lists.torproject.org
Sign In Sign Up
Manage this list Sign In Sign Up

Keyboard Shortcuts

Thread View

  • j: Next unread message
  • k: Previous unread message
  • j a: Jump to all threads
  • j l: Jump to MailingList overview

tbb-commits

Thread Start a new thread
Threads by month
  • ----- 2025 -----
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2024 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2023 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2022 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2021 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2020 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2019 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2018 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2017 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2016 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2015 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2014 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
tbb-commits@lists.torproject.org

August 2025

  • 1 participants
  • 197 discussions
[Git][tpo/applications/tor-browser][base-browser-140.1.0esr-15.0-1] fixup! Firefox preference overrides.
by Pier Angelo Vendrame (@pierov) 07 Aug '25

07 Aug '25
Pier Angelo Vendrame pushed to branch base-browser-140.1.0esr-15.0-1 at The Tor Project / Applications / Tor Browser Commits: 6cb6ea55 by Pier Angelo Vendrame at 2025-08-07T11:43:23+02:00 fixup! Firefox preference overrides. BB 44062: Enable touch events on Windows and Android. Auto-detection makes some properties available on the global scope only when touch support is actually available, but this introduces entorpy. Let's force touch enabled in Windows+Android and disable it elsewhere. This improves consistency with the spoofed number of touch points. - - - - - 1 changed file: - browser/app/profile/001-base-profile.js Changes: ===================================== browser/app/profile/001-base-profile.js ===================================== @@ -443,9 +443,12 @@ pref("dom.webmidi.enabled", false); // Bug 41398: Disable Web MIDI API // randomized IDs when this pref is true). // Defense-in-depth (already the default value) from Firefox 119 or 120. pref("media.devices.enumerate.legacy.enabled", false); -// Bug 10286: Always disable Touch API. -// We might need to deepen this topic, see tor-browser#42069. +// Touch events (tor-browser#10286, tor-browser#42069, tor-browser#44062) +#if defined(XP_WIN) || defined(ANDROID) +pref("dom.w3c_touch_events.enabled", 1); +#else pref("dom.w3c_touch_events.enabled", 0); +#endif #ifndef ANDROID // Bug 42138: Disable touch-based overscroll UX pref("apz.overscroll.enabled", false); View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/6cb6ea5… -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/6cb6ea5… You're receiving this email because of your account on gitlab.torproject.org.
1 0
0 0
[Git][tpo/applications/mullvad-browser][mullvad-browser-140.1.0esr-15.0-1] fixup! Firefox preference overrides.
by Pier Angelo Vendrame (@pierov) 07 Aug '25

07 Aug '25
Pier Angelo Vendrame pushed to branch mullvad-browser-140.1.0esr-15.0-1 at The Tor Project / Applications / Mullvad Browser Commits: 7259b166 by Pier Angelo Vendrame at 2025-08-07T11:42:04+02:00 fixup! Firefox preference overrides. BB 44062: Enable touch events on Windows and Android. Auto-detection makes some properties available on the global scope only when touch support is actually available, but this introduces entorpy. Let's force touch enabled in Windows+Android and disable it elsewhere. This improves consistency with the spoofed number of touch points. - - - - - 1 changed file: - browser/app/profile/001-base-profile.js Changes: ===================================== browser/app/profile/001-base-profile.js ===================================== @@ -443,9 +443,12 @@ pref("dom.webmidi.enabled", false); // Bug 41398: Disable Web MIDI API // randomized IDs when this pref is true). // Defense-in-depth (already the default value) from Firefox 119 or 120. pref("media.devices.enumerate.legacy.enabled", false); -// Bug 10286: Always disable Touch API. -// We might need to deepen this topic, see tor-browser#42069. +// Touch events (tor-browser#10286, tor-browser#42069, tor-browser#44062) +#if defined(XP_WIN) || defined(ANDROID) +pref("dom.w3c_touch_events.enabled", 1); +#else pref("dom.w3c_touch_events.enabled", 0); +#endif #ifndef ANDROID // Bug 42138: Disable touch-based overscroll UX pref("apz.overscroll.enabled", false); View it on GitLab: https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/725… -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/725… You're receiving this email because of your account on gitlab.torproject.org.
1 0
0 0
[Git][tpo/applications/tor-browser][tor-browser-140.1.0esr-15.0-1] fixup! Firefox preference overrides.
by Pier Angelo Vendrame (@pierov) 07 Aug '25

07 Aug '25
Pier Angelo Vendrame pushed to branch tor-browser-140.1.0esr-15.0-1 at The Tor Project / Applications / Tor Browser Commits: fbc1f480 by Pier Angelo Vendrame at 2025-08-07T11:39:52+02:00 fixup! Firefox preference overrides. BB 44062: Enable touch events on Windows and Android. Auto-detection makes some properties available on the global scope only when touch support is actually available, but this introduces entorpy. Let's force touch enabled in Windows+Android and disable it elsewhere. This improves consistency with the spoofed number of touch points. - - - - - 2 changed files: - browser/app/profile/001-base-profile.js - mobile/android/app/000-tor-browser-android.js Changes: ===================================== browser/app/profile/001-base-profile.js ===================================== @@ -443,9 +443,12 @@ pref("dom.webmidi.enabled", false); // Bug 41398: Disable Web MIDI API // randomized IDs when this pref is true). // Defense-in-depth (already the default value) from Firefox 119 or 120. pref("media.devices.enumerate.legacy.enabled", false); -// Bug 10286: Always disable Touch API. -// We might need to deepen this topic, see tor-browser#42069. +// Touch events (tor-browser#10286, tor-browser#42069, tor-browser#44062) +#if defined(XP_WIN) || defined(ANDROID) +pref("dom.w3c_touch_events.enabled", 1); +#else pref("dom.w3c_touch_events.enabled", 0); +#endif #ifndef ANDROID // Bug 42138: Disable touch-based overscroll UX pref("apz.overscroll.enabled", false); ===================================== mobile/android/app/000-tor-browser-android.js ===================================== @@ -23,9 +23,6 @@ pref("privacy.clearOnShutdown.siteSettings", true); // controls if we want camera support pref("media.realtime_decoder.enabled", false); -// Enable touch events on Android (highlighting text, etc) -pref("dom.w3c_touch_events.enabled", 2); - // No HLS support for now due to browser freezing, see: #29859. pref("media.hls.enabled", false); View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/fbc1f48… -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/fbc1f48… You're receiving this email because of your account on gitlab.torproject.org.
1 0
0 0
[Git][tpo/applications/tor-browser-build][main] Bug 41442: Update the generate-bugzilla-triage-csv script for Tor Browser 16.0
by Pier Angelo Vendrame (@pierov) 07 Aug '25

07 Aug '25
Pier Angelo Vendrame pushed to branch main at The Tor Project / Applications / tor-browser-build Commits: c088e842 by Morgan at 2025-08-06T18:10:21+00:00 Bug 41442: Update the generate-bugzilla-triage-csv script for Tor Browser 16.0 - - - - - 1 changed file: - tools/browser/generate-bugzilla-triage-csv Changes: ===================================== tools/browser/generate-bugzilla-triage-csv ===================================== @@ -1,8 +1,14 @@ #!/usr/bin/env bash # gitlab labels for review tickets -browser_label="15.0 stable" -esr_label="esr-140" +browser_label="Apps::Product::TorBrowser" +esr_label="esr-next" +priority_label="Priority::Blocker" +impact_label="Impact::Unknown" +type_label="Apps::Type::Audit" + +# milestone for the next major Tor Browser release +milestone="Tor Browser 16.0" # prints to stderr function echoerr() { echo "$@" 1>&2; } @@ -10,18 +16,17 @@ function echoerr() { echo "$@" 1>&2; } script_dir=$(dirname "${BASH_ARGV0:-$0}") # help dialog -if [ "$#" -lt 5 ]; then - echoerr "Usage: $0 <ff-version> <begin-commit> <end-commit> <gitlab-audit-issue> <reviewers...>" +if [ "$#" -ne 4 ]; then + echoerr "Usage: $0 <ff-version> <begin-commit> <end-commit> <gitlab-audit-issue>" echoerr echoerr "ff-version rapid-release Firefox version to audit" - echoerr "begin-commit starting gecko-dev commit of this Firefox version" - echoerr "end-commit ending gecko-dev commit of this Firefox version" + echoerr "begin-commit starting firefox commit of this Firefox version" + echoerr "end-commit ending firefox commit of this Firefox version" echoerr "gitlab-audit-issue tor-browser GitLab issue number for this audit" - echoerr "reviewers... space-separated list of reviewers responsible for this audit" echoerr "" echoerr "Example:" echoerr "" - echoerr "$0 129 FIREFOX_NIGHTLY_128_END FIREFOX_NIGHTLY_129_END 43303 morgan pierov henry" + echoerr "$0 129 FIREFOX_NIGHTLY_128_END FIREFOX_NIGHTLY_129_END 43303" exit 1 fi @@ -219,7 +224,8 @@ jq '. | sort_by([.component, .id])[] | "\(.id)|\(.component)|\(.summary)"' ${uni # review issue title new_issue_title=$(url_encode "Review Mozilla ${id}: ${summary_short}") # review issue description + labeling (14.0 stable, FF128-esr, Next) - new_issue_description=$(url_encode "### Bugzilla: ${bugzilla_url}")%0A$(url_encode "/label ~\"${browser_label}\" ~\"${esr_label}\" ~\"Bugzilla Review\" ~Next")%0A$(url_encode "/relate tpo/applications/tor-browser#${audit_issue}")%0A%0A$(url_encode "<!-- briefly describe why this issue needs further review -->")%0A + new_issue_description=$(url_encode "### Bugzilla: ${bugzilla_url}")%0A$(url_encode "/label ~\"${browser_label}\" ~\"${esr_label}\" ~\"${priority_label}\" ~\"${impact_label}\" ~\"${type_label}\"")%0A$(url_encode "/milestone %\"{milestone}\"")%0A$(url_encode "/relate tpo/applications/tor-browser#${audit_issue}")%0A%0A$(url_encode "<!-- briefly describe why this issue needs further review -->")%0A + # url which create's new issue with title and description pre-populated new_issue_url="https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/new?iss…" @@ -231,12 +237,6 @@ jq '. | sort_by([.component, .id])[] | "\(.id)|\(.component)|\(.summary)"' ${uni fi done -echo -echo "\"Triaged by:\"" -for reviewer in $reviewers; do - reviewer=$(csv_escape "${reviewer}") - echo "\"FALSE\",\"${reviewer}\"" -done echo bugzilla_query="=HYPERLINK(\"${bugzilla_query}\", \"Bugzilla query\")" View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/commit/c… -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/commit/c… You're receiving this email because of your account on gitlab.torproject.org.
1 0
0 0
[Git][tpo/applications/mullvad-browser][mullvad-browser-140.1.0esr-15.0-1] fixup! Base Browser's .mozconfigs.
by Pier Angelo Vendrame (@pierov) 06 Aug '25

06 Aug '25
Pier Angelo Vendrame pushed to branch mullvad-browser-140.1.0esr-15.0-1 at The Tor Project / Applications / Mullvad Browser Commits: fd1cb0c8 by Pier Angelo Vendrame at 2025-08-06T19:36:44+02:00 fixup! Base Browser's .mozconfigs. BB 44067: Build geckodriver only on Linux. After Bug 1908788, geckodriver has become a host tool. So, even when we cross-compile, we get Linux binaries, and we stopped shipping them in tor-browser-build. Therefore, we can disable also their compilation. - - - - - 2 changed files: - browser/config/mozconfigs/base-browser - mozconfig-linux-x86_64 Changes: ===================================== browser/config/mozconfigs/base-browser ===================================== @@ -41,6 +41,3 @@ ac_add_options --disable-legacy-profile-creation if test -z "$WASI_SYSROOT"; then ac_add_options --without-wasm-sandboxed-libraries fi - -# tor-browser#42337 -ac_add_options --enable-geckodriver ===================================== mozconfig-linux-x86_64 ===================================== @@ -11,3 +11,5 @@ ac_add_options --enable-default-toolkit=cairo-gtk3 # Let's make sure no preference is enabling either Adobe's or Google's CDM. ac_add_options --disable-eme +# tor-browser#44067: geckodriver has become a host-only tool +ac_add_options --enable-geckodriver View it on GitLab: https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/fd1… -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/fd1… You're receiving this email because of your account on gitlab.torproject.org.
1 0
0 0
[Git][tpo/applications/tor-browser][base-browser-140.1.0esr-15.0-1] fixup! Base Browser's .mozconfigs.
by Pier Angelo Vendrame (@pierov) 06 Aug '25

06 Aug '25
Pier Angelo Vendrame pushed to branch base-browser-140.1.0esr-15.0-1 at The Tor Project / Applications / Tor Browser Commits: d7bd2c46 by Pier Angelo Vendrame at 2025-08-06T19:35:36+02:00 fixup! Base Browser's .mozconfigs. BB 44067: Build geckodriver only on Linux. After Bug 1908788, geckodriver has become a host tool. So, even when we cross-compile, we get Linux binaries, and we stopped shipping them in tor-browser-build. Therefore, we can disable also their compilation. - - - - - 2 changed files: - browser/config/mozconfigs/base-browser - mozconfig-linux-x86_64 Changes: ===================================== browser/config/mozconfigs/base-browser ===================================== @@ -47,7 +47,4 @@ if test -z "$WASI_SYSROOT"; then ac_add_options --without-wasm-sandboxed-libraries fi -# tor-browser#42337 -ac_add_options --enable-geckodriver - ac_add_options --with-relative-data-dir=BaseBrowser/Data/Browser ===================================== mozconfig-linux-x86_64 ===================================== @@ -11,3 +11,5 @@ ac_add_options --enable-default-toolkit=cairo-gtk3 # Let's make sure no preference is enabling either Adobe's or Google's CDM. ac_add_options --disable-eme +# tor-browser#44067: geckodriver has become a host-only tool +ac_add_options --enable-geckodriver View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/d7bd2c4… -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/d7bd2c4… You're receiving this email because of your account on gitlab.torproject.org.
1 0
0 0
[Git][tpo/applications/tor-browser][tor-browser-140.1.0esr-15.0-1] fixup! Base Browser's .mozconfigs.
by Pier Angelo Vendrame (@pierov) 06 Aug '25

06 Aug '25
Pier Angelo Vendrame pushed to branch tor-browser-140.1.0esr-15.0-1 at The Tor Project / Applications / Tor Browser Commits: 47265bc8 by Pier Angelo Vendrame at 2025-08-06T18:35:32+02:00 fixup! Base Browser's .mozconfigs. BB 44067: Build geckodriver only on Linux. After Bug 1908788, geckodriver has become a host tool. So, even when we cross-compile, we get Linux binaries, and we stopped shipping them in tor-browser-build. Therefore, we can disable also their compilation. - - - - - 2 changed files: - browser/config/mozconfigs/base-browser - mozconfig-linux-x86_64 Changes: ===================================== browser/config/mozconfigs/base-browser ===================================== @@ -43,6 +43,3 @@ ac_add_options --disable-legacy-profile-creation if test -z "$WASI_SYSROOT"; then ac_add_options --without-wasm-sandboxed-libraries fi - -# tor-browser#42337 -ac_add_options --enable-geckodriver ===================================== mozconfig-linux-x86_64 ===================================== @@ -11,3 +11,5 @@ ac_add_options --enable-default-toolkit=cairo-gtk3 # Let's make sure no preference is enabling either Adobe's or Google's CDM. ac_add_options --disable-eme +# tor-browser#44067: geckodriver has become a host-only tool +ac_add_options --enable-geckodriver View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/47265bc… -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/47265bc… You're receiving this email because of your account on gitlab.torproject.org.
1 0
0 0
[Git][tpo/applications/mullvad-browser][mullvad-browser-140.1.0esr-15.0-1] fixup! Firefox preference overrides.
by brizental (@brizental) 05 Aug '25

05 Aug '25
brizental pushed to branch mullvad-browser-140.1.0esr-15.0-1 at The Tor Project / Applications / Mullvad Browser Commits: 392f3202 by Beatriz Rizental at 2025-08-05T18:33:36+02:00 fixup! Firefox preference overrides. - - - - - 1 changed file: - browser/app/profile/001-base-profile.js Changes: ===================================== browser/app/profile/001-base-profile.js ===================================== @@ -225,6 +225,11 @@ pref("toolkit.telemetry.firstShutdownPing.enabled", false); // Added in tor-brow pref("toolkit.telemetry.updatePing.enabled", false); // Make sure updater telemetry is disabled; see #25909. pref("toolkit.telemetry.bhrPing.enabled", false); pref("toolkit.telemetry.coverage.opt-out", true); +// Force all telemtry identifier to their canary values tor-browser#43750 +pref("toolkit.telemetry.cachedClientID", "c0ffeec0-ffee-c0ff-eec0-ffeec0ffeec0", locked); +pref("toolkit.telemetry.cachedProfileGroupID", "decafdec-afde-cafd-ecaf-decafdecafde", locked); +pref("datareporting.dau.cachedUsageProfileID", "beefbeef-beef-beef-beef-beeefbeefbee", locked); +pref("datareporting.dau.cachedUsageProfileGroupID", "b0bacafe-b0ba-cafe-b0ba-cafeb0bacafe", locked); pref("toolkit.coverage.opt-out", true); pref("toolkit.coverage.endpoint.base", ""); pref("browser.tabs.crashReporting.sendReport", false); View it on GitLab: https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/392… -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/392… You're receiving this email because of your account on gitlab.torproject.org.
1 0
0 0
[Git][tpo/applications/tor-browser][base-browser-140.1.0esr-15.0-1] fixup! Firefox preference overrides.
by brizental (@brizental) 05 Aug '25

05 Aug '25
brizental pushed to branch base-browser-140.1.0esr-15.0-1 at The Tor Project / Applications / Tor Browser Commits: e7eb3783 by Beatriz Rizental at 2025-08-05T18:28:59+02:00 fixup! Firefox preference overrides. - - - - - 1 changed file: - browser/app/profile/001-base-profile.js Changes: ===================================== browser/app/profile/001-base-profile.js ===================================== @@ -225,6 +225,11 @@ pref("toolkit.telemetry.firstShutdownPing.enabled", false); // Added in tor-brow pref("toolkit.telemetry.updatePing.enabled", false); // Make sure updater telemetry is disabled; see #25909. pref("toolkit.telemetry.bhrPing.enabled", false); pref("toolkit.telemetry.coverage.opt-out", true); +// Force all telemtry identifier to their canary values tor-browser#43750 +pref("toolkit.telemetry.cachedClientID", "c0ffeec0-ffee-c0ff-eec0-ffeec0ffeec0", locked); +pref("toolkit.telemetry.cachedProfileGroupID", "decafdec-afde-cafd-ecaf-decafdecafde", locked); +pref("datareporting.dau.cachedUsageProfileID", "beefbeef-beef-beef-beef-beeefbeefbee", locked); +pref("datareporting.dau.cachedUsageProfileGroupID", "b0bacafe-b0ba-cafe-b0ba-cafeb0bacafe", locked); pref("toolkit.coverage.opt-out", true); pref("toolkit.coverage.endpoint.base", ""); pref("browser.tabs.crashReporting.sendReport", false); View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/e7eb378… -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/e7eb378… You're receiving this email because of your account on gitlab.torproject.org.
1 0
0 0
[Git][tpo/applications/tor-browser][tor-browser-140.1.0esr-15.0-1] fixup! Firefox preference overrides.
by brizental (@brizental) 05 Aug '25

05 Aug '25
brizental pushed to branch tor-browser-140.1.0esr-15.0-1 at The Tor Project / Applications / Tor Browser Commits: 55b07453 by Beatriz Rizental at 2025-08-05T17:45:48+02:00 fixup! Firefox preference overrides. - - - - - 1 changed file: - browser/app/profile/001-base-profile.js Changes: ===================================== browser/app/profile/001-base-profile.js ===================================== @@ -225,6 +225,11 @@ pref("toolkit.telemetry.firstShutdownPing.enabled", false); // Added in tor-brow pref("toolkit.telemetry.updatePing.enabled", false); // Make sure updater telemetry is disabled; see #25909. pref("toolkit.telemetry.bhrPing.enabled", false); pref("toolkit.telemetry.coverage.opt-out", true); +// Force all telemtry identifier to their canary values tor-browser#43750 +pref("toolkit.telemetry.cachedClientID", "c0ffeec0-ffee-c0ff-eec0-ffeec0ffeec0", locked); +pref("toolkit.telemetry.cachedProfileGroupID", "decafdec-afde-cafd-ecaf-decafdecafde", locked); +pref("datareporting.dau.cachedUsageProfileID", "beefbeef-beef-beef-beef-beeefbeefbee", locked); +pref("datareporting.dau.cachedUsageProfileGroupID", "b0bacafe-b0ba-cafe-b0ba-cafeb0bacafe", locked); pref("toolkit.coverage.opt-out", true); pref("toolkit.coverage.endpoint.base", ""); pref("browser.tabs.crashReporting.sendReport", false); View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/55b0745… -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/55b0745… You're receiving this email because of your account on gitlab.torproject.org.
1 0
0 0
  • ← Newer
  • 1
  • ...
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • Older →

HyperKitty Powered by HyperKitty version 1.3.12.