lists.torproject.org
Sign In Sign Up
Manage this list Sign In Sign Up

Keyboard Shortcuts

Thread View

  • j: Next unread message
  • k: Previous unread message
  • j a: Jump to all threads
  • j l: Jump to MailingList overview

tbb-commits

Thread Start a new thread
Threads by month
  • ----- 2025 -----
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2024 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2023 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2022 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2021 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2020 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2019 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2018 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2017 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2016 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2015 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2014 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
tbb-commits@lists.torproject.org

  • 1 participants
  • 18805 discussions
[Git][tpo/applications/tor-browser-build][main] Bug 40724: Prepare alpha release 12.5a3
by Richard Pospesel (@richard) 17 Feb '23

17 Feb '23
Richard Pospesel pushed to branch main at The Tor Project / Applications / tor-browser-build Commits: df53997e by Richard Pospesel at 2023-02-16T19:40:32+00:00 Bug 40724: Prepare alpha release 12.5a3 - - - - - 11 changed files: - projects/browser/Bundle-Data/Docs-TBB/ChangeLog.txt - projects/browser/allowed_addons.json - projects/browser/config - projects/fenix/config - projects/firefox/config - projects/geckoview/config - projects/go/config - projects/manual/config - projects/openssl/config - projects/translation/config - rbm.conf Changes: ===================================== projects/browser/Bundle-Data/Docs-TBB/ChangeLog.txt ===================================== @@ -1,3 +1,112 @@ +Tor Browser 12.5a3 - February 16 2023 + * All Platforms + * Updated Translations + * Updated OpenSSL to 1.1.1t + * Updated NoScript to 11.4.16 + * Bug 40763: Stop using remote localized files in CFR [tor-browser] + * Bug 41351: Move the crypto protection patch earlier in the patchset [tor-browser] + * Bug 41361: Integrate the Conjure PT into alpha versions of Tor Browser [tor-browser] + * Bug 41424: Reduce disk activity by disabling some unnecessary tasks and telemetry [tor-browser] + * Bug 41565: Gate Telemetry Tasks behind AppConstants.MOZ_TELEMETRY_REPORTING [tor-browser] + * Bug 41568: Disable LaterRun [tor-browser] + * Bug 41598: Prevent NoScript from being removed / disabled until core functionality has been migrated to Tor Browser [tor-browser] + * Bug 41601: Apply Snowflake Remove HelloVerify Countermeasure [tor-browser] + * Bug 41603: Customize the creation of MOZ_SOURCE_URL [tor-browser] + * Bug 41624: Disable unused about: pages [tor-browser] + * Bug 41627: Enable network.http.referer.hideOnionSource in base-browser [tor-browser] + * Bug 41637: cherry-pick Mozilla 1814416: Generalize the app name in about:buildconfig. r=ahochheiden [tor-browser] + * Windows + macOS + Linux + * Updated Firefox to 102.8esr + * Bug 20497: Improve support for non-portable mode [tor-browser] + * Bug 40745: Allow customizing MOZ_APP_BASENAME [tor-browser-build] + * Bug 40773: Copy some documentation files only on Tor Browser [tor-browser-build] + * Bug 40781: Move translations to new paths [tor-browser-build] + * Bug 41080: Some users are choosing an adjacent country for circumvention settings [tor-browser] + * Bug 41084: Reserve red as a button color for dangerous actions [tor-browser] + * Bug 41540: Confusing build-id date in about:preferences in alphas [tor-browser] + * Bug 41542: Disable the creation of a default profile [tor-browser] + * Bug 41561: Maximize warning is broken (regression) [tor-browser] + * Bug 41577: Disable profile migration [tor-browser] + * Bug 41587: Disable the updater for Base Browser [tor-browser] + * Bug 41588: Use better words for the Tor Network description in the onboarding [tor-browser] + * Bug 41595: Disable pagethumbnails capturing [tor-browser] + * Bug 41606: Move the changes to the hamburger menu out of the Torbutton commit [tor-browser] + * Bug 41609: Move the disabling of Firefox Home (Activity Stream) to base-browser [tor-browser] + * Bug 41613: Skip Drang & Drop filtering for DNS-safe URLs (no hostname, e.g. RFC3966 tel:) [tor-browser] + * Bug 41626: Bridge-emojii tooltips not localized in ES locale [tor-browser] + * Bug 41633: Updating from 12.0.2 to 12.0.3 resets NoScript settings [tor-browser] + * Windows + * Bug 40717: UX: hide SSO [tor-browser] + * Bug 40772: Check and fix HiDPI issues in the NSIS installer [tor-browser-build] + * Android + * Updated GeckoView to 102.8esr + * Bug 40283: Can't upload files with Tor browser on Android [tor-browser] + * Bug 40536: Proxy Refused if link from other app opens Android TBB [tor-browser] + * Bug 41185: Hide learn more about sync [tor-browser] + * Bug 41616: Backport Android-specific security fixes from Firefox 110 to ESR 102.8-based Tor Browser [tor-browser] + * Bug 41634: Google Play incorrectly detects that libTor.so is built with OpenSSL 1.1.1b [tor-browser] + * Build System + * All Platforms + * Updated Go to 1.19.6 + * Bug 40723: Update upload-update_responses-to-staticiforme step for new tor-browser-update-responses repository [tor-browser-build] + * Bug 40747: Remove empty line at the top of sha256sums-unsigned-build.txt [tor-browser-build] + * Bug 40748: When sha256sums-unsigned-build.txt contains an empty line, tools/dmg2mar prints a warning [tor-browser-build] + * Bug 40751: make signtag-* needs to take project name into account [tor-browser-build] + * Bug 40753: We should not copy mar tools when the updater is disabled [tor-browser-build] + * Bug 40760: Add BSD packager contacts to release prep templates [tor-browser-build] + * Bug 40764: Embed repo URL and git revision in Firefox [tor-browser-build] + * Bug 40782: Update tools/signing/download-unsigned-sha256sums-gpg-signatures-from-people-tpo to fetch from tb-build-04 and tb-build-05 [tor-browser-build] + * Bug 40783: Update download-unsigned-sha256sums-gpg-signatures-from-people-tpo to use $projectname prefix directory [tor-browser-build] + * Bug 40784: Fix var_p/nightly_torbrowser_incremental_from after #40737 [tor-browser-build] + * Windows + macOS + Linux + * Bug 40778: Disable all translations with testbuilds in Firefox [tor-browser-build] + * Windows + * Bug 29185: NSIS Installer not reproducible when icon has an alpha channel [tor-browser-build] + * Bug 40757: Change projects/browser/windows-installer/torbrowser.nsi to a template file [tor-browser-build] + * macOS + * Bug 40755: libdmg-hfsplus fails to build on debian stable [tor-browser-build] + * Linux + * Bug 40731: Update namecoin patches to apply in tor-browser nightly [tor-browser-build] + * Android + * Bug 40752: Wrong urls in download-android-*.json files [tor-browser-build] + +Tor Browser 12.0.3 - February 13 2023 + * All Platforms + * Updated Translations + * Updated OpenSSL to 1.1.1t + * Updated NoScript to 11.4.16 + * Bug 40763: Stop using remote localized files in CFR [tor-browser] + * Bug 41424: Reduce disk activity by disabling some unnecessary tasks and telemetry [tor-browser] + * Bug 41565: Gate Telemetry Tasks behind AppConstants.MOZ_TELEMETRY_REPORTING [tor-browser] + * Bug 41601: Apply Snowflake Remove HelloVerify Countermeasure [tor-browser] + * Windows + macOS + Linux + * Updated Firefox to 102.8esr + * Bug 32274: Bad screen-reader UX for Security Level/Shield button [tor-browser] + * Bug 41066: Circuit Isolation should take containers into account [tor-browser] + * Bug 41561: Maximize warning is broken (regression) [tor-browser] + * Bug 41572: Check for userContextId also in the circuit display [tor-browser] + * Bug 41588: Use better words for the Tor Network description in the onboarding [tor-browser] + * Windows + * Bug 40717: UX: hide SSO [tor-browser] + * Bug 41578: Disable and lock Windows SSO [tor-browser] + * macOS + * Bug 28124: Show Tor Browser icon as macOS volume (dmg) icon [tor-browser-build] + * Android + * Updated GeckoView to 102.8esr + * Bug 40283: Can't upload files with Tor browser on Android [tor-browser] + * Bug 40536: Proxy Refused if link from other app opens Android TBB [tor-browser] + * Bug 41616: Backport Android-specific security fixes from Firefox 110 to ESR 102.8-based Tor Browser [tor-browser] + * Build System + * All Platforms + * Bug 40723: Update upload-update_responses-to-staticiforme step for new tor-browser-update-responses repository [tor-browser-build] + * Bug 40747: Remove empty line at the top of sha256sums-unsigned-build.txt [tor-browser-build] + * Bug 40748: When sha256sums-unsigned-build.txt contains an empty line, tools/dmg2mar prints a warning [tor-browser-build] + * macOS + * Bug 40744: HFS DMG are not deterministic [tor-browser-build] + * Bug 40755: libdmg-hfsplus fails to build on debian stable [tor-browser-build] + * Android + * Bug 40752: Wrong urls in download-android-*.json files [tor-browser-build] + Tor Browser 12.5a2 - January 22 2023 * All Platforms * Updated tor to 0.4.7.13 ===================================== projects/browser/allowed_addons.json ===================================== @@ -17,7 +17,7 @@ "picture_url": "https://addons.mozilla.org/user-media/userpics/34/9734/13299734/13299734.pn…" } ], - "average_daily_users": 941192, + "average_daily_users": 969882, "categories": { "android": [ "experimental", @@ -55,7 +55,7 @@ "release_notes": { "en-US": "- Fixed a edge case with extracting color numbers, it's now able to extract `rgb(0 0 0/0.04)`.\n- Improved IPv6 check.\n- Faster UI loading.\n- Users' fixes for websites." }, - "reviewed": null, + "reviewed": "2023-01-09T12:25:16Z", "version": "4.9.62", "files": [ { @@ -220,10 +220,10 @@ "category": "recommended" }, "ratings": { - "average": 4.5565, - "bayesian_average": 4.555296389469589, - "count": 4800, - "text_count": 1532 + "average": 4.5586, + "bayesian_average": 4.557409514018636, + "count": 4859, + "text_count": 1543 }, "ratings_url": "https://addons.mozilla.org/en-US/firefox/addon/darkreader/reviews/", "requires_payment": false, @@ -320,7 +320,7 @@ "type": "extension", "url": "https://addons.mozilla.org/en-US/firefox/addon/darkreader/", "versions_url": "https://addons.mozilla.org/en-US/firefox/addon/darkreader/versions/", - "weekly_downloads": 26559 + "weekly_downloads": 28911 }, "notes": null }, @@ -336,7 +336,7 @@ "picture_url": "https://addons.mozilla.org/user-media/userpics/56/7656/6937656/6937656.png?…" } ], - "average_daily_users": 260254, + "average_daily_users": 265173, "categories": { "android": [ "security-privacy" @@ -372,7 +372,7 @@ "release_notes": { "en-US": "<i>New languages:</i>\n\n- Added support for the Vietnamese language.\n\n<i>Enhancements:</i>\n\n- Improved popup panel display logic.\n\n<i>Bugfixes:</i>\n\n- Restored support for older versions of Firefox.\n\n<i>Other changes:</i>\n\n- Improved and extended various existing localizations.\n- Applied a minor design-related change to the options page.\n- Replaced remaining calls to a deprecated function." }, - "reviewed": null, + "reviewed": "2022-01-31T20:45:40Z", "version": "2.0.17", "files": [ { @@ -551,10 +551,10 @@ "category": "recommended" }, "ratings": { - "average": 4.8226, - "bayesian_average": 4.81792153710705, - "count": 1319, - "text_count": 238 + "average": 4.816, + "bayesian_average": 4.81132997570714, + "count": 1321, + "text_count": 235 }, "ratings_url": "https://addons.mozilla.org/en-US/firefox/addon/decentraleyes/reviews/", "requires_payment": false, @@ -639,7 +639,7 @@ "type": "extension", "url": "https://addons.mozilla.org/en-US/firefox/addon/decentraleyes/", "versions_url": "https://addons.mozilla.org/en-US/firefox/addon/decentraleyes/versions/", - "weekly_downloads": 4978 + "weekly_downloads": 4626 }, "notes": null }, @@ -655,7 +655,7 @@ "picture_url": "https://addons.mozilla.org/user-media/userpics/73/4073/5474073/5474073.png?…" } ], - "average_daily_users": 1084519, + "average_daily_users": 1096532, "categories": { "android": [ "security-privacy" @@ -667,7 +667,7 @@ "contributions_url": "https://paypal.me/SupportEFF?utm_content=product-page-contribute&utm_medium…", "created": "2014-05-01T18:23:16Z", "current_version": { - "id": 5463829, + "id": 5520250, "compatibility": { "firefox": { "min": "60.0", @@ -678,7 +678,7 @@ "max": "*" } }, - "edit_url": "https://addons.mozilla.org/en-US/developers/addon/privacy-badger17/versions…", + "edit_url": "https://addons.mozilla.org/en-US/developers/addon/privacy-badger17/versions…", "is_strict_compatibility_enabled": false, "license": { "id": 6, @@ -689,22 +689,22 @@ "url": "http://www.gnu.org/licenses/gpl-3.0.html" }, "release_notes": { - "en-US": "<ul><li>Improved widget replacement system to better handle embedded YouTube videos</li><li>Delayed opening the new user welcome page for a few seconds to work around a Chromium bug with administrator settings (managed storage)</li><li>Removed obsolete \"Prevent WebRTC from leaking local IP address\" setting</li><li>Fixed various site breakages</li><li>Added Japanese translations</li><li>Improved translations (Dutch, Finnish, French, Brazilian Portuguese, Russian, Spanish, Swedish, Turkish, Ukrainian)</li></ul>" + "en-US": "<ul><li>Added a note to the popup to explain that if you would like to log into websites with your Google account, you need to fully allow <a href=\"https://prod.outgoing.prod.webservices.mozgcp.net/v1/361ac6552f690217a6c9f0…" rel=\"nofollow\">accounts.google.com</a></li><li>Added dark theme support to widget replacement placeholders</li><li>Fixed blocking service worker-initiated requests in Chrome</li><li>Fixed various site breakages</li><li>Added Hindi translations</li><li>Improved Traditional Chinese translations</li></ul>" }, - "reviewed": null, - "version": "2022.9.27", + "reviewed": "2023-02-02T18:47:37Z", + "version": "2023.1.31", "files": [ { - "id": 4008174, - "created": "2022-09-27T18:57:05Z", - "hash": "sha256:8a0e456dfac801ea437164192f0a0659ee7227a519db97aceeb221f48f74d44a", + "id": 4064595, + "created": "2023-01-31T16:05:01Z", + "hash": "sha256:0082d8ffe7b25f370a313d9b899b0c1ba1669b21b3a11791fe5ecf031aeb6a6c", "is_restart_required": false, "is_webextension": true, "is_mozilla_signed_extension": false, "platform": "all", - "size": 1487264, + "size": 1834581, "status": "public", - "url": "https://addons.mozilla.org/firefox/downloads/file/4008174/privacy_badger17-…", + "url": "https://addons.mozilla.org/firefox/downloads/file/4064595/privacy_badger17-…", "permissions": [ "tabs", "http://*/*", @@ -1131,7 +1131,7 @@ }, "is_disabled": false, "is_experimental": false, - "last_updated": "2022-09-28T07:55:03Z", + "last_updated": "2023-02-02T18:47:37Z", "name": { "en-US": "Privacy Badger" }, @@ -1177,9 +1177,9 @@ "category": "recommended" }, "ratings": { - "average": 4.7952, - "bayesian_average": 4.7923692395774875, - "count": 2168, + "average": 4.7987, + "bayesian_average": 4.795881600312439, + "count": 2181, "text_count": 427 }, "ratings_url": "https://addons.mozilla.org/en-US/firefox/addon/privacy-badger17/reviews/", @@ -1204,7 +1204,7 @@ "type": "extension", "url": "https://addons.mozilla.org/en-US/firefox/addon/privacy-badger17/", "versions_url": "https://addons.mozilla.org/en-US/firefox/addon/privacy-badger17/versions/", - "weekly_downloads": 18765 + "weekly_downloads": 18674 }, "notes": null }, @@ -1220,7 +1220,7 @@ "picture_url": null } ], - "average_daily_users": 6238648, + "average_daily_users": 6382932, "categories": { "android": [ "security-privacy" @@ -1232,7 +1232,7 @@ "contributions_url": "", "created": "2015-04-25T07:26:22Z", "current_version": { - "id": 5503008, + "id": 5525624, "compatibility": { "firefox": { "min": "68.0", @@ -1243,7 +1243,7 @@ "max": "*" } }, - "edit_url": "https://addons.mozilla.org/en-US/developers/addon/ublock-origin/versions/55…", + "edit_url": "https://addons.mozilla.org/en-US/developers/addon/ublock-origin/versions/55…", "is_strict_compatibility_enabled": false, "license": { "id": 6, @@ -1254,22 +1254,22 @@ "url": "http://www.gnu.org/licenses/gpl-3.0.html" }, "release_notes": { - "en-US": "See complete release notes for <a href=\"https://prod.outgoing.prod.webservices.mozgcp.net/v1/389523b56d56000b5903f0…" rel=\"nofollow\">1.46.0</a>.\n\n<b>Fixes</b>\n<ul><li><a href=\"https://prod.outgoing.prod.webservices.mozgcp.net/v1/9c26fe22ae94cdc2f29d6c…" rel=\"nofollow\">Add <code>options</code> stub to <code>nofab</code> scriptlet </a></li><li><a href=\"https://prod.outgoing.prod.webservices.mozgcp.net/v1/30cbc3175eb0b2e15466bf…" rel=\"nofollow\">Rewrite logger's \"exceptor\" feature</a></li><li><a href=\"https://prod.outgoing.prod.webservices.mozgcp.net/v1/3ed97b9e246742ad411d56…" rel=\"nofollow\">Use Blob URLs to reliably inject scriptlets</a> -- as <a href=\"https://prod.outgoing.prod.webservices.mozgcp.net/v1/438c3567eb7d6b3ff10d90…" rel=\"nofollow\">suggested</a> by @evilpie</li><li><a href=\"https://prod.outgoing.prod.webservices.mozgcp.net/v1/8f40970eec0653bf03a1ca…" rel=\"nofollow\">Add :remove-attr() and :remove-class() pseudo selector operators</a></li><li><a href=\"https://prod.outgoing.prod.webservices.mozgcp.net/v1/94fccb01a65453050684d2…" rel=\"nofollow\">Add pseudo-operator :matches-attr()</a></li><li><a href=\"https://prod.outgoing.prod.webservices.mozgcp.net/v1/c08e49fc883ba5c9201cd8…" rel=\"nofollow\">Detect invalid usage of combinators in :not() pseudoclass</a></li><li><a href=\"https://prod.outgoing.prod.webservices.mozgcp.net/v1/615d0729d168db8cb67c8b…" rel=\"nofollow\">Give more time for viewport to be ready</a> (in popup panel) -- <a href=\"https://prod.outgoing.prod.webservices.mozgcp.net/v1/20ff6c390e21534e4a52fd…" rel=\"nofollow\">related feedback</a></li><li><a href=\"https://prod.outgoing.prod.webservices.mozgcp.net/v1/fac8d7f4335f97f8e60585…" rel=\"nofollow\">Handle potentially invalid CSS selector</a> (in logger)</li><li><a href=\"https://prod.outgoing.prod.webservices.mozgcp.net/v1/2e3d7b79681191d69ae519…" rel=\"nofollow\">Ensure state of more/less in panel reflect locked/disabled sections</a></li><li><a href=\"https://prod.outgoing.prod.webservices.mozgcp.net/v1/206078ace2c2f2cf401ad3…" rel=\"nofollow\">Isolate generic cosmetic filters from specific ones in generated stylesheet</a></li><li><a href=\"https://prod.outgoing.prod.webservices.mozgcp.net/v1/4f9ea5893ffda77f028cf2…" rel=\"nofollow\">Do not cname-uncloak same-origin network requests</a></li><li><a href=\"https://prod.outgoing.prod.webservices.mozgcp.net/v1/cc959a4d7f9d2e70d41225…" rel=\"nofollow\">Prevent the creation of non-cosmetic extended filters in element picker</a></li><li><a href=\"https://prod.outgoing.prod.webservices.mozgcp.net/v1/75f3ecbd1e6e79c9c62f22…" rel=\"nofollow\">Fix visual of DOM inspector layer in dark theme mode</a></li><li><a href=\"https://prod.outgoing.prod.webservices.mozgcp.net/v1/26929d8da566773a86e49a…" rel=\"nofollow\">Improve extraction of tokens from regexes</a></li><li><a href=\"https://prod.outgoing.prod.webservices.mozgcp.net/v1/53e1591ac127a6a1ee45be…" rel=\"nofollow\">Use placeholders to minimize vertical shifting at page load time</a></li><li><a href=\"https://prod.outgoing.prod.webservices.mozgcp.net/v1/edead39b273cc8494559fd…" rel=\"nofollow\">Bundled filter lists in releases are not timestamped</a></li><li><a href=\"https://prod.outgoing.prod.webservices.mozgcp.net/v1/86a77d0302d1cfdc9a5c31…" rel=\"nofollow\">Ensure procedural filters are applied at least once</a></li></ul>\n<a href=\"https://prod.outgoing.prod.webservices.mozgcp.net/v1/a57cff231cba9bed789947…" rel=\"nofollow\">Commits history since last version</a>." + "en-US": "See complete release notes for <a href=\"https://prod.outgoing.prod.webservices.mozgcp.net/v1/b140bd014e7f181fb45b37…" rel=\"nofollow\">1.47.0</a>.\n\n<b>Fixes / changes</b>\n\n<ul><li><a href=\"https://prod.outgoing.prod.webservices.mozgcp.net/v1/e35dbd5e9f783a5823861d…" rel=\"nofollow\">Prevent context menu entries on non-HTTP documents</a></li><li><a href=\"https://prod.outgoing.prod.webservices.mozgcp.net/v1/8574183ea43238e380567b…" rel=\"nofollow\">Ignore compilation hints when applying exception cosmetic filters</a></li><li><a href=\"https://prod.outgoing.prod.webservices.mozgcp.net/v1/58c3f94f487f1a98eda31a…" rel=\"nofollow\"> Add support for regex-based values as target domain for static extended filters</a></li><li><a href=\"https://prod.outgoing.prod.webservices.mozgcp.net/v1/664a38f09616854a9936e1…" rel=\"nofollow\">Add support for regex-based values for <code>domain=</code>/<code>from=</code>/<code>to=</code> options</a></li><li><a href=\"https://prod.outgoing.prod.webservices.mozgcp.net/v1/250586255e6c8ce1e3ae5e…" rel=\"nofollow\">Rewrite static filtering parser</a></li><li><a href=\"https://prod.outgoing.prod.webservices.mozgcp.net/v1/e628bc12d0be3b68739917…" rel=\"nofollow\">uBO doesn't reject cosmetic filters with invalid pseudo-classes/pseudo-elements</a></li><li><a href=\"https://prod.outgoing.prod.webservices.mozgcp.net/v1/01f40a6478c16320eebcb5…" rel=\"nofollow\">Make the logger entry dialog modeless</a></li><li><a href=\"https://prod.outgoing.prod.webservices.mozgcp.net/v1/8e5b045c6bbda00f272ead…" rel=\"nofollow\">Fix missing regex flags</a></li><li><a href=\"https://prod.outgoing.prod.webservices.mozgcp.net/v1/338ff06b790a9831939536…" rel=\"nofollow\">Import version 1.2.0 of RegexAnalyzer</a></li><li><a href=\"https://prod.outgoing.prod.webservices.mozgcp.net/v1/1ad5b3aa657299b66b4e93…" rel=\"nofollow\">Set <code>charset</code> to <code>utf-8</code> for Blob-based injected scriptlets </a></li><li><a href=\"https://prod.outgoing.prod.webservices.mozgcp.net/v1/e5547c21fa5e38fe56d4d8…" rel=\"nofollow\">Disallow <code>-abp-...</code> filters if not using <code>#?#</code></a></li><li><a href=\"https://prod.outgoing.prod.webservices.mozgcp.net/v1/e94131c76bb7a1a2513a70…" rel=\"nofollow\">Work related to keyboard shortcuts for page reload</a></li><li><a href=\"https://prod.outgoing.prod.webservices.mozgcp.net/v1/5fb5dddef3045ae7f30a24…" rel=\"nofollow\">New network filter option: <code>to=[list of domain names]</code></a></li><li><a href=\"https://prod.outgoing.prod.webservices.mozgcp.net/v1/78eda79469d3baaeb94f09…" rel=\"nofollow\">New network filter option: <code>method=...</code></a></li></ul>\n<a href=\"https://prod.outgoing.prod.webservices.mozgcp.net/v1/0706aff990bd228e1bb5b0…" rel=\"nofollow\">Commits history since last version</a>." }, - "reviewed": null, - "version": "1.46.0", + "reviewed": "2023-02-15T10:52:52Z", + "version": "1.47.0", "files": [ { - "id": 4047353, - "created": "2022-12-22T16:49:43Z", - "hash": "sha256:6bf8af5266353fab5eabdc7476de026e01edfb7901b0430c5e539f6791f1edc8", + "id": 4069969, + "created": "2023-02-13T18:12:01Z", + "hash": "sha256:e76958a8c8eb4b71954dac9b0eb1f5a7a545f746159227e0b821b1a1b23f7cd4", "is_restart_required": false, "is_webextension": true, "is_mozilla_signed_extension": false, "platform": "all", - "size": 3215576, + "size": 3224904, "status": "public", - "url": "https://addons.mozilla.org/firefox/downloads/file/4047353/ublock_origin-1.4…", + "url": "https://addons.mozilla.org/firefox/downloads/file/4069969/ublock_origin-1.4…", "permissions": [ "dns", "menus", @@ -1384,7 +1384,7 @@ }, "is_disabled": false, "is_experimental": false, - "last_updated": "2023-01-07T15:25:25Z", + "last_updated": "2023-02-15T10:52:52Z", "name": { "ar": "uBlock Origin", "bg": "uBlock Origin", @@ -1529,10 +1529,10 @@ "category": "recommended" }, "ratings": { - "average": 4.7791, - "bayesian_average": 4.778687487250499, - "count": 14827, - "text_count": 3878 + "average": 4.7797, + "bayesian_average": 4.779290903491396, + "count": 14964, + "text_count": 3911 }, "ratings_url": "https://addons.mozilla.org/en-US/firefox/addon/ublock-origin/reviews/", "requires_payment": false, @@ -1594,7 +1594,7 @@ "type": "extension", "url": "https://addons.mozilla.org/en-US/firefox/addon/ublock-origin/", "versions_url": "https://addons.mozilla.org/en-US/firefox/addon/ublock-origin/versions/", - "weekly_downloads": 150528 + "weekly_downloads": 146451 }, "notes": null }, @@ -1610,7 +1610,7 @@ "picture_url": null } ], - "average_daily_users": 142502, + "average_daily_users": 155053, "categories": { "android": [ "photos-media" @@ -1648,7 +1648,7 @@ "en-US": "Experimental improvement of Youtube handling.", "ro": "Îmbunătățiri experimentale pentru Youtube." }, - "reviewed": null, + "reviewed": "2021-04-23T07:50:05Z", "version": "1.6.0", "files": [ { @@ -1707,9 +1707,9 @@ "category": "recommended" }, "ratings": { - "average": 4.5097, - "bayesian_average": 4.504446391084406, - "count": 1085, + "average": 4.5083, + "bayesian_average": 4.503059203963862, + "count": 1088, "text_count": 403 }, "ratings_url": "https://addons.mozilla.org/en-US/firefox/addon/video-background-play-fix/re…", @@ -1732,7 +1732,7 @@ "type": "extension", "url": "https://addons.mozilla.org/en-US/firefox/addon/video-background-play-fix/", "versions_url": "https://addons.mozilla.org/en-US/firefox/addon/video-background-play-fix/ve…", - "weekly_downloads": 354 + "weekly_downloads": 503 }, "notes": null }, @@ -1748,7 +1748,7 @@ "picture_url": null } ], - "average_daily_users": 92136, + "average_daily_users": 92798, "categories": { "android": [ "experimental", @@ -1785,7 +1785,7 @@ "release_notes": { "en-US": "First update in a while! Sorry, having a full-time job does that. I welcome all the help I can get at <a href=\"https://prod.outgoing.prod.webservices.mozgcp.net/v1/602e8bbf1bf2ebf94898d7…" rel=\"nofollow\">https://github.com/cowlicks/privacypossum</a>\n\nI'm always happy to help folk contribute at any skill level. There is always some way to help.\n\nThis is mostly a release that improves testing and developer workflow stuff, which should help me make more frequent releases in the future.\n\nThere are also several minor bugfixes and updates." }, - "reviewed": null, + "reviewed": "2019-07-22T13:10:58Z", "version": "2019.7.18", "files": [ { @@ -1860,10 +1860,10 @@ ], "promoted": null, "ratings": { - "average": 4.39, - "bayesian_average": 4.37632626166722, - "count": 400, - "text_count": 113 + "average": 4.3838, + "bayesian_average": 4.369924660120627, + "count": 396, + "text_count": 111 }, "ratings_url": "https://addons.mozilla.org/en-US/firefox/addon/privacy-possum/reviews/", "requires_payment": false, @@ -1885,7 +1885,7 @@ "type": "extension", "url": "https://addons.mozilla.org/en-US/firefox/addon/privacy-possum/", "versions_url": "https://addons.mozilla.org/en-US/firefox/addon/privacy-possum/versions/", - "weekly_downloads": 517 + "weekly_downloads": 486 }, "notes": null }, @@ -1901,7 +1901,7 @@ "picture_url": "https://addons.mozilla.org/user-media/userpics/64/9064/12929064/12929064.pn…" } ], - "average_daily_users": 245015, + "average_daily_users": 249917, "categories": { "android": [ "photos-media", @@ -1939,7 +1939,7 @@ "release_notes": { "en-US": "Learn more about this release from the <a href=\"https://prod.outgoing.prod.webservices.mozgcp.net/v1/034fc31c913b4c44179589…" rel=\"nofollow\">changelog</a>." }, - "reviewed": null, + "reviewed": "2022-11-24T10:36:11Z", "version": "5.4.2", "files": [ { @@ -2119,10 +2119,10 @@ "category": "recommended" }, "ratings": { - "average": 4.6498, - "bayesian_average": 4.644960886726223, - "count": 1222, - "text_count": 239 + "average": 4.6512, + "bayesian_average": 4.646376429373567, + "count": 1227, + "text_count": 237 }, "ratings_url": "https://addons.mozilla.org/en-US/firefox/addon/search_by_image/reviews/", "requires_payment": false, @@ -2143,7 +2143,7 @@ "type": "extension", "url": "https://addons.mozilla.org/en-US/firefox/addon/search_by_image/", "versions_url": "https://addons.mozilla.org/en-US/firefox/addon/search_by_image/versions/", - "weekly_downloads": 3563 + "weekly_downloads": 3780 }, "notes": null }, @@ -2166,7 +2166,7 @@ "picture_url": null } ], - "average_daily_users": 103493, + "average_daily_users": 106756, "categories": { "android": [ "other" @@ -2198,7 +2198,7 @@ "release_notes": { "en-US": "This version features improves the performance and reliability of the add-on,\nand allows the Desktop mode to behave as intended." }, - "reviewed": null, + "reviewed": "2020-10-06T08:39:18Z", "version": "1.6", "files": [ { @@ -2448,10 +2448,10 @@ "category": "recommended" }, "ratings": { - "average": 4.442, - "bayesian_average": 4.437306737005405, - "count": 1190, - "text_count": 318 + "average": 4.4409, + "bayesian_average": 4.4362065782583375, + "count": 1193, + "text_count": 317 }, "ratings_url": "https://addons.mozilla.org/en-US/firefox/addon/google-search-fixer/reviews/", "requires_payment": false, @@ -2471,7 +2471,7 @@ "type": "extension", "url": "https://addons.mozilla.org/en-US/firefox/addon/google-search-fixer/", "versions_url": "https://addons.mozilla.org/en-US/firefox/addon/google-search-fixer/versions/", - "weekly_downloads": 50 + "weekly_downloads": 41 }, "notes": null }, @@ -2487,7 +2487,7 @@ "picture_url": "https://addons.mozilla.org/user-media/userpics/43/0143/143/143.png?modified…" } ], - "average_daily_users": 328001, + "average_daily_users": 329326, "categories": { "android": [ "performance", @@ -2501,7 +2501,7 @@ "contributions_url": "https://www.paypal.com/donate/?hosted_button_id=9ERKTU5MBH4EW&utm_content=p…", "created": "2005-05-13T10:51:32Z", "current_version": { - "id": 5506390, + "id": 5523128, "compatibility": { "firefox": { "min": "59.0", @@ -2512,7 +2512,7 @@ "max": "*" } }, - "edit_url": "https://addons.mozilla.org/en-US/developers/addon/noscript/versions/5506390", + "edit_url": "https://addons.mozilla.org/en-US/developers/addon/noscript/versions/5523128", "is_strict_compatibility_enabled": false, "license": { "id": 13, @@ -2523,22 +2523,22 @@ "url": "http://www.gnu.org/licenses/gpl-2.0.html" }, "release_notes": { - "en-US": "v 11.4.14\n============================================================\nx Updated HTML event attributes list\nx Uniformed indexed directory Firefox UI emulation to\n prevent a script blocking bypass on file:// resources\n (thanks RyotaK for reporting)\nx Fixed error being logged in the console on scriptless\n pages when hitting [Delete] or [Backspace] (thanks barbaz\n for reporting)\nx Work-around for background page misteriously being\n unloaded sometimes by Firefox\nx [L10n] Updated Transifex configuration" + "en-US": "v 11.4.16\n============================================================\nx [L10n] Updated de, nl, pl, ru, sq, zh_CN\nx Always open the windowed standalone UI when invoked from\n the Alt+Shift+N shortcut\nx Alt+Shift+Space shortcut to toggle restrictions\n enforcement for current tab (issue #129, thanks PF4Public\n for RFE)" }, - "reviewed": null, - "version": "11.4.14", + "reviewed": "2023-02-09T17:48:06Z", + "version": "11.4.16", "files": [ { - "id": 4050735, - "created": "2023-01-01T22:33:07Z", - "hash": "sha256:14af6a3cbc269c045f2d950e1e4f7c29981b35a7abc61d2413f5bb8bd7311857", + "id": 4067473, + "created": "2023-02-06T22:12:36Z", + "hash": "sha256:44bdddd89bee11e52e09ea967aebd3aa996dc2d66c1a819e8dfdaf9a16cc753b", "is_restart_required": false, "is_webextension": true, "is_mozilla_signed_extension": false, "platform": "all", - "size": 948881, + "size": 949002, "status": "public", - "url": "https://addons.mozilla.org/firefox/downloads/file/4050735/noscript-11.4.14.…", + "url": "https://addons.mozilla.org/firefox/downloads/file/4067473/noscript-11.4.16.…", "permissions": [ "contextMenus", "storage", @@ -2604,7 +2604,7 @@ }, "is_disabled": false, "is_experimental": false, - "last_updated": "2023-01-03T12:32:35Z", + "last_updated": "2023-02-09T17:48:06Z", "name": { "de": "NoScript", "el": "NoScript", @@ -2676,9 +2676,9 @@ "category": "recommended" }, "ratings": { - "average": 4.412, - "bayesian_average": 4.40926402856513, - "count": 2029, + "average": 4.4094, + "bayesian_average": 4.4066726918104555, + "count": 2037, "text_count": 793 }, "ratings_url": "https://addons.mozilla.org/en-US/firefox/addon/noscript/reviews/", @@ -2723,7 +2723,7 @@ "type": "extension", "url": "https://addons.mozilla.org/en-US/firefox/addon/noscript/", "versions_url": "https://addons.mozilla.org/en-US/firefox/addon/noscript/versions/", - "weekly_downloads": 8435 + "weekly_downloads": 7901 }, "notes": null }, @@ -2739,7 +2739,7 @@ "picture_url": null } ], - "average_daily_users": 142622, + "average_daily_users": 145846, "categories": { "android": [ "performance", @@ -2753,10 +2753,10 @@ "contributions_url": "", "created": "2011-07-15T10:42:41Z", "current_version": { - "id": 5401809, + "id": 5522766, "compatibility": { "firefox": { - "min": "42.0", + "min": "48.0", "max": "*" }, "android": { @@ -2764,7 +2764,7 @@ "max": "*" } }, - "edit_url": "https://addons.mozilla.org/en-US/developers/addon/youtube-high-definition/v…", + "edit_url": "https://addons.mozilla.org/en-US/developers/addon/youtube-high-definition/v…", "is_strict_compatibility_enabled": false, "license": { "id": 12, @@ -2775,22 +2775,22 @@ "url": "http://www.gnu.org/licenses/lgpl-3.0.html" }, "release_notes": { - "en-US": "Auto Subtitles" + "en-US": "AMO GUID added" }, - "reviewed": null, - "version": "100.0.0", + "reviewed": "2023-02-09T15:16:44Z", + "version": "109.0.0", "files": [ { - "id": 3946154, - "created": "2022-05-08T17:27:53Z", - "hash": "sha256:659bec82b02fc3950f17a99618ddb6329e8b40b51553da8d7ed980eebf8060a2", + "id": 4067111, + "created": "2023-02-06T12:44:20Z", + "hash": "sha256:bdda70d2ad5bfc5065844b76008ac731341b46be0d43ab9de535f28206ea3c59", "is_restart_required": false, "is_webextension": true, "is_mozilla_signed_extension": false, "platform": "all", - "size": 234453, + "size": 234450, "status": "public", - "url": "https://addons.mozilla.org/firefox/downloads/file/3946154/youtube_high_defi…", + "url": "https://addons.mozilla.org/firefox/downloads/file/4067111/youtube_high_defi…", "permissions": [ "tabs", "storage", @@ -2824,7 +2824,7 @@ }, "is_disabled": false, "is_experimental": false, - "last_updated": "2022-05-09T09:46:35Z", + "last_updated": "2023-02-09T15:16:44Z", "name": { "en-US": "YouTube High Definition", "zh-TW": "YouTube High Definition" @@ -2853,9 +2853,9 @@ "category": "recommended" }, "ratings": { - "average": 3.9222, - "bayesian_average": 3.917847057751054, - "count": 1105, + "average": 3.9213, + "bayesian_average": 3.91694973530769, + "count": 1106, "text_count": 395 }, "ratings_url": "https://addons.mozilla.org/en-US/firefox/addon/youtube-high-definition/revi…", @@ -2875,7 +2875,7 @@ "type": "extension", "url": "https://addons.mozilla.org/en-US/firefox/addon/youtube-high-definition/", "versions_url": "https://addons.mozilla.org/en-US/firefox/addon/youtube-high-definition/vers…", - "weekly_downloads": 1769 + "weekly_downloads": 1934 }, "notes": null } ===================================== projects/browser/config ===================================== @@ -103,9 +103,9 @@ input_files: enable: '[% ! c("var/android") %]' - filename: Bundle-Data enable: '[% ! c("var/android") %]' - - URL: https://addons.mozilla.org/firefox/downloads/file/4050735/noscript-11.4.14.… + - URL: https://addons.mozilla.org/firefox/downloads/file/4067473/noscript-11.4.16.… name: noscript - sha256sum: 14af6a3cbc269c045f2d950e1e4f7c29981b35a7abc61d2413f5bb8bd7311857 + sha256sum: 44bdddd89bee11e52e09ea967aebd3aa996dc2d66c1a819e8dfdaf9a16cc753b - URL: https://addons.mozilla.org/firefox/downloads/file/4047353/ublock_origin-1.4… name: ublock-origin sha256sum: 6bf8af5266353fab5eabdc7476de026e01edfb7901b0430c5e539f6791f1edc8 ===================================== projects/fenix/config ===================================== @@ -14,7 +14,7 @@ container: var: fenix_version: 102.2.1 browser_branch: 12.5-1 - fenix_build: 1 + fenix_build: 2 git_branch: 'tor-browser-[% c("var/fenix_version") %]-[% c("var/browser_branch") %]' copyright_year: '[% exec("git show -s --format=%ci").remove("-.*") %]' # This should be updated when the list of gradle dependencies is changed. ===================================== projects/firefox/config ===================================== @@ -11,10 +11,10 @@ container: use_container: 1 var: - firefox_platform_version: 102.7.0 + firefox_platform_version: 102.8.0 firefox_version: '[% c("var/firefox_platform_version") %]esr' browser_branch: '12.5-1' - browser_build: 1 + browser_build: 3 branding_directory_prefix: 'tb' copyright_year: '[% exec("git show -s --format=%ci").remove("-.*") %]' nightly_updates_osname: '[% c("var/osname") %]' ===================================== projects/geckoview/config ===================================== @@ -11,9 +11,9 @@ container: use_container: 1 var: - geckoview_version: 102.7.0esr + geckoview_version: 102.8.0esr browser_branch: 12.5-1 - browser_build: 1 + browser_build: 3 copyright_year: '[% exec("git show -s --format=%ci").remove("-.*") %]' deps: - build-essential ===================================== projects/go/config ===================================== @@ -1,5 +1,5 @@ # vim: filetype=yaml sw=2 -version: 1.19.5 +version: 1.19.6 filename: '[% project %]-[% c("version") %]-[% c("var/build_id") %].tar.gz' container: use_container: 1 @@ -121,7 +121,7 @@ input_files: enable: '[% ! c("var/linux") %]' - URL: 'https://golang.org/dl/go[% c("version") %].src.tar.gz' name: go - sha256sum: 8e486e8e85a281fc5ce3f0bedc5b9d2dbf6276d7db0b25d3ec034f313da0375f + sha256sum: d7f0013f82e6d7f862cc6cb5c8cdb48eef5f2e239b35baa97e2f1a7466043767 - URL: 'https://golang.org/dl/go[% c("var/go14_version") %].src.tar.gz' name: go14 sha256sum: 9947fc705b0b841b5938c48b22dc33e9647ec0752bae66e50278df4f23f64959 ===================================== projects/manual/config ===================================== @@ -1,7 +1,7 @@ # vim: filetype=yaml sw=2 # To update, see doc/how-to-update-the-manual.txt # Remember to update also the package's hash, with the version! -version: 62420 +version: 66168 filename: 'manual-[% c("version") %]-[% c("var/build_id") %].tar.gz' container: use_container: 1 @@ -19,6 +19,6 @@ input_files: - project: container-image - URL: 'https://people.torproject.org/~richard/tbb_files/manual_[% c("version") %].zip' name: manual - sha256sum: ea4cb60f27d4a0c9690c8b885c4f1f4d872b50e71060142f688bac9c5a37793a + sha256sum: efb88be6217f7cb6879157678963bc90c47a2b91380ae3ba9a52d748eabf9568 - filename: packagemanual.py name: package_script ===================================== projects/openssl/config ===================================== @@ -1,5 +1,5 @@ # vim: filetype=yaml sw=2 -version: 1.1.1s +version: 1.1.1t filename: '[% project %]-[% c("version") %]-[% c("var/osname") %]-[% c("var/build_id") %].tar.gz' container: use_container: 1 @@ -31,4 +31,4 @@ input_files: - name: '[% c("var/compiler") %]' project: '[% c("var/compiler") %]' - URL: 'https://www.openssl.org/source/openssl-[% c("version") %].tar.gz' - sha256sum: c5ac01e760ee6ff0dab61d6b2bbd30146724d063eb322180c6f18a6f74e4b6aa + sha256sum: 8dee9b24bdb1dcbf0c3d1e9b02fb8f6bf22165e807f45adeb7c9677536859d3b ===================================== projects/translation/config ===================================== @@ -6,19 +6,19 @@ version: '[% c("abbrev") %]' steps: base-browser: base-browser: '[% INCLUDE build %]' - git_hash: d1aa584f3da4c2fc6bfe5d289e2783705ee7e015 + git_hash: d862d323bd78e100de5f51f2f8742d21de3a76d0 targets: nightly: git_hash: 'base-browser' base-browser-fluent: base-browser-fluent: '[% INCLUDE build %]' - git_hash: ddc3ff5d0d1c9849f1b1d3a630c0dc6095a15959 + git_hash: 71869a9fd722c36eb57d08d7ef5a1fa5270ddb54 targets: nightly: git_hash: 'basebrowser-newidentityftl' tor-browser: tor-browser: '[% INCLUDE build %]' - git_hash: e7e6f5de5d83120785500908f8f1a3b6b8303475 + git_hash: b3d9033d2229e82d30771aa7a1b77667d9a80628 targets: nightly: git_hash: 'tor-browser' @@ -26,7 +26,7 @@ steps: fenix: '[% INCLUDE build %]' # We need to bump the commit before releasing but just pointing to a branch # might cause too much rebuidling of the Firefox part. - git_hash: 997fd61e426305c0d45e519ed219125712ba9075 + git_hash: d19129475bae8943d3ee4ca6b6ed114a9a6db94e targets: nightly: git_hash: 'fenix-torbrowserstringsxml' ===================================== rbm.conf ===================================== @@ -71,10 +71,10 @@ buildconf: git_signtag_opt: '-s' var: - torbrowser_version: '12.5a2' + torbrowser_version: '12.5a3' torbrowser_build: 'build1' torbrowser_incremental_from: - - 12.5a1 + - 12.5a2 updater_enabled: 1 build_mar: 1 # By default, we sort the list of installed packages. This allows sharing View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/commit/d… -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/commit/d… You're receiving this email because of your account on gitlab.torproject.org.
1 0
0 0
[Git][tpo/applications/tor-browser][base-browser-102.8.0esr-12.0-1] Bug 1814416: Generalize the app name in about:buildconfig. r=ahochheiden
by Pier Angelo Vendrame (@pierov) 17 Feb '23

17 Feb '23
Pier Angelo Vendrame pushed to branch base-browser-102.8.0esr-12.0-1 at The Tor Project / Applications / Tor Browser Commits: 730e58e8 by Pier Angelo Vendrame at 2023-02-17T08:30:09+01:00 Bug 1814416: Generalize the app name in about:buildconfig. r=ahochheiden Now it displays app display name, instead of having Firefox hardcoded. Differential Revision: https://phabricator.services.mozilla.com/D168562 - - - - - 2 changed files: - toolkit/content/buildconfig.html - toolkit/content/moz.build Changes: ===================================== toolkit/content/buildconfig.html ===================================== @@ -18,7 +18,7 @@ <body> <div class="container"> <h1>Build Configuration</h1> - <p>Please be aware that this page doesn't reflect all the options used to build Firefox.</p> + <p>Please be aware that this page doesn't reflect all the options used to build @MOZ_APP_DISPLAYNAME@.</p> #ifdef MOZ_SOURCE_URL <h2>Source</h2> <p>Built from <a href="@MOZ_SOURCE_URL@">@MOZ_SOURCE_URL@</a></p> ===================================== toolkit/content/moz.build ===================================== @@ -10,7 +10,7 @@ for var in ("CC", "CC_VERSION", "CXX", "RUSTC", "RUSTC_VERSION"): if CONFIG[var]: DEFINES[var] = CONFIG[var] -for var in ("MOZ_CONFIGURE_OPTIONS",): +for var in ("MOZ_CONFIGURE_OPTIONS", "MOZ_APP_DISPLAYNAME"): DEFINES[var] = CONFIG[var] if CONFIG["MOZ_ANDROID_FAT_AAR_ARCHITECTURES"]: View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/730e58e… -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/730e58e… You're receiving this email because of your account on gitlab.torproject.org.
1 0
0 0
[Git][tpo/applications/tor-browser][tor-browser-102.8.0esr-12.0-1] Bug 1814416: Generalize the app name in about:buildconfig. r=ahochheiden
by Pier Angelo Vendrame (@pierov) 17 Feb '23

17 Feb '23
Pier Angelo Vendrame pushed to branch tor-browser-102.8.0esr-12.0-1 at The Tor Project / Applications / Tor Browser Commits: d6bda78a by Pier Angelo Vendrame at 2023-02-17T08:29:40+01:00 Bug 1814416: Generalize the app name in about:buildconfig. r=ahochheiden Now it displays app display name, instead of having Firefox hardcoded. Differential Revision: https://phabricator.services.mozilla.com/D168562 - - - - - 2 changed files: - toolkit/content/buildconfig.html - toolkit/content/moz.build Changes: ===================================== toolkit/content/buildconfig.html ===================================== @@ -18,7 +18,7 @@ <body> <div class="container"> <h1>Build Configuration</h1> - <p>Please be aware that this page doesn't reflect all the options used to build Firefox.</p> + <p>Please be aware that this page doesn't reflect all the options used to build @MOZ_APP_DISPLAYNAME@.</p> #ifdef MOZ_SOURCE_URL <h2>Source</h2> <p>Built from <a href="@MOZ_SOURCE_URL@">@MOZ_SOURCE_URL@</a></p> ===================================== toolkit/content/moz.build ===================================== @@ -10,7 +10,7 @@ for var in ("CC", "CC_VERSION", "CXX", "RUSTC", "RUSTC_VERSION"): if CONFIG[var]: DEFINES[var] = CONFIG[var] -for var in ("MOZ_CONFIGURE_OPTIONS",): +for var in ("MOZ_CONFIGURE_OPTIONS", "MOZ_APP_DISPLAYNAME"): DEFINES[var] = CONFIG[var] if CONFIG["MOZ_ANDROID_FAT_AAR_ARCHITECTURES"]: View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/d6bda78… -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/d6bda78… You're receiving this email because of your account on gitlab.torproject.org.
1 0
0 0
[Git][tpo/applications/tor-browser][base-browser-102.8.0esr-12.5-1] Bug 1814416: Generalize the app name in about:buildconfig. r=ahochheiden
by Pier Angelo Vendrame (@pierov) 17 Feb '23

17 Feb '23
Pier Angelo Vendrame pushed to branch base-browser-102.8.0esr-12.5-1 at The Tor Project / Applications / Tor Browser Commits: bd243dc9 by Pier Angelo Vendrame at 2023-02-17T08:27:38+01:00 Bug 1814416: Generalize the app name in about:buildconfig. r=ahochheiden Now it displays app display name, instead of having Firefox hardcoded. Differential Revision: https://phabricator.services.mozilla.com/D168562 - - - - - 2 changed files: - toolkit/content/buildconfig.html - toolkit/content/moz.build Changes: ===================================== toolkit/content/buildconfig.html ===================================== @@ -18,7 +18,7 @@ <body> <div class="container"> <h1>Build Configuration</h1> - <p>Please be aware that this page doesn't reflect all the options used to build Firefox.</p> + <p>Please be aware that this page doesn't reflect all the options used to build @MOZ_APP_DISPLAYNAME@.</p> #ifdef MOZ_SOURCE_URL <h2>Source</h2> <p>Built from <a href="@MOZ_SOURCE_URL@">@MOZ_SOURCE_URL@</a></p> ===================================== toolkit/content/moz.build ===================================== @@ -10,7 +10,7 @@ for var in ("CC", "CC_VERSION", "CXX", "RUSTC", "RUSTC_VERSION"): if CONFIG[var]: DEFINES[var] = CONFIG[var] -for var in ("MOZ_CONFIGURE_OPTIONS",): +for var in ("MOZ_CONFIGURE_OPTIONS", "MOZ_APP_DISPLAYNAME"): DEFINES[var] = CONFIG[var] if CONFIG["MOZ_ANDROID_FAT_AAR_ARCHITECTURES"]: View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/bd243dc… -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/bd243dc… You're receiving this email because of your account on gitlab.torproject.org.
1 0
0 0
[Git][tpo/applications/tor-browser] Pushed new tag tor-browser-102.8.0esr-12.5-1-build3
by Richard Pospesel (@richard) 16 Feb '23

16 Feb '23
Richard Pospesel pushed new tag tor-browser-102.8.0esr-12.5-1-build3 at The Tor Project / Applications / Tor Browser -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/tree/tor-brows… You're receiving this email because of your account on gitlab.torproject.org.
1 0
0 0
[Git][tpo/applications/tor-browser][tor-browser-102.8.0esr-12.5-1] Bug 1814416: Generalize the app name in about:buildconfig. r=ahochheiden
by Pier Angelo Vendrame (@pierov) 16 Feb '23

16 Feb '23
Pier Angelo Vendrame pushed to branch tor-browser-102.8.0esr-12.5-1 at The Tor Project / Applications / Tor Browser Commits: d80384f9 by Pier Angelo Vendrame at 2023-02-16T20:36:29+01:00 Bug 1814416: Generalize the app name in about:buildconfig. r=ahochheiden Now it displays app display name, instead of having Firefox hardcoded. Differential Revision: https://phabricator.services.mozilla.com/D168562 - - - - - 2 changed files: - toolkit/content/buildconfig.html - toolkit/content/moz.build Changes: ===================================== toolkit/content/buildconfig.html ===================================== @@ -18,7 +18,7 @@ <body> <div class="container"> <h1>Build Configuration</h1> - <p>Please be aware that this page doesn't reflect all the options used to build Firefox.</p> + <p>Please be aware that this page doesn't reflect all the options used to build @MOZ_APP_DISPLAYNAME@.</p> #ifdef MOZ_SOURCE_URL <h2>Source</h2> <p>Built from <a href="@MOZ_SOURCE_URL@">@MOZ_SOURCE_URL@</a></p> ===================================== toolkit/content/moz.build ===================================== @@ -10,7 +10,7 @@ for var in ("CC", "CC_VERSION", "CXX", "RUSTC", "RUSTC_VERSION"): if CONFIG[var]: DEFINES[var] = CONFIG[var] -for var in ("MOZ_CONFIGURE_OPTIONS",): +for var in ("MOZ_CONFIGURE_OPTIONS", "MOZ_APP_DISPLAYNAME"): DEFINES[var] = CONFIG[var] if CONFIG["MOZ_ANDROID_FAT_AAR_ARCHITECTURES"]: View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/d80384f… -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/d80384f… You're receiving this email because of your account on gitlab.torproject.org.
1 0
0 0
[Git][tpo/applications/tor-browser][base-browser-102.8.0esr-12.5-1] amend! Firefox preference overrides.
by Pier Angelo Vendrame (@pierov) 16 Feb '23

16 Feb '23
Pier Angelo Vendrame pushed to branch base-browser-102.8.0esr-12.5-1 at The Tor Project / Applications / Tor Browser Commits: 1fc78685 by hackademix at 2023-02-16T20:07:11+01:00 amend! Firefox preference overrides. Firefox preference overrides. This hack directly includes our preference changes in omni.ja. Bug 41633: Do not disable webextensions.storage.sync until NoScript is resilient enough Bug 18292: Staged updates fail on Windows Temporarily disable staged updates on Windows. Bug 18297: Use separate Noto JP,KR,SC,TC fonts Bug 23404: Add Noto Sans Buginese to the macOS whitelist Bug 23745: Set dom.indexedDB.enabled = true Bug 13575: Disable randomised Firefox HTTP cache decay user tests. (Fernando Fernandez Mancera &lt;ffmancera(a)riseup.net&gt;) Bug 17252: Enable session identifiers with FPI Session tickets and session identifiers were isolated by OriginAttributes, so we can re-enable them by allowing the default value (true) of &quot;security.ssl.disable_session_identifiers&quot;. The pref &quot;security.enable_tls_session_tickets&quot; is obsolete (removed in https://bugzilla.mozilla.org/917049) Bug 14952: Enable http/2 and AltSvc In Firefox, SPDY/HTTP2 now uses Origin Attributes for isolation of connections, push streams, origin frames, etc. That means we get first-party isolation provided &quot;privacy.firstparty.isolate&quot; is true. So in this patch, we stop overriding &quot;network.http.spdy.enabled&quot; and &quot;network.http.spdy.enabled.http2&quot;. Alternate Services also use Origin Attributes for isolation. So we stop overriding &quot;network.http.altsvc.enabled&quot; and &quot;network.http.altsvc.oe&quot; as well. (All 4 of the abovementioned &quot;network.http.*&quot; prefs adopt Firefox 60ESR&#39;s default value of true.) However, we want to disable HTTP/2 push for now, so we set &quot;network.http.spdy.allow-push&quot; to false. &quot;network.http.spdy.enabled.http2draft&quot; was removed in Bug 1132357. &quot;network.http.sped.enabled.v2&quot; was removed in Bug 912550. &quot;network.http.sped.enabled.v3&quot; was removed in Bug 1097944. &quot;network.http.sped.enabled.v3-1&quot; was removed in Bug 1248197. Bug 26114: addons.mozilla.org is not special * Don&#39;t expose navigator.mozAddonManager on any site * Don&#39;t block NoScript from modifying addons.mozilla.org or other sites Enable ReaderView mode again (#27281). Bug 29916: Make sure enterprise policies are disabled Bug 2874: Block Components.interfaces from content Bug 26146: Spoof HTTP User-Agent header for desktop platforms In Tor Browser 8.0, the OS was revealed in both the HTTP User-Agent header and to JavaScript code via navigator.userAgent. To avoid leaking the OS inside each HTTP request (which many web servers log), always use the Windows 7 OS value in the desktop User-Agent header. We continue to allow access to the actual OS via JavaScript, since doing so improves compatibility with web applications such as GitHub and Google Docs. Bug 12885: Windows Jump Lists fail for Tor Browser Jumplist entries are stored in a binary file in: %APPDATA%\\Microsoft\Windows\Recent\CustomDestinations\ and has a name in the form [a-f0-9]+.customDestinations-ms The hex at the front is unique per app, and is ultimately derived from something called the &#39;App User Model ID&#39; (AUMID) via some unknown hashing method. The AUMID is provided as a key when programmatically creating, updating, and deleting a jumplist. The default behaviour in firefox is for the installer to define an AUMID for an app, and save it in the registry so that the jumplist data can be removed by the uninstaller. However, the Tor Browser does not set this (or any other) regkey during installation, so this codepath fails and the app&#39;s AUMID is left undefined. As a result the app&#39;s AUMID ends up being defined by windows, but unknowable by Tor Browser. This unknown AUMID is used to create and modify the jumplist, but the delete API requires that we provide the app&#39;s AUMID explicitly. Since we don&#39;t know what the AUMID is (since the expected regkey where it is normally stored does not exist) jumplist deletion will fail and we will leave behind a mostly empty customDestinations-ms file. The name of the file is derived from the binary path, so an enterprising person could reverse engineer how that hex name is calculated, and generate the name for Tor Browser&#39;s default Desktop installation path to determine whether a person had used Tor Browser in the past. The &#39;taskbar.grouping.useprofile&#39; option that is enabled by this patch works around this AUMID problem by having firefox.exe create it&#39;s own AUMID based on the profile path (rather than looking for a regkey). This way, if a user goes in and enables and disables jumplist entries, the backing store is properly deleted. Unfortunately, all windows users currently have this file lurking in the above mentioned directory and this patch will not remove it since it was created with an unknown AUMID. However, another patch could be written which goes to that directory and deletes any item containing the &#39;Tor Browser&#39; string. See bug 28996. Bug 30845: Make sure default themes and other internal extensions are enabled Bug 28896: Enable extensions in private browsing by default Bug 31065: Explicitly allow proxying localhost Bug 31598: Enable letterboxing Disable Presentation API everywhere Bug 21549 - Use Firefox&#39;s WASM default pref. It is disabled at safer security levels. Bug 32321: Disable Mozilla&#39;s MitM pings Bug 19890: Disable installation of system addons By setting the URL to &quot;&quot; we make sure that already installed system addons get deleted as well. Bug 22548: Firefox downgrades VP9 videos to VP8. On systems where H.264 is not available or no HWA, VP9 is preferred. But in Tor Browser 7.0 all youtube videos are degraded to VP8. This behaviour can be turned off by setting media.benchmark.vp9.threshold to 0. All clients will get better experience and lower traffic, beause TBB doesn&#39;t use &quot;Use hardware acceleration when available&quot;. Bug 25741 - TBA: Add mobile-override of 000-tor-browser prefs Bug 16441: Suppress &quot;Reset Tor Browser&quot; prompt. Bug 29120: Use the in-memory media cache and increase its maximum size. Bug 33697: use old search config based on list.json Bug 33855: Ensure that site-specific browser mode is disabled. Bug 30682: Disable Intermediate CA Preloading. Bug 40061: Omit the Windows default browser agent from the build Bug 40322: Consider disabling network.connectivity-service.enabled Bug 40408: Disallow SVG Context Paint in all web content Bug 40308: Disable network partitioning until we evaluate dFPI Bug 40322: Consider disabling network.connectivity-service.enabled Bug 40383: Disable dom.enable_event_timing Bug 40423: Disable http/3 Bug 40177: Update prefs for Fx91esr Bug 40700: Disable addons and features recommendations Bug 40682: Disable network.proxy.allow_bypass Bug 40736: Disable third-party cookies in PBM Bug 19850: Enabled HTTPS-Only by default Bug 40912: Hide the screenshot menu Bug 41292: Disable moreFromMozilla in preferences page Bug 40057: Ensure the CSS4 system colors are not a fingerprinting vector Bug 24686: Set network.http.tailing.enabled to true Bug 40183: Disable TLS ciphersuites using SHA-1 Bug 40783: Review 000-tor-browser.js and 001-base-profile.js for 102 We reviewed all the preferences we set for 102, and remove a few old ones. See the description of that issue to see all the preferences we believed were still valid for 102, and some brief description for the reasons to keep them. - - - - - 1 changed file: - browser/app/profile/001-base-profile.js Changes: ===================================== browser/app/profile/001-base-profile.js ===================================== @@ -445,8 +445,6 @@ pref("extensions.postDownloadThirdPartyPrompt", false); // Therefore, do not allow download of additional language packs. They are not a // privacy/security threat, we are disabling them for UX reasons. See bug 41377. pref("intl.multilingual.downloadEnabled", false); -// Disk activity: Disable storage.sync (tor-browser#41424) -pref("webextensions.storage.sync.enabled", false); // Toolbar layout pref("browser.uiCustomization.state", "{\"placements\":{\"widget-overflow-fixed-list\":[],\"PersonalToolbar\":[\"personal-bookmarks\"],\"nav-bar\":[\"back-button\",\"forward-button\",\"stop-reload-button\",\"urlbar-container\",\"security-level-button\",\"new-identity-button\",\"downloads-button\"],\"TabsToolbar\":[\"tabbrowser-tabs\",\"new-tab-button\",\"alltabs-button\"],\"toolbar-menubar\":[\"menubar-items\"],\"PanelUI-contents\":[\"home-button\",\"edit-controls\",\"zoom-controls\",\"new-window-button\",\"save-page-button\",\"print-button\",\"bookmarks-menu-button\",\"history-panelmenu\",\"find-button\",\"preferences-button\",\"add-ons-button\",\"developer-button\"],\"addon-bar\":[\"addonbar-closebutton\",\"status-bar\"]},\"seen\":[\"developer-button\"],\"dirtyAreaCache\":[\"PersonalToolbar\",\"nav-bar\",\"TabsToolbar\",\"toolbar-menubar\"],\"currentVersion\":14,\"newElementCount\":1}"); View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/1fc7868… -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/1fc7868… You're receiving this email because of your account on gitlab.torproject.org.
1 0
0 0
[Git][tpo/applications/tor-browser-build][main] Bug 41634: Remove reference to OpenSSl 1.1.1b in tor warning message to avoid...
by Richard Pospesel (@richard) 16 Feb '23

16 Feb '23
Richard Pospesel pushed to branch main at The Tor Project / Applications / tor-browser-build Commits: 36bf4bb1 by Richard Pospesel at 2023-02-16T18:18:15+00:00 Bug 41634: Remove reference to OpenSSl 1.1.1b in tor warning message to avoid defective openssl version false positive on Google Play Store - - - - - 1 changed file: - projects/tor/build Changes: ===================================== projects/tor/build ===================================== @@ -63,6 +63,13 @@ openssldir=/var/tmp/dist/openssl/openssl [% END %] cd /var/tmp/build/[% project %]-[% c('version') %] + +[% IF c("var/android") -%] +# Remove reference to OpenSSL 1.1.1b. See https://gitlab.torproject.org/tpo/core/tor/-/issues/40759 + sed -i 's/ A fix is expected to appear in OpenSSL //g' src/lib/tls/tortls_openssl.c + sed -i 's/1.1.1b.//g' src/lib/tls/tortls_openssl.c +[% END -%] + # add git hash to micro-revision.i for #24995 echo '"[% c("abbrev", { abbrev_length => 16 }) %]"' > micro-revision.i ./autogen.sh View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/commit/3… -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/commit/3… You're receiving this email because of your account on gitlab.torproject.org.
1 0
0 0
[Git][tpo/applications/tor-browser][tor-browser-102.8.0esr-12.5-1] amend! Firefox preference overrides.
by Pier Angelo Vendrame (@pierov) 16 Feb '23

16 Feb '23
Pier Angelo Vendrame pushed to branch tor-browser-102.8.0esr-12.5-1 at The Tor Project / Applications / Tor Browser Commits: fa845a8b by hackademix at 2023-02-16T18:33:49+01:00 amend! Firefox preference overrides. Firefox preference overrides. This hack directly includes our preference changes in omni.ja. Bug 41633: Do not disable webextensions.storage.sync until NoScript is resilient enough Bug 18292: Staged updates fail on Windows Temporarily disable staged updates on Windows. Bug 18297: Use separate Noto JP,KR,SC,TC fonts Bug 23404: Add Noto Sans Buginese to the macOS whitelist Bug 23745: Set dom.indexedDB.enabled = true Bug 13575: Disable randomised Firefox HTTP cache decay user tests. (Fernando Fernandez Mancera &lt;ffmancera(a)riseup.net&gt;) Bug 17252: Enable session identifiers with FPI Session tickets and session identifiers were isolated by OriginAttributes, so we can re-enable them by allowing the default value (true) of &quot;security.ssl.disable_session_identifiers&quot;. The pref &quot;security.enable_tls_session_tickets&quot; is obsolete (removed in https://bugzilla.mozilla.org/917049) Bug 14952: Enable http/2 and AltSvc In Firefox, SPDY/HTTP2 now uses Origin Attributes for isolation of connections, push streams, origin frames, etc. That means we get first-party isolation provided &quot;privacy.firstparty.isolate&quot; is true. So in this patch, we stop overriding &quot;network.http.spdy.enabled&quot; and &quot;network.http.spdy.enabled.http2&quot;. Alternate Services also use Origin Attributes for isolation. So we stop overriding &quot;network.http.altsvc.enabled&quot; and &quot;network.http.altsvc.oe&quot; as well. (All 4 of the abovementioned &quot;network.http.*&quot; prefs adopt Firefox 60ESR&#39;s default value of true.) However, we want to disable HTTP/2 push for now, so we set &quot;network.http.spdy.allow-push&quot; to false. &quot;network.http.spdy.enabled.http2draft&quot; was removed in Bug 1132357. &quot;network.http.sped.enabled.v2&quot; was removed in Bug 912550. &quot;network.http.sped.enabled.v3&quot; was removed in Bug 1097944. &quot;network.http.sped.enabled.v3-1&quot; was removed in Bug 1248197. Bug 26114: addons.mozilla.org is not special * Don&#39;t expose navigator.mozAddonManager on any site * Don&#39;t block NoScript from modifying addons.mozilla.org or other sites Enable ReaderView mode again (#27281). Bug 29916: Make sure enterprise policies are disabled Bug 2874: Block Components.interfaces from content Bug 26146: Spoof HTTP User-Agent header for desktop platforms In Tor Browser 8.0, the OS was revealed in both the HTTP User-Agent header and to JavaScript code via navigator.userAgent. To avoid leaking the OS inside each HTTP request (which many web servers log), always use the Windows 7 OS value in the desktop User-Agent header. We continue to allow access to the actual OS via JavaScript, since doing so improves compatibility with web applications such as GitHub and Google Docs. Bug 12885: Windows Jump Lists fail for Tor Browser Jumplist entries are stored in a binary file in: %APPDATA%\\Microsoft\Windows\Recent\CustomDestinations\ and has a name in the form [a-f0-9]+.customDestinations-ms The hex at the front is unique per app, and is ultimately derived from something called the &#39;App User Model ID&#39; (AUMID) via some unknown hashing method. The AUMID is provided as a key when programmatically creating, updating, and deleting a jumplist. The default behaviour in firefox is for the installer to define an AUMID for an app, and save it in the registry so that the jumplist data can be removed by the uninstaller. However, the Tor Browser does not set this (or any other) regkey during installation, so this codepath fails and the app&#39;s AUMID is left undefined. As a result the app&#39;s AUMID ends up being defined by windows, but unknowable by Tor Browser. This unknown AUMID is used to create and modify the jumplist, but the delete API requires that we provide the app&#39;s AUMID explicitly. Since we don&#39;t know what the AUMID is (since the expected regkey where it is normally stored does not exist) jumplist deletion will fail and we will leave behind a mostly empty customDestinations-ms file. The name of the file is derived from the binary path, so an enterprising person could reverse engineer how that hex name is calculated, and generate the name for Tor Browser&#39;s default Desktop installation path to determine whether a person had used Tor Browser in the past. The &#39;taskbar.grouping.useprofile&#39; option that is enabled by this patch works around this AUMID problem by having firefox.exe create it&#39;s own AUMID based on the profile path (rather than looking for a regkey). This way, if a user goes in and enables and disables jumplist entries, the backing store is properly deleted. Unfortunately, all windows users currently have this file lurking in the above mentioned directory and this patch will not remove it since it was created with an unknown AUMID. However, another patch could be written which goes to that directory and deletes any item containing the &#39;Tor Browser&#39; string. See bug 28996. Bug 30845: Make sure default themes and other internal extensions are enabled Bug 28896: Enable extensions in private browsing by default Bug 31065: Explicitly allow proxying localhost Bug 31598: Enable letterboxing Disable Presentation API everywhere Bug 21549 - Use Firefox&#39;s WASM default pref. It is disabled at safer security levels. Bug 32321: Disable Mozilla&#39;s MitM pings Bug 19890: Disable installation of system addons By setting the URL to &quot;&quot; we make sure that already installed system addons get deleted as well. Bug 22548: Firefox downgrades VP9 videos to VP8. On systems where H.264 is not available or no HWA, VP9 is preferred. But in Tor Browser 7.0 all youtube videos are degraded to VP8. This behaviour can be turned off by setting media.benchmark.vp9.threshold to 0. All clients will get better experience and lower traffic, beause TBB doesn&#39;t use &quot;Use hardware acceleration when available&quot;. Bug 25741 - TBA: Add mobile-override of 000-tor-browser prefs Bug 16441: Suppress &quot;Reset Tor Browser&quot; prompt. Bug 29120: Use the in-memory media cache and increase its maximum size. Bug 33697: use old search config based on list.json Bug 33855: Ensure that site-specific browser mode is disabled. Bug 30682: Disable Intermediate CA Preloading. Bug 40061: Omit the Windows default browser agent from the build Bug 40322: Consider disabling network.connectivity-service.enabled Bug 40408: Disallow SVG Context Paint in all web content Bug 40308: Disable network partitioning until we evaluate dFPI Bug 40322: Consider disabling network.connectivity-service.enabled Bug 40383: Disable dom.enable_event_timing Bug 40423: Disable http/3 Bug 40177: Update prefs for Fx91esr Bug 40700: Disable addons and features recommendations Bug 40682: Disable network.proxy.allow_bypass Bug 40736: Disable third-party cookies in PBM Bug 19850: Enabled HTTPS-Only by default Bug 40912: Hide the screenshot menu Bug 41292: Disable moreFromMozilla in preferences page Bug 40057: Ensure the CSS4 system colors are not a fingerprinting vector Bug 24686: Set network.http.tailing.enabled to true Bug 40183: Disable TLS ciphersuites using SHA-1 Bug 40783: Review 000-tor-browser.js and 001-base-profile.js for 102 We reviewed all the preferences we set for 102, and remove a few old ones. See the description of that issue to see all the preferences we believed were still valid for 102, and some brief description for the reasons to keep them. - - - - - 1 changed file: - browser/app/profile/001-base-profile.js Changes: ===================================== browser/app/profile/001-base-profile.js ===================================== @@ -445,8 +445,6 @@ pref("extensions.postDownloadThirdPartyPrompt", false); // Therefore, do not allow download of additional language packs. They are not a // privacy/security threat, we are disabling them for UX reasons. See bug 41377. pref("intl.multilingual.downloadEnabled", false); -// Disk activity: Disable storage.sync (tor-browser#41424) -pref("webextensions.storage.sync.enabled", false); // Toolbar layout pref("browser.uiCustomization.state", "{\"placements\":{\"widget-overflow-fixed-list\":[],\"PersonalToolbar\":[\"personal-bookmarks\"],\"nav-bar\":[\"back-button\",\"forward-button\",\"stop-reload-button\",\"urlbar-container\",\"security-level-button\",\"new-identity-button\",\"downloads-button\"],\"TabsToolbar\":[\"tabbrowser-tabs\",\"new-tab-button\",\"alltabs-button\"],\"toolbar-menubar\":[\"menubar-items\"],\"PanelUI-contents\":[\"home-button\",\"edit-controls\",\"zoom-controls\",\"new-window-button\",\"save-page-button\",\"print-button\",\"bookmarks-menu-button\",\"history-panelmenu\",\"find-button\",\"preferences-button\",\"add-ons-button\",\"developer-button\"],\"addon-bar\":[\"addonbar-closebutton\",\"status-bar\"]},\"seen\":[\"developer-button\"],\"dirtyAreaCache\":[\"PersonalToolbar\",\"nav-bar\",\"TabsToolbar\",\"toolbar-menubar\"],\"currentVersion\":14,\"newElementCount\":1}"); View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/fa845a8… -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/fa845a8… You're receiving this email because of your account on gitlab.torproject.org.
1 0
0 0
[Git][tpo/applications/tor-browser][tor-browser-102.8.0esr-12.5-1] 2 commits: fixup! Bug 31575: Disable Firefox Home (Activity Stream)
by Pier Angelo Vendrame (@pierov) 16 Feb '23

16 Feb '23
Pier Angelo Vendrame pushed to branch tor-browser-102.8.0esr-12.5-1 at The Tor Project / Applications / Tor Browser Commits: 61916fd6 by Pier Angelo Vendrame at 2023-02-16T10:53:15+01:00 fixup! Bug 31575: Disable Firefox Home (Activity Stream) Bug 41624: Further more SaveToPocket references deleted - - - - - 6b7ed649 by Pier Angelo Vendrame at 2023-02-16T10:53:33+01:00 Revert &quot;fixup! Bug 31740: Remove some unnecessary RemoteSettings instances&quot; This reverts commit 34ed82f6c02a8dc5ed8390fa664e2f63aeadc303. - - - - - 3 changed files: - browser/base/content/browser.js - browser/components/BrowserGlue.jsm - toolkit/components/moz.build Changes: ===================================== browser/base/content/browser.js ===================================== @@ -68,7 +68,6 @@ XPCOMUtils.defineLazyModuleGetters(this, { RFPHelper: "resource://gre/modules/RFPHelper.jsm", SafeBrowsing: "resource://gre/modules/SafeBrowsing.jsm", Sanitizer: "resource:///modules/Sanitizer.jsm", - SaveToPocket: "chrome://pocket/content/SaveToPocket.jsm", ScreenshotsUtils: "resource:///modules/ScreenshotsUtils.jsm", SessionStartup: "resource:///modules/sessionstore/SessionStartup.jsm", SessionStore: "resource:///modules/sessionstore/SessionStore.jsm", @@ -5480,8 +5479,6 @@ var XULBrowserWindow = { SafeBrowsingNotificationBox.onLocationChange(aLocationURI); - SaveToPocket.onLocationChange(window); - UrlbarProviderSearchTips.onLocationChange( window, aLocationURI, ===================================== browser/components/BrowserGlue.jsm ===================================== @@ -75,7 +75,6 @@ XPCOMUtils.defineLazyModuleGetters(this, { RFPHelper: "resource://gre/modules/RFPHelper.jsm", SafeBrowsing: "resource://gre/modules/SafeBrowsing.jsm", Sanitizer: "resource:///modules/Sanitizer.jsm", - SaveToPocket: "chrome://pocket/content/SaveToPocket.jsm", ScreenshotsUtils: "resource:///modules/ScreenshotsUtils.jsm", SearchSERPTelemetry: "resource:///modules/SearchSERPTelemetry.jsm", SessionStartup: "resource:///modules/sessionstore/SessionStartup.jsm", @@ -1286,8 +1285,6 @@ BrowserGlue.prototype = { Normandy.init(); } - SaveToPocket.init(); - AboutHomeStartupCache.init(); Services.obs.notifyObservers(null, "browser-ui-startup-complete"); ===================================== toolkit/components/moz.build ===================================== @@ -123,9 +123,10 @@ if CONFIG["MOZ_WIDGET_TOOLKIT"] != "android": "components.conf", ] -# tor-browser#41628: Disable Normandy and Nimbus at compile time if CONFIG["MOZ_BUILD_APP"] == "browser": - DIRS += ["messaging-system"] + DIRS += ["normandy", "messaging-system"] + +DIRS += ["nimbus"] if CONFIG["MOZ_BACKGROUNDTASKS"]: DIRS += ["backgroundtasks"] View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/compare/34ed82… -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/compare/34ed82… You're receiving this email because of your account on gitlab.torproject.org.
1 0
0 0
  • ← Newer
  • 1
  • ...
  • 451
  • 452
  • 453
  • 454
  • 455
  • 456
  • 457
  • ...
  • 1881
  • Older →

HyperKitty Powered by HyperKitty version 1.3.12.