Pier Angelo Vendrame pushed to branch mullvad-browser-115.15.0esr-13.5-1 at The Tor Project / Applications / Mullvad Browser
Commits:
37ef7afb by Pier Angelo Vendrame at 2024-08-28T21:58:03+00:00
MB 38: Mullvad Browser configuration
- - - - -
f8849e43 by Pier Angelo Vendrame at 2024-08-28T21:58:03+00:00
MB 1: Mullvad Browser branding
See also:
mullvad-browser#5: Product name and directory customization
mullvad-browser#12: Create new branding directories and integrate Mullvad icons+branding
mullvad-browser#14: Remove Default Built-in bookmarks
mullvad-browser#35: Add custom PDF icons for Windows builds
mullvad-browser#48: Replace Mozilla copyright and legal trademarks in mullvadbrowser.exe metadata
mullvad-browser#51: Update trademark string
mullvad-browser#104: Update shipped dll metadata copyright/licensing info
mullvad-browser#107: Add alpha and nightly icons
- - - - -
e86c3f1c by Pier Angelo Vendrame at 2024-08-28T21:58:04+00:00
MB 20: Allow packaged-addons in PBM.
We install a few addons from the distribution directory, but they are
not automatically enabled for PBM mode.
This commit modifies the code that installs them to also add the PBM
permission to the known ones.
- - - - -
6aa1d7de by Pier Angelo Vendrame at 2024-08-28T21:58:04+00:00
MB 63: Customize some about pages for Mullvad Browser
Also:
mullvad-browser#57: Purge unneeded about: pages
- - - - -
6daa7620 by Pier Angelo Vendrame at 2024-08-28T21:58:04+00:00
MB 37: Customization for the about dialog
- - - - -
c94bdf41 by Henry Wilkes at 2024-08-28T21:58:04+00:00
MB 39: Add home page about:mullvad-browser
- - - - -
f1ef654b by hackademix at 2024-08-28T21:58:05+00:00
MB 97: Remove UI cues to install new extensions.
- - - - -
4cee4b7a by hackademix at 2024-08-28T21:58:05+00:00
MB 47: uBlock Origin customization
- - - - -
688160a2 by Pier Angelo Vendrame at 2024-08-28T21:58:05+00:00
MB 21: Disable the password manager
This commit disables the about:login page and removes the "Login and
Password" section of about:preferences.
We do not do anything to the real password manager of Firefox, that is
in toolkit: it contains C++ parts that make it difficult to actually
prevent it from being built..
Finally, we modify the the function that opens about:login to report an
error in the console so that we can quickly get a backtrace to the code
that tries to use it.
- - - - -
82aafb40 by Pier Angelo Vendrame at 2024-08-28T21:58:05+00:00
MB 112: Updater customization for Mullvad Browser
MB 71: Set the updater base URL to Mullvad domain
- - - - -
265de51e by Nicolas Vigier at 2024-08-28T21:58:06+00:00
MB 79: Add Mullvad Browser MAR signing keys
MB 256: Add mullvad-browser nightly mar signing key
- - - - -
305b0424 by Pier Angelo Vendrame at 2024-08-28T21:58:06+00:00
MB 34: Hide unsafe and unwanted preferences UI
about:preferences allow to override some of our defaults, that could
be fingeprintable or have some other unwanted consequences.
- - - - -
121a0543 by Pier Angelo Vendrame at 2024-08-28T21:58:06+00:00
MB 160: Disable the cookie exceptions button
Besides disabling the "Delete on close checkbox", disable also the
"Manage Exceptions" button when always using PBM.
- - - - -
4a2169d9 by hackademix at 2024-08-28T21:58:06+00:00
MB 163: prevent uBlock Origin from being uninstalled/disabled
- - - - -
a234562b by Richard Pospesel at 2024-08-28T21:58:07+00:00
MB 188: Customize Gitlab Issue and Merge templates
- - - - -
2fcce7dc by rui hildt at 2024-08-28T21:58:07+00:00
MB 213: Customize the search engines list
- - - - -
8605e695 by hackademix at 2024-08-28T21:58:07+00:00
MB 214: Enable cross-tab identity leak protection in "quiet" mode
- - - - -
0de3a189 by Pier Angelo Vendrame at 2024-08-28T21:58:07+00:00
MB 234: Disable OS spoofing in HTTP User-Agent.
This commits makes it possible to disable OS spoofing in the HTTP
User-Agent header, to see if matching header and JS property improve
usability.
- - - - -
71a58d71 by Pier Angelo Vendrame at 2024-08-28T21:58:08+00:00
MB 80: Enable Mullvad Browser as a default browser
- - - - -
07d6ff62 by Dan Ballard at 2024-08-28T21:58:08+00:00
MB 290: Add default bookmarks in alpha channel for testing
- - - - -
7c46ec5a by june wilde at 2024-08-28T21:58:08+00:00
MB 305: Disable setting default browser on Windows
Until we can pull in upstream changes to fix breakage in setting
the Mullvad Browser as default in Windows 10/11 we're disabling
the ability to do so via about:preferences as well as via the
startup query dialog
- - - - -
30 changed files:
- .gitlab/issue_templates/Emergency Security Issue.md
- + .gitlab/issue_templates/Rebase Browser - Alpha.md
- + .gitlab/issue_templates/Rebase Browser - Stable.md
- .gitlab/merge_request_templates/default.md
- browser/app/Makefile.in
- browser/app/macbuild/Contents/Info.plist.in
- browser/app/module.ver
- browser/app/firefox.exe.manifest → browser/app/mullvadbrowser.exe.manifest
- + browser/app/profile/000-mullvad-browser.js
- browser/app/profile/001-base-profile.js
- browser/base/content/aboutDialog.xhtml
- browser/base/content/appmenu-viewcache.inc.xhtml
- browser/base/content/browser-menubar.inc
- browser/base/content/browser-places.js
- browser/base/content/browser.js
- browser/base/content/default-bookmarks.html
- browser/base/content/nsContextMenu.js
- browser/base/content/overrides/app-license.html
- browser/base/content/pageinfo/pageInfo.xhtml
- browser/base/content/utilityOverlay.js
- browser/branding/branding-common.mozbuild
- + browser/branding/mb-alpha/VisualElements_150.png
- + browser/branding/mb-alpha/VisualElements_70.png
- + browser/branding/mb-alpha/configure.sh
- + browser/branding/mb-alpha/content/about-logo.png
- + browser/branding/mb-alpha/content/about-logo.svg
- + browser/branding/mb-alpha/content/about-logo(a)2x.png
- + browser/branding/mb-alpha/content/about-wordmark.svg
- + browser/branding/mb-alpha/content/about.png
- + browser/branding/mb-alpha/content/aboutDialog.css
The diff was not included because it is too large.
View it on GitLab: https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/compare/69…
--
View it on GitLab: https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/compare/69…
You're receiving this email because of your account on gitlab.torproject.org.
morgan pushed to branch main at The Tor Project / Applications / tor-browser-build
Commits:
5a9ee2bd by Pier Angelo Vendrame at 2024-08-27T18:34:40+02:00
Bug 41180: Avoid some copies for the expert bundles.
AndroidManifest.xml should be copied only in tor-expert-bundle when
doing Android builds.
The compiler is not needed in tor-expert-bundle-aar.
- - - - -
d994819d by Pier Angelo Vendrame at 2024-08-28T16:41:52+02:00
Bug 41224: Do not ship Conjure and GeoIP databases on some Android configurations.
- - - - -
3 changed files:
- projects/tor-expert-bundle-aar/config
- projects/tor-expert-bundle/build
- projects/tor-expert-bundle/config
Changes:
=====================================
projects/tor-expert-bundle-aar/config
=====================================
@@ -8,8 +8,6 @@ var:
input_files:
- project: container-image
- - name: '[% c("var/compiler") %]'
- project: '[% c("var/compiler") %]'
- project: tor-expert-bundle
name: tor-expert-bundle-armv7
target_replace:
@@ -25,4 +23,4 @@ input_files:
- project: tor-expert-bundle
name: tor-expert-bundle-x86_64
target_replace:
- '^torbrowser-(?!testbuild).*': 'torbrowser-android-x86_64'
\ No newline at end of file
+ '^torbrowser-(?!testbuild).*': 'torbrowser-android-x86_64'
=====================================
projects/tor-expert-bundle/build
=====================================
@@ -15,7 +15,9 @@ mkdir pluggable_transports && cd pluggable_transports
tar -xkf $rootdir/[% c('input_files_by_name/lyrebird') %]
tar -xkf $rootdir/[% c('input_files_by_name/snowflake') %]
-tar -xkf $rootdir/[% c('input_files_by_name/conjure') %]
+[% IF c('input_files_by_name/conjure') -%]
+ tar -xkf $rootdir/[% c('input_files_by_name/conjure') %]
+[% END -%]
# add per-platform pt extension
awk '{gsub(/\$\{pt_extension\}/, "[% c("var/pt_extension") %]"); print}' $rootdir/pt_config.json > pt_config.json
@@ -33,11 +35,15 @@ cd $distdir
mkdir -p aar/assets/common
cp -a tor/libTor.so aar/jni/$abi/
- cp -a tor/pluggable_transports/conjure-client aar/jni/$abi/libConjure.so
cp -a tor/pluggable_transports/lyrebird aar/jni/$abi/libObfs4proxy.so
cp -a tor/pluggable_transports/snowflake-client aar/jni/$abi/libSnowflake.so
+ [% IF c('input_files_by_name/conjure') -%]
+ cp -a tor/pluggable_transports/conjure-client aar/jni/$abi/libConjure.so
+ [% END -%]
- cp -a data/* aar/assets/common/
+ # tor-browser-build#41224, tor-browser#42607: Currently we do not use the
+ # GeoIP databases. So, we avoid copying them to save space on the final APK.
+ # cp -a data/* aar/assets/common/
cp -a tor/pluggable_transports/pt_config.json aar/assets/common/
@@ -57,4 +63,4 @@ cd $distdir
tar_src => tar_src,
tar_args => '-czvf' _ dest_dir _ '/' _ c('filename') _ '/tor-expert-bundle.tar.gz',
});
-%]
\ No newline at end of file
+%]
=====================================
projects/tor-expert-bundle/config
=====================================
@@ -20,5 +20,7 @@ input_files:
project: snowflake
- name: conjure
project: conjure
+ enable: '[% !c("var/android-x86") && !c("var/android-x86_64") %]'
- filename: pt_config.json
- filename: AndroidManifest.xml
+ enable: '[% c("var/android") %]'
View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/compare/…
--
View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/compare/…
You're receiving this email because of your account on gitlab.torproject.org.
morgan pushed to branch tor-browser-128.2.0esr-14.0-1 at The Tor Project / Applications / Tor Browser
Commits:
431ff1b6 by Pier Angelo Vendrame at 2024-08-28T20:33:14+00:00
fixup! Bug 42247: Android helpers for the TorProvider
Bug 42607: Stop shipping GeoIP databases for now.
- - - - -
1 changed file:
- mobile/android/geckoview/src/main/java/org/mozilla/geckoview/TorIntegrationAndroid.java
Changes:
=====================================
mobile/android/geckoview/src/main/java/org/mozilla/geckoview/TorIntegrationAndroid.java
=====================================
@@ -289,13 +289,16 @@ public class TorIntegrationAndroid implements BundleEventListener {
Log.w(TAG, "torrc-default cannot be created, pluggable transports will not be available", e);
copied = false;
}
- try {
+ // tor-browser#42607: For now we do not ship geoip databases, as we
+ // do not have the circuit display functionality and they allow us
+ // to save some space in the final APK.
+ /*try {
copyAndUseConfigFile("GeoIPFile", "geoip", args);
copyAndUseConfigFile("GeoIPv6File", "geoip6", args);
} catch (IOException e) {
Log.w(TAG, "GeoIP files cannot be created, this feature will not be available.", e);
copied = false;
- }
+ }*/
mCopiedConfigFiles = copied;
Log.d(TAG, "Starting tor with the follwing args: " + args.toString());
View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/431ff1b…
--
View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/431ff1b…
You're receiving this email because of your account on gitlab.torproject.org.
morgan pushed to branch mullvad-browser-128.2.0esr-14.0-1 at The Tor Project / Applications / Mullvad Browser
Commits:
07162010 by Henry Wilkes at 2024-08-28T20:30:43+00:00
Bug 41736: Customize toolbar for mullvad-browser.
- - - - -
1 changed file:
- browser/components/customizableui/CustomizableUI.sys.mjs
Changes:
=====================================
browser/components/customizableui/CustomizableUI.sys.mjs
=====================================
@@ -65,6 +65,11 @@ var kVersion = 20;
var kVersionBaseBrowser = 2;
const NoScriptId = "_73a6fe31-595d-460b-a920-fcc0f8843232_-browser-action";
+/**
+ * The current version for mullvad browser.
+ */
+var kVersionMullvadBrowser = 1;
+
/**
* Buttons removed from built-ins by version they were removed. kVersion must be
* bumped any time a new id is added to this. Use the button id as key, and
@@ -228,6 +233,7 @@ var CustomizableUIInternal = {
this._updateForNewProtonVersion();
this._markObsoleteBuiltinButtonsSeen();
this._updateForBaseBrowser();
+ this._updateForMullvadBrowser();
this.registerArea(
CustomizableUI.AREA_FIXED_OVERFLOW_PANEL,
@@ -264,7 +270,11 @@ var CustomizableUIInternal = {
// Base-browser additions tor-browser#41736. If you want to add to, remove
// from, or rearrange this list, then bump the kVersionBaseBrowser and
// update existing saved states in _updateForBaseBrowser.
- "security-level-button",
+ // Or if the change is only meant for mullvad-browser, bump
+ // kVersionMullvadBrowser instead and update the existing saved states in
+ // _updateForMullvadBrowser.
+ // Do not show the security-level-button by default in Mullvad Browser.
+ // See mullvad-browser#329
"new-identity-button",
"downloads-button",
AppConstants.MOZ_DEV_EDITION ? "developer-button" : null,
@@ -930,6 +940,44 @@ var CustomizableUIInternal = {
}
},
+ _updateForMullvadBrowser() {
+ if (!gSavedState) {
+ // Use the defaults.
+ return;
+ }
+
+ const currentVersion = gSavedState.currentVersionMullvadBrowser;
+
+ if (currentVersion < 1) {
+ // Remove security-level-button if:
+ // + it hasn't been moved out of the navbar by the user, and
+ // + the user does not have a custom security level.
+ //
+ // NOTE: _updateForBaseBrowser adds this button when
+ // currentVersionBaseBrowser < 1. This should only happen when
+ // currentVersionMullvadBrowser < 1, and this method runs after, so should
+ // reverse it.
+ const navbarPlacements =
+ gSavedState.placements[CustomizableUI.AREA_NAVBAR];
+ if (navbarPlacements) {
+ const buttonIndex = navbarPlacements.indexOf("security-level-button");
+ // Test if security level icon exists in the navbar.
+ // Even though a user may have moved the button within the navbar,
+ // there is no simple way to know whether the button was moved, or if
+ // other components were moved around it.
+ if (buttonIndex >= 0) {
+ // NOTE: We expect the SecurityLevel module to already be initialized.
+ const { SecurityLevelPrefs } = ChromeUtils.importESModule(
+ "resource://gre/modules/SecurityLevel.sys.mjs"
+ );
+ if (!SecurityLevelPrefs.securityCustom) {
+ navbarPlacements.splice(buttonIndex, 1);
+ }
+ }
+ }
+ }
+ },
+
_placeNewDefaultWidgetsInArea(aArea) {
let futurePlacedWidgets = gFuturePlacements.get(aArea);
let savedPlacements =
@@ -2773,6 +2821,10 @@ var CustomizableUIInternal = {
gSavedState.currentVersionBaseBrowser = 0;
}
+ if (!("currentVersionMullvadBrowser" in gSavedState)) {
+ gSavedState.currentVersionMullvadBrowser = 0;
+ }
+
gSeenWidgets = new Set(gSavedState.seen || []);
gDirtyAreaCache = new Set(gSavedState.dirtyAreaCache || []);
gNewElementCount = gSavedState.newElementCount || 0;
@@ -2856,6 +2908,7 @@ var CustomizableUIInternal = {
dirtyAreaCache: gDirtyAreaCache,
currentVersion: kVersion,
currentVersionBaseBrowser: kVersionBaseBrowser,
+ currentVersionMullvadBrowser: kVersionMullvadBrowser,
newElementCount: gNewElementCount,
};
View it on GitLab: https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/071…
--
View it on GitLab: https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/071…
You're receiving this email because of your account on gitlab.torproject.org.
morgan pushed to branch tor-browser-128.2.0esr-14.0-1 at The Tor Project / Applications / Tor Browser
Commits:
ba8dff6e by Henry Wilkes at 2024-08-28T20:09:34+00:00
fixup! Bug 31286: Implementation of bridge, proxy, and firewall settings in about:preferences#connection
Bug 42803: Force focus ring to show for built-in bridge radio options.
- - - - -
1 changed file:
- browser/components/torpreferences/content/builtinBridgeDialog.js
Changes:
=====================================
browser/components/torpreferences/content/builtinBridgeDialog.js
=====================================
@@ -114,6 +114,16 @@ const gBuiltinBridgeDialog = {
},
};
+// Initial focus is not visible, even if opened with a keyboard. We avoid the
+// default handler and manage the focus ourselves, which will paint the focus
+// ring by default.
+// NOTE: A side effect is that the focus ring will show even if the user opened
+// with a mouse event.
+// TODO: Remove this once bugzilla bug 1708261 is resolved.
+document.subDialogSetDefaultFocus = () => {
+ document.getElementById("torPreferences-builtinBridge-typeSelection").focus();
+};
+
window.addEventListener(
"DOMContentLoaded",
() => {
View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/ba8dff6…
--
View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/ba8dff6…
You're receiving this email because of your account on gitlab.torproject.org.
morgan pushed to branch mullvad-browser-128.2.0esr-14.0-1 at The Tor Project / Applications / Mullvad Browser
Commits:
5a5a977a by Pier Angelo Vendrame at 2024-08-28T19:54:12+00:00
fixup! Firefox preference overrides.
Bug 42685: Re-enable textmetrics.
They do not add entropy (see the issue), so re-enable them for
compatibility.
- - - - -
1 changed file:
- browser/app/profile/001-base-profile.js
Changes:
=====================================
browser/app/profile/001-base-profile.js
=====================================
@@ -419,11 +419,6 @@ pref("network.http.referer.XOriginTrimmingPolicy", 2); // Bug 17228: Force trim
pref("media.videocontrols.picture-in-picture.enabled", false); // Bug 40148: disable until audited in #40147
// Bug 40463: Disable Windows SSO
pref("network.http.windows-sso.enabled", false, locked);
-// Disable API for measuring text width and height.
-pref("dom.textMetrics.actualBoundingBox.enabled", false);
-pref("dom.textMetrics.baselines.enabled", false);
-pref("dom.textMetrics.emHeight.enabled", false);
-pref("dom.textMetrics.fontBoundingBox.enabled", false);
// tor-browser#40424
pref("pdfjs.enableScripting", false);
// Bug 40057: Ensure system colors are not used for CSS4 colors
View it on GitLab: https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/5a5…
--
View it on GitLab: https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/5a5…
You're receiving this email because of your account on gitlab.torproject.org.
morgan pushed to branch base-browser-128.2.0esr-14.0-1 at The Tor Project / Applications / Tor Browser
Commits:
8fe2c105 by Pier Angelo Vendrame at 2024-08-28T19:52:42+00:00
fixup! Firefox preference overrides.
Bug 42685: Re-enable textmetrics.
They do not add entropy (see the issue), so re-enable them for
compatibility.
- - - - -
1 changed file:
- browser/app/profile/001-base-profile.js
Changes:
=====================================
browser/app/profile/001-base-profile.js
=====================================
@@ -419,11 +419,6 @@ pref("network.http.referer.XOriginTrimmingPolicy", 2); // Bug 17228: Force trim
pref("media.videocontrols.picture-in-picture.enabled", false); // Bug 40148: disable until audited in #40147
// Bug 40463: Disable Windows SSO
pref("network.http.windows-sso.enabled", false, locked);
-// Disable API for measuring text width and height.
-pref("dom.textMetrics.actualBoundingBox.enabled", false);
-pref("dom.textMetrics.baselines.enabled", false);
-pref("dom.textMetrics.emHeight.enabled", false);
-pref("dom.textMetrics.fontBoundingBox.enabled", false);
// tor-browser#40424
pref("pdfjs.enableScripting", false);
// Bug 40057: Ensure system colors are not used for CSS4 colors
View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/8fe2c10…
--
View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/8fe2c10…
You're receiving this email because of your account on gitlab.torproject.org.
morgan pushed to branch tor-browser-128.2.0esr-14.0-1 at The Tor Project / Applications / Tor Browser
Commits:
80c99d24 by Pier Angelo Vendrame at 2024-08-28T18:22:45+02:00
fixup! Firefox preference overrides.
Bug 42685: Re-enable textmetrics.
They do not add entropy (see the issue), so re-enable them for
compatibility.
- - - - -
1 changed file:
- browser/app/profile/001-base-profile.js
Changes:
=====================================
browser/app/profile/001-base-profile.js
=====================================
@@ -419,11 +419,6 @@ pref("network.http.referer.XOriginTrimmingPolicy", 2); // Bug 17228: Force trim
pref("media.videocontrols.picture-in-picture.enabled", false); // Bug 40148: disable until audited in #40147
// Bug 40463: Disable Windows SSO
pref("network.http.windows-sso.enabled", false, locked);
-// Disable API for measuring text width and height.
-pref("dom.textMetrics.actualBoundingBox.enabled", false);
-pref("dom.textMetrics.baselines.enabled", false);
-pref("dom.textMetrics.emHeight.enabled", false);
-pref("dom.textMetrics.fontBoundingBox.enabled", false);
// tor-browser#40424
pref("pdfjs.enableScripting", false);
// Bug 40057: Ensure system colors are not used for CSS4 colors
View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/80c99d2…
--
View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/80c99d2…
You're receiving this email because of your account on gitlab.torproject.org.
Pier Angelo Vendrame pushed to branch mullvad-browser-128.2.0esr-14.0-1 at The Tor Project / Applications / Mullvad Browser
Commits:
712375db by Henry Wilkes at 2024-08-28T11:35:47+02:00
Bug 43092: Disable wayland by default in Base Browser.
- - - - -
1 changed file:
- toolkit/xre/nsAppRunner.cpp
Changes:
=====================================
toolkit/xre/nsAppRunner.cpp
=====================================
@@ -460,13 +460,14 @@ bool IsWaylandEnabled() {
return true;
}
}
+ // Keep wayland disabled in Base Browser. See tor-browser#43092.
+ return false;
// Enable by default when we're running on a recent enough GTK version. We'd
// like to check further details like compositor version and so on ideally
// to make sure we don't enable it on old Mutter or what not, but we can't,
// so let's assume that if the user is running on a Wayland session by
// default we're ok, since either the distro has enabled Wayland by default,
// or the user has gone out of their way to use Wayland.
- return !gtk_check_version(3, 24, 30);
}();
return isWaylandEnabled;
}
View it on GitLab: https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/712…
--
View it on GitLab: https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/712…
You're receiving this email because of your account on gitlab.torproject.org.
Pier Angelo Vendrame pushed to branch base-browser-128.2.0esr-14.0-1 at The Tor Project / Applications / Tor Browser
Commits:
ec9235a9 by Henry Wilkes at 2024-08-28T11:35:06+02:00
Bug 43092: Disable wayland by default in Base Browser.
- - - - -
1 changed file:
- toolkit/xre/nsAppRunner.cpp
Changes:
=====================================
toolkit/xre/nsAppRunner.cpp
=====================================
@@ -460,13 +460,14 @@ bool IsWaylandEnabled() {
return true;
}
}
+ // Keep wayland disabled in Base Browser. See tor-browser#43092.
+ return false;
// Enable by default when we're running on a recent enough GTK version. We'd
// like to check further details like compositor version and so on ideally
// to make sure we don't enable it on old Mutter or what not, but we can't,
// so let's assume that if the user is running on a Wayland session by
// default we're ok, since either the distro has enabled Wayland by default,
// or the user has gone out of their way to use Wayland.
- return !gtk_check_version(3, 24, 30);
}();
return isWaylandEnabled;
}
View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/ec9235a…
--
View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/ec9235a…
You're receiving this email because of your account on gitlab.torproject.org.
Pier Angelo Vendrame pushed to branch tor-browser-128.2.0esr-14.0-1 at The Tor Project / Applications / Tor Browser
Commits:
3a076593 by Henry Wilkes at 2024-08-28T09:51:38+01:00
Bug 43092: Disable wayland by default in Base Browser.
- - - - -
1 changed file:
- toolkit/xre/nsAppRunner.cpp
Changes:
=====================================
toolkit/xre/nsAppRunner.cpp
=====================================
@@ -460,13 +460,14 @@ bool IsWaylandEnabled() {
return true;
}
}
+ // Keep wayland disabled in Base Browser. See tor-browser#43092.
+ return false;
// Enable by default when we're running on a recent enough GTK version. We'd
// like to check further details like compositor version and so on ideally
// to make sure we don't enable it on old Mutter or what not, but we can't,
// so let's assume that if the user is running on a Wayland session by
// default we're ok, since either the distro has enabled Wayland by default,
// or the user has gone out of their way to use Wayland.
- return !gtk_check_version(3, 24, 30);
}();
return isWaylandEnabled;
}
View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/3a07659…
--
View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/3a07659…
You're receiving this email because of your account on gitlab.torproject.org.
Pier Angelo Vendrame pushed to branch tor-browser-115.15.0esr-13.5-2 at The Tor Project / Applications / Tor Browser
Commits:
6935ca00 by Henry Wilkes at 2024-08-27T20:38:54+00:00
fixup! Bug 40597: Implement TorSettings module
Bug 42622: Send TorConnect "Error" signal before "StateChange".
- - - - -
1 changed file:
- toolkit/modules/TorConnect.sys.mjs
Changes:
=====================================
toolkit/modules/TorConnect.sys.mjs
=====================================
@@ -686,16 +686,7 @@ class ErrorState extends StateCallback {
ErrorState.#hasEverHappened = true;
}
- run(error) {
- if (!(error instanceof TorConnectError)) {
- error = new TorConnectError(TorConnectError.ExternalError, error);
- }
- TorConnect._errorCode = error.code;
- TorConnect._errorDetails = error;
- lazy.logger.error(`Entering error state (${error.code})`, error);
-
- Services.obs.notifyObservers(error, TorConnectTopics.Error);
-
+ run(_error) {
this.changeState(TorConnectState.Configuring);
}
@@ -903,6 +894,23 @@ export const TorConnect = {
// Set our new state first so that state transitions can themselves
// trigger a state transition.
this._stateHandler = this._makeState(newState);
+
+ // Error signal needs to be sent out before we enter the Error state.
+ // Expected on android `onBootstrapError` to set lastKnownError.
+ // Expected in about:torconnect to set the error codes and internet status
+ // *before* the StateChange signal.
+ if (newState === TorConnectState.Error) {
+ let error = args[0];
+ if (!(error instanceof TorConnectError)) {
+ error = new TorConnectError(TorConnectError.ExternalError, error);
+ }
+ TorConnect._errorCode = error.code;
+ TorConnect._errorDetails = error;
+ lazy.logger.error(`Entering error state (${error.code})`, error);
+
+ Services.obs.notifyObservers(error, TorConnectTopics.Error);
+ }
+
Services.obs.notifyObservers(
{ state: newState },
TorConnectTopics.StateChange
View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/6935ca0…
--
View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/6935ca0…
You're receiving this email because of your account on gitlab.torproject.org.
morgan pushed to branch tor-browser-128.2.0esr-14.0-1 at The Tor Project / Applications / Tor Browser
Commits:
e8eefc25 by Henry Wilkes at 2024-08-27T21:12:40+00:00
fixup! Bug 7494: Create local home page for TBB.
Bug 42744: Stop using prefersColorSchemeOverride for about:tor.
common-shared.css seems to have simplified since the original
implementation, so we can simply set the `color-scheme` and `color` on
the search form to keep the styling consistent in both light and dark
themes.
- - - - -
2 changed files:
- browser/components/abouttor/AboutTorChild.sys.mjs
- browser/components/abouttor/content/aboutTor.css
Changes:
=====================================
browser/components/abouttor/AboutTorChild.sys.mjs
=====================================
@@ -2,19 +2,6 @@
* Actor child class for the about:tor page.
*/
export class AboutTorChild extends JSWindowActorChild {
- actorCreated() {
- if (this.contentWindow.matchMedia("not (prefers-contrast)").matches) {
- // When prefers-contrast is not set, the page only has one style because
- // we always set a dark background and a light <form>.
- // We force prefers-color-scheme to be light, regardless of the user's
- // settings so that we inherit the "light" theme styling from
- // in-content/common.css for the <form> element. In particular, we want
- // the light styling for the <input> and <moz-toggle> elements, which are
- // on a light background.
- this.browsingContext.prefersColorSchemeOverride = "light";
- }
- }
-
handleEvent(event) {
switch (event.type) {
case "DOMContentLoaded":
=====================================
browser/components/abouttor/content/aboutTor.css
=====================================
@@ -180,15 +180,17 @@ body:not(.show-tor-check) #tor-check {
body > :not(#search-form) {
/* Same as --in-content-page-color when "prefers-color-scheme: dark" */
- --in-content-page-color: #fbfbfe;
- --in-content-text-color: #fbfbfe;
- color: var(--in-content-text-color);
+ color: var(--color-gray-05);
--link-color: var(--tor-link-color-dark);
--link-color-hover: var(--tor-link-color-hover-dark);
--link-color-active: var(--tor-link-color-active-dark);
}
#search-form {
+ /* Use light color for background and moz-toggle shadow root. */
+ color-scheme: light;
+ /* Same as --in-content-page-color when "prefers-color-scheme: light" */
+ color: var(--color-gray-100);
border-color: transparent;
}
View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/e8eefc2…
--
View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/e8eefc2…
You're receiving this email because of your account on gitlab.torproject.org.
morgan pushed to branch tor-browser-128.2.0esr-14.0-1 at The Tor Project / Applications / Tor Browser
Commits:
a8d1d771 by Henry Wilkes at 2024-08-27T21:07:58+00:00
fixup! Bug 7494: Create local home page for TBB.
Bug 43075: Drop link spacing in about:tor.
- - - - -
1 changed file:
- browser/components/abouttor/content/aboutTor.css
Changes:
=====================================
browser/components/abouttor/content/aboutTor.css
=====================================
@@ -89,14 +89,6 @@ body:not(.show-tor-check) #tor-check {
margin-inline-end: 0.3em;
}
-:is(
- .home-message,
- #tor-check,
-) a {
- /* Increase gap between the link and the rest of the text. */
- margin-inline: 0.4em;
-}
-
#search-form {
grid-area: form;
/* Occupy the entire "form" block. */
View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/a8d1d77…
--
View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/a8d1d77…
You're receiving this email because of your account on gitlab.torproject.org.
morgan pushed to branch tor-browser-115.15.0esr-13.5-1 at The Tor Project / Applications / Tor Browser
Commits:
6935ca00 by Henry Wilkes at 2024-08-27T20:38:54+00:00
fixup! Bug 40597: Implement TorSettings module
Bug 42622: Send TorConnect "Error" signal before "StateChange".
- - - - -
1 changed file:
- toolkit/modules/TorConnect.sys.mjs
Changes:
=====================================
toolkit/modules/TorConnect.sys.mjs
=====================================
@@ -686,16 +686,7 @@ class ErrorState extends StateCallback {
ErrorState.#hasEverHappened = true;
}
- run(error) {
- if (!(error instanceof TorConnectError)) {
- error = new TorConnectError(TorConnectError.ExternalError, error);
- }
- TorConnect._errorCode = error.code;
- TorConnect._errorDetails = error;
- lazy.logger.error(`Entering error state (${error.code})`, error);
-
- Services.obs.notifyObservers(error, TorConnectTopics.Error);
-
+ run(_error) {
this.changeState(TorConnectState.Configuring);
}
@@ -903,6 +894,23 @@ export const TorConnect = {
// Set our new state first so that state transitions can themselves
// trigger a state transition.
this._stateHandler = this._makeState(newState);
+
+ // Error signal needs to be sent out before we enter the Error state.
+ // Expected on android `onBootstrapError` to set lastKnownError.
+ // Expected in about:torconnect to set the error codes and internet status
+ // *before* the StateChange signal.
+ if (newState === TorConnectState.Error) {
+ let error = args[0];
+ if (!(error instanceof TorConnectError)) {
+ error = new TorConnectError(TorConnectError.ExternalError, error);
+ }
+ TorConnect._errorCode = error.code;
+ TorConnect._errorDetails = error;
+ lazy.logger.error(`Entering error state (${error.code})`, error);
+
+ Services.obs.notifyObservers(error, TorConnectTopics.Error);
+ }
+
Services.obs.notifyObservers(
{ state: newState },
TorConnectTopics.StateChange
View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/6935ca0…
--
View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/6935ca0…
You're receiving this email because of your account on gitlab.torproject.org.