morgan pushed to branch mullvad-browser-128.3.0esr-14.0-1 at The Tor Project / Applications / Mullvad Browser
Commits:
b4eaca29 by Pier Angelo Vendrame at 2024-10-03T17:57:36+00:00
fixup! Base Browser's .mozconfigs.
Bug 43151: Uniform the behavior of the android-all mozconfig.
- - - - -
2 changed files:
- browser/config/mozconfigs/base-browser-android
- mozconfig-android-all
Changes:
=====================================
browser/config/mozconfigs/base-browser-android
=====================================
@@ -1,3 +1,6 @@
+# Changes on this file might need to be synchronized with mozconfig-android-all!
+# See also tor-browser#43151.
+
export MOZILLA_OFFICIAL=1
ac_add_options --enable-optimize
@@ -29,6 +32,9 @@ ac_add_options --disable-parental-controls
ac_add_options --enable-proxy-bypass-protection
ac_add_options --disable-system-policies
+# See tor-browser#41131
+ac_add_options --disable-backgroundtasks
+
# Disable telemetry
ac_add_options MOZ_TELEMETRY_REPORTING=
=====================================
mozconfig-android-all
=====================================
@@ -1,18 +1,41 @@
+# Changes on this file might need to be synchronized with
+# browser/config/mozconfigs/base-browser-android!
+# See also tor-browser#43151.
+
export MOZILLA_OFFICIAL=1
ac_add_options --enable-application=mobile/android
+
ac_add_options --disable-compile-environment
+ac_add_options --with-java-bin-path=$JAVA_HOME/bin
+ac_add_options --with-android-sdk=$ANDROID_HOME
+ac_add_options --with-gradle=$GRADLE_HOME/bin/gradle
+
+ac_add_options --disable-tests
+ac_add_options --disable-debug
+
+ac_add_options --disable-updater
+ac_add_options --disable-crashreporter
+ac_add_options --disable-webrtc
+ac_add_options --disable-parental-controls
+
+ac_add_options --enable-proxy-bypass-protection
+ac_add_options --disable-system-policies
+
+# See tor-browser#41131
+ac_add_options --disable-backgroundtasks
+
+# Disable telemetry
+ac_add_options MOZ_TELEMETRY_REPORTING=
+
if test -n "$LOCAL_DEV_BUILD"; then
# You must use the "default" bogus channel for dev builds
ac_add_options --enable-update-channel=default
- ac_add_options --without-wasm-sandboxed-libraries
ac_add_options --with-base-browser-version=dev-build
ac_add_options --disable-minify
fi
-ac_add_options --with-tor-browser-version=dev-build
-
-ac_add_options --with-java-bin-path=$JAVA_HOME/bin
-ac_add_options --with-android-sdk=$ANDROID_HOME
-ac_add_options --with-gradle=$GRADLE_HOME/bin/gradle
+if test -z "$WASI_SYSROOT"; then
+ ac_add_options --without-wasm-sandboxed-libraries
+fi
View it on GitLab: https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/b4e…
--
View it on GitLab: https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/b4e…
You're receiving this email because of your account on gitlab.torproject.org.
morgan pushed to branch base-browser-128.3.0esr-14.0-1 at The Tor Project / Applications / Tor Browser
Commits:
0287abcb by Pier Angelo Vendrame at 2024-10-03T17:56:38+00:00
fixup! Base Browser's .mozconfigs.
Bug 43151: Uniform the behavior of the android-all mozconfig.
- - - - -
2 changed files:
- browser/config/mozconfigs/base-browser-android
- mozconfig-android-all
Changes:
=====================================
browser/config/mozconfigs/base-browser-android
=====================================
@@ -1,3 +1,6 @@
+# Changes on this file might need to be synchronized with mozconfig-android-all!
+# See also tor-browser#43151.
+
export MOZILLA_OFFICIAL=1
ac_add_options --enable-optimize
@@ -29,6 +32,9 @@ ac_add_options --disable-parental-controls
ac_add_options --enable-proxy-bypass-protection
ac_add_options --disable-system-policies
+# See tor-browser#41131
+ac_add_options --disable-backgroundtasks
+
# Disable telemetry
ac_add_options MOZ_TELEMETRY_REPORTING=
=====================================
mozconfig-android-all
=====================================
@@ -1,18 +1,41 @@
+# Changes on this file might need to be synchronized with
+# browser/config/mozconfigs/base-browser-android!
+# See also tor-browser#43151.
+
export MOZILLA_OFFICIAL=1
ac_add_options --enable-application=mobile/android
+
ac_add_options --disable-compile-environment
+ac_add_options --with-java-bin-path=$JAVA_HOME/bin
+ac_add_options --with-android-sdk=$ANDROID_HOME
+ac_add_options --with-gradle=$GRADLE_HOME/bin/gradle
+
+ac_add_options --disable-tests
+ac_add_options --disable-debug
+
+ac_add_options --disable-updater
+ac_add_options --disable-crashreporter
+ac_add_options --disable-webrtc
+ac_add_options --disable-parental-controls
+
+ac_add_options --enable-proxy-bypass-protection
+ac_add_options --disable-system-policies
+
+# See tor-browser#41131
+ac_add_options --disable-backgroundtasks
+
+# Disable telemetry
+ac_add_options MOZ_TELEMETRY_REPORTING=
+
if test -n "$LOCAL_DEV_BUILD"; then
# You must use the "default" bogus channel for dev builds
ac_add_options --enable-update-channel=default
- ac_add_options --without-wasm-sandboxed-libraries
ac_add_options --with-base-browser-version=dev-build
ac_add_options --disable-minify
fi
-ac_add_options --with-tor-browser-version=dev-build
-
-ac_add_options --with-java-bin-path=$JAVA_HOME/bin
-ac_add_options --with-android-sdk=$ANDROID_HOME
-ac_add_options --with-gradle=$GRADLE_HOME/bin/gradle
+if test -z "$WASI_SYSROOT"; then
+ ac_add_options --without-wasm-sandboxed-libraries
+fi
View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/0287abc…
--
View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/0287abc…
You're receiving this email because of your account on gitlab.torproject.org.
morgan pushed to branch tor-browser-128.3.0esr-14.0-1 at The Tor Project / Applications / Tor Browser
Commits:
72a8c0c8 by Pier Angelo Vendrame at 2024-10-03T17:44:50+00:00
fixup! TB3: Tor Browser's official .mozconfigs.
Bug 43151: Uniform the behavior of the android-all mozconfig.
- - - - -
58271a0c by Pier Angelo Vendrame at 2024-10-03T17:44:50+00:00
fixup! Base Browser's .mozconfigs.
Bug 43151: Uniform the behavior of the android-all mozconfig.
- - - - -
2 changed files:
- browser/config/mozconfigs/base-browser-android
- mozconfig-android-all
Changes:
=====================================
browser/config/mozconfigs/base-browser-android
=====================================
@@ -1,3 +1,6 @@
+# Changes on this file might need to be synchronized with mozconfig-android-all!
+# See also tor-browser#43151.
+
export MOZILLA_OFFICIAL=1
ac_add_options --enable-optimize
@@ -29,6 +32,9 @@ ac_add_options --disable-parental-controls
ac_add_options --enable-proxy-bypass-protection
ac_add_options --disable-system-policies
+# See tor-browser#41131
+ac_add_options --disable-backgroundtasks
+
# Disable telemetry
ac_add_options MOZ_TELEMETRY_REPORTING=
=====================================
mozconfig-android-all
=====================================
@@ -1,16 +1,41 @@
+# Changes on this file might need to be synchronized with
+# browser/config/mozconfigs/base-browser-android!
+# See also tor-browser#43151.
+
export MOZILLA_OFFICIAL=1
ac_add_options --enable-application=mobile/android
+
ac_add_options --disable-compile-environment
+ac_add_options --with-java-bin-path=$JAVA_HOME/bin
+ac_add_options --with-android-sdk=$ANDROID_HOME
+ac_add_options --with-gradle=$GRADLE_HOME/bin/gradle
+
+ac_add_options --disable-tests
+ac_add_options --disable-debug
+
+ac_add_options --disable-updater
+ac_add_options --disable-crashreporter
+ac_add_options --disable-webrtc
+ac_add_options --disable-parental-controls
+
+ac_add_options --enable-proxy-bypass-protection
+ac_add_options --disable-system-policies
+
+# See tor-browser#41131
+ac_add_options --disable-backgroundtasks
+
+# Disable telemetry
+ac_add_options MOZ_TELEMETRY_REPORTING=
+
if test -n "$LOCAL_DEV_BUILD"; then
# You must use the "default" bogus channel for dev builds
ac_add_options --enable-update-channel=default
- ac_add_options --without-wasm-sandboxed-libraries
ac_add_options --with-base-browser-version=dev-build
ac_add_options --disable-minify
fi
-ac_add_options --with-java-bin-path=$JAVA_HOME/bin
-ac_add_options --with-android-sdk=$ANDROID_HOME
-ac_add_options --with-gradle=$GRADLE_HOME/bin/gradle
+if test -z "$WASI_SYSROOT"; then
+ ac_add_options --without-wasm-sandboxed-libraries
+fi
View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/compare/816dae…
--
View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/compare/816dae…
You're receiving this email because of your account on gitlab.torproject.org.
morgan pushed to branch mullvad-browser-128.3.0esr-14.0-1 at The Tor Project / Applications / Mullvad Browser
Commits:
8523387b by Pier Angelo Vendrame at 2024-10-02T19:53:07+00:00
fixup! Firefox preference overrides.
Bug 42054: ESR128: investigate - thorin's list.
Set or remove some preferences as suggested by Thorin.
- - - - -
1 changed file:
- browser/app/profile/001-base-profile.js
Changes:
=====================================
browser/app/profile/001-base-profile.js
=====================================
@@ -101,6 +101,12 @@ pref("browser.pagethumbnails.capturing_disabled", true);
// pref("privacy.exposeContentTitleInWindow", false);
// pref("privacy.exposeContentTitleInWindow.pbm", false);
+// tor-browser#42054: Opt-out from any built-in backup system, even though
+// local, as it might be a violation of our standalone mode.
+// Users can still opt-in if they wish.
+pref("browser.backup.enabled", false);
+pref("browser.backup.scheduled.enabled", false);
+
// Empty clipboard content from private windows on exit (tor-browser#42154)
pref("browser.privatebrowsing.preserveClipboard", false);
@@ -251,6 +257,9 @@ pref("privacy.trackingprotection.fingerprinting.enabled", false);
pref("privacy.trackingprotection.socialtracking.enabled", false);
pref("privacy.socialtracking.block_cookies.enabled", false);
pref("privacy.annotate_channels.strict_list.enabled", false);
+// tor-browser#43178: for defense-in-depth, avoid remote overrides to FPP.
+// Notice that it should not apply to RFP anyway...
+pref("privacy.fingerprintingProtection.remoteOverrides.enabled", false);
// Disable the Pocket extension (Bug #18886 and #31602)
pref("extensions.pocket.enabled", false);
@@ -284,6 +293,9 @@ pref("browser.newtabpage.activity-stream.asrouter.providers.messaging-experiment
// Disable fetching asrouter.ftl and related console errors (tor-browser#40763).
pref("browser.newtabpage.activity-stream.asrouter.useRemoteL10n", false);
+// tor-browser#42054: make sure search result telemetry is disabled.
+pref("browser.search.serpEventTelemetryCategorization.enabled", false);
+
// tor-browser#42872, #42555: Disable translations.
// Translation have a bad UX in 128 (and with our config). Maybe we will
// re-enable after auditing and fixing the UX.
@@ -444,9 +456,6 @@ pref("pdfjs.disabled", false, locked);
#endif
// Bug 40057: Ensure system colors are not used for CSS4 colors
pref("browser.display.use_system_colors", false);
-// Enforce non-native widget theme (true by default, defense in depth).
-// Provides a uniform look and feel across platforms. Added with tor-browser#41496.
-pref("widget.non-native-theme.enabled", true);
// tor-browser#41676: Set the TZ environment variable as a defense-in-depth.
// TODO: Remove this in ESR-128, as it has been removed in 116 with Bug 1837582.
pref("privacy.resistFingerprinting.testing.setTZtoUTC", true);
@@ -524,7 +533,9 @@ pref("network.http.http2.websockets", true, locked);
pref("network.http.http2.enable-hpack-dump", false, locked);
// tor-browser#23044: Make sure we don't have any GIO supported protocols
-// (defense in depth measure)
+// (defense in depth measure).
+// As of Firefox 118 (Bug 1843763), upstream does not add any protocol by
+// default, but setting it to blank seems a good idea (tor-browser#42054).
pref("network.gio.supported-protocols", "");
// Mullvad Browser enables WebRTC by default, meaning that there the following prefs
// are first-line defense, rather than "in depth" (mullvad-browser#40)
@@ -627,9 +638,6 @@ pref("security.cert_pinning.enforcement_level", 2);
// Don't load OS client certs.
pref("security.osclientcerts.autoload", false);
-// Don't allow MitM via Microsoft Family Safety, see bug 21686
-pref("security.family_safety.mode", 0);
-
// Don't allow MitM via enterprise roots, see bug 30681
pref("security.enterprise_roots.enabled", false);
View it on GitLab: https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/852…
--
View it on GitLab: https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/852…
You're receiving this email because of your account on gitlab.torproject.org.
morgan pushed to branch base-browser-128.3.0esr-14.0-1 at The Tor Project / Applications / Tor Browser
Commits:
b8610ea4 by Pier Angelo Vendrame at 2024-10-02T19:52:38+00:00
fixup! Firefox preference overrides.
Bug 42054: ESR128: investigate - thorin's list.
Set or remove some preferences as suggested by Thorin.
- - - - -
1 changed file:
- browser/app/profile/001-base-profile.js
Changes:
=====================================
browser/app/profile/001-base-profile.js
=====================================
@@ -101,6 +101,12 @@ pref("browser.pagethumbnails.capturing_disabled", true);
// pref("privacy.exposeContentTitleInWindow", false);
// pref("privacy.exposeContentTitleInWindow.pbm", false);
+// tor-browser#42054: Opt-out from any built-in backup system, even though
+// local, as it might be a violation of our standalone mode.
+// Users can still opt-in if they wish.
+pref("browser.backup.enabled", false);
+pref("browser.backup.scheduled.enabled", false);
+
// Empty clipboard content from private windows on exit (tor-browser#42154)
pref("browser.privatebrowsing.preserveClipboard", false);
@@ -251,6 +257,9 @@ pref("privacy.trackingprotection.fingerprinting.enabled", false);
pref("privacy.trackingprotection.socialtracking.enabled", false);
pref("privacy.socialtracking.block_cookies.enabled", false);
pref("privacy.annotate_channels.strict_list.enabled", false);
+// tor-browser#43178: for defense-in-depth, avoid remote overrides to FPP.
+// Notice that it should not apply to RFP anyway...
+pref("privacy.fingerprintingProtection.remoteOverrides.enabled", false);
// Disable the Pocket extension (Bug #18886 and #31602)
pref("extensions.pocket.enabled", false);
@@ -284,6 +293,9 @@ pref("browser.newtabpage.activity-stream.asrouter.providers.messaging-experiment
// Disable fetching asrouter.ftl and related console errors (tor-browser#40763).
pref("browser.newtabpage.activity-stream.asrouter.useRemoteL10n", false);
+// tor-browser#42054: make sure search result telemetry is disabled.
+pref("browser.search.serpEventTelemetryCategorization.enabled", false);
+
// tor-browser#42872, #42555: Disable translations.
// Translation have a bad UX in 128 (and with our config). Maybe we will
// re-enable after auditing and fixing the UX.
@@ -444,9 +456,6 @@ pref("pdfjs.disabled", false, locked);
#endif
// Bug 40057: Ensure system colors are not used for CSS4 colors
pref("browser.display.use_system_colors", false);
-// Enforce non-native widget theme (true by default, defense in depth).
-// Provides a uniform look and feel across platforms. Added with tor-browser#41496.
-pref("widget.non-native-theme.enabled", true);
// tor-browser#41676: Set the TZ environment variable as a defense-in-depth.
// TODO: Remove this in ESR-128, as it has been removed in 116 with Bug 1837582.
pref("privacy.resistFingerprinting.testing.setTZtoUTC", true);
@@ -524,7 +533,9 @@ pref("network.http.http2.websockets", true, locked);
pref("network.http.http2.enable-hpack-dump", false, locked);
// tor-browser#23044: Make sure we don't have any GIO supported protocols
-// (defense in depth measure)
+// (defense in depth measure).
+// As of Firefox 118 (Bug 1843763), upstream does not add any protocol by
+// default, but setting it to blank seems a good idea (tor-browser#42054).
pref("network.gio.supported-protocols", "");
pref("media.peerconnection.enabled", false); // Disable WebRTC interfaces
// Mullvad Browser enables WebRTC by default, meaning that there the following prefs
@@ -631,9 +642,6 @@ pref("security.cert_pinning.enforcement_level", 2);
// Don't load OS client certs.
pref("security.osclientcerts.autoload", false);
-// Don't allow MitM via Microsoft Family Safety, see bug 21686
-pref("security.family_safety.mode", 0);
-
// Don't allow MitM via enterprise roots, see bug 30681
pref("security.enterprise_roots.enabled", false);
View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/b8610ea…
--
View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/b8610ea…
You're receiving this email because of your account on gitlab.torproject.org.
morgan pushed to branch tor-browser-128.3.0esr-14.0-1 at The Tor Project / Applications / Tor Browser
Commits:
816dae39 by Pier Angelo Vendrame at 2024-10-02T19:32:59+00:00
fixup! Firefox preference overrides.
Bug 42054: ESR128: investigate - thorin's list.
Set or remove some preferences as suggested by Thorin.
- - - - -
1 changed file:
- browser/app/profile/001-base-profile.js
Changes:
=====================================
browser/app/profile/001-base-profile.js
=====================================
@@ -101,6 +101,12 @@ pref("browser.pagethumbnails.capturing_disabled", true);
// pref("privacy.exposeContentTitleInWindow", false);
// pref("privacy.exposeContentTitleInWindow.pbm", false);
+// tor-browser#42054: Opt-out from any built-in backup system, even though
+// local, as it might be a violation of our standalone mode.
+// Users can still opt-in if they wish.
+pref("browser.backup.enabled", false);
+pref("browser.backup.scheduled.enabled", false);
+
// Empty clipboard content from private windows on exit (tor-browser#42154)
pref("browser.privatebrowsing.preserveClipboard", false);
@@ -251,6 +257,9 @@ pref("privacy.trackingprotection.fingerprinting.enabled", false);
pref("privacy.trackingprotection.socialtracking.enabled", false);
pref("privacy.socialtracking.block_cookies.enabled", false);
pref("privacy.annotate_channels.strict_list.enabled", false);
+// tor-browser#43178: for defense-in-depth, avoid remote overrides to FPP.
+// Notice that it should not apply to RFP anyway...
+pref("privacy.fingerprintingProtection.remoteOverrides.enabled", false);
// Disable the Pocket extension (Bug #18886 and #31602)
pref("extensions.pocket.enabled", false);
@@ -284,6 +293,9 @@ pref("browser.newtabpage.activity-stream.asrouter.providers.messaging-experiment
// Disable fetching asrouter.ftl and related console errors (tor-browser#40763).
pref("browser.newtabpage.activity-stream.asrouter.useRemoteL10n", false);
+// tor-browser#42054: make sure search result telemetry is disabled.
+pref("browser.search.serpEventTelemetryCategorization.enabled", false);
+
// tor-browser#42872, #42555: Disable translations.
// Translation have a bad UX in 128 (and with our config). Maybe we will
// re-enable after auditing and fixing the UX.
@@ -444,9 +456,6 @@ pref("pdfjs.disabled", false, locked);
#endif
// Bug 40057: Ensure system colors are not used for CSS4 colors
pref("browser.display.use_system_colors", false);
-// Enforce non-native widget theme (true by default, defense in depth).
-// Provides a uniform look and feel across platforms. Added with tor-browser#41496.
-pref("widget.non-native-theme.enabled", true);
// tor-browser#41676: Set the TZ environment variable as a defense-in-depth.
// TODO: Remove this in ESR-128, as it has been removed in 116 with Bug 1837582.
pref("privacy.resistFingerprinting.testing.setTZtoUTC", true);
@@ -524,7 +533,9 @@ pref("network.http.http2.websockets", true, locked);
pref("network.http.http2.enable-hpack-dump", false, locked);
// tor-browser#23044: Make sure we don't have any GIO supported protocols
-// (defense in depth measure)
+// (defense in depth measure).
+// As of Firefox 118 (Bug 1843763), upstream does not add any protocol by
+// default, but setting it to blank seems a good idea (tor-browser#42054).
pref("network.gio.supported-protocols", "");
pref("media.peerconnection.enabled", false); // Disable WebRTC interfaces
// Mullvad Browser enables WebRTC by default, meaning that there the following prefs
@@ -631,9 +642,6 @@ pref("security.cert_pinning.enforcement_level", 2);
// Don't load OS client certs.
pref("security.osclientcerts.autoload", false);
-// Don't allow MitM via Microsoft Family Safety, see bug 21686
-pref("security.family_safety.mode", 0);
-
// Don't allow MitM via enterprise roots, see bug 30681
pref("security.enterprise_roots.enabled", false);
View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/816dae3…
--
View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/816dae3…
You're receiving this email because of your account on gitlab.torproject.org.
morgan pushed to branch mullvad-browser-128.3.0esr-14.0-1 at The Tor Project / Applications / Mullvad Browser
Commits:
37ace560 by Morgan at 2024-10-02T17:36:53+00:00
fixup! Firefox preference overrides.
Bug 43164: Prevent search-bar from being auto-hidden when not used for awhile
- - - - -
1 changed file:
- browser/app/profile/001-base-profile.js
Changes:
=====================================
browser/app/profile/001-base-profile.js
=====================================
@@ -9,6 +9,11 @@ pref("intl.locale.requested", "");
pref("browser.startup.homepage", "about:blank");
pref("browser.newtabpage.enabled", false);
+// tor-browser#43164: Prevent search-bar from being auto-hidden when not used for awhile
+// This preference is locked so that the browser itself can never set an actual
+// value that would trigger the migration.
+pref("browser.search.widget.lastUsed", "", locked);
+
// Disable initial homepage notifications
pref("browser.search.update", false);
pref("startup.homepage_welcome_url", "");
View it on GitLab: https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/37a…
--
View it on GitLab: https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/37a…
You're receiving this email because of your account on gitlab.torproject.org.
morgan pushed to branch base-browser-128.3.0esr-14.0-1 at The Tor Project / Applications / Tor Browser
Commits:
e25795c4 by Morgan at 2024-10-02T17:34:44+00:00
fixup! Firefox preference overrides.
Bug 43164: Prevent search-bar from being auto-hidden when not used for awhile
- - - - -
1 changed file:
- browser/app/profile/001-base-profile.js
Changes:
=====================================
browser/app/profile/001-base-profile.js
=====================================
@@ -9,6 +9,11 @@ pref("intl.locale.requested", "");
pref("browser.startup.homepage", "about:blank");
pref("browser.newtabpage.enabled", false);
+// tor-browser#43164: Prevent search-bar from being auto-hidden when not used for awhile
+// This preference is locked so that the browser itself can never set an actual
+// value that would trigger the migration.
+pref("browser.search.widget.lastUsed", "", locked);
+
// Disable initial homepage notifications
pref("browser.search.update", false);
pref("startup.homepage_welcome_url", "");
View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/e25795c…
--
View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/e25795c…
You're receiving this email because of your account on gitlab.torproject.org.
morgan pushed to branch tor-browser-128.3.0esr-14.0-1 at The Tor Project / Applications / Tor Browser
Commits:
019449c4 by Morgan at 2024-10-02T17:32:43+00:00
fixup! Firefox preference overrides.
Bug 43164: Prevent search-bar from being auto-hidden when not used for awhile
- - - - -
1 changed file:
- browser/app/profile/001-base-profile.js
Changes:
=====================================
browser/app/profile/001-base-profile.js
=====================================
@@ -9,6 +9,11 @@ pref("intl.locale.requested", "");
pref("browser.startup.homepage", "about:blank");
pref("browser.newtabpage.enabled", false);
+// tor-browser#43164: Prevent search-bar from being auto-hidden when not used for awhile
+// This preference is locked so that the browser itself can never set an actual
+// value that would trigger the migration.
+pref("browser.search.widget.lastUsed", "", locked);
+
// Disable initial homepage notifications
pref("browser.search.update", false);
pref("startup.homepage_welcome_url", "");
View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/019449c…
--
View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/019449c…
You're receiving this email because of your account on gitlab.torproject.org.
Pier Angelo Vendrame pushed to branch tor-browser-128.3.0esr-14.0-1 at The Tor Project / Applications / Tor Browser
Commits:
8acd4ac6 by Dan Ballard at 2024-10-02T16:09:15+00:00
fixup! Orfox: Centralized proxy applied to AbstractCommunicator and BaseResources.
This reverts commit a16d36fce768826615620ee73bec755fcd7081ea for tb-42660
- - - - -
10a39162 by Dan Ballard at 2024-10-02T16:09:15+00:00
Bug 42660: Disable ProxySelector.openConnectionWithProxy and NOPify CrashReporter.sendCrashReport
- - - - -
2 changed files:
- mobile/android/geckoview/src/main/java/org/mozilla/gecko/util/ProxySelector.java
- mobile/android/geckoview/src/main/java/org/mozilla/geckoview/CrashReporter.java
Changes:
=====================================
mobile/android/geckoview/src/main/java/org/mozilla/gecko/util/ProxySelector.java
=====================================
@@ -28,40 +28,19 @@ import java.net.URLConnection;
import java.util.List;
public class ProxySelector {
- private static final String TOR_PROXY_ADDRESS = "127.0.0.1";
- private static final int TOR_SOCKS_PROXY_PORT = 9150;
- private static final int TOR_HTTP_PROXY_PORT = 8218;
-
public static URLConnection openConnectionWithProxy(final URI uri) throws IOException {
- final java.net.ProxySelector ps = java.net.ProxySelector.getDefault();
- Proxy proxy = Proxy.NO_PROXY;
- if (ps != null) {
- final List<Proxy> proxies = ps.select(uri);
- if (proxies != null && !proxies.isEmpty()) {
- proxy = proxies.get(0);
- }
- }
-
- /* Ignore the proxy we found from the VM, only use Tor. We can probably
- * safely use the logic in this class in the future. */
- return uri.toURL().openConnection(getProxy());
- }
-
- public static Proxy getProxy() {
- // TODO make configurable
- return new Proxy(Proxy.Type.SOCKS, new InetSocketAddress(TOR_PROXY_ADDRESS, TOR_SOCKS_PROXY_PORT));
- }
-
- public static String getProxyHostAddress() {
- return TOR_PROXY_ADDRESS;
- }
-
- public static int getSocksProxyPort() {
- return TOR_SOCKS_PROXY_PORT;
- }
-
- public static int getHttpProxyPort() {
- return TOR_HTTP_PROXY_PORT;
+// tb-42660: This should not be used: it cannot safely get tor configs so would be a proxy leak risk
+ throw new IOException("openConnectionWithProxy disabled by tb-42660");
+// final java.net.ProxySelector ps = java.net.ProxySelector.getDefault();
+// Proxy proxy = Proxy.NO_PROXY;
+// if (ps != null) {
+// final List<Proxy> proxies = ps.select(uri);
+// if (proxies != null && !proxies.isEmpty()) {
+// proxy = proxies.get(0);
+// }
+// }
+//
+// return uri.toURL().openConnection(proxy);
}
public ProxySelector() {}
=====================================
mobile/android/geckoview/src/main/java/org/mozilla/geckoview/CrashReporter.java
=====================================
@@ -169,6 +169,11 @@ public class CrashReporter {
@NonNull final File minidumpFile,
@NonNull final JSONObject extras)
throws IOException, URISyntaxException {
+ // tb-42660: makeing a NOP
+ if (true) {
+ return GeckoResult.fromValue("0");
+ }
+
Log.d(LOGTAG, "Sending crash report: " + minidumpFile.getPath());
HttpURLConnection conn = null;
View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/compare/ac6b47…
--
View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/compare/ac6b47…
You're receiving this email because of your account on gitlab.torproject.org.
Pier Angelo Vendrame pushed to branch tor-browser-128.3.0esr-14.0-1 at The Tor Project / Applications / Tor Browser
Commits:
ac6b47d5 by Henry Wilkes at 2024-10-02T10:27:03+01:00
fixup! Add CI for Tor Browser
Bug 43181: Automatically run translation CI for strings.xml changes.
- - - - -
1 changed file:
- .gitlab/ci/update-translations.yml
Changes:
=====================================
.gitlab/ci/update-translations.yml
=====================================
@@ -6,6 +6,7 @@
- "**/*.ftl"
- "**/*.properties"
- "**/*.dtd"
+ - "**/*strings.xml"
- if: $FORCE_UPDATE_TRANSLATIONS == "true"
variables:
TOR_BROWSER_COMBINED_FILES_JSON: "combined-translation-files.json"
View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/ac6b47d…
--
View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/ac6b47d…
You're receiving this email because of your account on gitlab.torproject.org.
Pier Angelo Vendrame pushed to branch main at The Tor Project / Applications / tor-browser-build
Commits:
bab35eb4 by Pier Angelo Vendrame at 2024-10-02T12:53:54+02:00
Bug 41254: Stop copying cryptoSafetyPrompt.properties.
That file is not used anymore, and it was supposed to not exist, but it
has been deleted only from the en-US directory in translation.git.
- - - - -
1 changed file:
- projects/firefox/build
Changes:
=====================================
projects/firefox/build
=====================================
@@ -143,7 +143,6 @@ mkdir "$HOME/.mozbuild"
fi
[% END -%]
mv "$transl_tor_browser/$source_lang/tor-browser.ftl" "$l10ncentral/$lang/toolkit/toolkit/global/"
- mv "$transl_tor_browser/$source_lang/cryptoSafetyPrompt.properties" "$l10ncentral/$lang/browser/chrome/browser/"
mv "$transl_tor_browser/$source_lang" "$torbutton_locales/$lang"
echo "% locale torbutton $lang %locale/$lang/" >> "$torbutton_jar"
echo " locale/$lang (chrome/locale/$lang/*)" >> "$torbutton_jar"
View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/commit/b…
--
View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/commit/b…
You're receiving this email because of your account on gitlab.torproject.org.
morgan pushed to branch maint-13.5a11 at The Tor Project / Applications / tor-browser-build
Commits:
f9e2b4a5 by Nicolas Vigier at 2024-10-01T19:36:41+02:00
Bug 41252: Do not run upload-update_responses-to-staticiforme
When signing a 13.5-legacy release, don't update and upload update_responses.
The update_responses containing both the 14.0 and 13.5-legacy releases
will be generated from the `maint-14.0` branch.
- - - - -
1 changed file:
- tools/signing/do-all-signing
Changes:
=====================================
tools/signing/do-all-signing
=====================================
@@ -206,5 +206,4 @@ do_step download-unsigned-sha256sums-gpg-signatures-from-people-tpo
do_step sync-local-to-staticiforme
do_step sync-scripts-to-staticiforme
do_step staticiforme-prepare-cdn-dist-upload
-do_step upload-update_responses-to-staticiforme
do_step finished-signing-clean-linux-signer
View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/commit/f…
--
View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/commit/f…
You're receiving this email because of your account on gitlab.torproject.org.
morgan deleted tag mullvad-browser-115.16.0esr-13.5-1-build2 at The Tor Project / Applications / Tor Browser
--
You're receiving this email because of your account on gitlab.torproject.org.