lists.torproject.org
Sign In Sign Up
Manage this list Sign In Sign Up

Keyboard Shortcuts

Thread View

  • j: Next unread message
  • k: Previous unread message
  • j a: Jump to all threads
  • j l: Jump to MailingList overview

tbb-commits

Thread Start a new thread
Download
Threads by month
  • ----- 2025 -----
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2024 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2023 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2022 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2021 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2020 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2019 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2018 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2017 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2016 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2015 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2014 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
tbb-commits@lists.torproject.org

  • 1 participants
  • 18605 discussions
[Git][tpo/applications/tor-browser][tor-browser-128.1.0esr-14.0-1] 4 commits: fixup! Bug 30237: Add v3 onion services client authentication prompt
by morgan (@morgan) 22 Aug '24

22 Aug '24
morgan pushed to branch tor-browser-128.1.0esr-14.0-1 at The Tor Project / Applications / Tor Browser Commits: 1825488a by Henry Wilkes at 2024-08-22T19:26:55+00:00 fixup! Bug 30237: Add v3 onion services client authentication prompt Bug 42665: Drop the &quot;tail-with-learn-more&quot; class from our descriptions. - - - - - ec4aaaf5 by Henry Wilkes at 2024-08-22T19:26:55+00:00 fixup! Bug 31286: Implementation of bridge, proxy, and firewall settings in about:preferences#connection Bug 42665: Drop the &quot;tail-with-learn-more&quot; class from our descriptions. - - - - - 0c7a4ea1 by Henry Wilkes at 2024-08-22T19:26:55+00:00 fixup! Bug 41916: Letterboxing preferences UI Bug 42665: Drop the &quot;tail-with-learn-more&quot; class from our descriptions. - - - - - 5b238c40 by Henry Wilkes at 2024-08-22T19:26:55+00:00 fixup! Bug 40925: Implemented the Security Level component Bug 42665: Drop the &quot;tail-with-learn-more&quot; class from our descriptions. - - - - - 5 changed files: - browser/components/onionservices/content/authPreferences.inc.xhtml - browser/components/preferences/letterboxing.inc.xhtml - browser/components/securitylevel/content/securityLevelPreferences.inc.xhtml - browser/components/torpreferences/content/connectionPane.xhtml - browser/components/torpreferences/content/provideBridgeDialog.xhtml Changes: ===================================== browser/components/onionservices/content/authPreferences.inc.xhtml ===================================== @@ -12,7 +12,6 @@ > <html:span id="torOnionServiceKeys-overview" - class="tail-with-learn-more" data-l10n-id="onion-site-authentication-preferences-overview" ></html:span> <label ===================================== browser/components/preferences/letterboxing.inc.xhtml ===================================== @@ -7,10 +7,7 @@ > <html:h1 data-l10n-id="letterboxing-header" /> <description class="letterboxing-overview description-deemphasized"> - <html:span - data-l10n-id="letterboxing-overview" - class="tail-with-learn-more" - ></html:span> + <html:span data-l10n-id="letterboxing-overview"></html:span> <html:a is="moz-support-link" tor-manual-page="anti-fingerprinting_letterboxing" @@ -26,10 +23,7 @@ <label><html:h2 data-l10n-id="letterboxing-window-size-header"/></label> <description class="letterboxing-search-overview description-deemphasized"> - <html:span - data-l10n-id="letterboxing-overview" - class="tail-with-learn-more" - ></html:span> + <html:span data-l10n-id="letterboxing-overview"></html:span> <html:a is="moz-support-link" tor-manual-page="anti-fingerprinting_letterboxing" @@ -51,10 +45,7 @@ data-l10n-id="letterboxing-alignment-header" /></label> <description class="letterboxing-search-overview description-deemphasized"> - <html:span - data-l10n-id="letterboxing-overview" - class="tail-with-learn-more" - ></html:span> + <html:span data-l10n-id="letterboxing-overview"></html:span> <html:a is="moz-support-link" tor-manual-page="anti-fingerprinting_letterboxing" @@ -100,10 +91,7 @@ <label class="letterboxing-search-heading"><html:h2 data-l10n-id="letterboxing-header"/></label> <description class="letterboxing-search-overview description-deemphasized"> - <html:span - data-l10n-id="letterboxing-overview" - class="tail-with-learn-more" - ></html:span> + <html:span data-l10n-id="letterboxing-overview"></html:span> <html:a is="moz-support-link" tor-manual-page="anti-fingerprinting_letterboxing" ===================================== browser/components/securitylevel/content/securityLevelPreferences.inc.xhtml ===================================== @@ -9,7 +9,6 @@ <description class="description-deemphasized" flex="1"> <html:span id="securityLevel-overview" - class="tail-with-learn-more" data-l10n-id="security-level-preferences-overview" ></html:span> <html:a ===================================== browser/components/torpreferences/content/connectionPane.xhtml ===================================== @@ -13,10 +13,7 @@ > <html:h1 data-l10n-id="tor-connection-settings-heading"></html:h1> <description class="description-deemphasized" flex="1"> - <html:span - data-l10n-id="tor-connection-overview" - class="tail-with-learn-more" - ></html:span> + <html:span data-l10n-id="tor-connection-overview"></html:span> <label class="learnMore text-link" is="text-link" @@ -112,10 +109,7 @@ hidden="true" > <description class="description-deemphasized" flex="1"> - <html:span - class="tail-with-learn-more" - data-l10n-id="tor-bridges-overview" - /> + <html:span data-l10n-id="tor-bridges-overview"></html:span> <label class="learnMore text-link" is="text-link" ===================================== browser/components/torpreferences/content/provideBridgeDialog.xhtml ===================================== @@ -30,7 +30,6 @@ <html:div id="user-provide-bridge-entry-page"> <description id="user-provide-bridge-description"> <html:span - class="tail-with-learn-more" data-l10n-id="user-provide-bridge-dialog-description" ></html:span> <label View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/compare/da2d11… -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/compare/da2d11… You're receiving this email because of your account on gitlab.torproject.org.
1 0
0 0
[Git][tpo/applications/tor-browser-build][maint-13.5] 2 commits: Bug 41168: Check that we are not changing other channel when deploying update_responses
by morgan (@morgan) 22 Aug '24

22 Aug '24
morgan pushed to branch maint-13.5 at The Tor Project / Applications / tor-browser-build Commits: 32537994 by Nicolas Vigier at 2024-08-22T19:09:19+00:00 Bug 41168: Check that we are not changing other channel when deploying update_responses - - - - - fb9e1493 by Nicolas Vigier at 2024-08-22T19:09:23+00:00 Bug 41168: Fix check in update_responses deploy script The check for modified files from other channels was inverted. - - - - - 1 changed file: - tools/signing/upload-update_responses-to-staticiforme Changes: ===================================== tools/signing/upload-update_responses-to-staticiforme ===================================== @@ -63,6 +63,18 @@ echo "update_responses_commit: $update_responses_commit" cd "$update_dir" git fetch +changed_files="\$(git diff --name-only HEAD $update_responses_commit)" +if echo "\$changed_files" | grep -qv "$tbb_version_type" +then + echo >&2 "Error: checking out new update_response_commit will changes" + echo >&2 "some files outside of the $tbb_version_type directory:" + echo "\$changed_files" | grep -v "$tbb_version_type" >&2 + echo >&2 "--" + echo >&2 "If this is really what you want to do, edit this script to" + echo >&2 "remove the line 'exit 1' and run it again." + echo >&2 "See tor-browser-build#41168 for more details." + exit 1 +fi git checkout "$update_responses_commit" static-update-component aus1.torproject.org View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/compare/… -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/compare/… You're receiving this email because of your account on gitlab.torproject.org.
1 0
0 0
[Git][tpo/applications/tor-browser-build][main] Bug 41168: Fix check in update_responses deploy script
by morgan (@morgan) 22 Aug '24

22 Aug '24
morgan pushed to branch main at The Tor Project / Applications / tor-browser-build Commits: db976d61 by Nicolas Vigier at 2024-08-22T19:01:47+00:00 Bug 41168: Fix check in update_responses deploy script The check for modified files from other channels was inverted. - - - - - 1 changed file: - tools/signing/upload-update_responses-to-staticiforme Changes: ===================================== tools/signing/upload-update_responses-to-staticiforme ===================================== @@ -64,7 +64,7 @@ echo "update_responses_commit: $update_responses_commit" cd "$update_dir" git fetch changed_files="\$(git diff --name-only HEAD $update_responses_commit)" -if ! echo "\$changed_files" | grep -qv "$tbb_version_type" +if echo "\$changed_files" | grep -qv "$tbb_version_type" then echo >&2 "Error: checking out new update_response_commit will changes" echo >&2 "some files outside of the $tbb_version_type directory:" View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/commit/d… -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/commit/d… You're receiving this email because of your account on gitlab.torproject.org.
1 0
0 0
[Git][tpo/applications/tor-browser-build][main] Bug 41013: Add a README to each project
by morgan (@morgan) 22 Aug '24

22 Aug '24
morgan pushed to branch main at The Tor Project / Applications / tor-browser-build Commits: 2a175fce by Pier Angelo Vendrame at 2024-08-21T20:55:55+00:00 Bug 41013: Add a README to each project - - - - - 30 changed files: - doc/how-to-update-go-dependencies.txt - + projects/android-toolchain/README.md - + projects/application-services/README.md - + projects/binutils/README.md - + projects/browser/README.md - + projects/cbindgen/README.md - + projects/cctools/README.md - + projects/clang/README.md - + projects/cmake/README.md - + projects/common/README.md - + projects/conjure/README.md - + projects/container-image/README.md - + projects/firefox-l10n/README.md - + projects/firefox/README.md - + projects/fonts/README.md - projects/fonts/README.txt - + projects/fxc2/README.md - + projects/gcc-source/README.md - + projects/gcc/README.md - + projects/geckoview/README.md - + projects/glean/README.md - + projects/go-bootstrap/README.md - + projects/go/README.md - + projects/gradle/README.md - + projects/hfsplus-tools/README.md - + projects/libdmg-hfsplus/README.md - + projects/libevent/README.md - + projects/libtapi/README.md - + projects/llvm-project/README.md - + projects/llvm-runtimes/README.md The diff was not included because it is too large. View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/commit/2… -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/commit/2… You're receiving this email because of your account on gitlab.torproject.org.
1 0
0 0
[Git][tpo/applications/tor-browser][tor-browser-128.1.0esr-14.0-1] 4 commits: fixup! Bug 3455: Add DomainIsolator, for isolating circuit by domain.
by morgan (@morgan) 22 Aug '24

22 Aug '24
morgan pushed to branch tor-browser-128.1.0esr-14.0-1 at The Tor Project / Applications / Tor Browser Commits: a7f45e05 by Pier Angelo Vendrame at 2024-08-22T14:02:09+02:00 fixup! Bug 3455: Add DomainIsolator, for isolating circuit by domain. Bug 43074: Pass the browser to TorDomainIsolator.newCircuitForBrowser. - - - - - d25a948d by Pier Angelo Vendrame at 2024-08-22T14:03:09+02:00 fixup! Bug 41600: Add a tor circuit display panel. Bug 43074: Pass the browser to TorDomainIsolator.newCircuitForBrowser. - - - - - 6ca3c329 by Pier Angelo Vendrame at 2024-08-22T14:03:41+02:00 fixup! Bug 40209: Implement Basic Crypto Safety Bug 43074: Pass the browser to TorDomainIsolator.newCircuitForBrowser. - - - - - da2d11fa by Pier Angelo Vendrame at 2024-08-22T14:05:24+02:00 Bug 42247: Android helpers for the TorProvider Bug 42655: Add a backend function for the &quot;New circuit for this site&quot; functionality. - - - - - 9 changed files: - browser/actors/CryptoSafetyParent.sys.mjs - browser/base/content/appmenu-viewcache.inc.xhtml - browser/base/content/browser-menubar.inc - browser/base/content/browser-sets.inc - browser/base/content/navigator-toolbox.inc.xhtml - browser/components/torcircuit/content/torCircuitPanel.js - mobile/android/geckoview/src/main/java/org/mozilla/geckoview/GeckoSession.java - mobile/shared/modules/geckoview/GeckoViewContent.sys.mjs - toolkit/components/tor-launcher/TorDomainIsolator.sys.mjs Changes: ===================================== browser/actors/CryptoSafetyParent.sys.mjs ===================================== @@ -67,7 +67,7 @@ export class CryptoSafetyParent extends JSWindowActorParent { const browser = browsingContext.embedderElement; if (browser) { lazy.TorDomainIsolator.newCircuitForBrowser( - browser.ownerGlobal.gBrowser + browser.ownerGlobal.gBrowser.selectedBrowser ); } } ===================================== browser/base/content/appmenu-viewcache.inc.xhtml ===================================== @@ -56,7 +56,7 @@ class="subviewbutton" key="new-circuit-key" data-l10n-id="appmenuitem-new-tor-circuit" - oncommand="TorDomainIsolator.newCircuitForBrowser(gBrowser);"/> + oncommand="TorDomainIsolator.newCircuitForBrowser(gBrowser.selectedBrowser);"/> <toolbarseparator/> <toolbarbutton id="appMenu-bookmarks-button" class="subviewbutton subviewbutton-nav" ===================================== browser/base/content/browser-menubar.inc ===================================== @@ -33,7 +33,7 @@ key="new-identity-key" data-l10n-id="menu-new-identity"/> <menuitem id="menu_newCircuit" key="new-circuit-key" data-l10n-id="menu-new-tor-circuit" - oncommand="TorDomainIsolator.newCircuitForBrowser(gBrowser);"/> + oncommand="TorDomainIsolator.newCircuitForBrowser(gBrowser.selectedBrowser);"/> <menuseparator/> <menuitem id="menu_openLocation" hidden="true" ===================================== browser/base/content/browser-sets.inc ===================================== @@ -392,5 +392,5 @@ internal="true"/> #endif <key id="new-identity-key" modifiers="accel shift" key="U" oncommand="NewIdentityButton.onCommand(event)"/> - <key id="new-circuit-key" modifiers="accel shift" key="L" oncommand="TorDomainIsolator.newCircuitForBrowser(gBrowser)"/> + <key id="new-circuit-key" modifiers="accel shift" key="L" oncommand="TorDomainIsolator.newCircuitForBrowser(gBrowser.selectedBrowser)"/> </keyset> ===================================== browser/base/content/navigator-toolbox.inc.xhtml ===================================== @@ -621,7 +621,7 @@ <toolbarbutton id="new-circuit-button" class="toolbarbutton-1 chromeclass-toolbar-additional" data-l10n-id="toolbar-new-tor-circuit" - oncommand="TorDomainIsolator.newCircuitForBrowser(gBrowser);"/> + oncommand="TorDomainIsolator.newCircuitForBrowser(gBrowser.selectedBrowser);"/> <toolbarbutton id="fullscreen-button" class="toolbarbutton-1 chromeclass-toolbar-additional" observes="View:FullScreen" ===================================== browser/components/torcircuit/content/torCircuitPanel.js ===================================== @@ -127,7 +127,7 @@ var gTorCircuitPanel = { document .getElementById("tor-circuit-new-circuit") .addEventListener("command", () => { - TorDomainIsolator.newCircuitForBrowser(gBrowser); + TorDomainIsolator.newCircuitForBrowser(gBrowser.selectedBrowser); }); // Update the display just before opening. ===================================== mobile/android/geckoview/src/main/java/org/mozilla/geckoview/GeckoSession.java ===================================== @@ -2610,6 +2610,14 @@ public class GeckoSession { return mEventDispatcher.queryBundle("GeckoView:GetTorCircuit"); } + /** + * Change the circuit for this session. + */ + @UiThread + public void newTorCircuit() { + mEventDispatcher.dispatch("GeckoView:NewTorCircuit"); + } + /** * Set this GeckoSession as active or inactive, which represents if the session is currently * visible or not. Setting a GeckoSession to inactive will significantly reduce its memory ===================================== mobile/shared/modules/geckoview/GeckoViewContent.sys.mjs ===================================== @@ -40,6 +40,7 @@ export class GeckoViewContent extends GeckoViewModule { "GeckoView:ZoomToInput", "GeckoView:IsPdfJs", "GeckoView:GetTorCircuit", + "GeckoView:NewTorCircuit", ]); } @@ -313,6 +314,9 @@ export class GeckoViewContent extends GeckoViewModule { case "GeckoView:GetTorCircuit": this._getTorCircuit(aCallback); break; + case "GeckoView:NewTorCircuit": + this._newTorCircuit(aCallback); + break; } } @@ -437,6 +441,11 @@ export class GeckoViewContent extends GeckoViewModule { } } + _newTorCircuit(aCallback) { + lazy.TorDomainIsolator.newCircuitForBrowser(this.browser); + aCallback?.onSuccess(); + } + async _containsFormData(aCallback) { aCallback.onSuccess(await this.actor.containsFormData()); } ===================================== toolkit/components/tor-launcher/TorDomainIsolator.sys.mjs ===================================== @@ -225,11 +225,9 @@ class TorDomainIsolatorImpl { * Create a new nonce for the FP domain of the selected browser and reload the * tab with a new circuit. * - * @param {object} globalBrowser Should be the gBrowser from the context of - * the caller + * @param {object} browser The browser we want to change the circuit for. */ - newCircuitForBrowser(globalBrowser) { - const browser = globalBrowser.selectedBrowser; + newCircuitForBrowser(browser) { const firstPartyDomain = getDomainForBrowser(browser); this.newCircuitForDomain(firstPartyDomain); const { username, password } = this.#getSocksProxyCredentials( View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/compare/3b1892… -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/compare/3b1892… You're receiving this email because of your account on gitlab.torproject.org.
1 0
0 0
[Git][tpo/applications/mullvad-browser][mullvad-browser-128.1.0esr-14.0-1] fixup! Firefox preference overrides.
by Pier Angelo Vendrame (@pierov) 22 Aug '24

22 Aug '24
Pier Angelo Vendrame pushed to branch mullvad-browser-128.1.0esr-14.0-1 at The Tor Project / Applications / Mullvad Browser Commits: 53f02328 by Morgan at 2024-08-22T09:36:35+02:00 fixup! Firefox preference overrides. Bug 42604: Remove safe-browsing google prefs - - - - - 1 changed file: - modules/libpref/init/all.js Changes: ===================================== modules/libpref/init/all.js ===================================== @@ -3529,6 +3529,8 @@ pref("browser.safebrowsing.downloads.remote.block_uncommon", true); // Android SafeBrowsing's configuration is in ContentBlocking.java, keep in sync. #ifndef MOZ_WIDGET_ANDROID +// tor-browser#42604: safe-browsing is disabled elsewhere, but no reason to ship scary google prefs +#ifndef BASE_BROWSER_VERSION // Google Safe Browsing provider (legacy) pref("browser.safebrowsing.provider.google.pver", "2.2"); pref("browser.safebrowsing.provider.google.lists", "goog-badbinurl-shavar,goog-downloadwhite-digest256,goog-phish-shavar,googpub-phish-shavar,goog-malware-shavar,goog-unwanted-shavar"); @@ -3552,6 +3554,7 @@ pref("browser.safebrowsing.provider.google4.advisoryURL", "https://developers.go pref("browser.safebrowsing.provider.google4.advisoryName", "Google Safe Browsing"); pref("browser.safebrowsing.provider.google4.dataSharingURL", "https://safebrowsing.googleapis.com/v4/threatHits?$ct=application/x-protobu…"); pref("browser.safebrowsing.provider.google4.dataSharing.enabled", false); +#endif // ifndef BASE_BROWSER_VERSION #endif // ifndef MOZ_WIDGET_ANDROID View it on GitLab: https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/53f… -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/53f… You're receiving this email because of your account on gitlab.torproject.org.
1 0
0 0
[Git][tpo/applications/tor-browser][base-browser-128.1.0esr-14.0-1] fixup! Firefox preference overrides.
by Pier Angelo Vendrame (@pierov) 22 Aug '24

22 Aug '24
Pier Angelo Vendrame pushed to branch base-browser-128.1.0esr-14.0-1 at The Tor Project / Applications / Tor Browser Commits: 1a4edd77 by Morgan at 2024-08-22T09:36:46+02:00 fixup! Firefox preference overrides. Bug 42604: Remove safe-browsing google prefs - - - - - 1 changed file: - modules/libpref/init/all.js Changes: ===================================== modules/libpref/init/all.js ===================================== @@ -3529,6 +3529,8 @@ pref("browser.safebrowsing.downloads.remote.block_uncommon", true); // Android SafeBrowsing's configuration is in ContentBlocking.java, keep in sync. #ifndef MOZ_WIDGET_ANDROID +// tor-browser#42604: safe-browsing is disabled elsewhere, but no reason to ship scary google prefs +#ifndef BASE_BROWSER_VERSION // Google Safe Browsing provider (legacy) pref("browser.safebrowsing.provider.google.pver", "2.2"); pref("browser.safebrowsing.provider.google.lists", "goog-badbinurl-shavar,goog-downloadwhite-digest256,goog-phish-shavar,googpub-phish-shavar,goog-malware-shavar,goog-unwanted-shavar"); @@ -3552,6 +3554,7 @@ pref("browser.safebrowsing.provider.google4.advisoryURL", "https://developers.go pref("browser.safebrowsing.provider.google4.advisoryName", "Google Safe Browsing"); pref("browser.safebrowsing.provider.google4.dataSharingURL", "https://safebrowsing.googleapis.com/v4/threatHits?$ct=application/x-protobu…"); pref("browser.safebrowsing.provider.google4.dataSharing.enabled", false); +#endif // ifndef BASE_BROWSER_VERSION #endif // ifndef MOZ_WIDGET_ANDROID View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/1a4edd7… -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/1a4edd7… You're receiving this email because of your account on gitlab.torproject.org.
1 0
0 0
[Git][tpo/applications/tor-browser][tor-browser-128.1.0esr-14.0-1] fixup! Firefox preference overrides.
by Pier Angelo Vendrame (@pierov) 22 Aug '24

22 Aug '24
Pier Angelo Vendrame pushed to branch tor-browser-128.1.0esr-14.0-1 at The Tor Project / Applications / Tor Browser Commits: 3b18923a by Morgan at 2024-08-22T07:34:26+00:00 fixup! Firefox preference overrides. Bug 42604: Remove safe-browsing google prefs - - - - - 1 changed file: - modules/libpref/init/all.js Changes: ===================================== modules/libpref/init/all.js ===================================== @@ -3529,6 +3529,8 @@ pref("browser.safebrowsing.downloads.remote.block_uncommon", true); // Android SafeBrowsing's configuration is in ContentBlocking.java, keep in sync. #ifndef MOZ_WIDGET_ANDROID +// tor-browser#42604: safe-browsing is disabled elsewhere, but no reason to ship scary google prefs +#ifndef BASE_BROWSER_VERSION // Google Safe Browsing provider (legacy) pref("browser.safebrowsing.provider.google.pver", "2.2"); pref("browser.safebrowsing.provider.google.lists", "goog-badbinurl-shavar,goog-downloadwhite-digest256,goog-phish-shavar,googpub-phish-shavar,goog-malware-shavar,goog-unwanted-shavar"); @@ -3552,6 +3554,7 @@ pref("browser.safebrowsing.provider.google4.advisoryURL", "https://developers.go pref("browser.safebrowsing.provider.google4.advisoryName", "Google Safe Browsing"); pref("browser.safebrowsing.provider.google4.dataSharingURL", "https://safebrowsing.googleapis.com/v4/threatHits?$ct=application/x-protobu…"); pref("browser.safebrowsing.provider.google4.dataSharing.enabled", false); +#endif // ifndef BASE_BROWSER_VERSION #endif // ifndef MOZ_WIDGET_ANDROID View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/3b18923… -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/3b18923… You're receiving this email because of your account on gitlab.torproject.org.
1 0
0 0
[Git][tpo/applications/mullvad-browser][mullvad-browser-128.1.0esr-14.0-1] fixup! Bug 40166: Disable security.certerrors.mitm.auto_enable_enterprise_roots
by Pier Angelo Vendrame (@pierov) 22 Aug '24

22 Aug '24
Pier Angelo Vendrame pushed to branch mullvad-browser-128.1.0esr-14.0-1 at The Tor Project / Applications / Mullvad Browser Commits: 91750307 by Morgan at 2024-08-22T09:30:50+02:00 fixup! Bug 40166: Disable security.certerrors.mitm.auto_enable_enterprise_roots - Revert 612d54e8e97017891865db8003826d8688ad5a9b - - - - - 1 changed file: - browser/components/BrowserGlue.sys.mjs Changes: ===================================== browser/components/BrowserGlue.sys.mjs ===================================== @@ -1538,20 +1538,6 @@ BrowserGlue.prototype = { // Base Browser-specific version of _migrateUI. this._migrateUIBB(); - // Clear possibly auto enabled enterprise_roots prefs (see bug 40166) - if ( - !Services.prefs.getBoolPref( - "security.certerrors.mitm.auto_enable_enterprise_roots" - ) && - Services.prefs.getBoolPref( - "security.enterprise_roots.auto-enabled", - false - ) - ) { - Services.prefs.clearUserPref("security.enterprise_roots.enabled"); - Services.prefs.clearUserPref("security.enterprise_roots.auto-enabled"); - } - if (!Services.prefs.prefHasUserValue(PREF_PDFJS_ISDEFAULT_CACHE_STATE)) { lazy.PdfJs.checkIsDefault(this._isNewProfile); } View it on GitLab: https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/917… -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/917… You're receiving this email because of your account on gitlab.torproject.org.
1 0
0 0
[Git][tpo/applications/tor-browser][base-browser-128.1.0esr-14.0-1] fixup! Bug 40166: Disable security.certerrors.mitm.auto_enable_enterprise_roots
by Pier Angelo Vendrame (@pierov) 22 Aug '24

22 Aug '24
Pier Angelo Vendrame pushed to branch base-browser-128.1.0esr-14.0-1 at The Tor Project / Applications / Tor Browser Commits: 8b6e208e by Morgan at 2024-08-22T09:29:41+02:00 fixup! Bug 40166: Disable security.certerrors.mitm.auto_enable_enterprise_roots - Revert 612d54e8e97017891865db8003826d8688ad5a9b - - - - - 1 changed file: - browser/components/BrowserGlue.sys.mjs Changes: ===================================== browser/components/BrowserGlue.sys.mjs ===================================== @@ -1557,20 +1557,6 @@ BrowserGlue.prototype = { // Base Browser-specific version of _migrateUI. this._migrateUIBB(); - // Clear possibly auto enabled enterprise_roots prefs (see bug 40166) - if ( - !Services.prefs.getBoolPref( - "security.certerrors.mitm.auto_enable_enterprise_roots" - ) && - Services.prefs.getBoolPref( - "security.enterprise_roots.auto-enabled", - false - ) - ) { - Services.prefs.clearUserPref("security.enterprise_roots.enabled"); - Services.prefs.clearUserPref("security.enterprise_roots.auto-enabled"); - } - if (!Services.prefs.prefHasUserValue(PREF_PDFJS_ISDEFAULT_CACHE_STATE)) { lazy.PdfJs.checkIsDefault(this._isNewProfile); } View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/8b6e208… -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/8b6e208… You're receiving this email because of your account on gitlab.torproject.org.
1 0
0 0
  • ← Newer
  • 1
  • ...
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • ...
  • 1861
  • Older →

HyperKitty Powered by HyperKitty version 1.3.12.