disable_for_isolated_content", false); ===================================== netwerk/protocol/http/nsHttpHandler.cpp ===================================== @@ -867,7 +867,7 @@ void nsHttpHandler::BuildUserAgent() { mUserAgent += '/'; mUserAgent += mProductSub; - bool isFirefox = mAppName.EqualsLiteral("Firefox"); + bool isFirefox = true; if (isFirefox || mCompatFirefoxEnabled) { // "Firefox/x.y" (compatibility) app token mUserAgent += ' '; View it on GitLab: https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/compare/7f… -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/compare/7f… You're receiving this email because of your account on gitlab.torproject.org.
1 0
0 0
[Git][tpo/applications/tor-browser][base-browser-128.7.0esr-14.0-1] 3 commits: fixup! Firefox preference overrides.
by Pier Angelo Vendrame (@pierov) 28 Jan '25

28 Jan '25
Pier Angelo Vendrame pushed to branch base-browser-128.7.0esr-14.0-1 at The Tor Project / Applications / Tor Browser Commits: 95637e62 by Pier Angelo Vendrame at 2025-01-28T16:39:42+01:00 fixup! Firefox preference overrides. BB 41065: Hardcode the limit of storage quota. Currently, we return min(10GB, 0.2 * available space in the fs). This is bad for systems that have less than 50GB free, especially live systems, such as Tails. Set a pref to replace the available space with a hardcoded limit (5GiB). - - - - - dc62e33f by Pier Angelo Vendrame at 2025-01-28T16:39:56+01:00 Bug 43386: Use Firefox in the UA in RFP-exempt request. XHR requests initiated by extensions are exempt from RFP. Therefore, they report the actual app name, instead of Firefox, and the actual Firefox minor version. This happens whenever the app name has been customized and does not match a hardcoded "Firefox". - - - - - 54e4f8f0 by Pier Angelo Vendrame at 2025-01-28T16:40:39+01:00 fixup! Firefox preference overrides. BB 43236: Disable vsync on Wayland. Vsync leaks the monitor refresh rate, therefore it is already disabled on other platforms, including Linux/X11 and Windows. - - - - - 2 changed files: - browser/app/profile/001-base-profile.js - netwerk/protocol/http/nsHttpHandler.cpp Changes: ===================================== browser/app/profile/001-base-profile.js ===================================== @@ -87,6 +87,15 @@ pref("browser.sessionstore.privacy_level", 2); // Use the in-memory media cache and increase its maximum size (#29120) pref("browser.privatebrowsing.forceMediaMemoryCache", true); pref("media.memory_cache_max_size", 65536); +// tor-browser#41065: lie about the available quota. +// This value is in KiB, and will be divided by 5. Currently: 50GiB, to be +// coherent with Firefox's usual value. However, this might be too much for live +// systems. +// This will be the limit also after granting the persistent storage permission, +// but we are not interested in it, since we support only PBM. +// We can come back to it, and hardcode the two spaced differently, if we ever +// think we need it. +pref("dom.quotaManager.temporaryStorage.fixedLimit", 52428800); // Disable restore in case of crash (tor-browser#41503) // This should not be needed in PBM, but we added it anyway like other options. pref("browser.sessionstore.resume_from_crash", false); @@ -466,6 +475,8 @@ pref("pdfjs.disabled", false, locked); #endif // Bug 40057: Ensure system colors are not used for CSS4 colors pref("browser.display.use_system_colors", false); +// tor-browser#43236: Disable vsync on Wayland to prevent refresh rate leaks. +pref("widget.wayland.vsync.enabled", false); // tor-browser#41943: defense-in-depth, but do not lock anymore (enabled in Firefox 119, http://bugzil.la/1851162) pref("javascript.options.spectre.disable_for_isolated_content", false); ===================================== netwerk/protocol/http/nsHttpHandler.cpp ===================================== @@ -867,7 +867,7 @@ void nsHttpHandler::BuildUserAgent() { mUserAgent += '/'; mUserAgent += mProductSub; - bool isFirefox = mAppName.EqualsLiteral("Firefox"); + bool isFirefox = true; if (isFirefox || mCompatFirefoxEnabled) { // "Firefox/x.y" (compatibility) app token mUserAgent += ' '; View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/compare/022a95… -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/compare/022a95… You're receiving this email because of your account on gitlab.torproject.org.
1 0
0 0
[Git][tpo/applications/tor-browser-update-responses][main] Fix typo in 14.0a4 watershed redirect rule
by boklm (@boklm) 28 Jan '25

28 Jan '25
boklm pushed to branch main at The Tor Project / Applications / Tor Browser update responses Commits: fdb6d9d0 by Nicolas Vigier at 2025-01-28T16:39:39+01:00 Fix typo in 14.0a4 watershed redirect rule - - - - - 1 changed file: - update_3/alpha/.htaccess Changes: ===================================== update_3/alpha/.htaccess ===================================== @@ -8,7 +8,7 @@ RewriteRule ^[^/]+/1[012]\..*/.* https://aus1.torproject.org/torbrowser/update_p RewriteRule ^[^/]+/13\.0.*/.* https://aus1.torproject.org/torbrowser/update_pre13.5a10/alpha/$0 [last] RewriteRule ^[^/]+/13\.5a\d/.* https://aus1.torproject.org/torbrowser/update_pre13.5a10/alpha/$0 [last] # Make 14.0a4 a watershed alpha release -RewriteRule ^[^/]+/14\.5a[123]/.* https://aus1.torproject.org/torbrowser/update_pre14.0a4/alpha/$0 [last] +RewriteRule ^[^/]+/14\.0a[123]/.* https://aus1.torproject.org/torbrowser/update_pre14.0a4/alpha/$0 [last] RewriteRule ^[^/]+/14.5a2/ no-update.xml [last] RewriteRule ^Linux_x86-gcc3/14.0a8/ALL 14.0a8-14.5a2-linux-i686-ALL.xml [last] RewriteRule ^Linux_x86-gcc3/14.0a9/ALL 14.0a9-14.5a2-linux-i686-ALL.xml [last] View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser-update-responses… -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser-update-responses… You're receiving this email because of your account on gitlab.torproject.org.
1 0
0 0
[Git][tpo/applications/tor-browser][tor-browser-128.7.0esr-14.0-1] 6 commits: fixup! Bug 40701: Add security warning when downloading a file
by Pier Angelo Vendrame (@pierov) 28 Jan '25

28 Jan '25
Pier Angelo Vendrame pushed to branch tor-browser-128.7.0esr-14.0-1 at The Tor Project / Applications / Tor Browser Commits: 4cd3b8b0 by Henry Wilkes at 2025-01-28T16:26:31+01:00 fixup! Bug 40701: Add security warning when downloading a file Bug 43312: Ensure download panel warning uses the same width as the mozilla downloads list. We stop setting a `width` on the download panel because this can conflict with the default width set for the mozilla downloads list, set by localisers. Instead, we use the same width for our Tor Browser warning message using a wrapper element. We also ensure that the wrapper element has `min-width: 100%` for scenarios where the localiser width is less than the min-width of the ancestor panel. - - - - - 3db9163f by Pier Angelo Vendrame at 2025-01-28T16:27:09+01:00 fixup! Bug 40933: Add tor-launcher functionality Bug 43326: Restrict the changes to LD_LIBRARY_PATH. We used to set LD_LIBRARY_PATH for the tor daemon before launching the browser, but this does not work well for some distributions, which link to the latest version of OpenSSL, whereas we link to the LTS. To avoid conflicts, we can set a custom LD_LIBRARY_PATH only for the tor daemon. - - - - - b683ecb0 by Pier Angelo Vendrame at 2025-01-28T16:30:30+01:00 fixup! Firefox preference overrides. BB 43236: Disable vsync on Wayland. Vsync leaks the monitor refresh rate, therefore it is already disabled on other platforms, including Linux/X11 and Windows. - - - - - 4744d84d by Pier Angelo Vendrame at 2025-01-28T16:31:13+01:00 Bug 43386: Use Firefox in the UA in RFP-exempt request. XHR requests initiated by extensions are exempt from RFP. Therefore, they report the actual app name, instead of Firefox, and the actual Firefox minor version. This happens whenever the app name has been customized and does not match a hardcoded "Firefox". - - - - - 55cbbdde by Pier Angelo Vendrame at 2025-01-28T16:31:42+01:00 fixup! Firefox preference overrides. BB 41065: Hardcode the limit of storage quota. Currently, we return min(10GB, 0.2 * available space in the fs). This is bad for systems that have less than 50GB free, especially live systems, such as Tails. Set a pref to replace the available space with a hardcoded limit (5GiB). - - - - - 24417b5a by Henry Wilkes at 2025-01-28T16:32:43+01:00 fixup! Bug 40458: Implement .tor.onion aliases TB 41831: Add additional effective TLD for abc.au.securedrop.tor.onion exception. - - - - - 7 changed files: - browser/app/profile/001-base-profile.js - browser/components/downloads/content/downloads.css - browser/components/downloads/content/downloadsPanel.inc.xhtml - netwerk/dns/effective_tld_names.dat - netwerk/protocol/http/nsHttpHandler.cpp - toolkit/components/tor-launcher/TorLauncherUtil.sys.mjs - toolkit/components/tor-launcher/TorProcess.sys.mjs Changes: ===================================== browser/app/profile/001-base-profile.js ===================================== @@ -87,6 +87,15 @@ pref("browser.sessionstore.privacy_level", 2); // Use the in-memory media cache and increase its maximum size (#29120) pref("browser.privatebrowsing.forceMediaMemoryCache", true); pref("media.memory_cache_max_size", 65536); +// tor-browser#41065: lie about the available quota. +// This value is in KiB, and will be divided by 5. Currently: 50GiB, to be +// coherent with Firefox's usual value. However, this might be too much for live +// systems. +// This will be the limit also after granting the persistent storage permission, +// but we are not interested in it, since we support only PBM. +// We can come back to it, and hardcode the two spaced differently, if we ever +// think we need it. +pref("dom.quotaManager.temporaryStorage.fixedLimit", 52428800); // Disable restore in case of crash (tor-browser#41503) // This should not be needed in PBM, but we added it anyway like other options. pref("browser.sessionstore.resume_from_crash", false); @@ -466,6 +475,8 @@ pref("pdfjs.disabled", false, locked); #endif // Bug 40057: Ensure system colors are not used for CSS4 colors pref("browser.display.use_system_colors", false); +// tor-browser#43236: Disable vsync on Wayland to prevent refresh rate leaks. +pref("widget.wayland.vsync.enabled", false); // tor-browser#41943: defense-in-depth, but do not lock anymore (enabled in Firefox 119, http://bugzil.la/1851162) pref("javascript.options.spectre.disable_for_isolated_content", false); ===================================== browser/components/downloads/content/downloads.css ===================================== @@ -92,15 +92,19 @@ #downloadsPanel-mainView { min-width: 37em; padding: 0.62em; - /* If we don't set a width, #downloadsPanelTorWarning will request - * its max-content width. */ - width: 37em; } #downloadsPanelTorWarning { margin-block-end: var(--arrowpanel-menuitem-padding-block); } +#downloadsPanelTorWarningWrapper { + /* The wrapper element has its `width` attribute set by mozilla localisers. + * We want to ensure the element occupies the available width when the + * localiser width is smaller. See tor-browser#43312. */ + min-width: 100%; +} + #downloadsHistory, #downloadsFooterButtons { margin: 0; ===================================== browser/components/downloads/content/downloadsPanel.inc.xhtml ===================================== @@ -104,8 +104,25 @@ disablekeynav="true"> <panelview id="downloadsPanel-mainView"> - <html:moz-message-bar id="downloadsPanelTorWarning"> - </html:moz-message-bar> + <!-- We add a wrapper around the #downloadsPanelTorWarning and give it the + - same Fluent ID as #downloadsListBox. This Fluent message allows + - Firefox localisers to set the width of the #downloadsListBox using + - the style attribute. We want the same width set for our downloads + - warning. Otherwise the warning will occupy its max-content width. + - NOTE: We require a wrapper element since #downloadsPanelTorWarning + - needs its own Fluent attributes. + - NOTE: This only works if #downloadsPanelTorWarningWrapper and + - #downloadsListBox share the same padding relative to their common + - ancestor. + - See tor-browser#43312. --> + <html:div + id="downloadsPanelTorWarningWrapper" + data-l10n-id="downloads-panel-items" + data-l10n-attrs="style" + > + <html:moz-message-bar id="downloadsPanelTorWarning"> + </html:moz-message-bar> + </html:div> <vbox class="panel-view-body-unscrollable"> <richlistbox id="downloadsListBox" data-l10n-id="downloads-panel-items" ===================================== netwerk/dns/effective_tld_names.dat ===================================== @@ -5065,6 +5065,10 @@ pro.om onion tor.onion securedrop.tor.onion +// An additional TLD for abc.au.securedrop.tor.onion only. +// See tor-browser#41831. +// TODO: Remove once abc.au has migrated. See tor-browser#43443. +au.securedrop.tor.onion // org : https://www.iana.org/domains/root/db/org.html org ===================================== netwerk/protocol/http/nsHttpHandler.cpp ===================================== @@ -867,7 +867,7 @@ void nsHttpHandler::BuildUserAgent() { mUserAgent += '/'; mUserAgent += mProductSub; - bool isFirefox = mAppName.EqualsLiteral("Firefox"); + bool isFirefox = true; if (isFirefox || mCompatFirefoxEnabled) { // "Firefox/x.y" (compatibility) app token mUserAgent += ' '; ===================================== toolkit/components/tor-launcher/TorLauncherUtil.sys.mjs ===================================== @@ -5,6 +5,8 @@ * Tor Launcher Util JS Module *************************************************************************/ +import { AppConstants } from "resource://gre/modules/AppConstants.sys.mjs"; + const lazy = {}; ChromeUtils.defineESModuleGetters(lazy, { @@ -335,6 +337,13 @@ export const TorLauncherUtil = Object.freeze({ return Services.appinfo.OS === "Android"; }, + get isLinux() { + // Use AppConstants for Linux rather then appinfo because we are sure it + // will catch also various Unix flavors for which unofficial ports might + // exist (which should work as Linux, as far as we know). + return AppConstants.platform === "linux"; + }, + get isMac() { return Services.appinfo.OS === "Darwin"; }, ===================================== toolkit/components/tor-launcher/TorProcess.sys.mjs ===================================== @@ -122,6 +122,16 @@ export class TorProcess { stderr: "stdout", workdir: lazy.TorLauncherUtil.getTorFile("pt-startup-dir", false).path, }; + if (lazy.TorLauncherUtil.isLinux) { + let ldLibPath = Services.env.get("LD_LIBRARY_PATH") ?? ""; + if (ldLibPath) { + ldLibPath = ":" + ldLibPath; + } + options.environment = { + LD_LIBRARY_PATH: this.#exeFile.parent.path + ldLibPath, + }; + options.environmentAppend = true; + } this.#subprocess = await Subprocess.call(options); this.#status = TorProcessStatus.Running; } catch (e) { View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/compare/e2e7a7… -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/compare/e2e7a7… You're receiving this email because of your account on gitlab.torproject.org.
1 0
0 0
[Git][tpo/applications/tor-browser-update-responses][main] 3 commits: Copy 14.0a4 update files to update_pre14.0a4, to make 14.0a4 a watershed
by boklm (@boklm) 28 Jan '25

28 Jan '25
boklm pushed to branch main at The Tor Project / Applications / Tor Browser update responses Commits: 5db852f0 by Nicolas Vigier at 2025-01-28T16:10:08+01:00 Copy 14.0a4 update files to update_pre14.0a4, to make 14.0a4 a watershed - - - - - 2fa4c04b by Nicolas Vigier at 2025-01-28T16:14:32+01:00 Update update_pre14.0a4/alpha to use archive.tpo This command was used: sed -i -e 's|cdn\.torproject\.org/aus1|archive.torproject.org/tor-package-archive|g' *.xml - - - - - 49dddf82 by Nicolas Vigier at 2025-01-28T16:29:05+01:00 Add redirect in update_3/alpha/.htaccess to make 14.0a4 a watershed - - - - - 33 changed files: - update_3/alpha/.htaccess - + update_pre14.0a4/alpha/.htaccess - + update_pre14.0a4/alpha/14.0a1-14.0a4-linux-i686-ALL.xml - + update_pre14.0a4/alpha/14.0a1-14.0a4-linux-x86_64-ALL.xml - + update_pre14.0a4/alpha/14.0a1-14.0a4-macos-ALL.xml - + update_pre14.0a4/alpha/14.0a1-14.0a4-windows-i686-ALL.xml - + update_pre14.0a4/alpha/14.0a1-14.0a4-windows-x86_64-ALL.xml - + update_pre14.0a4/alpha/14.0a2-14.0a4-linux-i686-ALL.xml - + update_pre14.0a4/alpha/14.0a2-14.0a4-linux-x86_64-ALL.xml - + update_pre14.0a4/alpha/14.0a2-14.0a4-macos-ALL.xml - + update_pre14.0a4/alpha/14.0a2-14.0a4-windows-i686-ALL.xml - + update_pre14.0a4/alpha/14.0a2-14.0a4-windows-x86_64-ALL.xml - + update_pre14.0a4/alpha/14.0a3-14.0a4-linux-i686-ALL.xml - + update_pre14.0a4/alpha/14.0a3-14.0a4-linux-x86_64-ALL.xml - + update_pre14.0a4/alpha/14.0a3-14.0a4-macos-ALL.xml - + update_pre14.0a4/alpha/14.0a3-14.0a4-windows-i686-ALL.xml - + update_pre14.0a4/alpha/14.0a3-14.0a4-windows-x86_64-ALL.xml - + update_pre14.0a4/alpha/14.0a4-linux-i686-ALL.xml - + update_pre14.0a4/alpha/14.0a4-linux-x86_64-ALL.xml - + update_pre14.0a4/alpha/14.0a4-macos-ALL.xml - + update_pre14.0a4/alpha/14.0a4-windows-i686-ALL.xml - + update_pre14.0a4/alpha/14.0a4-windows-x86_64-ALL.xml - + update_pre14.0a4/alpha/download-android-aarch64.json - + update_pre14.0a4/alpha/download-android-armv7.json - + update_pre14.0a4/alpha/download-android-x86.json - + update_pre14.0a4/alpha/download-android-x86_64.json - + update_pre14.0a4/alpha/download-linux-i686.json - + update_pre14.0a4/alpha/download-linux-x86_64.json - + update_pre14.0a4/alpha/download-macos.json - + update_pre14.0a4/alpha/download-windows-i686.json - + update_pre14.0a4/alpha/download-windows-x86_64.json - + update_pre14.0a4/alpha/downloads.json - + update_pre14.0a4/alpha/no-update.xml The diff was not included because it is too large. View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser-update-responses… -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser-update-responses… You're receiving this email because of your account on gitlab.torproject.org.
1 0
0 0
[Git][tpo/applications/mullvad-browser] Pushed new tag mullvad-browser-128.7.0esr-14.0-1-build1
by Pier Angelo Vendrame (@pierov) 28 Jan '25

28 Jan '25
Pier Angelo Vendrame pushed new tag mullvad-browser-128.7.0esr-14.0-1-build1 at The Tor Project / Applications / Mullvad Browser -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/tree/mullv… You're receiving this email because of your account on gitlab.torproject.org.
1 0
0 0
  • ← Newer
  • 1
  • 2
  • 3
  • 4
  • 5
  • ...
  • 17
  • Older →

HyperKitty Powered by HyperKitty version 1.3.12.