lists.torproject.org
Sign In Sign Up
Manage this list Sign In Sign Up

Keyboard Shortcuts

Thread View

  • j: Next unread message
  • k: Previous unread message
  • j a: Jump to all threads
  • j l: Jump to MailingList overview

tbb-commits

Thread Start a new thread
Threads by month
  • ----- 2026 -----
  • February
  • January
  • ----- 2025 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2024 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2023 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2022 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2021 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2020 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2019 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2018 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2017 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2016 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2015 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2014 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
tbb-commits@lists.torproject.org

  • 1 participants
  • 19931 discussions
[Git][tpo/applications/tor-browser][tor-browser-140.1.0esr-15.0-1] fixup! Firefox preference overrides.
by Pier Angelo Vendrame (@pierov) 08 Aug '25

08 Aug '25
Pier Angelo Vendrame pushed to branch tor-browser-140.1.0esr-15.0-1 at The Tor Project / Applications / Tor Browser Commits: efc66d2c by Pier Angelo Vendrame at 2025-08-08T18:29:59+02:00 fixup! Firefox preference overrides. BB 44026: Disable the modal with upstream's ToU. We disable data collection, so those terms do not apply to us. Indeed, currently this feature is already gated on the datareporting pref, but since upstream is refactoring these prefs, adding an explicit one seems a good idea. Also, move the datareporting prefs closer to telemetry. - - - - - 1 changed file: - browser/app/profile/001-base-profile.js Changes: ===================================== browser/app/profile/001-base-profile.js ===================================== @@ -202,8 +202,6 @@ pref("browser.safebrowsing.provider.google4.updateURL", ""); pref("browser.safebrowsing.provider.google4.gethashURL", ""); pref("browser.safebrowsing.provider.mozilla.updateURL", ""); pref("browser.safebrowsing.provider.mozilla.gethashURL", ""); -pref("datareporting.healthreport.uploadEnabled", false); -pref("datareporting.policy.dataSubmissionEnabled", false); // tor-browser#42735: Disable recent search suggestions pref("browser.urlbar.recentsearches.featureGate", false); pref("browser.urlbar.suggest.recentsearches", false); @@ -225,6 +223,8 @@ pref("toolkit.telemetry.firstShutdownPing.enabled", false); // Added in tor-brow pref("toolkit.telemetry.updatePing.enabled", false); // Make sure updater telemetry is disabled; see #25909. pref("toolkit.telemetry.bhrPing.enabled", false); pref("toolkit.telemetry.coverage.opt-out", true); +pref("datareporting.healthreport.uploadEnabled", false); +pref("datareporting.policy.dataSubmissionEnabled", false); // Force all telemtry identifier to their canary values tor-browser#43750 pref("toolkit.telemetry.cachedClientID", "c0ffeec0-ffee-c0ff-eec0-ffeec0ffeec0", locked); pref("toolkit.telemetry.cachedProfileGroupID", "decafdec-afde-cafd-ecaf-decafdecafde", locked); @@ -236,6 +236,9 @@ pref("browser.tabs.crashReporting.sendReport", false); pref("browser.crashReports.unsubmittedCheck.autoSubmit2", false); // Added in tor-browser#41496 even though false by default pref("browser.crashReports.unsubmittedCheck.enabled", false); +// tor-browser#44026: Disable the modal that shows upstream terms of usage, +// since we opt out of their telemetry and data collection. +pref("browser.preonboarding.enabled", false); // Disable checkbox in about:neterror that controls // security.xfocsp.errorReporting.automatic. See tor-browser#42653. pref("security.xfocsp.errorReporting.enabled", false); View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/efc66d2… -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/efc66d2… You're receiving this email because of your account on gitlab.torproject.org.
1 0
0 0
[Git][tpo/applications/tor-browser][tor-browser-140.1.0esr-15.0-1] fixup! TB 40041 [android]: Implement Tor Network Settings
by Dan Ballard (@dan) 07 Aug '25

07 Aug '25
Dan Ballard pushed to branch tor-browser-140.1.0esr-15.0-1 at The Tor Project / Applications / Tor Browser Commits: 1643c744 by clairehurst at 2025-08-07T10:25:07-06:00 fixup! TB 40041 [android]: Implement Tor Network Settings tor-browser#44042 Debug crash when opening settings too quickly after launching app. Clean up surrounding code - - - - - 1 changed file: - mobile/android/fenix/app/src/main/java/org/mozilla/fenix/settings/SettingsFragment.kt Changes: ===================================== mobile/android/fenix/app/src/main/java/org/mozilla/fenix/settings/SettingsFragment.kt ===================================== @@ -34,8 +34,10 @@ import androidx.preference.PreferenceFragmentCompat import androidx.preference.SwitchPreference import androidx.recyclerview.widget.RecyclerView import kotlinx.coroutines.CoroutineScope +import kotlinx.coroutines.Dispatchers import kotlinx.coroutines.delay import kotlinx.coroutines.launch +import kotlinx.coroutines.runBlocking import mozilla.components.browser.state.state.selectedOrDefaultSearchEngine import mozilla.components.concept.engine.Engine import mozilla.components.concept.sync.AccountObserver @@ -189,7 +191,9 @@ class SettingsFragment : PreferenceFragmentCompat(), UserInteractionHandler { } override fun onCreatePreferences(savedInstanceState: Bundle?, rootKey: String?) { - setPreferencesFromResource(R.xml.preferences, rootKey) + runBlocking(context = Dispatchers.IO) { + setPreferencesFromResource(R.xml.preferences, rootKey) + } } override fun onViewCreated(view: View, savedInstanceState: Bundle?) { View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/1643c74… -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/1643c74… You're receiving this email because of your account on gitlab.torproject.org.
1 0
0 0
[Git][tpo/applications/tor-browser][tor-browser-140.1.0esr-15.0-1] fixup! TB 40041 [android]: Implement Tor Network Settings
by Dan Ballard (@dan) 07 Aug '25

07 Aug '25
Dan Ballard pushed to branch tor-browser-140.1.0esr-15.0-1 at The Tor Project / Applications / Tor Browser Commits: 32f432c8 by clairehurst at 2025-08-07T10:20:12-06:00 fixup! TB 40041 [android]: Implement Tor Network Settings tor-browser#44042 Debug crash when opening settings too quickly after launching app. Clean up surrounding code - - - - - 1 changed file: - mobile/android/fenix/app/src/main/java/org/mozilla/fenix/settings/SettingsFragment.kt Changes: ===================================== mobile/android/fenix/app/src/main/java/org/mozilla/fenix/settings/SettingsFragment.kt ===================================== @@ -189,8 +189,6 @@ class SettingsFragment : PreferenceFragmentCompat(), UserInteractionHandler { } override fun onCreatePreferences(savedInstanceState: Bundle?, rootKey: String?) { - //setPreferencesFromResource(R.xml.tor_network_settings_preferences, rootKey) - //setupConnectionPreferences() setPreferencesFromResource(R.xml.preferences, rootKey) } View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/32f432c… -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/32f432c… You're receiving this email because of your account on gitlab.torproject.org.
1 0
0 0
[Git][tpo/applications/tor-browser][base-browser-140.1.0esr-15.0-1] fixup! Firefox preference overrides.
by Pier Angelo Vendrame (@pierov) 07 Aug '25

07 Aug '25
Pier Angelo Vendrame pushed to branch base-browser-140.1.0esr-15.0-1 at The Tor Project / Applications / Tor Browser Commits: 6cb6ea55 by Pier Angelo Vendrame at 2025-08-07T11:43:23+02:00 fixup! Firefox preference overrides. BB 44062: Enable touch events on Windows and Android. Auto-detection makes some properties available on the global scope only when touch support is actually available, but this introduces entorpy. Let's force touch enabled in Windows+Android and disable it elsewhere. This improves consistency with the spoofed number of touch points. - - - - - 1 changed file: - browser/app/profile/001-base-profile.js Changes: ===================================== browser/app/profile/001-base-profile.js ===================================== @@ -443,9 +443,12 @@ pref("dom.webmidi.enabled", false); // Bug 41398: Disable Web MIDI API // randomized IDs when this pref is true). // Defense-in-depth (already the default value) from Firefox 119 or 120. pref("media.devices.enumerate.legacy.enabled", false); -// Bug 10286: Always disable Touch API. -// We might need to deepen this topic, see tor-browser#42069. +// Touch events (tor-browser#10286, tor-browser#42069, tor-browser#44062) +#if defined(XP_WIN) || defined(ANDROID) +pref("dom.w3c_touch_events.enabled", 1); +#else pref("dom.w3c_touch_events.enabled", 0); +#endif #ifndef ANDROID // Bug 42138: Disable touch-based overscroll UX pref("apz.overscroll.enabled", false); View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/6cb6ea5… -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/6cb6ea5… You're receiving this email because of your account on gitlab.torproject.org.
1 0
0 0
[Git][tpo/applications/mullvad-browser][mullvad-browser-140.1.0esr-15.0-1] fixup! Firefox preference overrides.
by Pier Angelo Vendrame (@pierov) 07 Aug '25

07 Aug '25
Pier Angelo Vendrame pushed to branch mullvad-browser-140.1.0esr-15.0-1 at The Tor Project / Applications / Mullvad Browser Commits: 7259b166 by Pier Angelo Vendrame at 2025-08-07T11:42:04+02:00 fixup! Firefox preference overrides. BB 44062: Enable touch events on Windows and Android. Auto-detection makes some properties available on the global scope only when touch support is actually available, but this introduces entorpy. Let's force touch enabled in Windows+Android and disable it elsewhere. This improves consistency with the spoofed number of touch points. - - - - - 1 changed file: - browser/app/profile/001-base-profile.js Changes: ===================================== browser/app/profile/001-base-profile.js ===================================== @@ -443,9 +443,12 @@ pref("dom.webmidi.enabled", false); // Bug 41398: Disable Web MIDI API // randomized IDs when this pref is true). // Defense-in-depth (already the default value) from Firefox 119 or 120. pref("media.devices.enumerate.legacy.enabled", false); -// Bug 10286: Always disable Touch API. -// We might need to deepen this topic, see tor-browser#42069. +// Touch events (tor-browser#10286, tor-browser#42069, tor-browser#44062) +#if defined(XP_WIN) || defined(ANDROID) +pref("dom.w3c_touch_events.enabled", 1); +#else pref("dom.w3c_touch_events.enabled", 0); +#endif #ifndef ANDROID // Bug 42138: Disable touch-based overscroll UX pref("apz.overscroll.enabled", false); View it on GitLab: https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/725… -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/725… You're receiving this email because of your account on gitlab.torproject.org.
1 0
0 0
[Git][tpo/applications/tor-browser][tor-browser-140.1.0esr-15.0-1] fixup! Firefox preference overrides.
by Pier Angelo Vendrame (@pierov) 07 Aug '25

07 Aug '25
Pier Angelo Vendrame pushed to branch tor-browser-140.1.0esr-15.0-1 at The Tor Project / Applications / Tor Browser Commits: fbc1f480 by Pier Angelo Vendrame at 2025-08-07T11:39:52+02:00 fixup! Firefox preference overrides. BB 44062: Enable touch events on Windows and Android. Auto-detection makes some properties available on the global scope only when touch support is actually available, but this introduces entorpy. Let's force touch enabled in Windows+Android and disable it elsewhere. This improves consistency with the spoofed number of touch points. - - - - - 2 changed files: - browser/app/profile/001-base-profile.js - mobile/android/app/000-tor-browser-android.js Changes: ===================================== browser/app/profile/001-base-profile.js ===================================== @@ -443,9 +443,12 @@ pref("dom.webmidi.enabled", false); // Bug 41398: Disable Web MIDI API // randomized IDs when this pref is true). // Defense-in-depth (already the default value) from Firefox 119 or 120. pref("media.devices.enumerate.legacy.enabled", false); -// Bug 10286: Always disable Touch API. -// We might need to deepen this topic, see tor-browser#42069. +// Touch events (tor-browser#10286, tor-browser#42069, tor-browser#44062) +#if defined(XP_WIN) || defined(ANDROID) +pref("dom.w3c_touch_events.enabled", 1); +#else pref("dom.w3c_touch_events.enabled", 0); +#endif #ifndef ANDROID // Bug 42138: Disable touch-based overscroll UX pref("apz.overscroll.enabled", false); ===================================== mobile/android/app/000-tor-browser-android.js ===================================== @@ -23,9 +23,6 @@ pref("privacy.clearOnShutdown.siteSettings", true); // controls if we want camera support pref("media.realtime_decoder.enabled", false); -// Enable touch events on Android (highlighting text, etc) -pref("dom.w3c_touch_events.enabled", 2); - // No HLS support for now due to browser freezing, see: #29859. pref("media.hls.enabled", false); View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/fbc1f48… -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/fbc1f48… You're receiving this email because of your account on gitlab.torproject.org.
1 0
0 0
[Git][tpo/applications/tor-browser-build][main] Bug 41442: Update the generate-bugzilla-triage-csv script for Tor Browser 16.0
by Pier Angelo Vendrame (@pierov) 07 Aug '25

07 Aug '25
Pier Angelo Vendrame pushed to branch main at The Tor Project / Applications / tor-browser-build Commits: c088e842 by Morgan at 2025-08-06T18:10:21+00:00 Bug 41442: Update the generate-bugzilla-triage-csv script for Tor Browser 16.0 - - - - - 1 changed file: - tools/browser/generate-bugzilla-triage-csv Changes: ===================================== tools/browser/generate-bugzilla-triage-csv ===================================== @@ -1,8 +1,14 @@ #!/usr/bin/env bash # gitlab labels for review tickets -browser_label="15.0 stable" -esr_label="esr-140" +browser_label="Apps::Product::TorBrowser" +esr_label="esr-next" +priority_label="Priority::Blocker" +impact_label="Impact::Unknown" +type_label="Apps::Type::Audit" + +# milestone for the next major Tor Browser release +milestone="Tor Browser 16.0" # prints to stderr function echoerr() { echo "$@" 1>&2; } @@ -10,18 +16,17 @@ function echoerr() { echo "$@" 1>&2; } script_dir=$(dirname "${BASH_ARGV0:-$0}") # help dialog -if [ "$#" -lt 5 ]; then - echoerr "Usage: $0 <ff-version> <begin-commit> <end-commit> <gitlab-audit-issue> <reviewers...>" +if [ "$#" -ne 4 ]; then + echoerr "Usage: $0 <ff-version> <begin-commit> <end-commit> <gitlab-audit-issue>" echoerr echoerr "ff-version rapid-release Firefox version to audit" - echoerr "begin-commit starting gecko-dev commit of this Firefox version" - echoerr "end-commit ending gecko-dev commit of this Firefox version" + echoerr "begin-commit starting firefox commit of this Firefox version" + echoerr "end-commit ending firefox commit of this Firefox version" echoerr "gitlab-audit-issue tor-browser GitLab issue number for this audit" - echoerr "reviewers... space-separated list of reviewers responsible for this audit" echoerr "" echoerr "Example:" echoerr "" - echoerr "$0 129 FIREFOX_NIGHTLY_128_END FIREFOX_NIGHTLY_129_END 43303 morgan pierov henry" + echoerr "$0 129 FIREFOX_NIGHTLY_128_END FIREFOX_NIGHTLY_129_END 43303" exit 1 fi @@ -219,7 +224,8 @@ jq '. | sort_by([.component, .id])[] | "\(.id)|\(.component)|\(.summary)"' ${uni # review issue title new_issue_title=$(url_encode "Review Mozilla ${id}: ${summary_short}") # review issue description + labeling (14.0 stable, FF128-esr, Next) - new_issue_description=$(url_encode "### Bugzilla: ${bugzilla_url}")%0A$(url_encode "/label ~\"${browser_label}\" ~\"${esr_label}\" ~\"Bugzilla Review\" ~Next")%0A$(url_encode "/relate tpo/applications/tor-browser#${audit_issue}")%0A%0A$(url_encode "<!-- briefly describe why this issue needs further review -->")%0A + new_issue_description=$(url_encode "### Bugzilla: ${bugzilla_url}")%0A$(url_encode "/label ~\"${browser_label}\" ~\"${esr_label}\" ~\"${priority_label}\" ~\"${impact_label}\" ~\"${type_label}\"")%0A$(url_encode "/milestone %\"{milestone}\"")%0A$(url_encode "/relate tpo/applications/tor-browser#${audit_issue}")%0A%0A$(url_encode "<!-- briefly describe why this issue needs further review -->")%0A + # url which create's new issue with title and description pre-populated new_issue_url="https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/new?iss…" @@ -231,12 +237,6 @@ jq '. | sort_by([.component, .id])[] | "\(.id)|\(.component)|\(.summary)"' ${uni fi done -echo -echo "\"Triaged by:\"" -for reviewer in $reviewers; do - reviewer=$(csv_escape "${reviewer}") - echo "\"FALSE\",\"${reviewer}\"" -done echo bugzilla_query="=HYPERLINK(\"${bugzilla_query}\", \"Bugzilla query\")" View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/commit/c… -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/commit/c… You're receiving this email because of your account on gitlab.torproject.org.
1 0
0 0
[Git][tpo/applications/mullvad-browser][mullvad-browser-140.1.0esr-15.0-1] fixup! Base Browser's .mozconfigs.
by Pier Angelo Vendrame (@pierov) 06 Aug '25

06 Aug '25
Pier Angelo Vendrame pushed to branch mullvad-browser-140.1.0esr-15.0-1 at The Tor Project / Applications / Mullvad Browser Commits: fd1cb0c8 by Pier Angelo Vendrame at 2025-08-06T19:36:44+02:00 fixup! Base Browser's .mozconfigs. BB 44067: Build geckodriver only on Linux. After Bug 1908788, geckodriver has become a host tool. So, even when we cross-compile, we get Linux binaries, and we stopped shipping them in tor-browser-build. Therefore, we can disable also their compilation. - - - - - 2 changed files: - browser/config/mozconfigs/base-browser - mozconfig-linux-x86_64 Changes: ===================================== browser/config/mozconfigs/base-browser ===================================== @@ -41,6 +41,3 @@ ac_add_options --disable-legacy-profile-creation if test -z "$WASI_SYSROOT"; then ac_add_options --without-wasm-sandboxed-libraries fi - -# tor-browser#42337 -ac_add_options --enable-geckodriver ===================================== mozconfig-linux-x86_64 ===================================== @@ -11,3 +11,5 @@ ac_add_options --enable-default-toolkit=cairo-gtk3 # Let's make sure no preference is enabling either Adobe's or Google's CDM. ac_add_options --disable-eme +# tor-browser#44067: geckodriver has become a host-only tool +ac_add_options --enable-geckodriver View it on GitLab: https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/fd1… -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/fd1… You're receiving this email because of your account on gitlab.torproject.org.
1 0
0 0
[Git][tpo/applications/tor-browser][base-browser-140.1.0esr-15.0-1] fixup! Base Browser's .mozconfigs.
by Pier Angelo Vendrame (@pierov) 06 Aug '25

06 Aug '25
Pier Angelo Vendrame pushed to branch base-browser-140.1.0esr-15.0-1 at The Tor Project / Applications / Tor Browser Commits: d7bd2c46 by Pier Angelo Vendrame at 2025-08-06T19:35:36+02:00 fixup! Base Browser's .mozconfigs. BB 44067: Build geckodriver only on Linux. After Bug 1908788, geckodriver has become a host tool. So, even when we cross-compile, we get Linux binaries, and we stopped shipping them in tor-browser-build. Therefore, we can disable also their compilation. - - - - - 2 changed files: - browser/config/mozconfigs/base-browser - mozconfig-linux-x86_64 Changes: ===================================== browser/config/mozconfigs/base-browser ===================================== @@ -47,7 +47,4 @@ if test -z "$WASI_SYSROOT"; then ac_add_options --without-wasm-sandboxed-libraries fi -# tor-browser#42337 -ac_add_options --enable-geckodriver - ac_add_options --with-relative-data-dir=BaseBrowser/Data/Browser ===================================== mozconfig-linux-x86_64 ===================================== @@ -11,3 +11,5 @@ ac_add_options --enable-default-toolkit=cairo-gtk3 # Let's make sure no preference is enabling either Adobe's or Google's CDM. ac_add_options --disable-eme +# tor-browser#44067: geckodriver has become a host-only tool +ac_add_options --enable-geckodriver View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/d7bd2c4… -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/d7bd2c4… You're receiving this email because of your account on gitlab.torproject.org.
1 0
0 0
[Git][tpo/applications/tor-browser][tor-browser-140.1.0esr-15.0-1] fixup! Base Browser's .mozconfigs.
by Pier Angelo Vendrame (@pierov) 06 Aug '25

06 Aug '25
Pier Angelo Vendrame pushed to branch tor-browser-140.1.0esr-15.0-1 at The Tor Project / Applications / Tor Browser Commits: 47265bc8 by Pier Angelo Vendrame at 2025-08-06T18:35:32+02:00 fixup! Base Browser's .mozconfigs. BB 44067: Build geckodriver only on Linux. After Bug 1908788, geckodriver has become a host tool. So, even when we cross-compile, we get Linux binaries, and we stopped shipping them in tor-browser-build. Therefore, we can disable also their compilation. - - - - - 2 changed files: - browser/config/mozconfigs/base-browser - mozconfig-linux-x86_64 Changes: ===================================== browser/config/mozconfigs/base-browser ===================================== @@ -43,6 +43,3 @@ ac_add_options --disable-legacy-profile-creation if test -z "$WASI_SYSROOT"; then ac_add_options --without-wasm-sandboxed-libraries fi - -# tor-browser#42337 -ac_add_options --enable-geckodriver ===================================== mozconfig-linux-x86_64 ===================================== @@ -11,3 +11,5 @@ ac_add_options --enable-default-toolkit=cairo-gtk3 # Let's make sure no preference is enabling either Adobe's or Google's CDM. ac_add_options --disable-eme +# tor-browser#44067: geckodriver has become a host-only tool +ac_add_options --enable-geckodriver View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/47265bc… -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/47265bc… You're receiving this email because of your account on gitlab.torproject.org.
1 0
0 0
[Git][tpo/applications/mullvad-browser][mullvad-browser-140.1.0esr-15.0-1] fixup! Firefox preference overrides.
by brizental (@brizental) 05 Aug '25

05 Aug '25
brizental pushed to branch mullvad-browser-140.1.0esr-15.0-1 at The Tor Project / Applications / Mullvad Browser Commits: 392f3202 by Beatriz Rizental at 2025-08-05T18:33:36+02:00 fixup! Firefox preference overrides. - - - - - 1 changed file: - browser/app/profile/001-base-profile.js Changes: ===================================== browser/app/profile/001-base-profile.js ===================================== @@ -225,6 +225,11 @@ pref("toolkit.telemetry.firstShutdownPing.enabled", false); // Added in tor-brow pref("toolkit.telemetry.updatePing.enabled", false); // Make sure updater telemetry is disabled; see #25909. pref("toolkit.telemetry.bhrPing.enabled", false); pref("toolkit.telemetry.coverage.opt-out", true); +// Force all telemtry identifier to their canary values tor-browser#43750 +pref("toolkit.telemetry.cachedClientID", "c0ffeec0-ffee-c0ff-eec0-ffeec0ffeec0", locked); +pref("toolkit.telemetry.cachedProfileGroupID", "decafdec-afde-cafd-ecaf-decafdecafde", locked); +pref("datareporting.dau.cachedUsageProfileID", "beefbeef-beef-beef-beef-beeefbeefbee", locked); +pref("datareporting.dau.cachedUsageProfileGroupID", "b0bacafe-b0ba-cafe-b0ba-cafeb0bacafe", locked); pref("toolkit.coverage.opt-out", true); pref("toolkit.coverage.endpoint.base", ""); pref("browser.tabs.crashReporting.sendReport", false); View it on GitLab: https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/392… -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/392… You're receiving this email because of your account on gitlab.torproject.org.
1 0
0 0
[Git][tpo/applications/tor-browser][base-browser-140.1.0esr-15.0-1] fixup! Firefox preference overrides.
by brizental (@brizental) 05 Aug '25

05 Aug '25
brizental pushed to branch base-browser-140.1.0esr-15.0-1 at The Tor Project / Applications / Tor Browser Commits: e7eb3783 by Beatriz Rizental at 2025-08-05T18:28:59+02:00 fixup! Firefox preference overrides. - - - - - 1 changed file: - browser/app/profile/001-base-profile.js Changes: ===================================== browser/app/profile/001-base-profile.js ===================================== @@ -225,6 +225,11 @@ pref("toolkit.telemetry.firstShutdownPing.enabled", false); // Added in tor-brow pref("toolkit.telemetry.updatePing.enabled", false); // Make sure updater telemetry is disabled; see #25909. pref("toolkit.telemetry.bhrPing.enabled", false); pref("toolkit.telemetry.coverage.opt-out", true); +// Force all telemtry identifier to their canary values tor-browser#43750 +pref("toolkit.telemetry.cachedClientID", "c0ffeec0-ffee-c0ff-eec0-ffeec0ffeec0", locked); +pref("toolkit.telemetry.cachedProfileGroupID", "decafdec-afde-cafd-ecaf-decafdecafde", locked); +pref("datareporting.dau.cachedUsageProfileID", "beefbeef-beef-beef-beef-beeefbeefbee", locked); +pref("datareporting.dau.cachedUsageProfileGroupID", "b0bacafe-b0ba-cafe-b0ba-cafeb0bacafe", locked); pref("toolkit.coverage.opt-out", true); pref("toolkit.coverage.endpoint.base", ""); pref("browser.tabs.crashReporting.sendReport", false); View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/e7eb378… -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/e7eb378… You're receiving this email because of your account on gitlab.torproject.org.
1 0
0 0
[Git][tpo/applications/tor-browser][tor-browser-140.1.0esr-15.0-1] fixup! Firefox preference overrides.
by brizental (@brizental) 05 Aug '25

05 Aug '25
brizental pushed to branch tor-browser-140.1.0esr-15.0-1 at The Tor Project / Applications / Tor Browser Commits: 55b07453 by Beatriz Rizental at 2025-08-05T17:45:48+02:00 fixup! Firefox preference overrides. - - - - - 1 changed file: - browser/app/profile/001-base-profile.js Changes: ===================================== browser/app/profile/001-base-profile.js ===================================== @@ -225,6 +225,11 @@ pref("toolkit.telemetry.firstShutdownPing.enabled", false); // Added in tor-brow pref("toolkit.telemetry.updatePing.enabled", false); // Make sure updater telemetry is disabled; see #25909. pref("toolkit.telemetry.bhrPing.enabled", false); pref("toolkit.telemetry.coverage.opt-out", true); +// Force all telemtry identifier to their canary values tor-browser#43750 +pref("toolkit.telemetry.cachedClientID", "c0ffeec0-ffee-c0ff-eec0-ffeec0ffeec0", locked); +pref("toolkit.telemetry.cachedProfileGroupID", "decafdec-afde-cafd-ecaf-decafdecafde", locked); +pref("datareporting.dau.cachedUsageProfileID", "beefbeef-beef-beef-beef-beeefbeefbee", locked); +pref("datareporting.dau.cachedUsageProfileGroupID", "b0bacafe-b0ba-cafe-b0ba-cafeb0bacafe", locked); pref("toolkit.coverage.opt-out", true); pref("toolkit.coverage.endpoint.base", ""); pref("browser.tabs.crashReporting.sendReport", false); View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/55b0745… -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/55b0745… You're receiving this email because of your account on gitlab.torproject.org.
1 0
0 0
[Git][tpo/applications/mullvad-browser][mullvad-browser-140.1.0esr-15.0-1] 4 commits: dropme! fixup! MB 1: Mullvad Browser branding
by henry (@henry) 05 Aug '25

05 Aug '25
henry pushed to branch mullvad-browser-140.1.0esr-15.0-1 at The Tor Project / Applications / Mullvad Browser Commits: f5000c1f by Henry Wilkes at 2025-08-05T16:34:57+01:00 dropme! fixup! MB 1: Mullvad Browser branding TB 43864: Move moz-support-link "preferences" patch out of mullvad-browser commits. The target commit no longer needs to modify moz-support-link.mjs since the changes were moved to base-browser. - - - - - 9ba2a7bf by Henry Wilkes at 2025-08-05T16:35:17+01:00 fixup! BB 42583: Modify moz-support-link for Base Browser. TB 43864: Move moz-support-link "preferences" patch to base-browser. - - - - - bf086fe6 by Henry Wilkes at 2025-08-05T16:35:18+01:00 fixup! MB 38: Mullvad Browser configuration TB 43864: Move to Mullvad Browser help URL to preferences. - - - - - 9fe4d6f4 by Henry Wilkes at 2025-08-05T16:35:19+01:00 BB 43864: Modify the urlbar for Base Browser. - - - - - 4 changed files: - browser/app/profile/000-mullvad-browser.js - browser/components/urlbar/QuickActionsLoaderDefault.sys.mjs - browser/components/urlbar/SearchModeSwitcher.sys.mjs - toolkit/content/widgets/moz-support-link/moz-support-link.mjs Changes: ===================================== browser/app/profile/000-mullvad-browser.js ===================================== @@ -2,6 +2,9 @@ pref("browser.startup.homepage", "about:mullvad-browser"); +// General browser support url. tor-browser#43864 and mullvad-browser#244. +pref("browser.base-browser-support-url", "https://mullvad.net/en/help/"); + // Do not show the bookmark panel for now, because it makes the initial browser // window (about:home) bigger, and regular pages will show letterbox margins as // a result. ===================================== browser/components/urlbar/QuickActionsLoaderDefault.sys.mjs ===================================== @@ -13,6 +13,7 @@ ChromeUtils.defineESModuleGetters(lazy, { ScreenshotsUtils: "resource:///modules/ScreenshotsUtils.sys.mjs", ActionsProviderQuickActions: "resource:///modules/ActionsProviderQuickActions.sys.mjs", + PrivateBrowsingUtils: "resource://gre/modules/PrivateBrowsingUtils.sys.mjs", }); import { AppConstants } from "resource://gre/modules/AppConstants.sys.mjs"; @@ -78,6 +79,9 @@ const DEFAULT_ACTIONS = { icon: "chrome://mozapps/skin/extensions/category-extensions.svg", label: "quickactions-addons", onPick: openAddonsUrl("addons://discover/"), + // Hide in base-browser, since we don't want to open extensions + // "recommendations" tab. tor-browser#43864. + disabled: () => true, }, bookmarks: { l10nCommands: ["quickactions-cmd-bookmarks", "quickactions-bookmarks2"], @@ -100,6 +104,12 @@ const DEFAULT_ACTIONS = { .document.getElementById("Tools:Sanitize") .doCommand(); }, + // Disable in permanent private browsing. tor-browser#43864. + // NOTE: This should also be disabled in private windows, but we don't have + // access to a Window element to check. See mozilla bug 1980912. + disabled: () => { + return lazy.PrivateBrowsingUtils.permanentPrivateBrowsing; + }, }, downloads: { l10nCommands: ["quickactions-cmd-downloads"], @@ -112,13 +122,18 @@ const DEFAULT_ACTIONS = { icon: "chrome://mozapps/skin/extensions/category-extensions.svg", label: "quickactions-extensions", onPick: openAddonsUrl("addons://list/extension"), + // Hide in base-browser since we do not want to encourage users to change + // their extensions/addons. tor-browser#43864. + disabled: () => true, }, help: { l10nCommands: ["quickactions-cmd-help"], icon: "chrome://global/skin/icons/help.svg", label: "quickactions-help", + // Open the base-browser support/help page, rather than Firefox's. + // tor-browser#43864. onPick: openUrlFun( - "https://support.mozilla.org/products/firefox?as=u&utm_source=inproduct" + Services.prefs.getStringPref("browser.base-browser-support-url", "") ), }, firefoxview: { @@ -128,6 +143,9 @@ const DEFAULT_ACTIONS = { onPick: () => { lazy.BrowserWindowTracker.getTopWindow().FirefoxViewHandler.openTab(); }, + // Hide in base-browser since firefoxview is disabled. + // tor-browser#43864 and tor-browser#42037. + disabled: () => true, }, inspect: { l10nCommands: ["quickactions-cmd-inspector2"], @@ -311,6 +329,9 @@ export class QuickActionsLoaderDefault { let keys = Object.keys(DEFAULT_ACTIONS); for (const key of keys) { let actionData = DEFAULT_ACTIONS[key]; + if (actionData.disabled?.()) { + continue; + } let messages = await lazy.gFluentStrings.formatMessages( actionData.l10nCommands.map(id => ({ id })) ); ===================================== browser/components/urlbar/SearchModeSwitcher.sys.mjs ===================================== @@ -413,6 +413,15 @@ export class SearchModeSwitcher { if (!lazy.UrlbarPrefs.get(pref)) { continue; } + if ( + source === lazy.UrlbarUtils.RESULT_SOURCE.HISTORY && + lazy.PrivateBrowsingUtils.permanentPrivateBrowsing + ) { + // Do not show the search history option in PBM. tor-browser#43864. + // Although, it can still be triggered with "^" restrict keyword or + // through an app menu item. See also mozilla bug 1980928. + continue; + } let name = lazy.UrlbarUtils.getResultSourceName(source); let { icon } = await this.#getDisplayedEngineDetails({ source, ===================================== toolkit/content/widgets/moz-support-link/moz-support-link.mjs ===================================== @@ -125,11 +125,21 @@ export default class MozSupportLink extends HTMLAnchorElement { return; } let supportPage = this.getAttribute("support-page") ?? ""; - // Customize the link in about:preferences. - // See mullvad-browser#244 and tor-browser#41910. - if (supportPage === "preferences") { - this.href = "https://mullvad.net/en/help/"; - return; + // For base-browser we sometimes want to override firefox support links with + // our own. + // See tor-browser#40899. + switch (supportPage) { + case "preferences": + // Shown twice in preferences, both as `{ -brand-short-name } Support`. + // Instead of directing to support for preferences, we link to general + // tor browser support. + // See tor-browser#32092. + this.href = Services.prefs.getStringPref( + "browser.base-browser-support-url", + "" + ); + return; + // Fall through to support.mozilla.org } let base = MozSupportLink.SUPPORT_URL + supportPage; this.href = this.hasAttribute("utm-content") View it on GitLab: https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/compare/6e… -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/compare/6e… You're receiving this email because of your account on gitlab.torproject.org.
1 0
0 0
[Git][tpo/applications/tor-browser][base-browser-140.1.0esr-15.0-1] BB 43864: Modify the urlbar for Base Browser.
by henry (@henry) 05 Aug '25

05 Aug '25
henry pushed to branch base-browser-140.1.0esr-15.0-1 at The Tor Project / Applications / Tor Browser Commits: 1d477c7c by henry at 2025-08-05T15:33:07+00:00 BB 43864: Modify the urlbar for Base Browser. (cherry picked from commit 6167738479a9508101c62d2114939c3aa3a5e482) Co-authored-by: Henry Wilkes <henry(a)torproject.org> - - - - - 2 changed files: - browser/components/urlbar/QuickActionsLoaderDefault.sys.mjs - browser/components/urlbar/SearchModeSwitcher.sys.mjs Changes: ===================================== browser/components/urlbar/QuickActionsLoaderDefault.sys.mjs ===================================== @@ -13,6 +13,7 @@ ChromeUtils.defineESModuleGetters(lazy, { ScreenshotsUtils: "resource:///modules/ScreenshotsUtils.sys.mjs", ActionsProviderQuickActions: "resource:///modules/ActionsProviderQuickActions.sys.mjs", + PrivateBrowsingUtils: "resource://gre/modules/PrivateBrowsingUtils.sys.mjs", }); import { AppConstants } from "resource://gre/modules/AppConstants.sys.mjs"; @@ -78,6 +79,9 @@ const DEFAULT_ACTIONS = { icon: "chrome://mozapps/skin/extensions/category-extensions.svg", label: "quickactions-addons", onPick: openAddonsUrl("addons://discover/"), + // Hide in base-browser, since we don't want to open extensions + // "recommendations" tab. tor-browser#43864. + disabled: () => true, }, bookmarks: { l10nCommands: ["quickactions-cmd-bookmarks", "quickactions-bookmarks2"], @@ -100,6 +104,12 @@ const DEFAULT_ACTIONS = { .document.getElementById("Tools:Sanitize") .doCommand(); }, + // Disable in permanent private browsing. tor-browser#43864. + // NOTE: This should also be disabled in private windows, but we don't have + // access to a Window element to check. See mozilla bug 1980912. + disabled: () => { + return lazy.PrivateBrowsingUtils.permanentPrivateBrowsing; + }, }, downloads: { l10nCommands: ["quickactions-cmd-downloads"], @@ -112,13 +122,18 @@ const DEFAULT_ACTIONS = { icon: "chrome://mozapps/skin/extensions/category-extensions.svg", label: "quickactions-extensions", onPick: openAddonsUrl("addons://list/extension"), + // Hide in base-browser since we do not want to encourage users to change + // their extensions/addons. tor-browser#43864. + disabled: () => true, }, help: { l10nCommands: ["quickactions-cmd-help"], icon: "chrome://global/skin/icons/help.svg", label: "quickactions-help", + // Open the base-browser support/help page, rather than Firefox's. + // tor-browser#43864. onPick: openUrlFun( - "https://support.mozilla.org/products/firefox?as=u&utm_source=inproduct" + Services.prefs.getStringPref("browser.base-browser-support-url", "") ), }, firefoxview: { @@ -128,6 +143,9 @@ const DEFAULT_ACTIONS = { onPick: () => { lazy.BrowserWindowTracker.getTopWindow().FirefoxViewHandler.openTab(); }, + // Hide in base-browser since firefoxview is disabled. + // tor-browser#43864 and tor-browser#42037. + disabled: () => true, }, inspect: { l10nCommands: ["quickactions-cmd-inspector2"], @@ -311,6 +329,9 @@ export class QuickActionsLoaderDefault { let keys = Object.keys(DEFAULT_ACTIONS); for (const key of keys) { let actionData = DEFAULT_ACTIONS[key]; + if (actionData.disabled?.()) { + continue; + } let messages = await lazy.gFluentStrings.formatMessages( actionData.l10nCommands.map(id => ({ id })) ); ===================================== browser/components/urlbar/SearchModeSwitcher.sys.mjs ===================================== @@ -413,6 +413,15 @@ export class SearchModeSwitcher { if (!lazy.UrlbarPrefs.get(pref)) { continue; } + if ( + source === lazy.UrlbarUtils.RESULT_SOURCE.HISTORY && + lazy.PrivateBrowsingUtils.permanentPrivateBrowsing + ) { + // Do not show the search history option in PBM. tor-browser#43864. + // Although, it can still be triggered with "^" restrict keyword or + // through an app menu item. See also mozilla bug 1980928. + continue; + } let name = lazy.UrlbarUtils.getResultSourceName(source); let { icon } = await this.#getDisplayedEngineDetails({ source, View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/1d477c7… -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/1d477c7… You're receiving this email because of your account on gitlab.torproject.org.
1 0
0 0
[Git][tpo/applications/tor-browser][base-browser-140.1.0esr-15.0-1] fixup! BB 42583: Modify moz-support-link for Base Browser.
by henry (@henry) 05 Aug '25

05 Aug '25
henry pushed to branch base-browser-140.1.0esr-15.0-1 at The Tor Project / Applications / Tor Browser Commits: 36a296b5 by henry at 2025-08-05T15:32:09+00:00 fixup! BB 42583: Modify moz-support-link for Base Browser. TB 43864: Move moz-support-link "preferences" patch to base-browser. (cherry picked from commit be0e53370b89b47cebec8bdc38a3c2385773f249) Co-authored-by: Henry Wilkes <henry(a)torproject.org> - - - - - 1 changed file: - toolkit/content/widgets/moz-support-link/moz-support-link.mjs Changes: ===================================== toolkit/content/widgets/moz-support-link/moz-support-link.mjs ===================================== @@ -125,6 +125,22 @@ export default class MozSupportLink extends HTMLAnchorElement { return; } let supportPage = this.getAttribute("support-page") ?? ""; + // For base-browser we sometimes want to override firefox support links with + // our own. + // See tor-browser#40899. + switch (supportPage) { + case "preferences": + // Shown twice in preferences, both as `{ -brand-short-name } Support`. + // Instead of directing to support for preferences, we link to general + // tor browser support. + // See tor-browser#32092. + this.href = Services.prefs.getStringPref( + "browser.base-browser-support-url", + "" + ); + return; + // Fall through to support.mozilla.org + } let base = MozSupportLink.SUPPORT_URL + supportPage; this.href = this.hasAttribute("utm-content") ? formatUTMParams(this.getAttribute("utm-content"), base) View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/36a296b… -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/36a296b… You're receiving this email because of your account on gitlab.torproject.org.
1 0
0 0
[Git][tpo/applications/tor-browser][tor-browser-140.1.0esr-15.0-1] 4 commits: dropme! fixup! TB 42583: Modify moz-support-link for Tor Browser.
by henry (@henry) 05 Aug '25

05 Aug '25
henry pushed to branch tor-browser-140.1.0esr-15.0-1 at The Tor Project / Applications / Tor Browser Commits: f5edc9e2 by Henry Wilkes at 2025-08-05T15:30:39+00:00 dropme! fixup! TB 42583: Modify moz-support-link for Tor Browser. TB 43864: Move moz-support-link "preferences" patch out of tor-browser commits. Should be dropped at the next rebase. - - - - - be0e5337 by Henry Wilkes at 2025-08-05T15:30:39+00:00 fixup! BB 42583: Modify moz-support-link for Base Browser. TB 43864: Move moz-support-link "preferences" patch to base-browser. - - - - - 26f33db1 by Henry Wilkes at 2025-08-05T15:30:39+00:00 fixup! TB 40562: Added Tor Browser preferences to 000-tor-browser.js TB 43864: Move to Tor Browser help URL to preferences. - - - - - 61677384 by Henry Wilkes at 2025-08-05T15:30:39+00:00 BB 43864: Modify the urlbar for Base Browser. - - - - - 4 changed files: - browser/app/profile/000-tor-browser.js - browser/components/urlbar/QuickActionsLoaderDefault.sys.mjs - browser/components/urlbar/SearchModeSwitcher.sys.mjs - toolkit/content/widgets/moz-support-link/moz-support-link.mjs Changes: ===================================== browser/app/profile/000-tor-browser.js ===================================== @@ -48,6 +48,9 @@ pref("extensions.torbutton.use_nontor_proxy", false); // Browser home page: pref("browser.startup.homepage", "about:tor"); +// General browser support url. tor-browser#43864 and tor-browser#40899. +pref("browser.base-browser-support-url", "https://support.torproject.org/tbb"); + // tor-browser#40701: Add new download warning pref("browser.download.showTorWarning", true); ===================================== browser/components/urlbar/QuickActionsLoaderDefault.sys.mjs ===================================== @@ -13,6 +13,7 @@ ChromeUtils.defineESModuleGetters(lazy, { ScreenshotsUtils: "resource:///modules/ScreenshotsUtils.sys.mjs", ActionsProviderQuickActions: "resource:///modules/ActionsProviderQuickActions.sys.mjs", + PrivateBrowsingUtils: "resource://gre/modules/PrivateBrowsingUtils.sys.mjs", }); import { AppConstants } from "resource://gre/modules/AppConstants.sys.mjs"; @@ -78,6 +79,9 @@ const DEFAULT_ACTIONS = { icon: "chrome://mozapps/skin/extensions/category-extensions.svg", label: "quickactions-addons", onPick: openAddonsUrl("addons://discover/"), + // Hide in base-browser, since we don't want to open extensions + // "recommendations" tab. tor-browser#43864. + disabled: () => true, }, bookmarks: { l10nCommands: ["quickactions-cmd-bookmarks", "quickactions-bookmarks2"], @@ -100,6 +104,12 @@ const DEFAULT_ACTIONS = { .document.getElementById("Tools:Sanitize") .doCommand(); }, + // Disable in permanent private browsing. tor-browser#43864. + // NOTE: This should also be disabled in private windows, but we don't have + // access to a Window element to check. See mozilla bug 1980912. + disabled: () => { + return lazy.PrivateBrowsingUtils.permanentPrivateBrowsing; + }, }, downloads: { l10nCommands: ["quickactions-cmd-downloads"], @@ -112,13 +122,18 @@ const DEFAULT_ACTIONS = { icon: "chrome://mozapps/skin/extensions/category-extensions.svg", label: "quickactions-extensions", onPick: openAddonsUrl("addons://list/extension"), + // Hide in base-browser since we do not want to encourage users to change + // their extensions/addons. tor-browser#43864. + disabled: () => true, }, help: { l10nCommands: ["quickactions-cmd-help"], icon: "chrome://global/skin/icons/help.svg", label: "quickactions-help", + // Open the base-browser support/help page, rather than Firefox's. + // tor-browser#43864. onPick: openUrlFun( - "https://support.mozilla.org/products/firefox?as=u&utm_source=inproduct" + Services.prefs.getStringPref("browser.base-browser-support-url", "") ), }, firefoxview: { @@ -128,6 +143,9 @@ const DEFAULT_ACTIONS = { onPick: () => { lazy.BrowserWindowTracker.getTopWindow().FirefoxViewHandler.openTab(); }, + // Hide in base-browser since firefoxview is disabled. + // tor-browser#43864 and tor-browser#42037. + disabled: () => true, }, inspect: { l10nCommands: ["quickactions-cmd-inspector2"], @@ -311,6 +329,9 @@ export class QuickActionsLoaderDefault { let keys = Object.keys(DEFAULT_ACTIONS); for (const key of keys) { let actionData = DEFAULT_ACTIONS[key]; + if (actionData.disabled?.()) { + continue; + } let messages = await lazy.gFluentStrings.formatMessages( actionData.l10nCommands.map(id => ({ id })) ); ===================================== browser/components/urlbar/SearchModeSwitcher.sys.mjs ===================================== @@ -413,6 +413,15 @@ export class SearchModeSwitcher { if (!lazy.UrlbarPrefs.get(pref)) { continue; } + if ( + source === lazy.UrlbarUtils.RESULT_SOURCE.HISTORY && + lazy.PrivateBrowsingUtils.permanentPrivateBrowsing + ) { + // Do not show the search history option in PBM. tor-browser#43864. + // Although, it can still be triggered with "^" restrict keyword or + // through an app menu item. See also mozilla bug 1980928. + continue; + } let name = lazy.UrlbarUtils.getResultSourceName(source); let { icon } = await this.#getDisplayedEngineDetails({ source, ===================================== toolkit/content/widgets/moz-support-link/moz-support-link.mjs ===================================== @@ -113,7 +113,7 @@ export default class MozSupportLink extends HTMLAnchorElement { return; } let supportPage = this.getAttribute("support-page") ?? ""; - // For tor-browser we sometimes want to override firefox support links with + // For base-browser we sometimes want to override firefox support links with // our own. // See tor-browser#40899. switch (supportPage) { @@ -122,7 +122,10 @@ export default class MozSupportLink extends HTMLAnchorElement { // Instead of directing to support for preferences, we link to general // tor browser support. // See tor-browser#32092. - this.href = "https://support.torproject.org/tbb"; + this.href = Services.prefs.getStringPref( + "browser.base-browser-support-url", + "" + ); return; // Fall through to support.mozilla.org } View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/compare/17f8c4… -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/compare/17f8c4… You're receiving this email because of your account on gitlab.torproject.org.
1 0
0 0
[Git][tpo/applications/tor-browser][tor-browser-115.26.0esr-13.5-1] Bug 43912: Make xslt:sort obey spoof English.
by Pier Angelo Vendrame (@pierov) 05 Aug '25

05 Aug '25
Pier Angelo Vendrame pushed to branch tor-browser-115.26.0esr-13.5-1 at The Tor Project / Applications / Tor Browser Commits: 5e052e8c by Pier Angelo Vendrame at 2025-08-05T16:32:16+02:00 Bug 43912: Make xslt:sort obey spoof English. - - - - - 1 changed file: - dom/xslt/xslt/txNodeSorter.cpp Changes: ===================================== dom/xslt/xslt/txNodeSorter.cpp ===================================== @@ -76,6 +76,9 @@ nsresult txNodeSorter::addSortElement(Expr* aSelectExpr, Expr* aLangExpr, rv = aLangExpr->evaluateToString(aContext, lang); NS_ENSURE_SUCCESS(rv, rv); } + if (lang.IsEmpty() && nsContentUtils::SpoofLocaleEnglish()) { + lang.AssignLiteral("en-US"); + } // Case-order bool upperFirst = false; View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/5e052e8… -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/5e052e8… You're receiving this email because of your account on gitlab.torproject.org.
1 0
0 0
[Git][tpo/applications/mullvad-browser][mullvad-browser-128.13.0esr-14.5-1] Bug 1979608. r=hsivonen
by Pier Angelo Vendrame (@pierov) 05 Aug '25

05 Aug '25
Pier Angelo Vendrame pushed to branch mullvad-browser-128.13.0esr-14.5-1 at The Tor Project / Applications / Mullvad Browser Commits: 3f58a973 by Pier Angelo Vendrame at 2025-08-05T16:57:44+02:00 Bug 1979608. r=hsivonen Differential Revision: https://phabricator.services.mozilla.com/D258859 - - - - - 1 changed file: - dom/xslt/xslt/txNodeSorter.cpp Changes: ===================================== dom/xslt/xslt/txNodeSorter.cpp ===================================== @@ -77,9 +77,10 @@ nsresult txNodeSorter::addSortElement(Expr* aSelectExpr, Expr* aLangExpr, if (aLangExpr) { rv = aLangExpr->evaluateToString(aContext, lang); NS_ENSURE_SUCCESS(rv, rv); - } else if (aContext->getContextNode() - .OwnerDoc() - ->ShouldResistFingerprinting(RFPTarget::JSLocale)) { + } + if (lang.IsEmpty() && + aContext->getContextNode().OwnerDoc()->ShouldResistFingerprinting( + RFPTarget::JSLocale)) { CopyUTF8toUTF16(nsRFPService::GetSpoofedJSLocale(), lang); } View it on GitLab: https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/3f5… -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/3f5… You're receiving this email because of your account on gitlab.torproject.org.
1 0
0 0
[Git][tpo/applications/tor-browser][base-browser-128.13.0esr-14.5-1] Bug 1979608. r=hsivonen
by Pier Angelo Vendrame (@pierov) 05 Aug '25

05 Aug '25
Pier Angelo Vendrame pushed to branch base-browser-128.13.0esr-14.5-1 at The Tor Project / Applications / Tor Browser Commits: 19f74a4d by Pier Angelo Vendrame at 2025-08-05T16:57:22+02:00 Bug 1979608. r=hsivonen Differential Revision: https://phabricator.services.mozilla.com/D258859 - - - - - 1 changed file: - dom/xslt/xslt/txNodeSorter.cpp Changes: ===================================== dom/xslt/xslt/txNodeSorter.cpp ===================================== @@ -77,9 +77,10 @@ nsresult txNodeSorter::addSortElement(Expr* aSelectExpr, Expr* aLangExpr, if (aLangExpr) { rv = aLangExpr->evaluateToString(aContext, lang); NS_ENSURE_SUCCESS(rv, rv); - } else if (aContext->getContextNode() - .OwnerDoc() - ->ShouldResistFingerprinting(RFPTarget::JSLocale)) { + } + if (lang.IsEmpty() && + aContext->getContextNode().OwnerDoc()->ShouldResistFingerprinting( + RFPTarget::JSLocale)) { CopyUTF8toUTF16(nsRFPService::GetSpoofedJSLocale(), lang); } View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/19f74a4… -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/19f74a4… You're receiving this email because of your account on gitlab.torproject.org.
1 0
0 0
[Git][tpo/applications/tor-browser][tor-browser-128.13.0esr-14.5-1] Bug 1979608. r=hsivonen
by Pier Angelo Vendrame (@pierov) 05 Aug '25

05 Aug '25
Pier Angelo Vendrame pushed to branch tor-browser-128.13.0esr-14.5-1 at The Tor Project / Applications / Tor Browser Commits: 749092a5 by Pier Angelo Vendrame at 2025-08-05T16:56:46+02:00 Bug 1979608. r=hsivonen Differential Revision: https://phabricator.services.mozilla.com/D258859 - - - - - 1 changed file: - dom/xslt/xslt/txNodeSorter.cpp Changes: ===================================== dom/xslt/xslt/txNodeSorter.cpp ===================================== @@ -77,9 +77,10 @@ nsresult txNodeSorter::addSortElement(Expr* aSelectExpr, Expr* aLangExpr, if (aLangExpr) { rv = aLangExpr->evaluateToString(aContext, lang); NS_ENSURE_SUCCESS(rv, rv); - } else if (aContext->getContextNode() - .OwnerDoc() - ->ShouldResistFingerprinting(RFPTarget::JSLocale)) { + } + if (lang.IsEmpty() && + aContext->getContextNode().OwnerDoc()->ShouldResistFingerprinting( + RFPTarget::JSLocale)) { CopyUTF8toUTF16(nsRFPService::GetSpoofedJSLocale(), lang); } View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/749092a… -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/749092a… You're receiving this email because of your account on gitlab.torproject.org.
1 0
0 0
[Git][tpo/applications/mullvad-browser][mullvad-browser-140.1.0esr-15.0-1] Bug 1979608. r=hsivonen
by Pier Angelo Vendrame (@pierov) 05 Aug '25

05 Aug '25
Pier Angelo Vendrame pushed to branch mullvad-browser-140.1.0esr-15.0-1 at The Tor Project / Applications / Mullvad Browser Commits: 6ed66bd3 by Pier Angelo Vendrame at 2025-08-05T16:55:44+02:00 Bug 1979608. r=hsivonen Differential Revision: https://phabricator.services.mozilla.com/D258859 - - - - - 1 changed file: - dom/xslt/xslt/txNodeSorter.cpp Changes: ===================================== dom/xslt/xslt/txNodeSorter.cpp ===================================== @@ -77,9 +77,10 @@ nsresult txNodeSorter::addSortElement(Expr* aSelectExpr, Expr* aLangExpr, if (aLangExpr) { rv = aLangExpr->evaluateToString(aContext, lang); NS_ENSURE_SUCCESS(rv, rv); - } else if (aContext->getContextNode() - .OwnerDoc() - ->ShouldResistFingerprinting(RFPTarget::JSLocale)) { + } + if (lang.IsEmpty() && + aContext->getContextNode().OwnerDoc()->ShouldResistFingerprinting( + RFPTarget::JSLocale)) { CopyUTF8toUTF16(nsRFPService::GetSpoofedJSLocale(), lang); } View it on GitLab: https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/6ed… -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/6ed… You're receiving this email because of your account on gitlab.torproject.org.
1 0
0 0
[Git][tpo/applications/tor-browser][base-browser-140.1.0esr-15.0-1] Bug 1979608. r=hsivonen
by Pier Angelo Vendrame (@pierov) 05 Aug '25

05 Aug '25
Pier Angelo Vendrame pushed to branch base-browser-140.1.0esr-15.0-1 at The Tor Project / Applications / Tor Browser Commits: 5ff48f30 by Pier Angelo Vendrame at 2025-08-05T16:55:01+02:00 Bug 1979608. r=hsivonen Differential Revision: https://phabricator.services.mozilla.com/D258859 - - - - - 1 changed file: - dom/xslt/xslt/txNodeSorter.cpp Changes: ===================================== dom/xslt/xslt/txNodeSorter.cpp ===================================== @@ -77,9 +77,10 @@ nsresult txNodeSorter::addSortElement(Expr* aSelectExpr, Expr* aLangExpr, if (aLangExpr) { rv = aLangExpr->evaluateToString(aContext, lang); NS_ENSURE_SUCCESS(rv, rv); - } else if (aContext->getContextNode() - .OwnerDoc() - ->ShouldResistFingerprinting(RFPTarget::JSLocale)) { + } + if (lang.IsEmpty() && + aContext->getContextNode().OwnerDoc()->ShouldResistFingerprinting( + RFPTarget::JSLocale)) { CopyUTF8toUTF16(nsRFPService::GetSpoofedJSLocale(), lang); } View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/5ff48f3… -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/5ff48f3… You're receiving this email because of your account on gitlab.torproject.org.
1 0
0 0
[Git][tpo/applications/tor-browser-build][main] Bug 41517: Add morgan's key to the setup account on the signing machines
by morgan (@morgan) 05 Aug '25

05 Aug '25
morgan pushed to branch main at The Tor Project / Applications / tor-browser-build Commits: ca3c9880 by Nicolas Vigier at 2025-08-05T14:52:22+00:00 Bug 41517: Add morgan's key to the setup account on the signing machines - - - - - 1 changed file: - tools/signing/machines-setup/setup-signing-machine Changes: ===================================== tools/signing/machines-setup/setup-signing-machine ===================================== @@ -70,6 +70,7 @@ install_packages sudo vim tmux gnupg create_user setup authorized_keys setup boklm-yk1.pub +authorized_keys setup morgan.pub mkdir -p /signing chmod 0755 /signing chown setup /signing View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/commit/c… -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/commit/c… You're receiving this email because of your account on gitlab.torproject.org.
1 0
0 0
[Git][tpo/applications/tor-browser][tor-browser-140.1.0esr-15.0-1] Bug 1979608. r=hsivonen
by Pier Angelo Vendrame (@pierov) 05 Aug '25

05 Aug '25
Pier Angelo Vendrame pushed to branch tor-browser-140.1.0esr-15.0-1 at The Tor Project / Applications / Tor Browser Commits: 17f8c468 by Pier Angelo Vendrame at 2025-08-05T16:48:25+02:00 Bug 1979608. r=hsivonen Differential Revision: https://phabricator.services.mozilla.com/D258859 - - - - - 1 changed file: - dom/xslt/xslt/txNodeSorter.cpp Changes: ===================================== dom/xslt/xslt/txNodeSorter.cpp ===================================== @@ -77,9 +77,10 @@ nsresult txNodeSorter::addSortElement(Expr* aSelectExpr, Expr* aLangExpr, if (aLangExpr) { rv = aLangExpr->evaluateToString(aContext, lang); NS_ENSURE_SUCCESS(rv, rv); - } else if (aContext->getContextNode() - .OwnerDoc() - ->ShouldResistFingerprinting(RFPTarget::JSLocale)) { + } + if (lang.IsEmpty() && + aContext->getContextNode().OwnerDoc()->ShouldResistFingerprinting( + RFPTarget::JSLocale)) { CopyUTF8toUTF16(nsRFPService::GetSpoofedJSLocale(), lang); } View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/17f8c46… -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/17f8c46… You're receiving this email because of your account on gitlab.torproject.org.
1 0
0 0
  • ← Newer
  • 1
  • ...
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • ...
  • 798
  • Older →

HyperKitty Powered by HyperKitty version 1.3.12.