lists.torproject.org
Sign In Sign Up
Manage this list Sign In Sign Up

Keyboard Shortcuts

Thread View

  • j: Next unread message
  • k: Previous unread message
  • j a: Jump to all threads
  • j l: Jump to MailingList overview

tbb-commits

Thread Start a new thread
Download
Threads by month
  • ----- 2025 -----
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2024 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2023 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2022 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2021 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2020 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2019 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2018 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2017 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2016 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2015 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2014 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
tbb-commits@lists.torproject.org

  • 1 participants
  • 18730 discussions
[Git][tpo/applications/tor-browser-build][main] Bug 40848, 40873: Prepare Tor and Mullvad Browser 13.0a1
by richard (@richard) 24 Jul '23

24 Jul '23
richard pushed to branch main at The Tor Project / Applications / tor-browser-build Commits: 93c60f6e by Richard Pospesel at 2023-07-21T16:58:27+00:00 Bug 40848, 40873: Prepare Tor and Mullvad Browser 13.0a1 - - - - - 9 changed files: - projects/browser/Bundle-Data/Docs-MB/ChangeLog.txt - projects/browser/Bundle-Data/Docs-TBB/ChangeLog.txt - projects/browser/config - projects/firefox/config - projects/go/config - projects/manual/config - projects/openssl/config - projects/tor/config - projects/translation/config Changes: ===================================== projects/browser/Bundle-Data/Docs-MB/ChangeLog.txt ===================================== @@ -0,0 +1,74 @@ +Mullvad Browser 13.0a1 - July 20 2023 + * All Platforms + * Updated NoScript to 11.4.25 + * Updated uBlock Origin to 1.50.0 + * Updated mullvad-browser-extension to 0.8.3 + * Updated Firefox to 115.0.2esr + * Bug 166: Enable built-in URL anti-tracking query parameters stripping [mullvad-browser] + * Bug 183: Rebase Mullvad Browser to Firefox 115 [mullvad-browser] + * Bug 213: Add search engines to the default list [mullvad-browser] + * Bug 214: Enable cross-tab identity leak protection in "quiet" mode [mullvad-browser] + * Bug 26277: When "Safest" setting is enabled searching using duckduckgo should always use the Non-Javascript site for searches [tor-browser] + * Bug 33955: Selecting "Copy image" from menu leaks the source URL to the clipboard. This data is often dereferenced by other applications. [tor-browser] + * Bug 41759: Rebase Base Browser to 115 nightly [tor-browser] + * Bug 41834: Hide "Can't Be Removed - learn more" menu line for uninstallable add-ons [tor-browser] + * Bug 41854: Download Spam Protection cannot be overridden to allow legitimate downloads [tor-browser] + * Bug 41874: Visual & A11 regressions in add-on badges [tor-browser] + * Windows + * Bug 41806: Prevent Private Browsing start menu item to be added automatically [tor-browser] + * Build System + * All Platforms + * Bug 40089: Clean up usage of get-moz-build-date script [tor-browser-build] + * Bug 40410: Get rid of python2 [tor-browser-build] + * Bug 40487: Bump Python version [tor-browser-build] + * Bug 40802: Drop the patch for making WASI reproducible [tor-browser-build] + * Bug 40836: Update do-all-signing script to also deploy mullvad-browser installer bins to dist.torproject.org [tor-browser-build] + * Bug 40868: Bump Rust to 1.69.0 [tor-browser-build] + * Bug 40881: do-all-signing is asking for nssdb7 password when signing mullvadbrowser [tor-browser-build] + * Bug 40882: Fix static-update-component command in issue_templates [tor-browser-build] + * Bug 40886: Update README with instructions for Arch linux [tor-browser-build] + * Bug 40889: Add mullvad sha256sums URL to tools/signing/download-unsigned-sha256sums-gpg-signatures-from-people-tpo [tor-browser-build] + * Bug 40894: Fix format of keyring/boklm.gpg [tor-browser-build] + * Bug 40898: Add doc from tor-browser-spec/processes/ReleaseProcess to gitlab issue templates [tor-browser-build] + * Windows + * Bug 40832: Unify mingw-w64-clang 32+64 bits [tor-browser-build] + * Linux + * Bug 40102: Move from Debian Jessie to Debian Stretch for our Linux builds [tor-browser-build] + +Mullvad Browser 12.5.1 - July 5 2023 + * All Platforms + * Updated Firefox to 102.13.0esr + * Bug 192: Rebase Mullvad Browser 12.5 stable on top of 102.13esr [mullvad-browser] + * Bug 41854: Download Spam Protection cannot be overridden to allow legitimate downloads [tor-browser] + +Mullvad Browser 12.5 - June 21 2023 + * All Platforms + * Updated uBlock Origin to 1.50.0 + * Updated mullvad-browser-extension to version 0.8.3 + * Windows + macOS + Linux + * Bug 41577: Disable profile migration [tor-browser] + * Bug 41595: Disable pagethumbnails capturing [tor-browser] + * Bug 41609: Move the disabling of Firefox Home (Activity Stream) to base-browser [tor-browser] + * Bug 41668: Move part of the updater patches to base browser [tor-browser] + * Bug 41686: Move the 'Bug 11641: Disable remoting by default' commit from base-browser to tor-browser [tor-browser] + * Bug 41695: Port warning on maximized windows without letterboxing from torbutton [tor-browser] + * Bug 41701: Reporting an extension does not work [tor-browser] + * Bug 41711: Race condition when opening a new window in New Identity [tor-browser] + * Bug 41736: Customize the default CustomizableUI toolbar using CustomizableUI.jsm [tor-browser] + * Bug 41738: Replace the patch to disable live reload with its preference [tor-browser] + * Bug 41775: Avoid re-defining some macros in nsUpdateDriver.cpp [tor-browser] + * Windows + Linux + * Bug 41654: UpdateInfo jumped into Data [tor-browser] + * Linux + * Bug 40860: Improve the transition from the old fontconfig file to the new one [tor-browser-build] + * Bug 41163: Many bundled fonts are blocked in Ubuntu/Fedora because of RFP [tor-browser] + * Bug 41732: implement linux font whitelist as defense-in-depth [tor-browser] + * Build System + * All Platforms + * Bug 40837: Rebase mullvad-browser build changes onto main [tor-browser-build] + * Bug 40870: Remove url without browser name from tools/signing/download-unsigned-sha256sums-gpg-signatures-from-people-tpo [tor-browser-build] + * Windows + macOS + Linux + * Bug 40826: Correctly set appname_marfile for basebrowser in tools/signing/nightly/update-responses-base-config.yml [tor-browser-build] + * Bug 40866: Remove `Using ansible to set up a nightly build machine` from README [tor-browser-build] + * macOS + * Bug 40858: Create script to assist testers self sign Mac builds to allow running on Arm processors [tor-browser-build] ===================================== projects/browser/Bundle-Data/Docs-TBB/ChangeLog.txt ===================================== @@ -1,3 +1,239 @@ +Tor Browser 13.0a1 - July 20 2023 + * All Platforms + * Updated Translations + * Updated NoScript to 11.4.25 + * Updated OpenSSL to 3.0.9 + * Updated Go to 1.20.6 + * Updated tor to 0.4.8.2-alpha + * Bug 40577: Add "suggest url" in DDG onion's manifest [tor-browser] + * Bug 40885: Bump version of snowflake to v2.6.0 [tor-browser-build] + * Bug 40887: Update Webtunnel version to 38eb5505 [tor-browser-build] + * Bug 41092: Enable tracking query parameters stripping [tor-browser] + * Bug 41399: Update Mozilla's patch for Bug 1675054 to enable brotli encoding for HTTP onions as well [tor-browser] + * Bug 41759: Rebase Base Browser to 115 nightly [tor-browser] + * Bug 41796: Rebase Tor Browser to Firefox 115 [tor-browser] + * Windows + macOS + Linux + * Updated Firefox to 115.0.2esr + * Bug 26277: When "Safest" setting is enabled searching using duckduckgo should always use the Non-Javascript site for searches [tor-browser] + * Bug 33955: Selecting "Copy image" from menu leaks the source URL to the clipboard. This data is often dereferenced by other applications. [tor-browser] + * Bug 41741: Refactor the domain isolator and new circuit [tor-browser] + * Bug 41834: Hide "Can't Be Removed - learn more" menu line for uninstallable add-ons [tor-browser] + * Bug 41842: Remove the old removal logics from Torbutton [tor-browser] + * Bug 41845: Stop forcing (bad) pref values for non-PBM users [tor-browser] + * Bug 41854: Download Spam Protection cannot be overridden to allow legitimate downloads [tor-browser] + * Bug 41874: Visual & A11 regressions in add-on badges [tor-browser] + * Build System + * All Platforms + * Bug 40089: Clean up usage of get-moz-build-date script [tor-browser-build] + * Bug 40410: Get rid of python2 [tor-browser-build] + * Bug 40487: Bump Python version [tor-browser-build] + * Bug 40802: Drop the patch for making WASI reproducible [tor-browser-build] + * Bug 40854: Update to OpenSSL 3.0 [tor-browser-build] + * Bug 40855: Update toolchains for Mozilla 115 [tor-browser-build] + * Bug 40868: Bump Rust to 1.69.0 [tor-browser-build] + * Bug 40886: Update README with instructions for Arch linux [tor-browser-build] + * Bug 40889: Add mullvad sha256sums URL to tools/signing/download-unsigned-sha256sums-gpg-signatures-from-people-tpo [tor-browser-build] + * Bug 40894: Fix format of keyring/boklm.gpg [tor-browser-build] + * Bug 40898: Add doc from tor-browser-spec/processes/ReleaseProcess to gitlab issue templates [tor-browser-build] + * Windows + * Bug 40832: Unify mingw-w64-clang 32+64 bits [tor-browser-build] + * Linux + * Bug 40102: Move from Debian Jessie to Debian Stretch for our Linux builds [tor-browser-build] + +Tor Browser 12.5.1 - July 5 2023 + * All Platforms + * Updated Translations + * Updated NoScript to 11.4.24 + * Bug 41860: Rebase 12.5 stable to 102.13esr [tor-browser] + * Windows + macOS + Linux + * Updated Firefox to 102.13.0esr + * Bug 41854: Download Spam Protection cannot be overridden to allow legitimate downloads [tor-browser] + * Bug 41856: Onion service authorization prompt's key field does not get focus when clicked [tor-browser] + * Bug 41858: 'Learn more' link in onboarding links to 12.0 release notes and not 12.5 [tor-browser] + * Android + * Updated GeckoView to 102.13.0esr + +Tor Browser 12.5.0 - June 15 2023 + * All Platforms + * Updated Translations + * Bug 40353: Re-enable rlbox [tor-browser-build] + * Bug 40711: Review and expand the stakeholders we communicate major changes to [tor-browser-build] + * Bug 40810: Add Finnish (fi) language support [tor-browser-build] + * Bug 40817: Add basebrowser-incrementals-nightly makefile target [tor-browser-build] + * Bug 40833: base-browser nightly is using the default channel instead of nightly [tor-browser-build] + * Bug 40860: Improve the transition from the old fontconfig file to the new one [tor-browser-build] + * Bug 41066: Circuit Isolation should take containers into account [tor-browser] + * Bug 41351: Move the crypto protection patch earlier in the patchset [tor-browser] + * Bug 41428: Check if we can create our own directories for branding [tor-browser] + * Bug 41514: eslint broken since migrating torbutton [tor-browser] + * Bug 41568: Disable LaterRun [tor-browser] + * Bug 41599: about:networking#networkid should be normalized [tor-browser] + * Bug 41624: Disable unused about: pages [tor-browser] + * Bug 41635: Disable the Normandy component at compile time [tor-browser] + * Bug 41636: Disable back webextension.storage.sync after ensuring NoScript settings won't be lost [tor-browser] + * Bug 41647: Turn --enable-base-browser in --with-base-browser-version [tor-browser] + * Bug 41662: Disable about:sync-logs [tor-browser] + * Bug 41671: Turn media.peerconnection.ice.relay_only to true as defense in depth against WebRTC ICE leaks [tor-browser] + * Bug 41689: Remove startup.homepage_override_url from Base Browser [tor-browser] + * Bug 41704: Immediately return on remoteSettings.pollChanges [tor-browser] + * Bug 41738: Replace the patch to disable live reload with its preference [tor-browser] + * Bug 41763: TTP-02-003 WP1: Data URI allows JS execution despite safest security level (Low) [tor-browser] + * Bug 41775: Avoid re-defining some macros in nsUpdateDriver.cpp [tor-browser] + * Bug 41818: Remove YEC 2022 strings [tor-browser] + * Windows + macOS + Linux + * Bug 165: Fix maximization warning x button and preference [mullvad-browser] + * Bug 20497: Improve support for non-portable mode [tor-browser] + * Bug 33298: HTTP onion sites do not give a popup warning when submitting form data to non-onion HTTP sites [tor-browser] + * Bug 40144: about:privatebrowsing Firefox branding [tor-browser] + * Bug 40347: URL bar lock icon says connection is not secure when on "view-source:[...].onion" URLs [tor-browser] + * Bug 40552: New texts for the add a bridge manually modal [tor-browser] + * Bug 40701: Improve security warning when downloading a file [tor-browser] + * Bug 40733: Use the new branding directories [tor-browser-build] + * Bug 40745: Allow customizing MOZ_APP_BASENAME [tor-browser-build] + * Bug 40773: Copy some documentation files only on Tor Browser [tor-browser-build] + * Bug 40781: Move translations to new paths [tor-browser-build] + * Bug 40788: Tor Browser 11.0.4-11.0.6 phoning home [tor-browser] + * Bug 40808: Set update URL for nightly base-browser [tor-browser-build] + * Bug 40811: Make testing the updater easier [tor-browser-build] + * Bug 40958: The number of relays displayed for an onion site can be misleading [tor-browser] + * Bug 41038: Update "Click to Copy" button label in circuit display [tor-browser] + * Bug 41080: Some users are choosing an adjacent country for circumvention settings [tor-browser] + * Bug 41084: Reserve red as a button color for dangerous actions [tor-browser] + * Bug 41085: Refactor the UI to remove all bridges [tor-browser] + * Bug 41093: Users don't understand the purpose of bridge-moji [tor-browser] + * Bug 41109: "New circuit..." button gets cut-off when onion name wraps [tor-browser] + * Bug 41350: Move the implementation of Bug 19273 out of Torbutton [tor-browser] + * Bug 41363: Crypto warning popup is not screen reader accessible [tor-browser] + * Bug 41448: User 'danger' style for primary button in new identity modal [tor-browser] + * Bug 41483: Tor Browser says Firefox timed out, confusing users [tor-browser] + * Bug 41503: Disable restart in case of reboot and restore in case of crash [tor-browser] + * Bug 41521: Improve localization notes [tor-browser] + * Bug 41533: Page Info window for view-source:http://...onion addresses says Connection Not Encrypted [tor-browser] + * Bug 41540: Confusing build-id date in about:preferences in alphas [tor-browser] + * Bug 41562: API-triggered fullscreen after F11 causes letterboxing to crop the page [tor-browser] + * Bug 41577: Disable profile migration [tor-browser] + * Bug 41587: Disable the updater for Base Browser [tor-browser] + * Bug 41595: Disable pagethumbnails capturing [tor-browser] + * Bug 41600: Some users have difficulty finding the circuit display [tor-browser] + * Bug 41607: Update "New Circuit" icon [tor-browser] + * Bug 41608: Improve the UX of the location bar's connection status [tor-browser] + * Bug 41609: Move the disabling of Firefox Home (Activity Stream) to base-browser [tor-browser] + * Bug 41613: Skip Drang & Drop filtering for DNS-safe URLs (no hostname, e.g. RFC3966 tel:) [tor-browser] + * Bug 41617: Improve the UX of the built-in bridges dialog [tor-browser] + * Bug 41618: Update the iconography used in the status strip in connection settings [tor-browser] + * Bug 41623: Update connection assist's iconography [tor-browser] + * Bug 41633: Updating from 12.0.2 to 12.0.3 resets NoScript settings [tor-browser] + * Bug 41657: Remove --enable-tor-browser-data-outside-app-dir [tor-browser] + * Bug 41668: Move part of the updater patches to base browser [tor-browser] + * Bug 41686: Move the 'Bug 11641: Disable remoting by default' commit from base-browser to tor-browser [tor-browser] + * Bug 41695: Port warning on maximized windows without letterboxing from torbutton [tor-browser] + * Bug 41699: Tighten up the tor onion alias regular expression [tor-browser] + * Bug 41701: Reporting an extension does not work [tor-browser] + * Bug 41702: The connection pill needs to be centered vertically [tor-browser] + * Bug 41709: sendCommand should not try to send a command forever [tor-browser] + * Bug 41711: Race condition when opening a new window in New Identity [tor-browser] + * Bug 41718: Add the external filetype warning to about:downloads [tor-browser] + * Bug 41719: Update title and button strings in the new circuit display to sentence case [tor-browser] + * Bug 41725: Stray connectionPane.xhtml patch [tor-browser] + * Bug 41726: Animate the torconnect icon to transition between connected states [tor-browser] + * Bug 41734: Add a 'Connected' flag to indicate which built-in bridge option Tor Browser is currently using [tor-browser] + * Bug 41736: Customize the default CustomizableUI toolbar using CustomizableUI.jsm [tor-browser] + * Bug 41749: Replace the onion-glyph with dedicated icon for onion services [tor-browser] + * Bug 41770: Keyboard navigation broken leaving the toolbar tor circuit button [tor-browser] + * Bug 41775: Avoid re-defining some macros in nsUpdateDriver.cpp [tor-browser] + * Bug 41785: Network monitor in developer tools shows HTTP onion resources as insecure [tor-browser] + * Bug 41792: Drag and Drop protection prevents dragging downloads [tor-browser] + * Bug 41800: Add the external filetype warning to Library / Manage Bookmarks [tor-browser] + * Bug 41801: Fix handleProcessReady in TorSettings.init [tor-browser] + * Bug 41802: Bad regex used to extract transport from bridgeline [tor-browser] + * Bug 41810: Add "Connect" buttons to Request Bridge and Provide Bridge modals [tor-browser] + * Bug 41816: The top navigation in about:torconnect isn't updated correctly [tor-browser] + * Bug 41841: Use the new onion-site.svg icon in the onion-location pill [tor-browser] + * Windows + Linux + * Bug 40714: Ship NoScript in the distribution directory also for Windows and Linux [tor-browser-build] + * Bug 41654: UpdateInfo jumped into Data [tor-browser] + * Windows + * Bug 40772: Check and fix HiDPI issues in the NSIS installer [tor-browser-build] + * Bug 40793: Add some metadata also to the Windows installer [tor-browser-build] + * Bug 40801: Correct the ExecShell for system-wide installs in the NSIS script [tor-browser-build] + * Bug 41459: WebRTC fails to build under mingw [tor-browser] + * Bug 41678: WebRTC build fix patches incorrectly defining pid_t [tor-browser] + * Bug 41806: Prevent Private Browsing start menu item to be added automatically [tor-browser] + * macOS + * Bug 40719: Allow non-universal macOS builds also on base-browser [tor-browser-build] + * Bug 41535: Remove the old, unused and undocumented "-invisible" macOS CLI flag [tor-browser] + * Linux + * Bug 40830: The fontconfig directory is missing in Base Browser [tor-browser-build] + * Bug 41163: Many bundled fonts are blocked in Ubuntu/Fedora because of RFP [tor-browser] + * Bug 41732: implement linux font whitelist as defense-in-depth [tor-browser] + * Android + * Bug 41001: Remove remaining security slider code [tor-browser] + * Bug 41185: Hide learn more about sync [tor-browser] + * Bug 41634: Google Play incorrectly detects that libTor.so is built with OpenSSL 1.1.1b [tor-browser] + * Bug 41667: Enable media.peerconnection.ice.obfuscate_host_addresses on Android for defense-in-depth [tor-browser] + * Bug 41677: Remove the --disable-tor-browser-update flag on Android [tor-browser] + * Build System + * All Platforms + * Updated Go to 1.20.5 + * Bug 40673: Avoid building each go module separately [tor-browser-build] + * Bug 40679: Use the latest translations for nightly builds [tor-browser-build] + * Bug 40689: Update Ubuntu version from projects/mmdebstrap-image/config to 22.04.1 [tor-browser-build] + * Bug 40717: Create a script to prepare changelogs [tor-browser-build] + * Bug 40720: Update fetch-changelogs.py scripts to support new Build System label [tor-browser-build] + * Bug 40750: Find why rlbox hurts reproducibility [tor-browser-build] + * Bug 40751: make signtag-* needs to take project name into account [tor-browser-build] + * Bug 40753: We should not copy mar tools when the updater is disabled [tor-browser-build] + * Bug 40760: Add BSD packager contacts to release prep templates [tor-browser-build] + * Bug 40763: Add support for signing multiple browsers in tools/signing/nightly [tor-browser-build] + * Bug 40783: Update download-unsigned-sha256sums-gpg-signatures-from-people-tpo to use $projectname prefix directory [tor-browser-build] + * Bug 40784: Fix var_p/nightly_torbrowser_incremental_from after #40737 [tor-browser-build] + * Bug 40794: Include the build-id in firefox-l10n output name [tor-browser-build] + * Bug 40795: Trim down tor-browser-build release prep issue templates [tor-browser-build] + * Bug 40796: Bad UX for the changelogs script when using the issue number [tor-browser-build] + * Bug 40805: Define the version flag for all browsers [tor-browser-build] + * Bug 40807: Add config for signing base-browser nightly in tools/signing/nightly [tor-browser-build] + * Bug 40812: Make var/rezip in projects/firefox/config quiet [tor-browser-build] + * Bug 40818: Enable wasm target for rust compiler [tor-browser-build] + * Bug 40828: Use http://archive.debian.org/debian-archive/ for jessie [tor-browser-build] + * Bug 40837: Rebase mullvad-browser build changes onto main [tor-browser-build] + * Bug 40870: Remove url without browser name from tools/signing/download-unsigned-sha256sums-gpg-signatures-from-people-tpo [tor-browser-build] + * Bug 41649: Create rebase and security backport gitlab issue templates [tor-browser] + * Bug 41682: Add base-browser nightly mar signing key [tor-browser] + * Windows + macOS + Linux + * Bug 33953: Provide a way for easily updating Go dependencies of projects [tor-browser-build] + * Bug 40713: Use the new tor-browser l10n branch in Firefox [tor-browser-build] + * Bug 40777: Create a Go bootstrap project [tor-browser-build] + * Bug 40778: Disable all translations with testbuilds in Firefox [tor-browser-build] + * Bug 40788: Remove all languages but en-US for privacy-browser build target [tor-browser-build] + * Bug 40809: Remove --enable-tor-browser-update and --enable-verify-mar from projects/firefox/mozconfig [tor-browser-build] + * Bug 40813: Enable var/updater_enabled for basebrowser nightly [tor-browser-build] + * Bug 40823: Update appname_* variables in projects/release/update_responses_config.yml [tor-browser-build] + * Bug 40826: Correctly set appname_marfile for basebrowser in tools/signing/nightly/update-responses-base-config.yml [tor-browser-build] + * Bug 40827: MAR generation uses (mostly) hard-coded MAR update channel [tor-browser-build] + * Bug 40841: Adapt signing scripts to new signing machines [tor-browser-build] + * Bug 40849: Move Go dependencies to the projects dependent on them, not as a standalone projects [tor-browser-build] + * Bug 40866: Remove `Using ansible to set up a nightly build machine` from README [tor-browser-build] + * Bug 40869: obfs4 is renamed to lyrebird [tor-browser-build] + * Windows + * Bug 29185: NSIS Installer not reproducible when icon has an alpha channel [tor-browser-build] + * Bug 40757: Change projects/browser/windows-installer/torbrowser.nsi to a template file [tor-browser-build] + * Windows + macOS + Linux + * Bug 40732: Review Bundle-Data and try not to ship the default profile in base browser [tor-browser-build] + * Linux + Android + * Bug 40653: Build compiler-rt with runtimes instead of the main LLVM build [tor-browser-build] + * macOS + * Bug 40792: signing scripts missing project name prefix to make rule [tor-browser-build] + * Bug 40798: dmg2mar step also takes care of copying the signed+stabled dmg to the signed directory [tor-browser-build] + * Bug 40806: Update the reference to the macOS mozconfig [tor-browser-build] + * Bug 40824: dmg2mar script using hardcoded project names for paths [tor-browser-build] + * Bug 40847: Build filesystem influences the DMG creation [tor-browser-build] + * Bug 40858: Create script to assist testers self sign Mac builds to allow running on Arm processors [tor-browser-build] + * Bug 41453: Rename mozconfig-macos-x86_64 to mozconfig-macos [tor-browser] + * Android + * Bug 40738: Update Android git hashes templates [tor-browser-build] + * Bug 40874: Add commit information also to GV [tor-browser-build] + * Bug 41684: Android improvements for local dev builds [tor-browser] + Tor Browser 12.5a7 - June 08 2023 * All Platforms * Updated Translations ===================================== projects/browser/config ===================================== @@ -103,16 +103,16 @@ input_files: enable: '[% ! c("var/android") %]' - filename: Bundle-Data enable: '[% ! c("var/android") %]' - - URL: https://addons.mozilla.org/firefox/downloads/file/4111078/noscript-11.4.22.… + - URL: https://addons.mozilla.org/firefox/downloads/file/4136347/noscript-11.4.25.… name: noscript - sha256sum: 46a84c85df4c6be11905388ad2b66aeb5a010ed615484112c8c1710ad13bc36e - - URL: https://addons.mozilla.org/firefox/downloads/file/4103048/ublock_origin-1.4… + sha256sum: 36b44a4af8b57188db230c29284dd64626611ee6b46fbf8ef3e352317fbf55aa + - URL: https://addons.mozilla.org/firefox/downloads/file/4121906/ublock_origin-1.5… name: ublock-origin - sha256sum: 39266486f720cd31d291d2fdad78625b079782a05517e1936eec7e780bc2a84d + sha256sum: 10618003e70b528c3f17996e373146d39e6b15f777ac4ca1f214da2ffdb7a5b3 enable: '[% c("var/mullvad-browser") %]' - - URL: https://github.com/mullvad/browser-extension/releases/download/v0.7.9-firef… + - URL: https://github.com/mullvad/browser-extension/releases/download/v0.8.3-firef… name: mullvad-extension - sha256sum: 17ce31b32e8be0f0db86a5a5ed93607cc84d5e2092341aee0b8eaba1c0746390 + sha256sum: e531ce6e809091eb40848874ea9e695bce61196397b6d8238ab582a152e02ac7 enable: '[% c("var/mullvad-browser") %]' - filename: 'gtk3-settings.ini' enable: '[% c("var/linux") %]' ===================================== projects/firefox/config ===================================== @@ -15,7 +15,7 @@ var: firefox_version: '[% c("var/firefox_platform_version") %]esr' browser_series: '13.0' browser_branch: '[% c("var/browser_series") %]-1' - browser_build: 1 + browser_build: 3 branding_directory_prefix: 'tb' copyright_year: '[% exec("git show -s --format=%ci").remove("-.*") %]' nightly_updates_publish_dir: '[% c("var/nightly_updates_publish_dir_prefix") %]nightly-[% c("var/osname") %]' @@ -84,7 +84,7 @@ targets: git_url: https://gitlab.torproject.org/tpo/applications/mullvad-browser.git var: branding_directory_prefix: 'mb' - browser_build: 1 + browser_build: 2 gitlab_project: https://gitlab.torproject.org/tpo/applications/mullvad-browser linux-x86_64: ===================================== projects/go/config ===================================== @@ -1,5 +1,5 @@ # vim: filetype=yaml sw=2 -version: 1.20.5 +version: 1.20.6 filename: '[% project %]-[% c("version") %]-[% c("var/osname") %]-[% c("var/build_id") %].tar.gz' container: use_container: 1 @@ -119,7 +119,7 @@ input_files: enable: '[% ! c("var/linux") %]' - URL: 'https://golang.org/dl/go[% c("version") %].src.tar.gz' name: go - sha256sum: 9a15c133ba2cfafe79652f4815b62e7cfc267f68df1b9454c6ab2a3ca8b96a88 + sha256sum: 62ee5bc6fb55b8bae8f705e0cb8df86d6453626b4ecf93279e2867092e0b7f70 - project: go-bootstrap name: go-bootstrap target_replace: ===================================== projects/manual/config ===================================== @@ -1,7 +1,7 @@ # vim: filetype=yaml sw=2 # To update, see doc/how-to-update-the-manual.txt # Remember to update also the package's hash, with the version! -version: 79869 +version: 88998 filename: 'manual-[% c("version") %]-[% c("var/build_id") %].tar.gz' container: use_container: 1 @@ -17,8 +17,8 @@ var: input_files: - project: container-image - - URL: 'https://people.torproject.org/~pierov/tbb_files/manual_[% c("version") %].zip' + - URL: 'https://people.torproject.org/~richard/tbb_files/manual_[% c("version") %].zip' name: manual - sha256sum: ee4c6e4ce4998736ae44dc3e6f92875a481b9e03860517764ea9af6c2bba24e0 + sha256sum: 1be6cf35a3c9f243998b7611e9531d4a99591cc257cb55f3924f504b9ead71a7 - filename: packagemanual.py name: package_script ===================================== projects/openssl/config ===================================== @@ -1,5 +1,5 @@ # vim: filetype=yaml sw=2 -version: 3.0.8 +version: 3.0.9 filename: '[% project %]-[% c("version") %]-[% c("var/osname") %]-[% c("var/build_id") %].tar.gz' container: use_container: 1 @@ -33,4 +33,4 @@ input_files: - name: '[% c("var/compiler") %]' project: '[% c("var/compiler") %]' - URL: 'https://www.openssl.org/source/openssl-[% c("version") %].tar.gz' - sha256sum: 6c13d2bf38fdf31eac3ce2a347073673f5d63263398f1f69d0df4a41253e4b3e + sha256sum: eb1ab04781474360f77c318ab89d8c5a03abc38e63d65a603cabbf1b00a1dc90 ===================================== projects/tor/config ===================================== @@ -1,6 +1,6 @@ # vim: filetype=yaml sw=2 filename: '[% project %]-[% c("version") %]-[% c("var/osname") %]-[% c("var/build_id") %].tar.gz' -version: 0.4.7.13 +version: 0.4.8.2-alpha git_hash: 'tor-[% c("version") %]' git_url: https://gitlab.torproject.org/tpo/core/tor.git git_submodule: 1 ===================================== projects/translation/config ===================================== @@ -6,19 +6,19 @@ version: '[% c("abbrev") %]' steps: base-browser: base-browser: '[% INCLUDE build %]' - git_hash: 0a429fd14e8ebe9edcdbaac933c86b4bac8fcb19 + git_hash: 060d9d04b3a4c3e0f09f3f5fa8ad3ab12e2f4e80 targets: nightly: git_hash: 'base-browser' base-browser-fluent: base-browser-fluent: '[% INCLUDE build %]' - git_hash: c68657f80050975474903f170250e2888c2a1fea + git_hash: 6f64004400616a5956d1823a0e8176b60d212090 targets: nightly: git_hash: 'basebrowser-newidentityftl' tor-browser: tor-browser: '[% INCLUDE build %]' - git_hash: 0cd2ac8d14ce4acd8c9781376a9fdcb9c8323b91 + git_hash: d8d2b8f3200aa309f44f2fa80625ff8e6a25bb78 targets: nightly: git_hash: 'tor-browser' @@ -26,7 +26,7 @@ steps: fenix: '[% INCLUDE build %]' # We need to bump the commit before releasing but just pointing to a branch # might cause too much rebuidling of the Firefox part. - git_hash: 1b094bdfaa444d31f06fe7c0261de89ae67083cc + git_hash: e037147c72348192ddd38c2a21712c65031b912c targets: nightly: git_hash: 'fenix-torbrowserstringsxml' View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/commit/9… -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/commit/9… You're receiving this email because of your account on gitlab.torproject.org.
1 0
0 0
[Git][tpo/applications/tor-browser] Pushed new tag base-browser-115.0.2esr-13.0-1-build2
by richard (@richard) 21 Jul '23

21 Jul '23
richard pushed new tag base-browser-115.0.2esr-13.0-1-build2 at The Tor Project / Applications / Tor Browser -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/tree/base-brow… You're receiving this email because of your account on gitlab.torproject.org.
1 0
0 0
[Git][tpo/applications/tor-browser] Pushed new tag tor-browser-115.0.2esr-13.0-1-build3
by richard (@richard) 21 Jul '23

21 Jul '23
richard pushed new tag tor-browser-115.0.2esr-13.0-1-build3 at The Tor Project / Applications / Tor Browser -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/tree/tor-brows… You're receiving this email because of your account on gitlab.torproject.org.
1 0
0 0
[Git][tpo/applications/tor-browser][tor-browser-115.0.2esr-13.0-1] Revert "fixup! Bug 40562: Added Tor Browser preferences to 000-tor-browser.js"
by richard (@richard) 21 Jul '23

21 Jul '23
richard pushed to branch tor-browser-115.0.2esr-13.0-1 at The Tor Project / Applications / Tor Browser Commits: 93ef5b2d by Richard Pospesel at 2023-07-21T16:49:26+00:00 Revert "fixup! Bug 40562: Added Tor Browser preferences to 000-tor-browser.js" This reverts commit da33ad3bc03cc015d404b6907978a82585518259. - - - - - 1 changed file: - browser/app/profile/000-tor-browser.js Changes: ===================================== browser/app/profile/000-tor-browser.js ===================================== @@ -74,23 +74,28 @@ pref("extensions.torlauncher.quickstart", false); pref("extensions.torlauncher.max_tor_log_entries", 1000); -// On Linux and macOS, Tor Browser can use IPC for the communication with the -// tor daemon, and this is the preferred way. -// You can set the path of the Unix sockets with control_ipc_path. -// If a relative one is provided, it is handled like torrc_path (see below). -// Tor Browser on Windows will use TCP (and it can be used also on Linux and -// macOS, if preferred). -// Host and port can be customized with control_host and control_port. -// This applies both to the control port and to the SOCKS port, but their -// configurations are completely independent. -pref("extensions.torlauncher.control_port_use_ipc", true); -pref("extensions.torlauncher.control_ipc_path", ""); +// By default, Tor Launcher configures a TCP listener for the Tor +// control port, as defined by control_host and control_port. +// Set control_port_use_ipc to true to use an IPC object (e.g., a Unix +// domain socket) instead. You may also modify control_ipc_path to +// override the default IPC object location. If a relative path is used, +// it is handled like torrc_path (see below). pref("extensions.torlauncher.control_host", "127.0.0.1"); pref("extensions.torlauncher.control_port", 9151); -pref("extensions.torlauncher.socks_port_use_ipc", true); -pref("extensions.torlauncher.socks_ipc_path", ""); +pref("extensions.torlauncher.control_port_use_ipc", false); +pref("extensions.torlauncher.control_ipc_path", ""); + +// By default, Tor Launcher configures a TCP listener for the Tor +// SOCKS port. The host is taken from the network.proxy.socks pref and +// the port is taken from the network.proxy.socks_port pref. +// Set socks_port_use_ipc to true to use an IPC object (e.g., a Unix +// domain socket) instead. You may also modify socks_ipc_path to +// override the default IPC object location. If a relative path is used, +// it is handled like torrc_path (see below). // Modify socks_port_flags to use a different set of SocksPort flags (but be // careful). +pref("extensions.torlauncher.socks_port_use_ipc", false); +pref("extensions.torlauncher.socks_ipc_path", ""); pref("extensions.torlauncher.socks_port_flags", "ExtendedErrors IPv6Traffic PreferIPv6 KeepAliveIsolateSOCKSAuth"); // The tor_path is relative to the application directory. On Linux and View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/93ef5b2… -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/93ef5b2… You're receiving this email because of your account on gitlab.torproject.org.
1 0
0 0
[Git][tpo/applications/tor-browser][base-browser-115.0.2esr-13.0-1] fixup! Firefox preference overrides.
by richard (@richard) 21 Jul '23

21 Jul '23
richard pushed to branch base-browser-115.0.2esr-13.0-1 at The Tor Project / Applications / Tor Browser Commits: f3faeb09 by Pier Angelo Vendrame at 2023-07-21T16:41:53+00:00 fixup! Firefox preference overrides. Bug 41806: Prevent Private Browsing start menu item to be automatically added. - - - - - 1 changed file: - browser/app/profile/001-base-profile.js Changes: ===================================== browser/app/profile/001-base-profile.js ===================================== @@ -521,6 +521,10 @@ pref("browser.taskbar.lists.frequent.enabled", false); pref("browser.taskbar.lists.tasks.enabled", false); pref("browser.taskbar.lists.recent.enabled", false); +// tor-browser#41806: Prevent the browser from adding a new Private Browsing +// start menu item automatically +pref("browser.privacySegmentation.createdShortcut", true); + // Do not re-open the browser automatically after reboots when "Restart apps" is // enabled (tor-browser#41503) pref("toolkit.winRegisterApplicationRestart", false); View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/f3faeb0… -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/f3faeb0… You're receiving this email because of your account on gitlab.torproject.org.
1 0
0 0
[Git][tpo/applications/tor-browser][tor-browser-115.0.2esr-13.0-1] fixup! Firefox preference overrides.
by richard (@richard) 21 Jul '23

21 Jul '23
richard pushed to branch tor-browser-115.0.2esr-13.0-1 at The Tor Project / Applications / Tor Browser Commits: 024598ab by Pier Angelo Vendrame at 2023-07-21T16:10:37+02:00 fixup! Firefox preference overrides. Bug 41806: Prevent Private Browsing start menu item to be automatically added. - - - - - 1 changed file: - browser/app/profile/001-base-profile.js Changes: ===================================== browser/app/profile/001-base-profile.js ===================================== @@ -521,6 +521,10 @@ pref("browser.taskbar.lists.frequent.enabled", false); pref("browser.taskbar.lists.tasks.enabled", false); pref("browser.taskbar.lists.recent.enabled", false); +// tor-browser#41806: Prevent the browser from adding a new Private Browsing +// start menu item automatically +pref("browser.privacySegmentation.createdShortcut", true); + // Do not re-open the browser automatically after reboots when "Restart apps" is // enabled (tor-browser#41503) pref("toolkit.winRegisterApplicationRestart", false); View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/024598a… -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/024598a… You're receiving this email because of your account on gitlab.torproject.org.
1 0
0 0
[Git][tpo/applications/tor-browser] Pushed new tag tor-browser-115.0.2esr-13.0-1-build2
by richard (@richard) 20 Jul '23

20 Jul '23
richard pushed new tag tor-browser-115.0.2esr-13.0-1-build2 at The Tor Project / Applications / Tor Browser -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/tree/tor-brows… You're receiving this email because of your account on gitlab.torproject.org.
1 0
0 0
[Git][tpo/applications/tor-browser][tor-browser-115.0.2esr-13.0-1] fixup! Bug 40562: Added Tor Browser preferences to 000-tor-browser.js
by richard (@richard) 20 Jul '23

20 Jul '23
richard pushed to branch tor-browser-115.0.2esr-13.0-1 at The Tor Project / Applications / Tor Browser Commits: da33ad3b by Pier Angelo Vendrame at 2023-07-20T19:22:00+02:00 fixup! Bug 40562: Added Tor Browser preferences to 000-tor-browser.js Bug 41872: Use IPC by default on Linux and macOS. The preference is flipped also for Windows, but it is actually ignored. - - - - - 1 changed file: - browser/app/profile/000-tor-browser.js Changes: ===================================== browser/app/profile/000-tor-browser.js ===================================== @@ -74,28 +74,23 @@ pref("extensions.torlauncher.quickstart", false); pref("extensions.torlauncher.max_tor_log_entries", 1000); -// By default, Tor Launcher configures a TCP listener for the Tor -// control port, as defined by control_host and control_port. -// Set control_port_use_ipc to true to use an IPC object (e.g., a Unix -// domain socket) instead. You may also modify control_ipc_path to -// override the default IPC object location. If a relative path is used, -// it is handled like torrc_path (see below). +// On Linux and macOS, Tor Browser can use IPC for the communication with the +// tor daemon, and this is the preferred way. +// You can set the path of the Unix sockets with control_ipc_path. +// If a relative one is provided, it is handled like torrc_path (see below). +// Tor Browser on Windows will use TCP (and it can be used also on Linux and +// macOS, if preferred). +// Host and port can be customized with control_host and control_port. +// This applies both to the control port and to the SOCKS port, but their +// configurations are completely independent. +pref("extensions.torlauncher.control_port_use_ipc", true); +pref("extensions.torlauncher.control_ipc_path", ""); pref("extensions.torlauncher.control_host", "127.0.0.1"); pref("extensions.torlauncher.control_port", 9151); -pref("extensions.torlauncher.control_port_use_ipc", false); -pref("extensions.torlauncher.control_ipc_path", ""); - -// By default, Tor Launcher configures a TCP listener for the Tor -// SOCKS port. The host is taken from the network.proxy.socks pref and -// the port is taken from the network.proxy.socks_port pref. -// Set socks_port_use_ipc to true to use an IPC object (e.g., a Unix -// domain socket) instead. You may also modify socks_ipc_path to -// override the default IPC object location. If a relative path is used, -// it is handled like torrc_path (see below). +pref("extensions.torlauncher.socks_port_use_ipc", true); +pref("extensions.torlauncher.socks_ipc_path", ""); // Modify socks_port_flags to use a different set of SocksPort flags (but be // careful). -pref("extensions.torlauncher.socks_port_use_ipc", false); -pref("extensions.torlauncher.socks_ipc_path", ""); pref("extensions.torlauncher.socks_port_flags", "ExtendedErrors IPv6Traffic PreferIPv6 KeepAliveIsolateSOCKSAuth"); // The tor_path is relative to the application directory. On Linux and View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/da33ad3… -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/da33ad3… You're receiving this email because of your account on gitlab.torproject.org.
1 0
0 0
[Git][tpo/applications/tor-browser-build][main] 7 commits: Bug 40854: Upgrade to OpenSSL 3
by Pier Angelo Vendrame (@pierov) 20 Jul '23

20 Jul '23
Pier Angelo Vendrame pushed to branch main at The Tor Project / Applications / tor-browser-build Commits: 85031e91 by Pier Angelo Vendrame at 2023-07-14T15:31:43+02:00 Bug 40854: Upgrade to OpenSSL 3 - - - - - b096b32e by Pier Angelo Vendrame at 2023-07-14T15:31:44+02:00 Bug 40487: Bump Python version to 3.11.3 Debian Stretch's Python version is still too old for some of the projects we need to build under it. So, since we needed to review the Python options we use anyway, we decided also to update it to a much more recent version. - - - - - 30db5fad by Pier Angelo Vendrame at 2023-07-14T15:31:44+02:00 Bug 40410: Get rid of python2 - - - - - 34d9e212 by Pier Angelo Vendrame at 2023-07-14T15:31:44+02:00 Bug 40802: Update the wasi-sdk and remove the patch to make it reproducible. We already uplifted the patch, and the new version includes it. - - - - - 4df7d971 by Pier Angelo Vendrame at 2023-07-20T14:05:54+02:00 Bug 40855: Update toolchains for Firefox 115 (common part) Toolchain updates needed for all platforms. Bug 31588 (partially): Create cargo vendor archives locally for cbindgen. The Rust crates we use provide a Cargo.lock. That should be enough to make sure they always use a certain version of a dependency. Therefore, with 115, we could try stop hosting vendor archives on people.tpo and build them locally. In this commit we do that for cbindgen. In next commit we could try to do so for also other projects. - - - - - 028d15c6 by Pier Angelo Vendrame at 2023-07-20T14:05:56+02:00 Bug 40855: Update toolchains for Firefox 115 (Windows part) Windows-only toolchain updates. Also, bug 40832: Unify mingw-w64-clang 32+64 bits The clang binaries used in the mingw-w64-clang artifacts were exactly the same, because Clang allows you to set the target at runtime with CLI options, contrarily to GCC, that allows you to set them at build time. Also, i686 and x86_64 parts that differ have different paths, so they can live in the same mingw-w64 installation. This allows us to save both time, and space on the out directory, since we can safely use only one archive for both platforms. Also, partially bug 40652: drop dependency on libssp. Libssp is not necessary anymore for _FORTIFY_SOURCE. So, we match llvm-mingw, and replace it with empty archives. In the future, we should stop creating these archives, too, when the compiler users stop including it during linking. - - - - - 838f290f by Pier Angelo Vendrame at 2023-07-20T14:05:56+02:00 Bug 40855: Update toolchains for Firefox 115 (macOS part) macOS-only toolchain updates. With this update, we stop downloading the macOS SDK from people.tpo. Instead, we download it from apple.com and we use the same scripts as Mozilla to extract it. We took them from Firefox source tree, and slightly adapted to our build system/containers/needs. Also, we try to be more similar to Mozilla in compiling LLVM runtimes. - - - - - 30 changed files: - Makefile - keyring/python.gpg - projects/browser/build - projects/browser/config - projects/browser/verify_allowed_addons.py - projects/cbindgen/build - projects/cbindgen/config - projects/clang/build - projects/clang/config - + projects/clang/use-fixed-chunk-size-for-uuid.patch - projects/cmake/config - projects/firefox/build - projects/firefox/config - projects/firefox/list_toolchain_updates_checks - projects/fxc2/config - projects/llvm-project/config - projects/macosx-toolchain/build - − projects/macosx-toolchain/compiler-rt-cross-compile.patch - − projects/macosx-toolchain/compiler-rt-no-codesign.patch - projects/macosx-toolchain/config - + projects/macosx-toolchain/macpkg.py - + projects/macosx-toolchain/mozbuild_util.py - + projects/macosx-toolchain/tools.diff - + projects/macosx-toolchain/unpack-sdk.py - projects/mingw-w64-clang/build - projects/mingw-w64-clang/config - − projects/mingw-w64-clang/libssp-Makefile - + projects/mingw-w64-clang/mingw-composition.patch - + projects/mingw-w64-clang/mingw-dispatchqueue.patch - projects/mingw-w64-clang/mingw-dwrite_3.patch The diff was not included because it is too large. View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/compare/… -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/compare/… You're receiving this email because of your account on gitlab.torproject.org.
1 0
0 0
[Git][tpo/applications/tor-browser][tor-browser-115.0.2esr-13.0-1] fixup! Base Browser's .mozconfigs.
by Pier Angelo Vendrame (@pierov) 20 Jul '23

20 Jul '23
Pier Angelo Vendrame pushed to branch tor-browser-115.0.2esr-13.0-1 at The Tor Project / Applications / Tor Browser Commits: d23c9e12 by Pier Angelo Vendrame at 2023-07-20T14:43:16+02:00 fixup! Base Browser's .mozconfigs. Bug 41890: Let tor-browser-build set the update channel it prefers. Forgot to update the mozconfig-android-all in the previous commit. - - - - - 1 changed file: - mozconfig-android-all Changes: ===================================== mozconfig-android-all ===================================== @@ -11,10 +11,6 @@ if test -n "$LOCAL_DEV_BUILD"; then ac_add_options --enable-update-channel=default ac_add_options --without-wasm-sandboxed-libraries ac_add_options --with-base-browser-version=dev-build -else - # We want to have a similar fat .aar versioning as Mozilla and make it clear - # we are on the beta channel for GeckoView - ac_add_options --enable-update-channel=beta fi ac_add_options --with-java-bin-path=$JAVA_HOME/bin View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/d23c9e1… -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/d23c9e1… You're receiving this email because of your account on gitlab.torproject.org.
1 0
0 0
  • ← Newer
  • 1
  • ...
  • 394
  • 395
  • 396
  • 397
  • 398
  • 399
  • 400
  • ...
  • 1873
  • Older →

HyperKitty Powered by HyperKitty version 1.3.12.