lists.torproject.org
Sign In Sign Up
Manage this list Sign In Sign Up

Keyboard Shortcuts

Thread View

  • j: Next unread message
  • k: Previous unread message
  • j a: Jump to all threads
  • j l: Jump to MailingList overview

tbb-commits

Thread Start a new thread
Threads by month
  • ----- 2026 -----
  • March
  • February
  • January
  • ----- 2025 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2024 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2023 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2022 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2021 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2020 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2019 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2018 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2017 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2016 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2015 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2014 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
tbb-commits@lists.torproject.org

  • 1 participants
  • 20109 discussions
[Git][tpo/applications/tor-browser][tor-browser-140.1.0esr-15.0-1] 4 commits: fixup! TB 40041 [android]: Implement Tor Network Settings
by henry (@henry) 11 Aug '25

11 Aug '25
henry pushed to branch tor-browser-140.1.0esr-15.0-1 at The Tor Project / Applications / Tor Browser Commits: 048a9ee4 by Henry Wilkes at 2025-08-11T08:06:43+00:00 fixup! TB 40041 [android]: Implement Tor Network Settings TB 44069: Update meek name. TB 44083: Capitalise Snowflake name. - - - - - c387352e by Henry Wilkes at 2025-08-11T08:06:43+00:00 fixup! [android] TBA strings TB 44069: Update meek name. TB 44083: Capitalise Snowflake name. - - - - - 308bfd2a by Henry Wilkes at 2025-08-11T08:06:43+00:00 fixup! TB 31286: Implementation of bridge, proxy, and firewall settings in about:preferences#connection TB 44069: Update built-in meek name and description. Also change the radio options strings to have their .label point directly to the corresponding bridge type name string. - - - - - cca7d67e by Henry Wilkes at 2025-08-11T08:06:43+00:00 fixup! Tor Browser strings TB 44069: Update the meek name and description. Update the radio option strings to point their .label directly to the name strings. - - - - - 5 changed files: - browser/components/torpreferences/content/builtinBridgeDialog.xhtml - browser/components/torpreferences/content/connectionPane.js - mobile/android/fenix/app/src/main/res/values/torbrowser_strings.xml - mobile/android/fenix/app/src/main/res/xml/tor_bridge_config_preferences.xml - toolkit/locales/en-US/toolkit/global/tor-browser.ftl Changes: ===================================== browser/components/torpreferences/content/builtinBridgeDialog.xhtml ===================================== @@ -33,7 +33,7 @@ - only the latter description should contribute. --> <radio value="obfs4" - data-l10n-id="built-in-dialog-obfs4-radio-option" + data-l10n-id="built-in-dialog-obfs4-radio-option2" /> <html:span class="bridge-status-badge"> <html:div class="bridge-status-icon"></html:div> @@ -54,7 +54,7 @@ <hbox> <radio value="snowflake" - data-l10n-id="built-in-dialog-snowflake-radio-option" + data-l10n-id="built-in-dialog-snowflake-radio-option2" /> <html:span class="bridge-status-badge"> <html:div class="bridge-status-icon"></html:div> @@ -75,7 +75,7 @@ <hbox> <radio value="meek-azure" - data-l10n-id="built-in-dialog-meek-azure-radio-option" + data-l10n-id="built-in-dialog-meek-radio-option2" /> <html:span class="bridge-status-badge"> <html:div class="bridge-status-icon"></html:div> @@ -88,7 +88,7 @@ </hbox> <html:div class="indent builtin-bridges-option-description" - data-l10n-id="tor-bridges-built-in-meek-azure-description" + data-l10n-id="tor-bridges-built-in-meek-description" > </html:div> </vbox> ===================================== browser/components/torpreferences/content/connectionPane.js ===================================== @@ -1080,8 +1080,8 @@ const gBuiltinBridgesArea = { description: "tor-bridges-built-in-snowflake-description", }, "meek-azure": { - name: "tor-bridges-built-in-meek-azure-name", - description: "tor-bridges-built-in-meek-azure-description", + name: "tor-bridges-built-in-meek-name", + description: "tor-bridges-built-in-meek-description", }, }, ===================================== mobile/android/fenix/app/src/main/res/values/torbrowser_strings.xml ===================================== @@ -23,9 +23,12 @@ <string name="preferences_tor_network_settings_bridge_config_explanation">Bridges are unlisted relays that make it more difficult to block connections to the Tor network. Because of how certain countries try to block Tor, certain bridges work in certain countries but not others.</string> <string name="preferences_tor_network_settings_bridge_config_toggle">Use a Bridge</string> <string name="preferences_tor_network_settings_bridge_config_toggle_description">Config a bridge to connect to Tor</string> + <!-- "obfs4" is a technical name, and likely should not be translated. --> <string name="preferences_tor_network_settings_bridge_config_builtin_bridge_obfs4">obfs4</string> - <string name="preferences_tor_network_settings_bridge_config_builtin_bridge_meek_azure">meek-azure</string> - <string name="preferences_tor_network_settings_bridge_config_builtin_bridge_snowflake">snowflake</string> + <!-- "meek" is a technical name, and likely should not be translated. --> + <string name="preferences_tor_network_settings_bridge_config_builtin_bridge_meek">meek</string> + <!-- "Snowflake" is a proper noun for a type of Tor bridge, and likely should not be translated. --> + <string name="preferences_tor_network_settings_bridge_config_builtin_bridge_snowflake2">Snowflake</string> <string name="preferences_tor_network_settings_bridge_config_user_provided_bridge">Provide a Bridge I know</string> <string name="preferences_tor_network_settings_bridge_config_user_provided_bridge_description">Enter bridge information from a trusted source</string> <string name="preferences_tor_network_settings_bridge_config_current_bridge">Current Configured Bridge: %s</string> ===================================== mobile/android/fenix/app/src/main/res/xml/tor_bridge_config_preferences.xml ===================================== @@ -21,12 +21,12 @@ android:defaultValue="false" android:dependency="@string/pref_key_tor_network_settings_bridge_config_toggle" android:key="@string/pref_key_tor_network_settings_bridge_config_builtin_bridge_meek_azure" - android:title="@string/preferences_tor_network_settings_bridge_config_builtin_bridge_meek_azure" /> + android:title="@string/preferences_tor_network_settings_bridge_config_builtin_bridge_meek" /> <org.mozilla.fenix.settings.RadioButtonPreference android:defaultValue="false" android:dependency="@string/pref_key_tor_network_settings_bridge_config_toggle" android:key="@string/pref_key_tor_network_settings_bridge_config_builtin_bridge_snowflake" - android:title="@string/preferences_tor_network_settings_bridge_config_builtin_bridge_snowflake" /> + android:title="@string/preferences_tor_network_settings_bridge_config_builtin_bridge_snowflake2" /> <EditTextPreference android:dependency="@string/pref_key_tor_network_settings_bridge_config_toggle" android:key="@string/pref_key_tor_network_settings_bridge_config_user_provided_bridge" ===================================== toolkit/locales/en-US/toolkit/global/tor-browser.ftl ===================================== @@ -135,12 +135,12 @@ tor-bridges-built-in-obfs4-description = Makes your Tor traffic look like random tor-bridges-built-in-snowflake-name = Snowflake # "Snowflake" is a proper noun for a type of Tor bridge, and likely should not be translated. tor-bridges-built-in-snowflake-description = Routes your connection through Snowflake proxies to make it look like you’re placing a video call, for example. -# "meek-azure" is a technical name, and likely should not be translated. -tor-bridges-built-in-meek-azure-name = meek-azure -tor-bridges-built-in-meek-azure-description = Makes it look like you’re connected to a Microsoft website, instead of using Tor. May work in heavily censored regions, but is usually very slow. +# "meek" is a technical name, and likely should not be translated. +tor-bridges-built-in-meek-name = meek +tor-bridges-built-in-meek-description = Connects you to the Tor network through a big cloud provider. May work in heavily censored regions, but is usually very slow. # Shown at the start of a Tor bridge line. -# $type (String) - The Tor bridge type ("snowflake", "obfs4", "meek-azure"). +# $type (String) - The Tor bridge type ("snowflake", "obfs4", "meek", etc). tor-bridges-type-prefix = { $type } bridge: # Shown at the start of a Tor bridge line, when the transport type is unknown (or "vanilla"). tor-bridges-type-prefix-generic = Tor bridge: @@ -385,15 +385,12 @@ built-in-dialog-title = .title = Select a Built-In Bridge # -brand-short-name refers to 'Tor Browser', localized. built-in-dialog-introduction = { -brand-short-name } includes some specific types of bridges known as “pluggable transports”, which can help conceal the fact you’re using Tor. -# "obfs4" is a technical name, and likely should not be translated. -built-in-dialog-obfs4-radio-option = - .label = obfs4 -# "Snowflake" is a proper noun for a type of Tor bridge, and likely should not be translated. -built-in-dialog-snowflake-radio-option = - .label = Snowflake -# "meek-azure" is a technical name, and likely should not be translated. -built-in-dialog-meek-azure-radio-option = - .label = meek-azure +built-in-dialog-obfs4-radio-option2 = + .label = { tor-bridges-built-in-obfs4-name } +built-in-dialog-snowflake-radio-option2 = + .label = { tor-bridges-built-in-snowflake-name } +built-in-dialog-meek-radio-option2 = + .label = { tor-bridges-built-in-meek-name } # Label attached to the built-in bridge option that is already in use. # The "aria-label" should use the same text, but include some ending punctuation to separate it from the sentence that follows. This is used for screen reader users. built-in-dialog-current-bridge-label = Current bridge View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/compare/efc66d… -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/compare/efc66d… You're receiving this email because of your account on gitlab.torproject.org.
1 0
0 0
[Git][tpo/applications/mullvad-browser][mullvad-browser-140.1.0esr-15.0-1] fixup! Firefox preference overrides.
by Pier Angelo Vendrame (@pierov) 08 Aug '25

08 Aug '25
Pier Angelo Vendrame pushed to branch mullvad-browser-140.1.0esr-15.0-1 at The Tor Project / Applications / Mullvad Browser Commits: 5aa8703d by Pier Angelo Vendrame at 2025-08-08T18:31:31+02:00 fixup! Firefox preference overrides. BB 44026: Disable the modal with upstream's ToU. We disable data collection, so those terms do not apply to us. Indeed, currently this feature is already gated on the datareporting pref, but since upstream is refactoring these prefs, adding an explicit one seems a good idea. Also, move the datareporting prefs closer to telemetry. - - - - - 1 changed file: - browser/app/profile/001-base-profile.js Changes: ===================================== browser/app/profile/001-base-profile.js ===================================== @@ -202,8 +202,6 @@ pref("browser.safebrowsing.provider.google4.updateURL", ""); pref("browser.safebrowsing.provider.google4.gethashURL", ""); pref("browser.safebrowsing.provider.mozilla.updateURL", ""); pref("browser.safebrowsing.provider.mozilla.gethashURL", ""); -pref("datareporting.healthreport.uploadEnabled", false); -pref("datareporting.policy.dataSubmissionEnabled", false); // tor-browser#42735: Disable recent search suggestions pref("browser.urlbar.recentsearches.featureGate", false); pref("browser.urlbar.suggest.recentsearches", false); @@ -225,6 +223,8 @@ pref("toolkit.telemetry.firstShutdownPing.enabled", false); // Added in tor-brow pref("toolkit.telemetry.updatePing.enabled", false); // Make sure updater telemetry is disabled; see #25909. pref("toolkit.telemetry.bhrPing.enabled", false); pref("toolkit.telemetry.coverage.opt-out", true); +pref("datareporting.healthreport.uploadEnabled", false); +pref("datareporting.policy.dataSubmissionEnabled", false); // Force all telemtry identifier to their canary values tor-browser#43750 pref("toolkit.telemetry.cachedClientID", "c0ffeec0-ffee-c0ff-eec0-ffeec0ffeec0", locked); pref("toolkit.telemetry.cachedProfileGroupID", "decafdec-afde-cafd-ecaf-decafdecafde", locked); @@ -236,6 +236,9 @@ pref("browser.tabs.crashReporting.sendReport", false); pref("browser.crashReports.unsubmittedCheck.autoSubmit2", false); // Added in tor-browser#41496 even though false by default pref("browser.crashReports.unsubmittedCheck.enabled", false); +// tor-browser#44026: Disable the modal that shows upstream terms of usage, +// since we opt out of their telemetry and data collection. +pref("browser.preonboarding.enabled", false); // Disable checkbox in about:neterror that controls // security.xfocsp.errorReporting.automatic. See tor-browser#42653. pref("security.xfocsp.errorReporting.enabled", false); View it on GitLab: https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/5aa… -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/5aa… You're receiving this email because of your account on gitlab.torproject.org.
1 0
0 0
[Git][tpo/applications/tor-browser][base-browser-140.1.0esr-15.0-1] fixup! Firefox preference overrides.
by Pier Angelo Vendrame (@pierov) 08 Aug '25

08 Aug '25
Pier Angelo Vendrame pushed to branch base-browser-140.1.0esr-15.0-1 at The Tor Project / Applications / Tor Browser Commits: cdc07ea9 by Pier Angelo Vendrame at 2025-08-08T18:31:17+02:00 fixup! Firefox preference overrides. BB 44026: Disable the modal with upstream's ToU. We disable data collection, so those terms do not apply to us. Indeed, currently this feature is already gated on the datareporting pref, but since upstream is refactoring these prefs, adding an explicit one seems a good idea. Also, move the datareporting prefs closer to telemetry. - - - - - 1 changed file: - browser/app/profile/001-base-profile.js Changes: ===================================== browser/app/profile/001-base-profile.js ===================================== @@ -202,8 +202,6 @@ pref("browser.safebrowsing.provider.google4.updateURL", ""); pref("browser.safebrowsing.provider.google4.gethashURL", ""); pref("browser.safebrowsing.provider.mozilla.updateURL", ""); pref("browser.safebrowsing.provider.mozilla.gethashURL", ""); -pref("datareporting.healthreport.uploadEnabled", false); -pref("datareporting.policy.dataSubmissionEnabled", false); // tor-browser#42735: Disable recent search suggestions pref("browser.urlbar.recentsearches.featureGate", false); pref("browser.urlbar.suggest.recentsearches", false); @@ -225,6 +223,8 @@ pref("toolkit.telemetry.firstShutdownPing.enabled", false); // Added in tor-brow pref("toolkit.telemetry.updatePing.enabled", false); // Make sure updater telemetry is disabled; see #25909. pref("toolkit.telemetry.bhrPing.enabled", false); pref("toolkit.telemetry.coverage.opt-out", true); +pref("datareporting.healthreport.uploadEnabled", false); +pref("datareporting.policy.dataSubmissionEnabled", false); // Force all telemtry identifier to their canary values tor-browser#43750 pref("toolkit.telemetry.cachedClientID", "c0ffeec0-ffee-c0ff-eec0-ffeec0ffeec0", locked); pref("toolkit.telemetry.cachedProfileGroupID", "decafdec-afde-cafd-ecaf-decafdecafde", locked); @@ -236,6 +236,9 @@ pref("browser.tabs.crashReporting.sendReport", false); pref("browser.crashReports.unsubmittedCheck.autoSubmit2", false); // Added in tor-browser#41496 even though false by default pref("browser.crashReports.unsubmittedCheck.enabled", false); +// tor-browser#44026: Disable the modal that shows upstream terms of usage, +// since we opt out of their telemetry and data collection. +pref("browser.preonboarding.enabled", false); // Disable checkbox in about:neterror that controls // security.xfocsp.errorReporting.automatic. See tor-browser#42653. pref("security.xfocsp.errorReporting.enabled", false); View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/cdc07ea… -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/cdc07ea… You're receiving this email because of your account on gitlab.torproject.org.
1 0
0 0
[Git][tpo/applications/tor-browser][tor-browser-140.1.0esr-15.0-1] fixup! Firefox preference overrides.
by Pier Angelo Vendrame (@pierov) 08 Aug '25

08 Aug '25
Pier Angelo Vendrame pushed to branch tor-browser-140.1.0esr-15.0-1 at The Tor Project / Applications / Tor Browser Commits: efc66d2c by Pier Angelo Vendrame at 2025-08-08T18:29:59+02:00 fixup! Firefox preference overrides. BB 44026: Disable the modal with upstream's ToU. We disable data collection, so those terms do not apply to us. Indeed, currently this feature is already gated on the datareporting pref, but since upstream is refactoring these prefs, adding an explicit one seems a good idea. Also, move the datareporting prefs closer to telemetry. - - - - - 1 changed file: - browser/app/profile/001-base-profile.js Changes: ===================================== browser/app/profile/001-base-profile.js ===================================== @@ -202,8 +202,6 @@ pref("browser.safebrowsing.provider.google4.updateURL", ""); pref("browser.safebrowsing.provider.google4.gethashURL", ""); pref("browser.safebrowsing.provider.mozilla.updateURL", ""); pref("browser.safebrowsing.provider.mozilla.gethashURL", ""); -pref("datareporting.healthreport.uploadEnabled", false); -pref("datareporting.policy.dataSubmissionEnabled", false); // tor-browser#42735: Disable recent search suggestions pref("browser.urlbar.recentsearches.featureGate", false); pref("browser.urlbar.suggest.recentsearches", false); @@ -225,6 +223,8 @@ pref("toolkit.telemetry.firstShutdownPing.enabled", false); // Added in tor-brow pref("toolkit.telemetry.updatePing.enabled", false); // Make sure updater telemetry is disabled; see #25909. pref("toolkit.telemetry.bhrPing.enabled", false); pref("toolkit.telemetry.coverage.opt-out", true); +pref("datareporting.healthreport.uploadEnabled", false); +pref("datareporting.policy.dataSubmissionEnabled", false); // Force all telemtry identifier to their canary values tor-browser#43750 pref("toolkit.telemetry.cachedClientID", "c0ffeec0-ffee-c0ff-eec0-ffeec0ffeec0", locked); pref("toolkit.telemetry.cachedProfileGroupID", "decafdec-afde-cafd-ecaf-decafdecafde", locked); @@ -236,6 +236,9 @@ pref("browser.tabs.crashReporting.sendReport", false); pref("browser.crashReports.unsubmittedCheck.autoSubmit2", false); // Added in tor-browser#41496 even though false by default pref("browser.crashReports.unsubmittedCheck.enabled", false); +// tor-browser#44026: Disable the modal that shows upstream terms of usage, +// since we opt out of their telemetry and data collection. +pref("browser.preonboarding.enabled", false); // Disable checkbox in about:neterror that controls // security.xfocsp.errorReporting.automatic. See tor-browser#42653. pref("security.xfocsp.errorReporting.enabled", false); View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/efc66d2… -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/efc66d2… You're receiving this email because of your account on gitlab.torproject.org.
1 0
0 0
[Git][tpo/applications/tor-browser][tor-browser-140.1.0esr-15.0-1] fixup! TB 40041 [android]: Implement Tor Network Settings
by Dan Ballard (@dan) 07 Aug '25

07 Aug '25
Dan Ballard pushed to branch tor-browser-140.1.0esr-15.0-1 at The Tor Project / Applications / Tor Browser Commits: 1643c744 by clairehurst at 2025-08-07T10:25:07-06:00 fixup! TB 40041 [android]: Implement Tor Network Settings tor-browser#44042 Debug crash when opening settings too quickly after launching app. Clean up surrounding code - - - - - 1 changed file: - mobile/android/fenix/app/src/main/java/org/mozilla/fenix/settings/SettingsFragment.kt Changes: ===================================== mobile/android/fenix/app/src/main/java/org/mozilla/fenix/settings/SettingsFragment.kt ===================================== @@ -34,8 +34,10 @@ import androidx.preference.PreferenceFragmentCompat import androidx.preference.SwitchPreference import androidx.recyclerview.widget.RecyclerView import kotlinx.coroutines.CoroutineScope +import kotlinx.coroutines.Dispatchers import kotlinx.coroutines.delay import kotlinx.coroutines.launch +import kotlinx.coroutines.runBlocking import mozilla.components.browser.state.state.selectedOrDefaultSearchEngine import mozilla.components.concept.engine.Engine import mozilla.components.concept.sync.AccountObserver @@ -189,7 +191,9 @@ class SettingsFragment : PreferenceFragmentCompat(), UserInteractionHandler { } override fun onCreatePreferences(savedInstanceState: Bundle?, rootKey: String?) { - setPreferencesFromResource(R.xml.preferences, rootKey) + runBlocking(context = Dispatchers.IO) { + setPreferencesFromResource(R.xml.preferences, rootKey) + } } override fun onViewCreated(view: View, savedInstanceState: Bundle?) { View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/1643c74… -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/1643c74… You're receiving this email because of your account on gitlab.torproject.org.
1 0
0 0
[Git][tpo/applications/tor-browser][tor-browser-140.1.0esr-15.0-1] fixup! TB 40041 [android]: Implement Tor Network Settings
by Dan Ballard (@dan) 07 Aug '25

07 Aug '25
Dan Ballard pushed to branch tor-browser-140.1.0esr-15.0-1 at The Tor Project / Applications / Tor Browser Commits: 32f432c8 by clairehurst at 2025-08-07T10:20:12-06:00 fixup! TB 40041 [android]: Implement Tor Network Settings tor-browser#44042 Debug crash when opening settings too quickly after launching app. Clean up surrounding code - - - - - 1 changed file: - mobile/android/fenix/app/src/main/java/org/mozilla/fenix/settings/SettingsFragment.kt Changes: ===================================== mobile/android/fenix/app/src/main/java/org/mozilla/fenix/settings/SettingsFragment.kt ===================================== @@ -189,8 +189,6 @@ class SettingsFragment : PreferenceFragmentCompat(), UserInteractionHandler { } override fun onCreatePreferences(savedInstanceState: Bundle?, rootKey: String?) { - //setPreferencesFromResource(R.xml.tor_network_settings_preferences, rootKey) - //setupConnectionPreferences() setPreferencesFromResource(R.xml.preferences, rootKey) } View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/32f432c… -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/32f432c… You're receiving this email because of your account on gitlab.torproject.org.
1 0
0 0
[Git][tpo/applications/tor-browser][base-browser-140.1.0esr-15.0-1] fixup! Firefox preference overrides.
by Pier Angelo Vendrame (@pierov) 07 Aug '25

07 Aug '25
Pier Angelo Vendrame pushed to branch base-browser-140.1.0esr-15.0-1 at The Tor Project / Applications / Tor Browser Commits: 6cb6ea55 by Pier Angelo Vendrame at 2025-08-07T11:43:23+02:00 fixup! Firefox preference overrides. BB 44062: Enable touch events on Windows and Android. Auto-detection makes some properties available on the global scope only when touch support is actually available, but this introduces entorpy. Let's force touch enabled in Windows+Android and disable it elsewhere. This improves consistency with the spoofed number of touch points. - - - - - 1 changed file: - browser/app/profile/001-base-profile.js Changes: ===================================== browser/app/profile/001-base-profile.js ===================================== @@ -443,9 +443,12 @@ pref("dom.webmidi.enabled", false); // Bug 41398: Disable Web MIDI API // randomized IDs when this pref is true). // Defense-in-depth (already the default value) from Firefox 119 or 120. pref("media.devices.enumerate.legacy.enabled", false); -// Bug 10286: Always disable Touch API. -// We might need to deepen this topic, see tor-browser#42069. +// Touch events (tor-browser#10286, tor-browser#42069, tor-browser#44062) +#if defined(XP_WIN) || defined(ANDROID) +pref("dom.w3c_touch_events.enabled", 1); +#else pref("dom.w3c_touch_events.enabled", 0); +#endif #ifndef ANDROID // Bug 42138: Disable touch-based overscroll UX pref("apz.overscroll.enabled", false); View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/6cb6ea5… -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/6cb6ea5… You're receiving this email because of your account on gitlab.torproject.org.
1 0
0 0
[Git][tpo/applications/mullvad-browser][mullvad-browser-140.1.0esr-15.0-1] fixup! Firefox preference overrides.
by Pier Angelo Vendrame (@pierov) 07 Aug '25

07 Aug '25
Pier Angelo Vendrame pushed to branch mullvad-browser-140.1.0esr-15.0-1 at The Tor Project / Applications / Mullvad Browser Commits: 7259b166 by Pier Angelo Vendrame at 2025-08-07T11:42:04+02:00 fixup! Firefox preference overrides. BB 44062: Enable touch events on Windows and Android. Auto-detection makes some properties available on the global scope only when touch support is actually available, but this introduces entorpy. Let's force touch enabled in Windows+Android and disable it elsewhere. This improves consistency with the spoofed number of touch points. - - - - - 1 changed file: - browser/app/profile/001-base-profile.js Changes: ===================================== browser/app/profile/001-base-profile.js ===================================== @@ -443,9 +443,12 @@ pref("dom.webmidi.enabled", false); // Bug 41398: Disable Web MIDI API // randomized IDs when this pref is true). // Defense-in-depth (already the default value) from Firefox 119 or 120. pref("media.devices.enumerate.legacy.enabled", false); -// Bug 10286: Always disable Touch API. -// We might need to deepen this topic, see tor-browser#42069. +// Touch events (tor-browser#10286, tor-browser#42069, tor-browser#44062) +#if defined(XP_WIN) || defined(ANDROID) +pref("dom.w3c_touch_events.enabled", 1); +#else pref("dom.w3c_touch_events.enabled", 0); +#endif #ifndef ANDROID // Bug 42138: Disable touch-based overscroll UX pref("apz.overscroll.enabled", false); View it on GitLab: https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/725… -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/725… You're receiving this email because of your account on gitlab.torproject.org.
1 0
0 0
[Git][tpo/applications/tor-browser][tor-browser-140.1.0esr-15.0-1] fixup! Firefox preference overrides.
by Pier Angelo Vendrame (@pierov) 07 Aug '25

07 Aug '25
Pier Angelo Vendrame pushed to branch tor-browser-140.1.0esr-15.0-1 at The Tor Project / Applications / Tor Browser Commits: fbc1f480 by Pier Angelo Vendrame at 2025-08-07T11:39:52+02:00 fixup! Firefox preference overrides. BB 44062: Enable touch events on Windows and Android. Auto-detection makes some properties available on the global scope only when touch support is actually available, but this introduces entorpy. Let's force touch enabled in Windows+Android and disable it elsewhere. This improves consistency with the spoofed number of touch points. - - - - - 2 changed files: - browser/app/profile/001-base-profile.js - mobile/android/app/000-tor-browser-android.js Changes: ===================================== browser/app/profile/001-base-profile.js ===================================== @@ -443,9 +443,12 @@ pref("dom.webmidi.enabled", false); // Bug 41398: Disable Web MIDI API // randomized IDs when this pref is true). // Defense-in-depth (already the default value) from Firefox 119 or 120. pref("media.devices.enumerate.legacy.enabled", false); -// Bug 10286: Always disable Touch API. -// We might need to deepen this topic, see tor-browser#42069. +// Touch events (tor-browser#10286, tor-browser#42069, tor-browser#44062) +#if defined(XP_WIN) || defined(ANDROID) +pref("dom.w3c_touch_events.enabled", 1); +#else pref("dom.w3c_touch_events.enabled", 0); +#endif #ifndef ANDROID // Bug 42138: Disable touch-based overscroll UX pref("apz.overscroll.enabled", false); ===================================== mobile/android/app/000-tor-browser-android.js ===================================== @@ -23,9 +23,6 @@ pref("privacy.clearOnShutdown.siteSettings", true); // controls if we want camera support pref("media.realtime_decoder.enabled", false); -// Enable touch events on Android (highlighting text, etc) -pref("dom.w3c_touch_events.enabled", 2); - // No HLS support for now due to browser freezing, see: #29859. pref("media.hls.enabled", false); View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/fbc1f48… -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/fbc1f48… You're receiving this email because of your account on gitlab.torproject.org.
1 0
0 0
[Git][tpo/applications/tor-browser-build][main] Bug 41442: Update the generate-bugzilla-triage-csv script for Tor Browser 16.0
by Pier Angelo Vendrame (@pierov) 07 Aug '25

07 Aug '25
Pier Angelo Vendrame pushed to branch main at The Tor Project / Applications / tor-browser-build Commits: c088e842 by Morgan at 2025-08-06T18:10:21+00:00 Bug 41442: Update the generate-bugzilla-triage-csv script for Tor Browser 16.0 - - - - - 1 changed file: - tools/browser/generate-bugzilla-triage-csv Changes: ===================================== tools/browser/generate-bugzilla-triage-csv ===================================== @@ -1,8 +1,14 @@ #!/usr/bin/env bash # gitlab labels for review tickets -browser_label="15.0 stable" -esr_label="esr-140" +browser_label="Apps::Product::TorBrowser" +esr_label="esr-next" +priority_label="Priority::Blocker" +impact_label="Impact::Unknown" +type_label="Apps::Type::Audit" + +# milestone for the next major Tor Browser release +milestone="Tor Browser 16.0" # prints to stderr function echoerr() { echo "$@" 1>&2; } @@ -10,18 +16,17 @@ function echoerr() { echo "$@" 1>&2; } script_dir=$(dirname "${BASH_ARGV0:-$0}") # help dialog -if [ "$#" -lt 5 ]; then - echoerr "Usage: $0 <ff-version> <begin-commit> <end-commit> <gitlab-audit-issue> <reviewers...>" +if [ "$#" -ne 4 ]; then + echoerr "Usage: $0 <ff-version> <begin-commit> <end-commit> <gitlab-audit-issue>" echoerr echoerr "ff-version rapid-release Firefox version to audit" - echoerr "begin-commit starting gecko-dev commit of this Firefox version" - echoerr "end-commit ending gecko-dev commit of this Firefox version" + echoerr "begin-commit starting firefox commit of this Firefox version" + echoerr "end-commit ending firefox commit of this Firefox version" echoerr "gitlab-audit-issue tor-browser GitLab issue number for this audit" - echoerr "reviewers... space-separated list of reviewers responsible for this audit" echoerr "" echoerr "Example:" echoerr "" - echoerr "$0 129 FIREFOX_NIGHTLY_128_END FIREFOX_NIGHTLY_129_END 43303 morgan pierov henry" + echoerr "$0 129 FIREFOX_NIGHTLY_128_END FIREFOX_NIGHTLY_129_END 43303" exit 1 fi @@ -219,7 +224,8 @@ jq '. | sort_by([.component, .id])[] | "\(.id)|\(.component)|\(.summary)"' ${uni # review issue title new_issue_title=$(url_encode "Review Mozilla ${id}: ${summary_short}") # review issue description + labeling (14.0 stable, FF128-esr, Next) - new_issue_description=$(url_encode "### Bugzilla: ${bugzilla_url}")%0A$(url_encode "/label ~\"${browser_label}\" ~\"${esr_label}\" ~\"Bugzilla Review\" ~Next")%0A$(url_encode "/relate tpo/applications/tor-browser#${audit_issue}")%0A%0A$(url_encode "<!-- briefly describe why this issue needs further review -->")%0A + new_issue_description=$(url_encode "### Bugzilla: ${bugzilla_url}")%0A$(url_encode "/label ~\"${browser_label}\" ~\"${esr_label}\" ~\"${priority_label}\" ~\"${impact_label}\" ~\"${type_label}\"")%0A$(url_encode "/milestone %\"{milestone}\"")%0A$(url_encode "/relate tpo/applications/tor-browser#${audit_issue}")%0A%0A$(url_encode "<!-- briefly describe why this issue needs further review -->")%0A + # url which create's new issue with title and description pre-populated new_issue_url="https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/new?iss…" @@ -231,12 +237,6 @@ jq '. | sort_by([.component, .id])[] | "\(.id)|\(.component)|\(.summary)"' ${uni fi done -echo -echo "\"Triaged by:\"" -for reviewer in $reviewers; do - reviewer=$(csv_escape "${reviewer}") - echo "\"FALSE\",\"${reviewer}\"" -done echo bugzilla_query="=HYPERLINK(\"${bugzilla_query}\", \"Bugzilla query\")" View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/commit/c… -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/commit/c… You're receiving this email because of your account on gitlab.torproject.org.
1 0
0 0
  • ← Newer
  • 1
  • ...
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • ...
  • 2011
  • Older →

HyperKitty Powered by HyperKitty version 1.3.12.