lists.torproject.org
Sign In Sign Up
Manage this list Sign In Sign Up

Keyboard Shortcuts

Thread View

  • j: Next unread message
  • k: Previous unread message
  • j a: Jump to all threads
  • j l: Jump to MailingList overview

tbb-commits

Thread Start a new thread
Threads by month
  • ----- 2025 -----
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2024 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2023 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2022 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2021 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2020 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2019 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2018 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2017 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2016 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2015 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2014 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
tbb-commits@lists.torproject.org

  • 1 participants
  • 19138 discussions
[Git][tpo/applications/tor-browser][tor-browser-140.1.0esr-15.0-1] fixup! BB 40925: Implemented the Security Level component
by Pier Angelo Vendrame (@pierov) 11 Aug '25

11 Aug '25
Pier Angelo Vendrame pushed to branch tor-browser-140.1.0esr-15.0-1 at The Tor Project / Applications / Tor Browser Commits: 4d18451e by Pier Angelo Vendrame at 2025-08-11T11:55:17+02:00 fixup! BB 40925: Implemented the Security Level component BB 43785: Fix DDG HTML in Safest. During the rebases, we broke the automatic redirects to the HTML version of DuckDuckGo. This commit fixes them. - - - - - 1 changed file: - toolkit/components/search/SearchEngine.sys.mjs Changes: ===================================== toolkit/components/search/SearchEngine.sys.mjs ===================================== @@ -359,18 +359,20 @@ export class EngineURL { lazy.SecurityLevelPrefs?.securityLevel === "safest" && this.type === lazy.SearchUtils.URL_TYPE.SEARCH ) { - let host = this.templateHost; + let host = templateURI.host; try { host = Services.eTLD.getBaseDomainFromHost(host); } catch (ex) { lazy.logConsole.warn("Failed to get a FPD", ex, host); } - if ( - host === "duckduckgo.com" || + if (host === "duckduckgo.com") { + templateURI.host = "html.duckduckgo.com"; + templateURI.pathname = "/html"; + } else if ( host === - "duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion" + "duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion" ) { - query += "html"; + templateURI.pathname = "/html"; } } View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/4d18451… -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/4d18451… You're receiving this email because of your account on gitlab.torproject.org.
1 0
0 0
[Git][tpo/applications/tor-browser][base-browser-140.1.0esr-15.0-1] 2 commits: fixup! BB 40925: Implemented the Security Level component
by Pier Angelo Vendrame (@pierov) 11 Aug '25

11 Aug '25
Pier Angelo Vendrame pushed to branch base-browser-140.1.0esr-15.0-1 at The Tor Project / Applications / Tor Browser Commits: 53783e5a by Pier Angelo Vendrame at 2025-08-11T11:38:18+02:00 fixup! BB 40925: Implemented the Security Level component BB 44090: Add CSP to our XUL XHTML documents. - - - - - 2c208832 by Pier Angelo Vendrame at 2025-08-11T11:38:20+02:00 fixup! BB 40926: Implemented the New Identity feature BB 44090: Add CSP to our XUL XHTML documents. - - - - - 2 changed files: - browser/components/newidentity/content/newIdentityDialog.xhtml - browser/components/securitylevel/content/securityLevelDialog.xhtml Changes: ===================================== browser/components/newidentity/content/newIdentityDialog.xhtml ===================================== @@ -6,6 +6,8 @@ <!-- based on resetProfile.xhtml --> +<?csp default-src chrome: ?> + <window id="newIdentityDialogWindow" xmlns="http://www.mozilla.org/keymaster/gatekeeper/there.is.only.xul" ===================================== browser/components/securitylevel/content/securityLevelDialog.xhtml ===================================== @@ -1,5 +1,7 @@ <?xml version="1.0"?> +<?csp default-src chrome: ?> + <window xmlns="http://www.mozilla.org/keymaster/gatekeeper/there.is.only.xul" xmlns:html="http://www.w3.org/1999/xhtml" View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/compare/cdc07e… -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/compare/cdc07e… You're receiving this email because of your account on gitlab.torproject.org.
1 0
0 0
[Git][tpo/applications/mullvad-browser][mullvad-browser-140.1.0esr-15.0-1] 2 commits: fixup! BB 40925: Implemented the Security Level component
by Pier Angelo Vendrame (@pierov) 11 Aug '25

11 Aug '25
Pier Angelo Vendrame pushed to branch mullvad-browser-140.1.0esr-15.0-1 at The Tor Project / Applications / Mullvad Browser Commits: ab307a98 by Pier Angelo Vendrame at 2025-08-11T11:37:38+02:00 fixup! BB 40925: Implemented the Security Level component BB 44090: Add CSP to our XUL XHTML documents. - - - - - 0fcb2e0f by Pier Angelo Vendrame at 2025-08-11T11:37:40+02:00 fixup! BB 40926: Implemented the New Identity feature BB 44090: Add CSP to our XUL XHTML documents. - - - - - 2 changed files: - browser/components/newidentity/content/newIdentityDialog.xhtml - browser/components/securitylevel/content/securityLevelDialog.xhtml Changes: ===================================== browser/components/newidentity/content/newIdentityDialog.xhtml ===================================== @@ -6,6 +6,8 @@ <!-- based on resetProfile.xhtml --> +<?csp default-src chrome: ?> + <window id="newIdentityDialogWindow" xmlns="http://www.mozilla.org/keymaster/gatekeeper/there.is.only.xul" ===================================== browser/components/securitylevel/content/securityLevelDialog.xhtml ===================================== @@ -1,5 +1,7 @@ <?xml version="1.0"?> +<?csp default-src chrome: ?> + <window xmlns="http://www.mozilla.org/keymaster/gatekeeper/there.is.only.xul" xmlns:html="http://www.w3.org/1999/xhtml" View it on GitLab: https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/compare/5a… -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/compare/5a… You're receiving this email because of your account on gitlab.torproject.org.
1 0
0 0
[Git][tpo/applications/tor-browser][tor-browser-140.1.0esr-15.0-1] 4 commits: fixup! BB 40925: Implemented the Security Level component
by Pier Angelo Vendrame (@pierov) 11 Aug '25

11 Aug '25
Pier Angelo Vendrame pushed to branch tor-browser-140.1.0esr-15.0-1 at The Tor Project / Applications / Tor Browser Commits: d68f1d0a by Pier Angelo Vendrame at 2025-08-11T11:31:57+02:00 fixup! BB 40925: Implemented the Security Level component BB 44090: Add CSP to our XUL XHTML documents. - - - - - 7a4c6fc9 by Pier Angelo Vendrame at 2025-08-11T11:32:06+02:00 fixup! BB 40926: Implemented the New Identity feature BB 44090: Add CSP to our XUL XHTML documents. - - - - - bdec800c by Pier Angelo Vendrame at 2025-08-11T11:32:06+02:00 fixup! TB 30237: Add v3 onion services client authentication prompt BB 44090: Add CSP to our XUL XHTML documents. - - - - - 70a4871e by Pier Angelo Vendrame at 2025-08-11T11:32:07+02:00 fixup! TB 31286: Implementation of bridge, proxy, and firewall settings in about:preferences#connection BB 44090: Add CSP to our XUL XHTML documents. - - - - - 11 changed files: - browser/components/newidentity/content/newIdentityDialog.xhtml - browser/components/onionservices/content/savedKeysDialog.xhtml - browser/components/securitylevel/content/securityLevelDialog.xhtml - browser/components/torpreferences/content/bridgeQrDialog.xhtml - browser/components/torpreferences/content/builtinBridgeDialog.xhtml - browser/components/torpreferences/content/connectionSettingsDialog.xhtml - browser/components/torpreferences/content/loxInviteDialog.xhtml - browser/components/torpreferences/content/provideBridgeDialog.xhtml - browser/components/torpreferences/content/requestBridgeDialog.xhtml - browser/components/torpreferences/content/torLogDialog.xhtml - dom/security/nsContentSecurityUtils.cpp Changes: ===================================== browser/components/newidentity/content/newIdentityDialog.xhtml ===================================== @@ -6,6 +6,8 @@ <!-- based on resetProfile.xhtml --> +<?csp default-src chrome: ?> + <window id="newIdentityDialogWindow" xmlns="http://www.mozilla.org/keymaster/gatekeeper/there.is.only.xul" ===================================== browser/components/onionservices/content/savedKeysDialog.xhtml ===================================== @@ -1,6 +1,8 @@ <?xml version="1.0"?> <!-- Copyright (c) 2020, The Tor Project, Inc. --> +<?csp default-src chrome: ?> + <window id="onionservices-savedkeys-dialog" windowtype="OnionServices:SavedKeys" ===================================== browser/components/securitylevel/content/securityLevelDialog.xhtml ===================================== @@ -1,5 +1,7 @@ <?xml version="1.0"?> +<?csp default-src chrome: ?> + <window xmlns="http://www.mozilla.org/keymaster/gatekeeper/there.is.only.xul" xmlns:html="http://www.w3.org/1999/xhtml" ===================================== browser/components/torpreferences/content/bridgeQrDialog.xhtml ===================================== @@ -1,5 +1,7 @@ <?xml version="1.0" encoding="UTF-8"?> +<?csp default-src chrome: ?> + <window type="child" xmlns="http://www.mozilla.org/keymaster/gatekeeper/there.is.only.xul" ===================================== browser/components/torpreferences/content/builtinBridgeDialog.xhtml ===================================== @@ -1,5 +1,7 @@ <?xml version="1.0" encoding="UTF-8"?> +<?csp default-src chrome: ?> + <window type="child" xmlns="http://www.mozilla.org/keymaster/gatekeeper/there.is.only.xul" ===================================== browser/components/torpreferences/content/connectionSettingsDialog.xhtml ===================================== @@ -1,5 +1,7 @@ <?xml version="1.0" encoding="UTF-8"?> +<?csp default-src chrome: ?> + <window type="child" xmlns="http://www.mozilla.org/keymaster/gatekeeper/there.is.only.xul" ===================================== browser/components/torpreferences/content/loxInviteDialog.xhtml ===================================== @@ -1,5 +1,7 @@ <?xml version="1.0" encoding="UTF-8"?> +<?csp default-src chrome: ?> + <window type="child" xmlns="http://www.mozilla.org/keymaster/gatekeeper/there.is.only.xul" ===================================== browser/components/torpreferences/content/provideBridgeDialog.xhtml ===================================== @@ -1,5 +1,7 @@ <?xml version="1.0" encoding="UTF-8"?> +<?csp default-src chrome: ?> + <window type="child" xmlns="http://www.mozilla.org/keymaster/gatekeeper/there.is.only.xul" ===================================== browser/components/torpreferences/content/requestBridgeDialog.xhtml ===================================== @@ -1,5 +1,7 @@ <?xml version="1.0" encoding="UTF-8"?> +<?csp default-src chrome:; img-src data: ?> + <window type="child" xmlns="http://www.mozilla.org/keymaster/gatekeeper/there.is.only.xul" ===================================== browser/components/torpreferences/content/torLogDialog.xhtml ===================================== @@ -1,5 +1,7 @@ <?xml version="1.0" encoding="UTF-8"?> +<?csp default-src chrome: ?> + <window type="child" xmlns="http://www.mozilla.org/keymaster/gatekeeper/there.is.only.xul" ===================================== dom/security/nsContentSecurityUtils.cpp ===================================== @@ -1361,6 +1361,7 @@ static nsLiteralCString sImgSrcDataBlobAllowList[] = { "chrome://devtools/content/webconsole/index.html"_ns, "chrome://global/content/alerts/alert.xhtml"_ns, "chrome://global/content/print.html"_ns, + "chrome://browser/content/torpreferences/requestBridgeDialog.xhtml"_ns, }; // img-src https: static nsLiteralCString sImgSrcHttpsAllowList[] = { View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/compare/cca7d6… -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/compare/cca7d6… You're receiving this email because of your account on gitlab.torproject.org.
1 0
0 0
[Git][tpo/applications/tor-browser][tor-browser-140.1.0esr-15.0-1] 4 commits: fixup! TB 40041 [android]: Implement Tor Network Settings
by henry (@henry) 11 Aug '25

11 Aug '25
henry pushed to branch tor-browser-140.1.0esr-15.0-1 at The Tor Project / Applications / Tor Browser Commits: 048a9ee4 by Henry Wilkes at 2025-08-11T08:06:43+00:00 fixup! TB 40041 [android]: Implement Tor Network Settings TB 44069: Update meek name. TB 44083: Capitalise Snowflake name. - - - - - c387352e by Henry Wilkes at 2025-08-11T08:06:43+00:00 fixup! [android] TBA strings TB 44069: Update meek name. TB 44083: Capitalise Snowflake name. - - - - - 308bfd2a by Henry Wilkes at 2025-08-11T08:06:43+00:00 fixup! TB 31286: Implementation of bridge, proxy, and firewall settings in about:preferences#connection TB 44069: Update built-in meek name and description. Also change the radio options strings to have their .label point directly to the corresponding bridge type name string. - - - - - cca7d67e by Henry Wilkes at 2025-08-11T08:06:43+00:00 fixup! Tor Browser strings TB 44069: Update the meek name and description. Update the radio option strings to point their .label directly to the name strings. - - - - - 5 changed files: - browser/components/torpreferences/content/builtinBridgeDialog.xhtml - browser/components/torpreferences/content/connectionPane.js - mobile/android/fenix/app/src/main/res/values/torbrowser_strings.xml - mobile/android/fenix/app/src/main/res/xml/tor_bridge_config_preferences.xml - toolkit/locales/en-US/toolkit/global/tor-browser.ftl Changes: ===================================== browser/components/torpreferences/content/builtinBridgeDialog.xhtml ===================================== @@ -33,7 +33,7 @@ - only the latter description should contribute. --> <radio value="obfs4" - data-l10n-id="built-in-dialog-obfs4-radio-option" + data-l10n-id="built-in-dialog-obfs4-radio-option2" /> <html:span class="bridge-status-badge"> <html:div class="bridge-status-icon"></html:div> @@ -54,7 +54,7 @@ <hbox> <radio value="snowflake" - data-l10n-id="built-in-dialog-snowflake-radio-option" + data-l10n-id="built-in-dialog-snowflake-radio-option2" /> <html:span class="bridge-status-badge"> <html:div class="bridge-status-icon"></html:div> @@ -75,7 +75,7 @@ <hbox> <radio value="meek-azure" - data-l10n-id="built-in-dialog-meek-azure-radio-option" + data-l10n-id="built-in-dialog-meek-radio-option2" /> <html:span class="bridge-status-badge"> <html:div class="bridge-status-icon"></html:div> @@ -88,7 +88,7 @@ </hbox> <html:div class="indent builtin-bridges-option-description" - data-l10n-id="tor-bridges-built-in-meek-azure-description" + data-l10n-id="tor-bridges-built-in-meek-description" > </html:div> </vbox> ===================================== browser/components/torpreferences/content/connectionPane.js ===================================== @@ -1080,8 +1080,8 @@ const gBuiltinBridgesArea = { description: "tor-bridges-built-in-snowflake-description", }, "meek-azure": { - name: "tor-bridges-built-in-meek-azure-name", - description: "tor-bridges-built-in-meek-azure-description", + name: "tor-bridges-built-in-meek-name", + description: "tor-bridges-built-in-meek-description", }, }, ===================================== mobile/android/fenix/app/src/main/res/values/torbrowser_strings.xml ===================================== @@ -23,9 +23,12 @@ <string name="preferences_tor_network_settings_bridge_config_explanation">Bridges are unlisted relays that make it more difficult to block connections to the Tor network. Because of how certain countries try to block Tor, certain bridges work in certain countries but not others.</string> <string name="preferences_tor_network_settings_bridge_config_toggle">Use a Bridge</string> <string name="preferences_tor_network_settings_bridge_config_toggle_description">Config a bridge to connect to Tor</string> + <!-- "obfs4" is a technical name, and likely should not be translated. --> <string name="preferences_tor_network_settings_bridge_config_builtin_bridge_obfs4">obfs4</string> - <string name="preferences_tor_network_settings_bridge_config_builtin_bridge_meek_azure">meek-azure</string> - <string name="preferences_tor_network_settings_bridge_config_builtin_bridge_snowflake">snowflake</string> + <!-- "meek" is a technical name, and likely should not be translated. --> + <string name="preferences_tor_network_settings_bridge_config_builtin_bridge_meek">meek</string> + <!-- "Snowflake" is a proper noun for a type of Tor bridge, and likely should not be translated. --> + <string name="preferences_tor_network_settings_bridge_config_builtin_bridge_snowflake2">Snowflake</string> <string name="preferences_tor_network_settings_bridge_config_user_provided_bridge">Provide a Bridge I know</string> <string name="preferences_tor_network_settings_bridge_config_user_provided_bridge_description">Enter bridge information from a trusted source</string> <string name="preferences_tor_network_settings_bridge_config_current_bridge">Current Configured Bridge: %s</string> ===================================== mobile/android/fenix/app/src/main/res/xml/tor_bridge_config_preferences.xml ===================================== @@ -21,12 +21,12 @@ android:defaultValue="false" android:dependency="@string/pref_key_tor_network_settings_bridge_config_toggle" android:key="@string/pref_key_tor_network_settings_bridge_config_builtin_bridge_meek_azure" - android:title="@string/preferences_tor_network_settings_bridge_config_builtin_bridge_meek_azure" /> + android:title="@string/preferences_tor_network_settings_bridge_config_builtin_bridge_meek" /> <org.mozilla.fenix.settings.RadioButtonPreference android:defaultValue="false" android:dependency="@string/pref_key_tor_network_settings_bridge_config_toggle" android:key="@string/pref_key_tor_network_settings_bridge_config_builtin_bridge_snowflake" - android:title="@string/preferences_tor_network_settings_bridge_config_builtin_bridge_snowflake" /> + android:title="@string/preferences_tor_network_settings_bridge_config_builtin_bridge_snowflake2" /> <EditTextPreference android:dependency="@string/pref_key_tor_network_settings_bridge_config_toggle" android:key="@string/pref_key_tor_network_settings_bridge_config_user_provided_bridge" ===================================== toolkit/locales/en-US/toolkit/global/tor-browser.ftl ===================================== @@ -135,12 +135,12 @@ tor-bridges-built-in-obfs4-description = Makes your Tor traffic look like random tor-bridges-built-in-snowflake-name = Snowflake # "Snowflake" is a proper noun for a type of Tor bridge, and likely should not be translated. tor-bridges-built-in-snowflake-description = Routes your connection through Snowflake proxies to make it look like you’re placing a video call, for example. -# "meek-azure" is a technical name, and likely should not be translated. -tor-bridges-built-in-meek-azure-name = meek-azure -tor-bridges-built-in-meek-azure-description = Makes it look like you’re connected to a Microsoft website, instead of using Tor. May work in heavily censored regions, but is usually very slow. +# "meek" is a technical name, and likely should not be translated. +tor-bridges-built-in-meek-name = meek +tor-bridges-built-in-meek-description = Connects you to the Tor network through a big cloud provider. May work in heavily censored regions, but is usually very slow. # Shown at the start of a Tor bridge line. -# $type (String) - The Tor bridge type ("snowflake", "obfs4", "meek-azure"). +# $type (String) - The Tor bridge type ("snowflake", "obfs4", "meek", etc). tor-bridges-type-prefix = { $type } bridge: # Shown at the start of a Tor bridge line, when the transport type is unknown (or "vanilla"). tor-bridges-type-prefix-generic = Tor bridge: @@ -385,15 +385,12 @@ built-in-dialog-title = .title = Select a Built-In Bridge # -brand-short-name refers to 'Tor Browser', localized. built-in-dialog-introduction = { -brand-short-name } includes some specific types of bridges known as “pluggable transports”, which can help conceal the fact you’re using Tor. -# "obfs4" is a technical name, and likely should not be translated. -built-in-dialog-obfs4-radio-option = - .label = obfs4 -# "Snowflake" is a proper noun for a type of Tor bridge, and likely should not be translated. -built-in-dialog-snowflake-radio-option = - .label = Snowflake -# "meek-azure" is a technical name, and likely should not be translated. -built-in-dialog-meek-azure-radio-option = - .label = meek-azure +built-in-dialog-obfs4-radio-option2 = + .label = { tor-bridges-built-in-obfs4-name } +built-in-dialog-snowflake-radio-option2 = + .label = { tor-bridges-built-in-snowflake-name } +built-in-dialog-meek-radio-option2 = + .label = { tor-bridges-built-in-meek-name } # Label attached to the built-in bridge option that is already in use. # The "aria-label" should use the same text, but include some ending punctuation to separate it from the sentence that follows. This is used for screen reader users. built-in-dialog-current-bridge-label = Current bridge View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/compare/efc66d… -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/compare/efc66d… You're receiving this email because of your account on gitlab.torproject.org.
1 0
0 0
[Git][tpo/applications/mullvad-browser][mullvad-browser-140.1.0esr-15.0-1] fixup! Firefox preference overrides.
by Pier Angelo Vendrame (@pierov) 08 Aug '25

08 Aug '25
Pier Angelo Vendrame pushed to branch mullvad-browser-140.1.0esr-15.0-1 at The Tor Project / Applications / Mullvad Browser Commits: 5aa8703d by Pier Angelo Vendrame at 2025-08-08T18:31:31+02:00 fixup! Firefox preference overrides. BB 44026: Disable the modal with upstream's ToU. We disable data collection, so those terms do not apply to us. Indeed, currently this feature is already gated on the datareporting pref, but since upstream is refactoring these prefs, adding an explicit one seems a good idea. Also, move the datareporting prefs closer to telemetry. - - - - - 1 changed file: - browser/app/profile/001-base-profile.js Changes: ===================================== browser/app/profile/001-base-profile.js ===================================== @@ -202,8 +202,6 @@ pref("browser.safebrowsing.provider.google4.updateURL", ""); pref("browser.safebrowsing.provider.google4.gethashURL", ""); pref("browser.safebrowsing.provider.mozilla.updateURL", ""); pref("browser.safebrowsing.provider.mozilla.gethashURL", ""); -pref("datareporting.healthreport.uploadEnabled", false); -pref("datareporting.policy.dataSubmissionEnabled", false); // tor-browser#42735: Disable recent search suggestions pref("browser.urlbar.recentsearches.featureGate", false); pref("browser.urlbar.suggest.recentsearches", false); @@ -225,6 +223,8 @@ pref("toolkit.telemetry.firstShutdownPing.enabled", false); // Added in tor-brow pref("toolkit.telemetry.updatePing.enabled", false); // Make sure updater telemetry is disabled; see #25909. pref("toolkit.telemetry.bhrPing.enabled", false); pref("toolkit.telemetry.coverage.opt-out", true); +pref("datareporting.healthreport.uploadEnabled", false); +pref("datareporting.policy.dataSubmissionEnabled", false); // Force all telemtry identifier to their canary values tor-browser#43750 pref("toolkit.telemetry.cachedClientID", "c0ffeec0-ffee-c0ff-eec0-ffeec0ffeec0", locked); pref("toolkit.telemetry.cachedProfileGroupID", "decafdec-afde-cafd-ecaf-decafdecafde", locked); @@ -236,6 +236,9 @@ pref("browser.tabs.crashReporting.sendReport", false); pref("browser.crashReports.unsubmittedCheck.autoSubmit2", false); // Added in tor-browser#41496 even though false by default pref("browser.crashReports.unsubmittedCheck.enabled", false); +// tor-browser#44026: Disable the modal that shows upstream terms of usage, +// since we opt out of their telemetry and data collection. +pref("browser.preonboarding.enabled", false); // Disable checkbox in about:neterror that controls // security.xfocsp.errorReporting.automatic. See tor-browser#42653. pref("security.xfocsp.errorReporting.enabled", false); View it on GitLab: https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/5aa… -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/5aa… You're receiving this email because of your account on gitlab.torproject.org.
1 0
0 0
[Git][tpo/applications/tor-browser][base-browser-140.1.0esr-15.0-1] fixup! Firefox preference overrides.
by Pier Angelo Vendrame (@pierov) 08 Aug '25

08 Aug '25
Pier Angelo Vendrame pushed to branch base-browser-140.1.0esr-15.0-1 at The Tor Project / Applications / Tor Browser Commits: cdc07ea9 by Pier Angelo Vendrame at 2025-08-08T18:31:17+02:00 fixup! Firefox preference overrides. BB 44026: Disable the modal with upstream's ToU. We disable data collection, so those terms do not apply to us. Indeed, currently this feature is already gated on the datareporting pref, but since upstream is refactoring these prefs, adding an explicit one seems a good idea. Also, move the datareporting prefs closer to telemetry. - - - - - 1 changed file: - browser/app/profile/001-base-profile.js Changes: ===================================== browser/app/profile/001-base-profile.js ===================================== @@ -202,8 +202,6 @@ pref("browser.safebrowsing.provider.google4.updateURL", ""); pref("browser.safebrowsing.provider.google4.gethashURL", ""); pref("browser.safebrowsing.provider.mozilla.updateURL", ""); pref("browser.safebrowsing.provider.mozilla.gethashURL", ""); -pref("datareporting.healthreport.uploadEnabled", false); -pref("datareporting.policy.dataSubmissionEnabled", false); // tor-browser#42735: Disable recent search suggestions pref("browser.urlbar.recentsearches.featureGate", false); pref("browser.urlbar.suggest.recentsearches", false); @@ -225,6 +223,8 @@ pref("toolkit.telemetry.firstShutdownPing.enabled", false); // Added in tor-brow pref("toolkit.telemetry.updatePing.enabled", false); // Make sure updater telemetry is disabled; see #25909. pref("toolkit.telemetry.bhrPing.enabled", false); pref("toolkit.telemetry.coverage.opt-out", true); +pref("datareporting.healthreport.uploadEnabled", false); +pref("datareporting.policy.dataSubmissionEnabled", false); // Force all telemtry identifier to their canary values tor-browser#43750 pref("toolkit.telemetry.cachedClientID", "c0ffeec0-ffee-c0ff-eec0-ffeec0ffeec0", locked); pref("toolkit.telemetry.cachedProfileGroupID", "decafdec-afde-cafd-ecaf-decafdecafde", locked); @@ -236,6 +236,9 @@ pref("browser.tabs.crashReporting.sendReport", false); pref("browser.crashReports.unsubmittedCheck.autoSubmit2", false); // Added in tor-browser#41496 even though false by default pref("browser.crashReports.unsubmittedCheck.enabled", false); +// tor-browser#44026: Disable the modal that shows upstream terms of usage, +// since we opt out of their telemetry and data collection. +pref("browser.preonboarding.enabled", false); // Disable checkbox in about:neterror that controls // security.xfocsp.errorReporting.automatic. See tor-browser#42653. pref("security.xfocsp.errorReporting.enabled", false); View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/cdc07ea… -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/cdc07ea… You're receiving this email because of your account on gitlab.torproject.org.
1 0
0 0
[Git][tpo/applications/tor-browser][tor-browser-140.1.0esr-15.0-1] fixup! Firefox preference overrides.
by Pier Angelo Vendrame (@pierov) 08 Aug '25

08 Aug '25
Pier Angelo Vendrame pushed to branch tor-browser-140.1.0esr-15.0-1 at The Tor Project / Applications / Tor Browser Commits: efc66d2c by Pier Angelo Vendrame at 2025-08-08T18:29:59+02:00 fixup! Firefox preference overrides. BB 44026: Disable the modal with upstream's ToU. We disable data collection, so those terms do not apply to us. Indeed, currently this feature is already gated on the datareporting pref, but since upstream is refactoring these prefs, adding an explicit one seems a good idea. Also, move the datareporting prefs closer to telemetry. - - - - - 1 changed file: - browser/app/profile/001-base-profile.js Changes: ===================================== browser/app/profile/001-base-profile.js ===================================== @@ -202,8 +202,6 @@ pref("browser.safebrowsing.provider.google4.updateURL", ""); pref("browser.safebrowsing.provider.google4.gethashURL", ""); pref("browser.safebrowsing.provider.mozilla.updateURL", ""); pref("browser.safebrowsing.provider.mozilla.gethashURL", ""); -pref("datareporting.healthreport.uploadEnabled", false); -pref("datareporting.policy.dataSubmissionEnabled", false); // tor-browser#42735: Disable recent search suggestions pref("browser.urlbar.recentsearches.featureGate", false); pref("browser.urlbar.suggest.recentsearches", false); @@ -225,6 +223,8 @@ pref("toolkit.telemetry.firstShutdownPing.enabled", false); // Added in tor-brow pref("toolkit.telemetry.updatePing.enabled", false); // Make sure updater telemetry is disabled; see #25909. pref("toolkit.telemetry.bhrPing.enabled", false); pref("toolkit.telemetry.coverage.opt-out", true); +pref("datareporting.healthreport.uploadEnabled", false); +pref("datareporting.policy.dataSubmissionEnabled", false); // Force all telemtry identifier to their canary values tor-browser#43750 pref("toolkit.telemetry.cachedClientID", "c0ffeec0-ffee-c0ff-eec0-ffeec0ffeec0", locked); pref("toolkit.telemetry.cachedProfileGroupID", "decafdec-afde-cafd-ecaf-decafdecafde", locked); @@ -236,6 +236,9 @@ pref("browser.tabs.crashReporting.sendReport", false); pref("browser.crashReports.unsubmittedCheck.autoSubmit2", false); // Added in tor-browser#41496 even though false by default pref("browser.crashReports.unsubmittedCheck.enabled", false); +// tor-browser#44026: Disable the modal that shows upstream terms of usage, +// since we opt out of their telemetry and data collection. +pref("browser.preonboarding.enabled", false); // Disable checkbox in about:neterror that controls // security.xfocsp.errorReporting.automatic. See tor-browser#42653. pref("security.xfocsp.errorReporting.enabled", false); View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/efc66d2… -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/efc66d2… You're receiving this email because of your account on gitlab.torproject.org.
1 0
0 0
[Git][tpo/applications/tor-browser][tor-browser-140.1.0esr-15.0-1] fixup! TB 40041 [android]: Implement Tor Network Settings
by Dan Ballard (@dan) 07 Aug '25

07 Aug '25
Dan Ballard pushed to branch tor-browser-140.1.0esr-15.0-1 at The Tor Project / Applications / Tor Browser Commits: 1643c744 by clairehurst at 2025-08-07T10:25:07-06:00 fixup! TB 40041 [android]: Implement Tor Network Settings tor-browser#44042 Debug crash when opening settings too quickly after launching app. Clean up surrounding code - - - - - 1 changed file: - mobile/android/fenix/app/src/main/java/org/mozilla/fenix/settings/SettingsFragment.kt Changes: ===================================== mobile/android/fenix/app/src/main/java/org/mozilla/fenix/settings/SettingsFragment.kt ===================================== @@ -34,8 +34,10 @@ import androidx.preference.PreferenceFragmentCompat import androidx.preference.SwitchPreference import androidx.recyclerview.widget.RecyclerView import kotlinx.coroutines.CoroutineScope +import kotlinx.coroutines.Dispatchers import kotlinx.coroutines.delay import kotlinx.coroutines.launch +import kotlinx.coroutines.runBlocking import mozilla.components.browser.state.state.selectedOrDefaultSearchEngine import mozilla.components.concept.engine.Engine import mozilla.components.concept.sync.AccountObserver @@ -189,7 +191,9 @@ class SettingsFragment : PreferenceFragmentCompat(), UserInteractionHandler { } override fun onCreatePreferences(savedInstanceState: Bundle?, rootKey: String?) { - setPreferencesFromResource(R.xml.preferences, rootKey) + runBlocking(context = Dispatchers.IO) { + setPreferencesFromResource(R.xml.preferences, rootKey) + } } override fun onViewCreated(view: View, savedInstanceState: Bundle?) { View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/1643c74… -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/1643c74… You're receiving this email because of your account on gitlab.torproject.org.
1 0
0 0
[Git][tpo/applications/tor-browser][tor-browser-140.1.0esr-15.0-1] fixup! TB 40041 [android]: Implement Tor Network Settings
by Dan Ballard (@dan) 07 Aug '25

07 Aug '25
Dan Ballard pushed to branch tor-browser-140.1.0esr-15.0-1 at The Tor Project / Applications / Tor Browser Commits: 32f432c8 by clairehurst at 2025-08-07T10:20:12-06:00 fixup! TB 40041 [android]: Implement Tor Network Settings tor-browser#44042 Debug crash when opening settings too quickly after launching app. Clean up surrounding code - - - - - 1 changed file: - mobile/android/fenix/app/src/main/java/org/mozilla/fenix/settings/SettingsFragment.kt Changes: ===================================== mobile/android/fenix/app/src/main/java/org/mozilla/fenix/settings/SettingsFragment.kt ===================================== @@ -189,8 +189,6 @@ class SettingsFragment : PreferenceFragmentCompat(), UserInteractionHandler { } override fun onCreatePreferences(savedInstanceState: Bundle?, rootKey: String?) { - //setPreferencesFromResource(R.xml.tor_network_settings_preferences, rootKey) - //setupConnectionPreferences() setPreferencesFromResource(R.xml.preferences, rootKey) } View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/32f432c… -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/32f432c… You're receiving this email because of your account on gitlab.torproject.org.
1 0
0 0
[Git][tpo/applications/tor-browser][base-browser-140.1.0esr-15.0-1] fixup! Firefox preference overrides.
by Pier Angelo Vendrame (@pierov) 07 Aug '25

07 Aug '25
Pier Angelo Vendrame pushed to branch base-browser-140.1.0esr-15.0-1 at The Tor Project / Applications / Tor Browser Commits: 6cb6ea55 by Pier Angelo Vendrame at 2025-08-07T11:43:23+02:00 fixup! Firefox preference overrides. BB 44062: Enable touch events on Windows and Android. Auto-detection makes some properties available on the global scope only when touch support is actually available, but this introduces entorpy. Let's force touch enabled in Windows+Android and disable it elsewhere. This improves consistency with the spoofed number of touch points. - - - - - 1 changed file: - browser/app/profile/001-base-profile.js Changes: ===================================== browser/app/profile/001-base-profile.js ===================================== @@ -443,9 +443,12 @@ pref("dom.webmidi.enabled", false); // Bug 41398: Disable Web MIDI API // randomized IDs when this pref is true). // Defense-in-depth (already the default value) from Firefox 119 or 120. pref("media.devices.enumerate.legacy.enabled", false); -// Bug 10286: Always disable Touch API. -// We might need to deepen this topic, see tor-browser#42069. +// Touch events (tor-browser#10286, tor-browser#42069, tor-browser#44062) +#if defined(XP_WIN) || defined(ANDROID) +pref("dom.w3c_touch_events.enabled", 1); +#else pref("dom.w3c_touch_events.enabled", 0); +#endif #ifndef ANDROID // Bug 42138: Disable touch-based overscroll UX pref("apz.overscroll.enabled", false); View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/6cb6ea5… -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/6cb6ea5… You're receiving this email because of your account on gitlab.torproject.org.
1 0
0 0
[Git][tpo/applications/mullvad-browser][mullvad-browser-140.1.0esr-15.0-1] fixup! Firefox preference overrides.
by Pier Angelo Vendrame (@pierov) 07 Aug '25

07 Aug '25
Pier Angelo Vendrame pushed to branch mullvad-browser-140.1.0esr-15.0-1 at The Tor Project / Applications / Mullvad Browser Commits: 7259b166 by Pier Angelo Vendrame at 2025-08-07T11:42:04+02:00 fixup! Firefox preference overrides. BB 44062: Enable touch events on Windows and Android. Auto-detection makes some properties available on the global scope only when touch support is actually available, but this introduces entorpy. Let's force touch enabled in Windows+Android and disable it elsewhere. This improves consistency with the spoofed number of touch points. - - - - - 1 changed file: - browser/app/profile/001-base-profile.js Changes: ===================================== browser/app/profile/001-base-profile.js ===================================== @@ -443,9 +443,12 @@ pref("dom.webmidi.enabled", false); // Bug 41398: Disable Web MIDI API // randomized IDs when this pref is true). // Defense-in-depth (already the default value) from Firefox 119 or 120. pref("media.devices.enumerate.legacy.enabled", false); -// Bug 10286: Always disable Touch API. -// We might need to deepen this topic, see tor-browser#42069. +// Touch events (tor-browser#10286, tor-browser#42069, tor-browser#44062) +#if defined(XP_WIN) || defined(ANDROID) +pref("dom.w3c_touch_events.enabled", 1); +#else pref("dom.w3c_touch_events.enabled", 0); +#endif #ifndef ANDROID // Bug 42138: Disable touch-based overscroll UX pref("apz.overscroll.enabled", false); View it on GitLab: https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/725… -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/725… You're receiving this email because of your account on gitlab.torproject.org.
1 0
0 0
[Git][tpo/applications/tor-browser][tor-browser-140.1.0esr-15.0-1] fixup! Firefox preference overrides.
by Pier Angelo Vendrame (@pierov) 07 Aug '25

07 Aug '25
Pier Angelo Vendrame pushed to branch tor-browser-140.1.0esr-15.0-1 at The Tor Project / Applications / Tor Browser Commits: fbc1f480 by Pier Angelo Vendrame at 2025-08-07T11:39:52+02:00 fixup! Firefox preference overrides. BB 44062: Enable touch events on Windows and Android. Auto-detection makes some properties available on the global scope only when touch support is actually available, but this introduces entorpy. Let's force touch enabled in Windows+Android and disable it elsewhere. This improves consistency with the spoofed number of touch points. - - - - - 2 changed files: - browser/app/profile/001-base-profile.js - mobile/android/app/000-tor-browser-android.js Changes: ===================================== browser/app/profile/001-base-profile.js ===================================== @@ -443,9 +443,12 @@ pref("dom.webmidi.enabled", false); // Bug 41398: Disable Web MIDI API // randomized IDs when this pref is true). // Defense-in-depth (already the default value) from Firefox 119 or 120. pref("media.devices.enumerate.legacy.enabled", false); -// Bug 10286: Always disable Touch API. -// We might need to deepen this topic, see tor-browser#42069. +// Touch events (tor-browser#10286, tor-browser#42069, tor-browser#44062) +#if defined(XP_WIN) || defined(ANDROID) +pref("dom.w3c_touch_events.enabled", 1); +#else pref("dom.w3c_touch_events.enabled", 0); +#endif #ifndef ANDROID // Bug 42138: Disable touch-based overscroll UX pref("apz.overscroll.enabled", false); ===================================== mobile/android/app/000-tor-browser-android.js ===================================== @@ -23,9 +23,6 @@ pref("privacy.clearOnShutdown.siteSettings", true); // controls if we want camera support pref("media.realtime_decoder.enabled", false); -// Enable touch events on Android (highlighting text, etc) -pref("dom.w3c_touch_events.enabled", 2); - // No HLS support for now due to browser freezing, see: #29859. pref("media.hls.enabled", false); View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/fbc1f48… -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/fbc1f48… You're receiving this email because of your account on gitlab.torproject.org.
1 0
0 0
[Git][tpo/applications/tor-browser-build][main] Bug 41442: Update the generate-bugzilla-triage-csv script for Tor Browser 16.0
by Pier Angelo Vendrame (@pierov) 07 Aug '25

07 Aug '25
Pier Angelo Vendrame pushed to branch main at The Tor Project / Applications / tor-browser-build Commits: c088e842 by Morgan at 2025-08-06T18:10:21+00:00 Bug 41442: Update the generate-bugzilla-triage-csv script for Tor Browser 16.0 - - - - - 1 changed file: - tools/browser/generate-bugzilla-triage-csv Changes: ===================================== tools/browser/generate-bugzilla-triage-csv ===================================== @@ -1,8 +1,14 @@ #!/usr/bin/env bash # gitlab labels for review tickets -browser_label="15.0 stable" -esr_label="esr-140" +browser_label="Apps::Product::TorBrowser" +esr_label="esr-next" +priority_label="Priority::Blocker" +impact_label="Impact::Unknown" +type_label="Apps::Type::Audit" + +# milestone for the next major Tor Browser release +milestone="Tor Browser 16.0" # prints to stderr function echoerr() { echo "$@" 1>&2; } @@ -10,18 +16,17 @@ function echoerr() { echo "$@" 1>&2; } script_dir=$(dirname "${BASH_ARGV0:-$0}") # help dialog -if [ "$#" -lt 5 ]; then - echoerr "Usage: $0 <ff-version> <begin-commit> <end-commit> <gitlab-audit-issue> <reviewers...>" +if [ "$#" -ne 4 ]; then + echoerr "Usage: $0 <ff-version> <begin-commit> <end-commit> <gitlab-audit-issue>" echoerr echoerr "ff-version rapid-release Firefox version to audit" - echoerr "begin-commit starting gecko-dev commit of this Firefox version" - echoerr "end-commit ending gecko-dev commit of this Firefox version" + echoerr "begin-commit starting firefox commit of this Firefox version" + echoerr "end-commit ending firefox commit of this Firefox version" echoerr "gitlab-audit-issue tor-browser GitLab issue number for this audit" - echoerr "reviewers... space-separated list of reviewers responsible for this audit" echoerr "" echoerr "Example:" echoerr "" - echoerr "$0 129 FIREFOX_NIGHTLY_128_END FIREFOX_NIGHTLY_129_END 43303 morgan pierov henry" + echoerr "$0 129 FIREFOX_NIGHTLY_128_END FIREFOX_NIGHTLY_129_END 43303" exit 1 fi @@ -219,7 +224,8 @@ jq '. | sort_by([.component, .id])[] | "\(.id)|\(.component)|\(.summary)"' ${uni # review issue title new_issue_title=$(url_encode "Review Mozilla ${id}: ${summary_short}") # review issue description + labeling (14.0 stable, FF128-esr, Next) - new_issue_description=$(url_encode "### Bugzilla: ${bugzilla_url}")%0A$(url_encode "/label ~\"${browser_label}\" ~\"${esr_label}\" ~\"Bugzilla Review\" ~Next")%0A$(url_encode "/relate tpo/applications/tor-browser#${audit_issue}")%0A%0A$(url_encode "<!-- briefly describe why this issue needs further review -->")%0A + new_issue_description=$(url_encode "### Bugzilla: ${bugzilla_url}")%0A$(url_encode "/label ~\"${browser_label}\" ~\"${esr_label}\" ~\"${priority_label}\" ~\"${impact_label}\" ~\"${type_label}\"")%0A$(url_encode "/milestone %\"{milestone}\"")%0A$(url_encode "/relate tpo/applications/tor-browser#${audit_issue}")%0A%0A$(url_encode "<!-- briefly describe why this issue needs further review -->")%0A + # url which create's new issue with title and description pre-populated new_issue_url="https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/new?iss…" @@ -231,12 +237,6 @@ jq '. | sort_by([.component, .id])[] | "\(.id)|\(.component)|\(.summary)"' ${uni fi done -echo -echo "\"Triaged by:\"" -for reviewer in $reviewers; do - reviewer=$(csv_escape "${reviewer}") - echo "\"FALSE\",\"${reviewer}\"" -done echo bugzilla_query="=HYPERLINK(\"${bugzilla_query}\", \"Bugzilla query\")" View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/commit/c… -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/commit/c… You're receiving this email because of your account on gitlab.torproject.org.
1 0
0 0
[Git][tpo/applications/mullvad-browser][mullvad-browser-140.1.0esr-15.0-1] fixup! Base Browser's .mozconfigs.
by Pier Angelo Vendrame (@pierov) 06 Aug '25

06 Aug '25
Pier Angelo Vendrame pushed to branch mullvad-browser-140.1.0esr-15.0-1 at The Tor Project / Applications / Mullvad Browser Commits: fd1cb0c8 by Pier Angelo Vendrame at 2025-08-06T19:36:44+02:00 fixup! Base Browser's .mozconfigs. BB 44067: Build geckodriver only on Linux. After Bug 1908788, geckodriver has become a host tool. So, even when we cross-compile, we get Linux binaries, and we stopped shipping them in tor-browser-build. Therefore, we can disable also their compilation. - - - - - 2 changed files: - browser/config/mozconfigs/base-browser - mozconfig-linux-x86_64 Changes: ===================================== browser/config/mozconfigs/base-browser ===================================== @@ -41,6 +41,3 @@ ac_add_options --disable-legacy-profile-creation if test -z "$WASI_SYSROOT"; then ac_add_options --without-wasm-sandboxed-libraries fi - -# tor-browser#42337 -ac_add_options --enable-geckodriver ===================================== mozconfig-linux-x86_64 ===================================== @@ -11,3 +11,5 @@ ac_add_options --enable-default-toolkit=cairo-gtk3 # Let's make sure no preference is enabling either Adobe's or Google's CDM. ac_add_options --disable-eme +# tor-browser#44067: geckodriver has become a host-only tool +ac_add_options --enable-geckodriver View it on GitLab: https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/fd1… -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/fd1… You're receiving this email because of your account on gitlab.torproject.org.
1 0
0 0
[Git][tpo/applications/tor-browser][base-browser-140.1.0esr-15.0-1] fixup! Base Browser's .mozconfigs.
by Pier Angelo Vendrame (@pierov) 06 Aug '25

06 Aug '25
Pier Angelo Vendrame pushed to branch base-browser-140.1.0esr-15.0-1 at The Tor Project / Applications / Tor Browser Commits: d7bd2c46 by Pier Angelo Vendrame at 2025-08-06T19:35:36+02:00 fixup! Base Browser's .mozconfigs. BB 44067: Build geckodriver only on Linux. After Bug 1908788, geckodriver has become a host tool. So, even when we cross-compile, we get Linux binaries, and we stopped shipping them in tor-browser-build. Therefore, we can disable also their compilation. - - - - - 2 changed files: - browser/config/mozconfigs/base-browser - mozconfig-linux-x86_64 Changes: ===================================== browser/config/mozconfigs/base-browser ===================================== @@ -47,7 +47,4 @@ if test -z "$WASI_SYSROOT"; then ac_add_options --without-wasm-sandboxed-libraries fi -# tor-browser#42337 -ac_add_options --enable-geckodriver - ac_add_options --with-relative-data-dir=BaseBrowser/Data/Browser ===================================== mozconfig-linux-x86_64 ===================================== @@ -11,3 +11,5 @@ ac_add_options --enable-default-toolkit=cairo-gtk3 # Let's make sure no preference is enabling either Adobe's or Google's CDM. ac_add_options --disable-eme +# tor-browser#44067: geckodriver has become a host-only tool +ac_add_options --enable-geckodriver View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/d7bd2c4… -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/d7bd2c4… You're receiving this email because of your account on gitlab.torproject.org.
1 0
0 0
[Git][tpo/applications/tor-browser][tor-browser-140.1.0esr-15.0-1] fixup! Base Browser's .mozconfigs.
by Pier Angelo Vendrame (@pierov) 06 Aug '25

06 Aug '25
Pier Angelo Vendrame pushed to branch tor-browser-140.1.0esr-15.0-1 at The Tor Project / Applications / Tor Browser Commits: 47265bc8 by Pier Angelo Vendrame at 2025-08-06T18:35:32+02:00 fixup! Base Browser's .mozconfigs. BB 44067: Build geckodriver only on Linux. After Bug 1908788, geckodriver has become a host tool. So, even when we cross-compile, we get Linux binaries, and we stopped shipping them in tor-browser-build. Therefore, we can disable also their compilation. - - - - - 2 changed files: - browser/config/mozconfigs/base-browser - mozconfig-linux-x86_64 Changes: ===================================== browser/config/mozconfigs/base-browser ===================================== @@ -43,6 +43,3 @@ ac_add_options --disable-legacy-profile-creation if test -z "$WASI_SYSROOT"; then ac_add_options --without-wasm-sandboxed-libraries fi - -# tor-browser#42337 -ac_add_options --enable-geckodriver ===================================== mozconfig-linux-x86_64 ===================================== @@ -11,3 +11,5 @@ ac_add_options --enable-default-toolkit=cairo-gtk3 # Let's make sure no preference is enabling either Adobe's or Google's CDM. ac_add_options --disable-eme +# tor-browser#44067: geckodriver has become a host-only tool +ac_add_options --enable-geckodriver View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/47265bc… -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/47265bc… You're receiving this email because of your account on gitlab.torproject.org.
1 0
0 0
[Git][tpo/applications/mullvad-browser][mullvad-browser-140.1.0esr-15.0-1] fixup! Firefox preference overrides.
by brizental (@brizental) 05 Aug '25

05 Aug '25
brizental pushed to branch mullvad-browser-140.1.0esr-15.0-1 at The Tor Project / Applications / Mullvad Browser Commits: 392f3202 by Beatriz Rizental at 2025-08-05T18:33:36+02:00 fixup! Firefox preference overrides. - - - - - 1 changed file: - browser/app/profile/001-base-profile.js Changes: ===================================== browser/app/profile/001-base-profile.js ===================================== @@ -225,6 +225,11 @@ pref("toolkit.telemetry.firstShutdownPing.enabled", false); // Added in tor-brow pref("toolkit.telemetry.updatePing.enabled", false); // Make sure updater telemetry is disabled; see #25909. pref("toolkit.telemetry.bhrPing.enabled", false); pref("toolkit.telemetry.coverage.opt-out", true); +// Force all telemtry identifier to their canary values tor-browser#43750 +pref("toolkit.telemetry.cachedClientID", "c0ffeec0-ffee-c0ff-eec0-ffeec0ffeec0", locked); +pref("toolkit.telemetry.cachedProfileGroupID", "decafdec-afde-cafd-ecaf-decafdecafde", locked); +pref("datareporting.dau.cachedUsageProfileID", "beefbeef-beef-beef-beef-beeefbeefbee", locked); +pref("datareporting.dau.cachedUsageProfileGroupID", "b0bacafe-b0ba-cafe-b0ba-cafeb0bacafe", locked); pref("toolkit.coverage.opt-out", true); pref("toolkit.coverage.endpoint.base", ""); pref("browser.tabs.crashReporting.sendReport", false); View it on GitLab: https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/392… -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/392… You're receiving this email because of your account on gitlab.torproject.org.
1 0
0 0
[Git][tpo/applications/tor-browser][base-browser-140.1.0esr-15.0-1] fixup! Firefox preference overrides.
by brizental (@brizental) 05 Aug '25

05 Aug '25
brizental pushed to branch base-browser-140.1.0esr-15.0-1 at The Tor Project / Applications / Tor Browser Commits: e7eb3783 by Beatriz Rizental at 2025-08-05T18:28:59+02:00 fixup! Firefox preference overrides. - - - - - 1 changed file: - browser/app/profile/001-base-profile.js Changes: ===================================== browser/app/profile/001-base-profile.js ===================================== @@ -225,6 +225,11 @@ pref("toolkit.telemetry.firstShutdownPing.enabled", false); // Added in tor-brow pref("toolkit.telemetry.updatePing.enabled", false); // Make sure updater telemetry is disabled; see #25909. pref("toolkit.telemetry.bhrPing.enabled", false); pref("toolkit.telemetry.coverage.opt-out", true); +// Force all telemtry identifier to their canary values tor-browser#43750 +pref("toolkit.telemetry.cachedClientID", "c0ffeec0-ffee-c0ff-eec0-ffeec0ffeec0", locked); +pref("toolkit.telemetry.cachedProfileGroupID", "decafdec-afde-cafd-ecaf-decafdecafde", locked); +pref("datareporting.dau.cachedUsageProfileID", "beefbeef-beef-beef-beef-beeefbeefbee", locked); +pref("datareporting.dau.cachedUsageProfileGroupID", "b0bacafe-b0ba-cafe-b0ba-cafeb0bacafe", locked); pref("toolkit.coverage.opt-out", true); pref("toolkit.coverage.endpoint.base", ""); pref("browser.tabs.crashReporting.sendReport", false); View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/e7eb378… -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/e7eb378… You're receiving this email because of your account on gitlab.torproject.org.
1 0
0 0
[Git][tpo/applications/tor-browser][tor-browser-140.1.0esr-15.0-1] fixup! Firefox preference overrides.
by brizental (@brizental) 05 Aug '25

05 Aug '25
brizental pushed to branch tor-browser-140.1.0esr-15.0-1 at The Tor Project / Applications / Tor Browser Commits: 55b07453 by Beatriz Rizental at 2025-08-05T17:45:48+02:00 fixup! Firefox preference overrides. - - - - - 1 changed file: - browser/app/profile/001-base-profile.js Changes: ===================================== browser/app/profile/001-base-profile.js ===================================== @@ -225,6 +225,11 @@ pref("toolkit.telemetry.firstShutdownPing.enabled", false); // Added in tor-brow pref("toolkit.telemetry.updatePing.enabled", false); // Make sure updater telemetry is disabled; see #25909. pref("toolkit.telemetry.bhrPing.enabled", false); pref("toolkit.telemetry.coverage.opt-out", true); +// Force all telemtry identifier to their canary values tor-browser#43750 +pref("toolkit.telemetry.cachedClientID", "c0ffeec0-ffee-c0ff-eec0-ffeec0ffeec0", locked); +pref("toolkit.telemetry.cachedProfileGroupID", "decafdec-afde-cafd-ecaf-decafdecafde", locked); +pref("datareporting.dau.cachedUsageProfileID", "beefbeef-beef-beef-beef-beeefbeefbee", locked); +pref("datareporting.dau.cachedUsageProfileGroupID", "b0bacafe-b0ba-cafe-b0ba-cafeb0bacafe", locked); pref("toolkit.coverage.opt-out", true); pref("toolkit.coverage.endpoint.base", ""); pref("browser.tabs.crashReporting.sendReport", false); View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/55b0745… -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/55b0745… You're receiving this email because of your account on gitlab.torproject.org.
1 0
0 0
[Git][tpo/applications/mullvad-browser][mullvad-browser-140.1.0esr-15.0-1] 4 commits: dropme! fixup! MB 1: Mullvad Browser branding
by henry (@henry) 05 Aug '25

05 Aug '25
henry pushed to branch mullvad-browser-140.1.0esr-15.0-1 at The Tor Project / Applications / Mullvad Browser Commits: f5000c1f by Henry Wilkes at 2025-08-05T16:34:57+01:00 dropme! fixup! MB 1: Mullvad Browser branding TB 43864: Move moz-support-link "preferences" patch out of mullvad-browser commits. The target commit no longer needs to modify moz-support-link.mjs since the changes were moved to base-browser. - - - - - 9ba2a7bf by Henry Wilkes at 2025-08-05T16:35:17+01:00 fixup! BB 42583: Modify moz-support-link for Base Browser. TB 43864: Move moz-support-link "preferences" patch to base-browser. - - - - - bf086fe6 by Henry Wilkes at 2025-08-05T16:35:18+01:00 fixup! MB 38: Mullvad Browser configuration TB 43864: Move to Mullvad Browser help URL to preferences. - - - - - 9fe4d6f4 by Henry Wilkes at 2025-08-05T16:35:19+01:00 BB 43864: Modify the urlbar for Base Browser. - - - - - 4 changed files: - browser/app/profile/000-mullvad-browser.js - browser/components/urlbar/QuickActionsLoaderDefault.sys.mjs - browser/components/urlbar/SearchModeSwitcher.sys.mjs - toolkit/content/widgets/moz-support-link/moz-support-link.mjs Changes: ===================================== browser/app/profile/000-mullvad-browser.js ===================================== @@ -2,6 +2,9 @@ pref("browser.startup.homepage", "about:mullvad-browser"); +// General browser support url. tor-browser#43864 and mullvad-browser#244. +pref("browser.base-browser-support-url", "https://mullvad.net/en/help/"); + // Do not show the bookmark panel for now, because it makes the initial browser // window (about:home) bigger, and regular pages will show letterbox margins as // a result. ===================================== browser/components/urlbar/QuickActionsLoaderDefault.sys.mjs ===================================== @@ -13,6 +13,7 @@ ChromeUtils.defineESModuleGetters(lazy, { ScreenshotsUtils: "resource:///modules/ScreenshotsUtils.sys.mjs", ActionsProviderQuickActions: "resource:///modules/ActionsProviderQuickActions.sys.mjs", + PrivateBrowsingUtils: "resource://gre/modules/PrivateBrowsingUtils.sys.mjs", }); import { AppConstants } from "resource://gre/modules/AppConstants.sys.mjs"; @@ -78,6 +79,9 @@ const DEFAULT_ACTIONS = { icon: "chrome://mozapps/skin/extensions/category-extensions.svg", label: "quickactions-addons", onPick: openAddonsUrl("addons://discover/"), + // Hide in base-browser, since we don't want to open extensions + // "recommendations" tab. tor-browser#43864. + disabled: () => true, }, bookmarks: { l10nCommands: ["quickactions-cmd-bookmarks", "quickactions-bookmarks2"], @@ -100,6 +104,12 @@ const DEFAULT_ACTIONS = { .document.getElementById("Tools:Sanitize") .doCommand(); }, + // Disable in permanent private browsing. tor-browser#43864. + // NOTE: This should also be disabled in private windows, but we don't have + // access to a Window element to check. See mozilla bug 1980912. + disabled: () => { + return lazy.PrivateBrowsingUtils.permanentPrivateBrowsing; + }, }, downloads: { l10nCommands: ["quickactions-cmd-downloads"], @@ -112,13 +122,18 @@ const DEFAULT_ACTIONS = { icon: "chrome://mozapps/skin/extensions/category-extensions.svg", label: "quickactions-extensions", onPick: openAddonsUrl("addons://list/extension"), + // Hide in base-browser since we do not want to encourage users to change + // their extensions/addons. tor-browser#43864. + disabled: () => true, }, help: { l10nCommands: ["quickactions-cmd-help"], icon: "chrome://global/skin/icons/help.svg", label: "quickactions-help", + // Open the base-browser support/help page, rather than Firefox's. + // tor-browser#43864. onPick: openUrlFun( - "https://support.mozilla.org/products/firefox?as=u&utm_source=inproduct" + Services.prefs.getStringPref("browser.base-browser-support-url", "") ), }, firefoxview: { @@ -128,6 +143,9 @@ const DEFAULT_ACTIONS = { onPick: () => { lazy.BrowserWindowTracker.getTopWindow().FirefoxViewHandler.openTab(); }, + // Hide in base-browser since firefoxview is disabled. + // tor-browser#43864 and tor-browser#42037. + disabled: () => true, }, inspect: { l10nCommands: ["quickactions-cmd-inspector2"], @@ -311,6 +329,9 @@ export class QuickActionsLoaderDefault { let keys = Object.keys(DEFAULT_ACTIONS); for (const key of keys) { let actionData = DEFAULT_ACTIONS[key]; + if (actionData.disabled?.()) { + continue; + } let messages = await lazy.gFluentStrings.formatMessages( actionData.l10nCommands.map(id => ({ id })) ); ===================================== browser/components/urlbar/SearchModeSwitcher.sys.mjs ===================================== @@ -413,6 +413,15 @@ export class SearchModeSwitcher { if (!lazy.UrlbarPrefs.get(pref)) { continue; } + if ( + source === lazy.UrlbarUtils.RESULT_SOURCE.HISTORY && + lazy.PrivateBrowsingUtils.permanentPrivateBrowsing + ) { + // Do not show the search history option in PBM. tor-browser#43864. + // Although, it can still be triggered with "^" restrict keyword or + // through an app menu item. See also mozilla bug 1980928. + continue; + } let name = lazy.UrlbarUtils.getResultSourceName(source); let { icon } = await this.#getDisplayedEngineDetails({ source, ===================================== toolkit/content/widgets/moz-support-link/moz-support-link.mjs ===================================== @@ -125,11 +125,21 @@ export default class MozSupportLink extends HTMLAnchorElement { return; } let supportPage = this.getAttribute("support-page") ?? ""; - // Customize the link in about:preferences. - // See mullvad-browser#244 and tor-browser#41910. - if (supportPage === "preferences") { - this.href = "https://mullvad.net/en/help/"; - return; + // For base-browser we sometimes want to override firefox support links with + // our own. + // See tor-browser#40899. + switch (supportPage) { + case "preferences": + // Shown twice in preferences, both as `{ -brand-short-name } Support`. + // Instead of directing to support for preferences, we link to general + // tor browser support. + // See tor-browser#32092. + this.href = Services.prefs.getStringPref( + "browser.base-browser-support-url", + "" + ); + return; + // Fall through to support.mozilla.org } let base = MozSupportLink.SUPPORT_URL + supportPage; this.href = this.hasAttribute("utm-content") View it on GitLab: https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/compare/6e… -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/compare/6e… You're receiving this email because of your account on gitlab.torproject.org.
1 0
0 0
[Git][tpo/applications/tor-browser][base-browser-140.1.0esr-15.0-1] BB 43864: Modify the urlbar for Base Browser.
by henry (@henry) 05 Aug '25

05 Aug '25
henry pushed to branch base-browser-140.1.0esr-15.0-1 at The Tor Project / Applications / Tor Browser Commits: 1d477c7c by henry at 2025-08-05T15:33:07+00:00 BB 43864: Modify the urlbar for Base Browser. (cherry picked from commit 6167738479a9508101c62d2114939c3aa3a5e482) Co-authored-by: Henry Wilkes <henry(a)torproject.org> - - - - - 2 changed files: - browser/components/urlbar/QuickActionsLoaderDefault.sys.mjs - browser/components/urlbar/SearchModeSwitcher.sys.mjs Changes: ===================================== browser/components/urlbar/QuickActionsLoaderDefault.sys.mjs ===================================== @@ -13,6 +13,7 @@ ChromeUtils.defineESModuleGetters(lazy, { ScreenshotsUtils: "resource:///modules/ScreenshotsUtils.sys.mjs", ActionsProviderQuickActions: "resource:///modules/ActionsProviderQuickActions.sys.mjs", + PrivateBrowsingUtils: "resource://gre/modules/PrivateBrowsingUtils.sys.mjs", }); import { AppConstants } from "resource://gre/modules/AppConstants.sys.mjs"; @@ -78,6 +79,9 @@ const DEFAULT_ACTIONS = { icon: "chrome://mozapps/skin/extensions/category-extensions.svg", label: "quickactions-addons", onPick: openAddonsUrl("addons://discover/"), + // Hide in base-browser, since we don't want to open extensions + // "recommendations" tab. tor-browser#43864. + disabled: () => true, }, bookmarks: { l10nCommands: ["quickactions-cmd-bookmarks", "quickactions-bookmarks2"], @@ -100,6 +104,12 @@ const DEFAULT_ACTIONS = { .document.getElementById("Tools:Sanitize") .doCommand(); }, + // Disable in permanent private browsing. tor-browser#43864. + // NOTE: This should also be disabled in private windows, but we don't have + // access to a Window element to check. See mozilla bug 1980912. + disabled: () => { + return lazy.PrivateBrowsingUtils.permanentPrivateBrowsing; + }, }, downloads: { l10nCommands: ["quickactions-cmd-downloads"], @@ -112,13 +122,18 @@ const DEFAULT_ACTIONS = { icon: "chrome://mozapps/skin/extensions/category-extensions.svg", label: "quickactions-extensions", onPick: openAddonsUrl("addons://list/extension"), + // Hide in base-browser since we do not want to encourage users to change + // their extensions/addons. tor-browser#43864. + disabled: () => true, }, help: { l10nCommands: ["quickactions-cmd-help"], icon: "chrome://global/skin/icons/help.svg", label: "quickactions-help", + // Open the base-browser support/help page, rather than Firefox's. + // tor-browser#43864. onPick: openUrlFun( - "https://support.mozilla.org/products/firefox?as=u&utm_source=inproduct" + Services.prefs.getStringPref("browser.base-browser-support-url", "") ), }, firefoxview: { @@ -128,6 +143,9 @@ const DEFAULT_ACTIONS = { onPick: () => { lazy.BrowserWindowTracker.getTopWindow().FirefoxViewHandler.openTab(); }, + // Hide in base-browser since firefoxview is disabled. + // tor-browser#43864 and tor-browser#42037. + disabled: () => true, }, inspect: { l10nCommands: ["quickactions-cmd-inspector2"], @@ -311,6 +329,9 @@ export class QuickActionsLoaderDefault { let keys = Object.keys(DEFAULT_ACTIONS); for (const key of keys) { let actionData = DEFAULT_ACTIONS[key]; + if (actionData.disabled?.()) { + continue; + } let messages = await lazy.gFluentStrings.formatMessages( actionData.l10nCommands.map(id => ({ id })) ); ===================================== browser/components/urlbar/SearchModeSwitcher.sys.mjs ===================================== @@ -413,6 +413,15 @@ export class SearchModeSwitcher { if (!lazy.UrlbarPrefs.get(pref)) { continue; } + if ( + source === lazy.UrlbarUtils.RESULT_SOURCE.HISTORY && + lazy.PrivateBrowsingUtils.permanentPrivateBrowsing + ) { + // Do not show the search history option in PBM. tor-browser#43864. + // Although, it can still be triggered with "^" restrict keyword or + // through an app menu item. See also mozilla bug 1980928. + continue; + } let name = lazy.UrlbarUtils.getResultSourceName(source); let { icon } = await this.#getDisplayedEngineDetails({ source, View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/1d477c7… -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/1d477c7… You're receiving this email because of your account on gitlab.torproject.org.
1 0
0 0
[Git][tpo/applications/tor-browser][base-browser-140.1.0esr-15.0-1] fixup! BB 42583: Modify moz-support-link for Base Browser.
by henry (@henry) 05 Aug '25

05 Aug '25
henry pushed to branch base-browser-140.1.0esr-15.0-1 at The Tor Project / Applications / Tor Browser Commits: 36a296b5 by henry at 2025-08-05T15:32:09+00:00 fixup! BB 42583: Modify moz-support-link for Base Browser. TB 43864: Move moz-support-link "preferences" patch to base-browser. (cherry picked from commit be0e53370b89b47cebec8bdc38a3c2385773f249) Co-authored-by: Henry Wilkes <henry(a)torproject.org> - - - - - 1 changed file: - toolkit/content/widgets/moz-support-link/moz-support-link.mjs Changes: ===================================== toolkit/content/widgets/moz-support-link/moz-support-link.mjs ===================================== @@ -125,6 +125,22 @@ export default class MozSupportLink extends HTMLAnchorElement { return; } let supportPage = this.getAttribute("support-page") ?? ""; + // For base-browser we sometimes want to override firefox support links with + // our own. + // See tor-browser#40899. + switch (supportPage) { + case "preferences": + // Shown twice in preferences, both as `{ -brand-short-name } Support`. + // Instead of directing to support for preferences, we link to general + // tor browser support. + // See tor-browser#32092. + this.href = Services.prefs.getStringPref( + "browser.base-browser-support-url", + "" + ); + return; + // Fall through to support.mozilla.org + } let base = MozSupportLink.SUPPORT_URL + supportPage; this.href = this.hasAttribute("utm-content") ? formatUTMParams(this.getAttribute("utm-content"), base) View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/36a296b… -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/36a296b… You're receiving this email because of your account on gitlab.torproject.org.
1 0
0 0
[Git][tpo/applications/tor-browser][tor-browser-140.1.0esr-15.0-1] 4 commits: dropme! fixup! TB 42583: Modify moz-support-link for Tor Browser.
by henry (@henry) 05 Aug '25

05 Aug '25
henry pushed to branch tor-browser-140.1.0esr-15.0-1 at The Tor Project / Applications / Tor Browser Commits: f5edc9e2 by Henry Wilkes at 2025-08-05T15:30:39+00:00 dropme! fixup! TB 42583: Modify moz-support-link for Tor Browser. TB 43864: Move moz-support-link "preferences" patch out of tor-browser commits. Should be dropped at the next rebase. - - - - - be0e5337 by Henry Wilkes at 2025-08-05T15:30:39+00:00 fixup! BB 42583: Modify moz-support-link for Base Browser. TB 43864: Move moz-support-link "preferences" patch to base-browser. - - - - - 26f33db1 by Henry Wilkes at 2025-08-05T15:30:39+00:00 fixup! TB 40562: Added Tor Browser preferences to 000-tor-browser.js TB 43864: Move to Tor Browser help URL to preferences. - - - - - 61677384 by Henry Wilkes at 2025-08-05T15:30:39+00:00 BB 43864: Modify the urlbar for Base Browser. - - - - - 4 changed files: - browser/app/profile/000-tor-browser.js - browser/components/urlbar/QuickActionsLoaderDefault.sys.mjs - browser/components/urlbar/SearchModeSwitcher.sys.mjs - toolkit/content/widgets/moz-support-link/moz-support-link.mjs Changes: ===================================== browser/app/profile/000-tor-browser.js ===================================== @@ -48,6 +48,9 @@ pref("extensions.torbutton.use_nontor_proxy", false); // Browser home page: pref("browser.startup.homepage", "about:tor"); +// General browser support url. tor-browser#43864 and tor-browser#40899. +pref("browser.base-browser-support-url", "https://support.torproject.org/tbb"); + // tor-browser#40701: Add new download warning pref("browser.download.showTorWarning", true); ===================================== browser/components/urlbar/QuickActionsLoaderDefault.sys.mjs ===================================== @@ -13,6 +13,7 @@ ChromeUtils.defineESModuleGetters(lazy, { ScreenshotsUtils: "resource:///modules/ScreenshotsUtils.sys.mjs", ActionsProviderQuickActions: "resource:///modules/ActionsProviderQuickActions.sys.mjs", + PrivateBrowsingUtils: "resource://gre/modules/PrivateBrowsingUtils.sys.mjs", }); import { AppConstants } from "resource://gre/modules/AppConstants.sys.mjs"; @@ -78,6 +79,9 @@ const DEFAULT_ACTIONS = { icon: "chrome://mozapps/skin/extensions/category-extensions.svg", label: "quickactions-addons", onPick: openAddonsUrl("addons://discover/"), + // Hide in base-browser, since we don't want to open extensions + // "recommendations" tab. tor-browser#43864. + disabled: () => true, }, bookmarks: { l10nCommands: ["quickactions-cmd-bookmarks", "quickactions-bookmarks2"], @@ -100,6 +104,12 @@ const DEFAULT_ACTIONS = { .document.getElementById("Tools:Sanitize") .doCommand(); }, + // Disable in permanent private browsing. tor-browser#43864. + // NOTE: This should also be disabled in private windows, but we don't have + // access to a Window element to check. See mozilla bug 1980912. + disabled: () => { + return lazy.PrivateBrowsingUtils.permanentPrivateBrowsing; + }, }, downloads: { l10nCommands: ["quickactions-cmd-downloads"], @@ -112,13 +122,18 @@ const DEFAULT_ACTIONS = { icon: "chrome://mozapps/skin/extensions/category-extensions.svg", label: "quickactions-extensions", onPick: openAddonsUrl("addons://list/extension"), + // Hide in base-browser since we do not want to encourage users to change + // their extensions/addons. tor-browser#43864. + disabled: () => true, }, help: { l10nCommands: ["quickactions-cmd-help"], icon: "chrome://global/skin/icons/help.svg", label: "quickactions-help", + // Open the base-browser support/help page, rather than Firefox's. + // tor-browser#43864. onPick: openUrlFun( - "https://support.mozilla.org/products/firefox?as=u&utm_source=inproduct" + Services.prefs.getStringPref("browser.base-browser-support-url", "") ), }, firefoxview: { @@ -128,6 +143,9 @@ const DEFAULT_ACTIONS = { onPick: () => { lazy.BrowserWindowTracker.getTopWindow().FirefoxViewHandler.openTab(); }, + // Hide in base-browser since firefoxview is disabled. + // tor-browser#43864 and tor-browser#42037. + disabled: () => true, }, inspect: { l10nCommands: ["quickactions-cmd-inspector2"], @@ -311,6 +329,9 @@ export class QuickActionsLoaderDefault { let keys = Object.keys(DEFAULT_ACTIONS); for (const key of keys) { let actionData = DEFAULT_ACTIONS[key]; + if (actionData.disabled?.()) { + continue; + } let messages = await lazy.gFluentStrings.formatMessages( actionData.l10nCommands.map(id => ({ id })) ); ===================================== browser/components/urlbar/SearchModeSwitcher.sys.mjs ===================================== @@ -413,6 +413,15 @@ export class SearchModeSwitcher { if (!lazy.UrlbarPrefs.get(pref)) { continue; } + if ( + source === lazy.UrlbarUtils.RESULT_SOURCE.HISTORY && + lazy.PrivateBrowsingUtils.permanentPrivateBrowsing + ) { + // Do not show the search history option in PBM. tor-browser#43864. + // Although, it can still be triggered with "^" restrict keyword or + // through an app menu item. See also mozilla bug 1980928. + continue; + } let name = lazy.UrlbarUtils.getResultSourceName(source); let { icon } = await this.#getDisplayedEngineDetails({ source, ===================================== toolkit/content/widgets/moz-support-link/moz-support-link.mjs ===================================== @@ -113,7 +113,7 @@ export default class MozSupportLink extends HTMLAnchorElement { return; } let supportPage = this.getAttribute("support-page") ?? ""; - // For tor-browser we sometimes want to override firefox support links with + // For base-browser we sometimes want to override firefox support links with // our own. // See tor-browser#40899. switch (supportPage) { @@ -122,7 +122,10 @@ export default class MozSupportLink extends HTMLAnchorElement { // Instead of directing to support for preferences, we link to general // tor browser support. // See tor-browser#32092. - this.href = "https://support.torproject.org/tbb"; + this.href = Services.prefs.getStringPref( + "browser.base-browser-support-url", + "" + ); return; // Fall through to support.mozilla.org } View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/compare/17f8c4… -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/compare/17f8c4… You're receiving this email because of your account on gitlab.torproject.org.
1 0
0 0
[Git][tpo/applications/tor-browser][tor-browser-115.26.0esr-13.5-1] Bug 43912: Make xslt:sort obey spoof English.
by Pier Angelo Vendrame (@pierov) 05 Aug '25

05 Aug '25
Pier Angelo Vendrame pushed to branch tor-browser-115.26.0esr-13.5-1 at The Tor Project / Applications / Tor Browser Commits: 5e052e8c by Pier Angelo Vendrame at 2025-08-05T16:32:16+02:00 Bug 43912: Make xslt:sort obey spoof English. - - - - - 1 changed file: - dom/xslt/xslt/txNodeSorter.cpp Changes: ===================================== dom/xslt/xslt/txNodeSorter.cpp ===================================== @@ -76,6 +76,9 @@ nsresult txNodeSorter::addSortElement(Expr* aSelectExpr, Expr* aLangExpr, rv = aLangExpr->evaluateToString(aContext, lang); NS_ENSURE_SUCCESS(rv, rv); } + if (lang.IsEmpty() && nsContentUtils::SpoofLocaleEnglish()) { + lang.AssignLiteral("en-US"); + } // Case-order bool upperFirst = false; View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/5e052e8… -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/5e052e8… You're receiving this email because of your account on gitlab.torproject.org.
1 0
0 0
  • ← Newer
  • 1
  • ...
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • ...
  • 766
  • Older →

HyperKitty Powered by HyperKitty version 1.3.12.