lists.torproject.org
Sign In Sign Up
Manage this list Sign In Sign Up

Keyboard Shortcuts

Thread View

  • j: Next unread message
  • k: Previous unread message
  • j a: Jump to all threads
  • j l: Jump to MailingList overview

tbb-commits

Thread Start a new thread
Threads by month
  • ----- 2025 -----
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2024 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2023 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2022 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2021 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2020 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2019 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2018 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2017 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2016 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2015 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2014 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
tbb-commits@lists.torproject.org

October 2025

  • 1 participants
  • 213 discussions
[Git][tpo/applications/tor-browser-build][main] Bug 41609: Use new CDN77 fronts for snowflake
by morgan (@morgan) 22 Oct '25

22 Oct '25
morgan pushed to branch main at The Tor Project / Applications / tor-browser-build Commits: b77d601e by Cecylia Bocovich at 2025-10-22T16:44:49+00:00 Bug 41609: Use new CDN77 fronts for snowflake - - - - - 1 changed file: - projects/tor-expert-bundle/pt_config.json Changes: ===================================== projects/tor-expert-bundle/pt_config.json ===================================== @@ -23,8 +23,8 @@ "obfs4 51.222.13.177:80 5EDAC3B810E12B01F6FD8050D2FD3E277B289A08 cert=2uplIpLQ0q9+0qMFrK5pkaYRDOe460LL9WHBvatgkuRr/SL31wBOEupaMMJ6koRE6Ld0ew iat-mode=0" ], "snowflake" : [ - "snowflake 192.0.2.3:80 2B280B23E1107BB62ABFC40DDCC8824814F80A72 fingerprint=2B280B23E1107BB62ABFC40DDCC8824814F80A72 url=https://voluble-torrone-fc39bf.netlify.app/ fronts=vuejs.org ice=stun:stun.epygi.com:3478,stun:stun.uls.co.za:3478,stun:stun.voipgate.com:3478,stun:stun.mixvoip.com:3478,stun:stun.nextcloud.com:3478,stun:stun.bethesda.net:3478,stun:stun.nextcloud.com:443 utls-imitate=hellorandomizedalpn", - "snowflake 192.0.2.4:80 8838024498816A039FCBBAB14E6F40A0843051FA fingerprint=8838024498816A039FCBBAB14E6F40A0843051FA url=https://voluble-torrone-fc39bf.netlify.app/ fronts=vuejs.org ice=stun:stun.epygi.com:3478,stun:stun.uls.co.za:3478,stun:stun.voipgate.com:3478,stun:stun.mixvoip.com:3478,stun:stun.nextcloud.com:3478,stun:stun.bethesda.net:3478,stun:stun.nextcloud.com:443 utls-imitate=hellorandomizedalpn" + "snowflake 192.0.2.3:80 2B280B23E1107BB62ABFC40DDCC8824814F80A72 fingerprint=2B280B23E1107BB62ABFC40DDCC8824814F80A72 url=https://1098762253.rsc.cdn77.org/ fronts=app.datapacket.com,www.datapacket.com ice=stun:stun.epygi.com:3478,stun:stun.uls.co.za:3478,stun:stun.voipgate.com:3478,stun:stun.mixvoip.com:3478,stun:stun.nextcloud.com:3478,stun:stun.bethesda.net:3478,stun:stun.nextcloud.com:443 utls-imitate=hellorandomizedalpn", + "snowflake 192.0.2.4:80 8838024498816A039FCBBAB14E6F40A0843051FA fingerprint=8838024498816A039FCBBAB14E6F40A0843051FA url=https://1098762253.rsc.cdn77.org/ fronts=app.datapacket.com,www.datapacket.com ice=stun:stun.epygi.com:3478,stun:stun.uls.co.za:3478,stun:stun.voipgate.com:3478,stun:stun.mixvoip.com:3478,stun:stun.nextcloud.com:3478,stun:stun.bethesda.net:3478,stun:stun.nextcloud.com:443 utls-imitate=hellorandomizedalpn" ] } } View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/commit/b… -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/commit/b… You're receiving this email because of your account on gitlab.torproject.org.
1 0
0 0
[Git][tpo/applications/mullvad-browser][mullvad-browser-140.4.0esr-15.0-1] Bug 1977787 - Match storage limit to common value/desktop for RFP in Android. r=timhuang
by Pier Angelo Vendrame (@pierov) 22 Oct '25

22 Oct '25
Pier Angelo Vendrame pushed to branch mullvad-browser-140.4.0esr-15.0-1 at The Tor Project / Applications / Mullvad Browser Commits: 45f2b655 by Fatih Kilic at 2025-10-22T14:57:24+02:00 Bug 1977787 - Match storage limit to common value/desktop for RFP in Android. r=timhuang Differential Revision: https://phabricator.services.mozilla.com/D257850 - - - - - 2 changed files: - dom/quota/test/xpcshell/test_temporaryStorageRFP.js - toolkit/components/resistfingerprinting/nsRFPService.cpp Changes: ===================================== dom/quota/test/xpcshell/test_temporaryStorageRFP.js ===================================== @@ -36,10 +36,7 @@ async function testSteps() { request = reset(); await requestFinished(request); - let spoofedLimitBytes = 50 * GiB; - if (AppConstants.platform == "android") { - spoofedLimitBytes = 32 * GiB; - } + const spoofedLimitBytes = 50 * GiB; Services.prefs.setBoolPref("privacy.resistFingerprinting", true); ===================================== toolkit/components/resistfingerprinting/nsRFPService.cpp ===================================== @@ -2672,12 +2672,7 @@ CSSIntRect nsRFPService::GetSpoofedScreenAvailSize(const nsRect& aRect, /* static */ uint64_t nsRFPService::GetSpoofedStorageLimit() { - uint64_t gib = 1024ULL * 1024ULL * 1024ULL; // 1 GiB -#ifdef ANDROID - uint64_t limit = 32ULL * gib; // 32 GiB -#else - uint64_t limit = 50ULL * gib; // 50 GiB -#endif + uint64_t limit = 50ULL * 1024ULL * 1024ULL * 1024ULL; // 50 GiB MOZ_ASSERT(limit / 5 == dom::quota::QuotaManager::GetGroupLimitForLimit(limit)); View it on GitLab: https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/45f… -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/45f… You're receiving this email because of your account on gitlab.torproject.org.
1 0
0 0
[Git][tpo/applications/tor-browser][base-browser-140.4.0esr-15.0-1] Bug 1977787 - Match storage limit to common value/desktop for RFP in Android. r=timhuang
by Pier Angelo Vendrame (@pierov) 22 Oct '25

22 Oct '25
Pier Angelo Vendrame pushed to branch base-browser-140.4.0esr-15.0-1 at The Tor Project / Applications / Tor Browser Commits: e71d2634 by Fatih Kilic at 2025-10-22T14:56:30+02:00 Bug 1977787 - Match storage limit to common value/desktop for RFP in Android. r=timhuang Differential Revision: https://phabricator.services.mozilla.com/D257850 - - - - - 2 changed files: - dom/quota/test/xpcshell/test_temporaryStorageRFP.js - toolkit/components/resistfingerprinting/nsRFPService.cpp Changes: ===================================== dom/quota/test/xpcshell/test_temporaryStorageRFP.js ===================================== @@ -36,10 +36,7 @@ async function testSteps() { request = reset(); await requestFinished(request); - let spoofedLimitBytes = 50 * GiB; - if (AppConstants.platform == "android") { - spoofedLimitBytes = 32 * GiB; - } + const spoofedLimitBytes = 50 * GiB; Services.prefs.setBoolPref("privacy.resistFingerprinting", true); ===================================== toolkit/components/resistfingerprinting/nsRFPService.cpp ===================================== @@ -2672,12 +2672,7 @@ CSSIntRect nsRFPService::GetSpoofedScreenAvailSize(const nsRect& aRect, /* static */ uint64_t nsRFPService::GetSpoofedStorageLimit() { - uint64_t gib = 1024ULL * 1024ULL * 1024ULL; // 1 GiB -#ifdef ANDROID - uint64_t limit = 32ULL * gib; // 32 GiB -#else - uint64_t limit = 50ULL * gib; // 50 GiB -#endif + uint64_t limit = 50ULL * 1024ULL * 1024ULL * 1024ULL; // 50 GiB MOZ_ASSERT(limit / 5 == dom::quota::QuotaManager::GetGroupLimitForLimit(limit)); View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/e71d263… -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/e71d263… You're receiving this email because of your account on gitlab.torproject.org.
1 0
0 0
[Git][tpo/applications/tor-browser][tor-browser-140.4.0esr-15.0-1] Bug 1977787 - Match storage limit to common value/desktop for RFP in Android. r=timhuang
by Pier Angelo Vendrame (@pierov) 22 Oct '25

22 Oct '25
Pier Angelo Vendrame pushed to branch tor-browser-140.4.0esr-15.0-1 at The Tor Project / Applications / Tor Browser Commits: 632e2baa by Fatih Kilic at 2025-10-22T14:37:33+02:00 Bug 1977787 - Match storage limit to common value/desktop for RFP in Android. r=timhuang Differential Revision: https://phabricator.services.mozilla.com/D257850 - - - - - 2 changed files: - dom/quota/test/xpcshell/test_temporaryStorageRFP.js - toolkit/components/resistfingerprinting/nsRFPService.cpp Changes: ===================================== dom/quota/test/xpcshell/test_temporaryStorageRFP.js ===================================== @@ -36,10 +36,7 @@ async function testSteps() { request = reset(); await requestFinished(request); - let spoofedLimitBytes = 50 * GiB; - if (AppConstants.platform == "android") { - spoofedLimitBytes = 32 * GiB; - } + const spoofedLimitBytes = 50 * GiB; Services.prefs.setBoolPref("privacy.resistFingerprinting", true); ===================================== toolkit/components/resistfingerprinting/nsRFPService.cpp ===================================== @@ -2679,12 +2679,7 @@ CSSIntRect nsRFPService::GetSpoofedScreenAvailSize(const nsRect& aRect, /* static */ uint64_t nsRFPService::GetSpoofedStorageLimit() { - uint64_t gib = 1024ULL * 1024ULL * 1024ULL; // 1 GiB -#ifdef ANDROID - uint64_t limit = 32ULL * gib; // 32 GiB -#else - uint64_t limit = 50ULL * gib; // 50 GiB -#endif + uint64_t limit = 50ULL * 1024ULL * 1024ULL * 1024ULL; // 50 GiB MOZ_ASSERT(limit / 5 == dom::quota::QuotaManager::GetGroupLimitForLimit(limit)); View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/632e2ba… -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/632e2ba… You're receiving this email because of your account on gitlab.torproject.org.
1 0
0 0
[Git][tpo/applications/mullvad-browser-update-responses][main] 4 commits: release: new version, 15.0 (linux-x86_64)
by ma1 (@ma1) 22 Oct '25

22 Oct '25
ma1 pushed to branch main at The Tor Project / Applications / mullvad-browser-update-responses Commits: 80855a3e by hackademix at 2025-10-22T13:15:27+02:00 release: new version, 15.0 (linux-x86_64) - - - - - 01635e1e by hackademix at 2025-10-22T13:15:27+02:00 release: new version, 15.0 (macos) - - - - - 3c859b1c by hackademix at 2025-10-22T13:15:28+02:00 release: new version, 15.0 (windows-x86_64) - - - - - 86d16720 by hackademix at 2025-10-22T13:15:28+02:00 release: new version, 15.0 - - - - - 31 changed files: - update_1/release/download-linux-x86_64.json - update_1/release/download-macos.json - update_1/release/download-windows-x86_64.json - update_1/release/downloads.json - update_1/release/linux-x86_64/.htaccess - − update_1/release/linux-x86_64/update-14.5.5-14.5.8-linux-x86_64.xml - − update_1/release/linux-x86_64/update-14.5.6-14.5.8-linux-x86_64.xml - + update_1/release/linux-x86_64/update-14.5.6-15.0-linux-x86_64.xml - − update_1/release/linux-x86_64/update-14.5.7-14.5.8-linux-x86_64.xml - + update_1/release/linux-x86_64/update-14.5.7-15.0-linux-x86_64.xml - + update_1/release/linux-x86_64/update-14.5.8-15.0-linux-x86_64.xml - − update_1/release/linux-x86_64/update-14.5.8-linux-x86_64.xml - + update_1/release/linux-x86_64/update-15.0-linux-x86_64.xml - update_1/release/macos/.htaccess - − update_1/release/macos/update-14.5.5-14.5.8-macos.xml - − update_1/release/macos/update-14.5.6-14.5.8-macos.xml - + update_1/release/macos/update-14.5.6-15.0-macos.xml - − update_1/release/macos/update-14.5.7-14.5.8-macos.xml - + update_1/release/macos/update-14.5.7-15.0-macos.xml - + update_1/release/macos/update-14.5.8-15.0-macos.xml - − update_1/release/macos/update-14.5.8-macos.xml - + update_1/release/macos/update-15.0-macos.xml - update_1/release/windows-x86_64/.htaccess - − update_1/release/windows-x86_64/update-14.5.5-14.5.8-windows-x86_64.xml - − update_1/release/windows-x86_64/update-14.5.6-14.5.8-windows-x86_64.xml - + update_1/release/windows-x86_64/update-14.5.6-15.0-windows-x86_64.xml - − update_1/release/windows-x86_64/update-14.5.7-14.5.8-windows-x86_64.xml - + update_1/release/windows-x86_64/update-14.5.7-15.0-windows-x86_64.xml - + update_1/release/windows-x86_64/update-14.5.8-15.0-windows-x86_64.xml - − update_1/release/windows-x86_64/update-14.5.8-windows-x86_64.xml - + update_1/release/windows-x86_64/update-15.0-windows-x86_64.xml The diff was not included because it is too large. View it on GitLab: https://gitlab.torproject.org/tpo/applications/mullvad-browser-update-respo… -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/mullvad-browser-update-respo… You're receiving this email because of your account on gitlab.torproject.org.
1 0
0 0
[Git][tpo/applications/mullvad-browser][mullvad-browser-140.4.0esr-15.0-1] fixup! BB 40925: Implemented the Security Level component
by ma1 (@ma1) 22 Oct '25

22 Oct '25
ma1 pushed to branch mullvad-browser-140.4.0esr-15.0-1 at The Tor Project / Applications / Mullvad Browser Commits: bfc262ff by hackademix at 2025-10-22T13:03:23+02:00 fixup! BB 40925: Implemented the Security Level component BB 44275: Reduce console noise on security level guessing - - - - - 1 changed file: - toolkit/components/securitylevel/SecurityLevel.sys.mjs Changes: ===================================== toolkit/components/securitylevel/SecurityLevel.sys.mjs ===================================== @@ -350,14 +350,14 @@ var read_setting_from_prefs = function (prefNames) { const actual = Services.prefs.getBoolPref(prefName); if (wanted !== actual) { possibleSetting = false; - logger.info( + logger.debug( `${prefName} does not match level ${settingIndex}: ${actual}, should be ${wanted}!` ); break; } } if (possibleSetting) { - // We have a match! + logger.debug(`Preferences match level ${settingIndex}.`); return settingIndex; } } View it on GitLab: https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/bfc… -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/bfc… You're receiving this email because of your account on gitlab.torproject.org.
1 0
0 0
[Git][tpo/applications/tor-browser][base-browser-140.4.0esr-15.0-1] fixup! BB 40925: Implemented the Security Level component
by ma1 (@ma1) 22 Oct '25

22 Oct '25
ma1 pushed to branch base-browser-140.4.0esr-15.0-1 at The Tor Project / Applications / Tor Browser Commits: 290bf297 by hackademix at 2025-10-22T13:03:18+02:00 fixup! BB 40925: Implemented the Security Level component BB 44275: Reduce console noise on security level guessing - - - - - 1 changed file: - toolkit/components/securitylevel/SecurityLevel.sys.mjs Changes: ===================================== toolkit/components/securitylevel/SecurityLevel.sys.mjs ===================================== @@ -338,14 +338,14 @@ var read_setting_from_prefs = function (prefNames) { const actual = Services.prefs.getBoolPref(prefName); if (wanted !== actual) { possibleSetting = false; - logger.info( + logger.debug( `${prefName} does not match level ${settingIndex}: ${actual}, should be ${wanted}!` ); break; } } if (possibleSetting) { - // We have a match! + logger.debug(`Preferences match level ${settingIndex}.`); return settingIndex; } } View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/290bf29… -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/290bf29… You're receiving this email because of your account on gitlab.torproject.org.
1 0
0 0
[Git][tpo/applications/tor-browser][tor-browser-140.4.0esr-15.0-1] fixup! BB 40925: Implemented the Security Level component
by ma1 (@ma1) 22 Oct '25

22 Oct '25
ma1 pushed to branch tor-browser-140.4.0esr-15.0-1 at The Tor Project / Applications / Tor Browser Commits: 33251a1e by hackademix at 2025-10-22T11:43:47+02:00 fixup! BB 40925: Implemented the Security Level component BB 44275: Reduce console noise on security level guessing - - - - - 1 changed file: - toolkit/components/securitylevel/SecurityLevel.sys.mjs Changes: ===================================== toolkit/components/securitylevel/SecurityLevel.sys.mjs ===================================== @@ -338,14 +338,14 @@ var read_setting_from_prefs = function (prefNames) { const actual = Services.prefs.getBoolPref(prefName); if (wanted !== actual) { possibleSetting = false; - logger.info( + logger.debug( `${prefName} does not match level ${settingIndex}: ${actual}, should be ${wanted}!` ); break; } } if (possibleSetting) { - // We have a match! + logger.debug(`Preferences match level ${settingIndex}.`); return settingIndex; } } View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/33251a1… -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/33251a1… You're receiving this email because of your account on gitlab.torproject.org.
1 0
0 0
[Git][tpo/applications/tor-browser][tor-browser-140.4.0esr-15.0-1] fixup! TB 43817: Add tests for Tor Browser
by Pier Angelo Vendrame (@pierov) 22 Oct '25

22 Oct '25
Pier Angelo Vendrame pushed to branch tor-browser-140.4.0esr-15.0-1 at The Tor Project / Applications / Tor Browser Commits: 78327397 by Pier Angelo Vendrame at 2025-10-22T11:10:54+02:00 fixup! TB 43817: Add tests for Tor Browser TB 44280: Test stream isolation. - - - - - 2 changed files: - testing/tor/marionette.toml - + testing/tor/test_circuit_isolation.py Changes: ===================================== testing/tor/marionette.toml ===================================== @@ -1,3 +1,4 @@ [DEFAULT] +["test_circuit_isolation.py"] ["test_network_check.py"] ===================================== testing/tor/test_circuit_isolation.py ===================================== @@ -0,0 +1,98 @@ +from ipaddress import ip_address + +from marionette_driver import By +from marionette_driver.errors import NoSuchElementException +from marionette_harness import MarionetteTestCase + +TOR_BOOTSTRAP_TIMEOUT = 30000 # 30s + + +class TestCircuitIsolation(MarionetteTestCase): + + def bootstrap(self): + with self.marionette.using_context("chrome"): + self.marionette.execute_async_script( + """ + const { TorConnect, TorConnectTopics } = ChromeUtils.importESModule( + "resource://gre/modules/TorConnect.sys.mjs" + ); + const [resolve] = arguments; + + function waitForBootstrap() { + const topic = TorConnectTopics.BootstrapComplete; + Services.obs.addObserver(function observer() { + Services.obs.removeObserver(observer, topic); + resolve(); + }, topic); + TorConnect.beginBootstrapping(); + } + + const stageTopic = TorConnectTopics.StageChange; + function stageObserver() { + if (TorConnect.canBeginNormalBootstrap) { + Services.obs.removeObserver(stageObserver, stageTopic); + waitForBootstrap(); + } + } + Services.obs.addObserver(stageObserver, stageTopic); + stageObserver(); + """, + script_timeout=TOR_BOOTSTRAP_TIMEOUT, + ) + + def extract_from_check_tpo(self): + # Fetch the IP from check.torproject.org. + # In addition to that, since we are loading this page, we + # perform some additional sanity checks. + self.marionette.navigate("https://check.torproject.org/") + # When check.tpo's check succeed (i.e., it thinks we're + # connecting through tor), we should be able to find a h1.on, + # with some message... + on = self.marionette.find_element(By.CLASS_NAME, "on") + self.assertIsNotNone( + on, + "h1.on not found, you might not be connected through tor", + ) + # ... but if it fails, the message is inside a h1.off. We want + # to make sure we do not find that either (even though there is + # no reason for both of the h1 to be outputted at the moment). + self.assertRaises( + NoSuchElementException, + self.marionette.find_element, + By.CLASS_NAME, + "off", + ) + ip = self.marionette.find_element(By.TAG_NAME, "strong") + return ip_address(ip.text.strip()) + + def extract_generic(self, url): + # Fetch the IP address from any generic page that only contains + # the address. + self.marionette.navigate(url) + return ip_address( + self.marionette.execute_script( + "return document.documentElement.textContent" + ).strip() + ) + + def test_circuit_isolation(self): + self.bootstrap() + ips = [ + self.extract_from_check_tpo(), + self.extract_generic("https://am.i.mullvad.net/ip"), + self.extract_generic("https://test1.ifconfig.me/ip"), + ] + self.logger.info(f"Found the following IP addresses: {ips}") + unique_ips = set(ips) + self.logger.info(f"Found the following unique IP addresses: {unique_ips}") + self.assertEqual( + len(ips), + len(unique_ips), + "Some of the IP addresses we got are not unique.", + ) + duplicate = self.extract_generic("https://test2.ifconfig.me/ip") + self.assertEqual( + ips[-1], + duplicate, + "Two IPs that were expected to be equal are different, we might be over isolating!", + ) View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/7832739… -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/7832739… You're receiving this email because of your account on gitlab.torproject.org.
1 0
0 0
[Git][tpo/applications/tor-browser-build][main] Bug 41608: Add per-platform numbers for incrementals in count-mar-downloads
by boklm (@boklm) 22 Oct '25

22 Oct '25
boklm pushed to branch main at The Tor Project / Applications / tor-browser-build Commits: ad568972 by Nicolas Vigier at 2025-10-21T19:32:33+02:00 Bug 41608: Add per-platform numbers for incrementals in count-mar-downloads - - - - - 1 changed file: - tools/count-mar-downloads Changes: ===================================== tools/count-mar-downloads ===================================== @@ -81,6 +81,7 @@ sub parse_log_file { $downloads{$version}{OS}{$os} += 1; $downloads{$version}{incremental_update_total} += 1; $downloads{$version}{incremental_update}{$incremental_from} += 1; + $downloads{$version}{incremental_update_by_OS}{$os} += 1; } } } @@ -115,6 +116,9 @@ sub print_results { foreach my $incremental_from (sort keys %{$downloads{$version}{incremental_update}}) { print " Incremental updates from $incremental_from: $downloads{$version}{incremental_update}{$incremental_from}\n"; } + foreach my $os (sort keys %{$downloads{$version}{incremental_update_by_OS}}) { + print " Incremental updates on $os: $downloads{$version}{incremental_update_by_OS}{$os}\n"; + } } print "\n"; } View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/commit/a… -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/commit/a… You're receiving this email because of your account on gitlab.torproject.org.
1 0
0 0
  • ← Newer
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • ...
  • 22
  • Older →

HyperKitty Powered by HyperKitty version 1.3.12.