lists.torproject.org
Sign In Sign Up
Manage this list Sign In Sign Up

Keyboard Shortcuts

Thread View

  • j: Next unread message
  • k: Previous unread message
  • j a: Jump to all threads
  • j l: Jump to MailingList overview

tbb-commits

Thread Start a new thread
Threads by month
  • ----- 2025 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2024 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2023 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2022 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2021 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2020 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2019 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2018 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2017 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2016 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2015 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2014 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
tbb-commits@lists.torproject.org

  • 1 participants
  • 19724 discussions
[Git][tpo/applications/mullvad-browser][mullvad-browser-140.6.0esr-15.0-1] Bug 1977576 - Pass JSContext to VideoFrame::PrefEnabled in more places. r=manuel,chunmin,tjr
by Pier Angelo Vendrame (@pierov) 08 Dec '25

08 Dec '25
Pier Angelo Vendrame pushed to branch mullvad-browser-140.6.0esr-15.0-1 at The Tor Project / Applications / Mullvad Browser Commits: 52b09dcb by Fatih Kilic at 2025-12-08T12:31:32+01:00 Bug 1977576 - Pass JSContext to VideoFrame::PrefEnabled in more places. r=manuel,chunmin,tjr Differential Revision: https://phabricator.services.mozilla.com/D257488 - - - - - 3 changed files: - dom/base/StructuredCloneHolder.cpp - dom/media/webcodecs/VideoFrame.h - toolkit/components/resistfingerprinting/nsRFPService.cpp Changes: ===================================== dom/base/StructuredCloneHolder.cpp ===================================== @@ -1110,7 +1110,7 @@ JSObject* StructuredCloneHolder::CustomReadHandler( return ClonedErrorHolder::ReadStructuredClone(aCx, aReader, this); } - if (VideoFrame::PrefEnabled() && aTag == SCTAG_DOM_VIDEOFRAME && + if (VideoFrame::PrefEnabled(aCx) && aTag == SCTAG_DOM_VIDEOFRAME && CloneScope() == StructuredCloneScope::SameProcess && aCloneDataPolicy.areIntraClusterClonableSharedObjectsAllowed()) { JS::Rooted<JSObject*> global(aCx, mGlobal->GetGlobalJSObject()); @@ -1250,7 +1250,7 @@ bool StructuredCloneHolder::CustomWriteHandler( } // See if this is a VideoFrame object. - if (VideoFrame::PrefEnabled()) { + if (VideoFrame::PrefEnabled(aCx)) { VideoFrame* videoFrame = nullptr; if (NS_SUCCEEDED(UNWRAP_OBJECT(VideoFrame, &obj, videoFrame))) { SameProcessScopeRequired(aSameProcessScopeRequired); @@ -1446,7 +1446,7 @@ StructuredCloneHolder::CustomReadTransferHandler( aReturnObject); } - if (VideoFrame::PrefEnabled() && aTag == SCTAG_DOM_VIDEOFRAME && + if (VideoFrame::PrefEnabled(aCx) && aTag == SCTAG_DOM_VIDEOFRAME && CloneScope() == StructuredCloneScope::SameProcess && aCloneDataPolicy.areIntraClusterClonableSharedObjectsAllowed()) { MOZ_ASSERT(aContent); @@ -1591,7 +1591,7 @@ StructuredCloneHolder::CustomWriteTransferHandler( return true; } - if (VideoFrame::PrefEnabled()) { + if (VideoFrame::PrefEnabled(aCx)) { VideoFrame* videoFrame = nullptr; rv = UNWRAP_OBJECT(VideoFrame, &obj, videoFrame); if (NS_SUCCEEDED(rv)) { @@ -1758,7 +1758,7 @@ void StructuredCloneHolder::CustomFreeTransferHandler( return; } - if (VideoFrame::PrefEnabled() && aTag == SCTAG_DOM_VIDEOFRAME && + if (aTag == SCTAG_DOM_VIDEOFRAME && CloneScope() == StructuredCloneScope::SameProcess) { if (aContent) { VideoFrame::TransferredData* data = @@ -1767,8 +1767,7 @@ void StructuredCloneHolder::CustomFreeTransferHandler( } return; } - if (StaticPrefs::dom_media_webcodecs_enabled() && - aTag == SCTAG_DOM_AUDIODATA && + if (aTag == SCTAG_DOM_AUDIODATA && CloneScope() == StructuredCloneScope::SameProcess) { if (aContent) { AudioData::TransferredData* data = @@ -1851,7 +1850,7 @@ bool StructuredCloneHolder::CustomCanTransferHandler( } } - if (VideoFrame::PrefEnabled()) { + if (VideoFrame::PrefEnabled(aCx)) { VideoFrame* videoframe = nullptr; nsresult rv = UNWRAP_OBJECT(VideoFrame, &obj, videoframe); if (NS_SUCCEEDED(rv)) { ===================================== dom/media/webcodecs/VideoFrame.h ===================================== @@ -104,7 +104,7 @@ class VideoFrame final : public nsISupports, JSObject* WrapObject(JSContext* aCx, JS::Handle<JSObject*> aGivenProto) override; - static bool PrefEnabled(JSContext* aCx = nullptr, JSObject* aObj = nullptr); + static bool PrefEnabled(JSContext* aCx, JSObject* aObj = nullptr); static already_AddRefed<VideoFrame> Constructor( const GlobalObject& aGlobal, HTMLImageElement& aImageElement, ===================================== toolkit/components/resistfingerprinting/nsRFPService.cpp ===================================== @@ -2708,8 +2708,10 @@ bool nsRFPService::IsWebCodecsRFPTargetEnabled(JSContext* aCx) { // We know that the RFPTarget::WebCodecs is enabled, check if principal // is exempted. - // VideoFrame::PrefEnabled function can be called without a JSContext. - if (!aCx) { + if (NS_WARN_IF(!aCx)) { + MOZ_LOG(gResistFingerprintingLog, LogLevel::Warning, + ("nsRFPService::IsWebCodecsRFPTargetEnabled called with null " + "JSContext")); return true; } View it on GitLab: https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/52b… -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/52b… You're receiving this email because of your account on gitlab.torproject.org.
1 0
0 0
[Git][tpo/applications/mullvad-browser] Pushed new tag mullvad-browser-140.6.0esr-15.0-1-build3
by Pier Angelo Vendrame (@pierov) 08 Dec '25

08 Dec '25
Pier Angelo Vendrame pushed new tag mullvad-browser-140.6.0esr-15.0-1-build3 at The Tor Project / Applications / Mullvad Browser -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/tree/mullv… You're receiving this email because of your account on gitlab.torproject.org.
1 0
0 0
[Git][tpo/applications/tor-browser][base-browser-140.6.0esr-15.0-1] Bug 1977576 - Pass JSContext to VideoFrame::PrefEnabled in more places. r=manuel,chunmin,tjr
by Pier Angelo Vendrame (@pierov) 08 Dec '25

08 Dec '25
Pier Angelo Vendrame pushed to branch base-browser-140.6.0esr-15.0-1 at The Tor Project / Applications / Tor Browser Commits: a12d7a61 by Fatih Kilic at 2025-12-08T12:26:54+01:00 Bug 1977576 - Pass JSContext to VideoFrame::PrefEnabled in more places. r=manuel,chunmin,tjr Differential Revision: https://phabricator.services.mozilla.com/D257488 - - - - - 3 changed files: - dom/base/StructuredCloneHolder.cpp - dom/media/webcodecs/VideoFrame.h - toolkit/components/resistfingerprinting/nsRFPService.cpp Changes: ===================================== dom/base/StructuredCloneHolder.cpp ===================================== @@ -1110,7 +1110,7 @@ JSObject* StructuredCloneHolder::CustomReadHandler( return ClonedErrorHolder::ReadStructuredClone(aCx, aReader, this); } - if (VideoFrame::PrefEnabled() && aTag == SCTAG_DOM_VIDEOFRAME && + if (VideoFrame::PrefEnabled(aCx) && aTag == SCTAG_DOM_VIDEOFRAME && CloneScope() == StructuredCloneScope::SameProcess && aCloneDataPolicy.areIntraClusterClonableSharedObjectsAllowed()) { JS::Rooted<JSObject*> global(aCx, mGlobal->GetGlobalJSObject()); @@ -1250,7 +1250,7 @@ bool StructuredCloneHolder::CustomWriteHandler( } // See if this is a VideoFrame object. - if (VideoFrame::PrefEnabled()) { + if (VideoFrame::PrefEnabled(aCx)) { VideoFrame* videoFrame = nullptr; if (NS_SUCCEEDED(UNWRAP_OBJECT(VideoFrame, &obj, videoFrame))) { SameProcessScopeRequired(aSameProcessScopeRequired); @@ -1446,7 +1446,7 @@ StructuredCloneHolder::CustomReadTransferHandler( aReturnObject); } - if (VideoFrame::PrefEnabled() && aTag == SCTAG_DOM_VIDEOFRAME && + if (VideoFrame::PrefEnabled(aCx) && aTag == SCTAG_DOM_VIDEOFRAME && CloneScope() == StructuredCloneScope::SameProcess && aCloneDataPolicy.areIntraClusterClonableSharedObjectsAllowed()) { MOZ_ASSERT(aContent); @@ -1591,7 +1591,7 @@ StructuredCloneHolder::CustomWriteTransferHandler( return true; } - if (VideoFrame::PrefEnabled()) { + if (VideoFrame::PrefEnabled(aCx)) { VideoFrame* videoFrame = nullptr; rv = UNWRAP_OBJECT(VideoFrame, &obj, videoFrame); if (NS_SUCCEEDED(rv)) { @@ -1758,7 +1758,7 @@ void StructuredCloneHolder::CustomFreeTransferHandler( return; } - if (VideoFrame::PrefEnabled() && aTag == SCTAG_DOM_VIDEOFRAME && + if (aTag == SCTAG_DOM_VIDEOFRAME && CloneScope() == StructuredCloneScope::SameProcess) { if (aContent) { VideoFrame::TransferredData* data = @@ -1767,8 +1767,7 @@ void StructuredCloneHolder::CustomFreeTransferHandler( } return; } - if (StaticPrefs::dom_media_webcodecs_enabled() && - aTag == SCTAG_DOM_AUDIODATA && + if (aTag == SCTAG_DOM_AUDIODATA && CloneScope() == StructuredCloneScope::SameProcess) { if (aContent) { AudioData::TransferredData* data = @@ -1851,7 +1850,7 @@ bool StructuredCloneHolder::CustomCanTransferHandler( } } - if (VideoFrame::PrefEnabled()) { + if (VideoFrame::PrefEnabled(aCx)) { VideoFrame* videoframe = nullptr; nsresult rv = UNWRAP_OBJECT(VideoFrame, &obj, videoframe); if (NS_SUCCEEDED(rv)) { ===================================== dom/media/webcodecs/VideoFrame.h ===================================== @@ -104,7 +104,7 @@ class VideoFrame final : public nsISupports, JSObject* WrapObject(JSContext* aCx, JS::Handle<JSObject*> aGivenProto) override; - static bool PrefEnabled(JSContext* aCx = nullptr, JSObject* aObj = nullptr); + static bool PrefEnabled(JSContext* aCx, JSObject* aObj = nullptr); static already_AddRefed<VideoFrame> Constructor( const GlobalObject& aGlobal, HTMLImageElement& aImageElement, ===================================== toolkit/components/resistfingerprinting/nsRFPService.cpp ===================================== @@ -2708,8 +2708,10 @@ bool nsRFPService::IsWebCodecsRFPTargetEnabled(JSContext* aCx) { // We know that the RFPTarget::WebCodecs is enabled, check if principal // is exempted. - // VideoFrame::PrefEnabled function can be called without a JSContext. - if (!aCx) { + if (NS_WARN_IF(!aCx)) { + MOZ_LOG(gResistFingerprintingLog, LogLevel::Warning, + ("nsRFPService::IsWebCodecsRFPTargetEnabled called with null " + "JSContext")); return true; } View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/a12d7a6… -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/a12d7a6… You're receiving this email because of your account on gitlab.torproject.org.
1 0
0 0
[Git][tpo/applications/tor-browser] Pushed new tag tor-browser-140.6.0esr-15.0-1-build4
by Pier Angelo Vendrame (@pierov) 08 Dec '25

08 Dec '25
Pier Angelo Vendrame pushed new tag tor-browser-140.6.0esr-15.0-1-build4 at The Tor Project / Applications / Tor Browser -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/tree/tor-brows… You're receiving this email because of your account on gitlab.torproject.org.
1 0
0 0
[Git][tpo/applications/tor-browser][tor-browser-140.6.0esr-15.0-1] Bug 1977576 - Pass JSContext to VideoFrame::PrefEnabled in more places. r=manuel,chunmin,tjr
by Pier Angelo Vendrame (@pierov) 08 Dec '25

08 Dec '25
Pier Angelo Vendrame pushed to branch tor-browser-140.6.0esr-15.0-1 at The Tor Project / Applications / Tor Browser Commits: 2035d30b by Fatih Kilic at 2025-12-08T11:36:14+01:00 Bug 1977576 - Pass JSContext to VideoFrame::PrefEnabled in more places. r=manuel,chunmin,tjr Differential Revision: https://phabricator.services.mozilla.com/D257488 - - - - - 3 changed files: - dom/base/StructuredCloneHolder.cpp - dom/media/webcodecs/VideoFrame.h - toolkit/components/resistfingerprinting/nsRFPService.cpp Changes: ===================================== dom/base/StructuredCloneHolder.cpp ===================================== @@ -1110,7 +1110,7 @@ JSObject* StructuredCloneHolder::CustomReadHandler( return ClonedErrorHolder::ReadStructuredClone(aCx, aReader, this); } - if (VideoFrame::PrefEnabled() && aTag == SCTAG_DOM_VIDEOFRAME && + if (VideoFrame::PrefEnabled(aCx) && aTag == SCTAG_DOM_VIDEOFRAME && CloneScope() == StructuredCloneScope::SameProcess && aCloneDataPolicy.areIntraClusterClonableSharedObjectsAllowed()) { JS::Rooted<JSObject*> global(aCx, mGlobal->GetGlobalJSObject()); @@ -1250,7 +1250,7 @@ bool StructuredCloneHolder::CustomWriteHandler( } // See if this is a VideoFrame object. - if (VideoFrame::PrefEnabled()) { + if (VideoFrame::PrefEnabled(aCx)) { VideoFrame* videoFrame = nullptr; if (NS_SUCCEEDED(UNWRAP_OBJECT(VideoFrame, &obj, videoFrame))) { SameProcessScopeRequired(aSameProcessScopeRequired); @@ -1446,7 +1446,7 @@ StructuredCloneHolder::CustomReadTransferHandler( aReturnObject); } - if (VideoFrame::PrefEnabled() && aTag == SCTAG_DOM_VIDEOFRAME && + if (VideoFrame::PrefEnabled(aCx) && aTag == SCTAG_DOM_VIDEOFRAME && CloneScope() == StructuredCloneScope::SameProcess && aCloneDataPolicy.areIntraClusterClonableSharedObjectsAllowed()) { MOZ_ASSERT(aContent); @@ -1591,7 +1591,7 @@ StructuredCloneHolder::CustomWriteTransferHandler( return true; } - if (VideoFrame::PrefEnabled()) { + if (VideoFrame::PrefEnabled(aCx)) { VideoFrame* videoFrame = nullptr; rv = UNWRAP_OBJECT(VideoFrame, &obj, videoFrame); if (NS_SUCCEEDED(rv)) { @@ -1758,7 +1758,7 @@ void StructuredCloneHolder::CustomFreeTransferHandler( return; } - if (VideoFrame::PrefEnabled() && aTag == SCTAG_DOM_VIDEOFRAME && + if (aTag == SCTAG_DOM_VIDEOFRAME && CloneScope() == StructuredCloneScope::SameProcess) { if (aContent) { VideoFrame::TransferredData* data = @@ -1767,8 +1767,7 @@ void StructuredCloneHolder::CustomFreeTransferHandler( } return; } - if (StaticPrefs::dom_media_webcodecs_enabled() && - aTag == SCTAG_DOM_AUDIODATA && + if (aTag == SCTAG_DOM_AUDIODATA && CloneScope() == StructuredCloneScope::SameProcess) { if (aContent) { AudioData::TransferredData* data = @@ -1851,7 +1850,7 @@ bool StructuredCloneHolder::CustomCanTransferHandler( } } - if (VideoFrame::PrefEnabled()) { + if (VideoFrame::PrefEnabled(aCx)) { VideoFrame* videoframe = nullptr; nsresult rv = UNWRAP_OBJECT(VideoFrame, &obj, videoframe); if (NS_SUCCEEDED(rv)) { ===================================== dom/media/webcodecs/VideoFrame.h ===================================== @@ -104,7 +104,7 @@ class VideoFrame final : public nsISupports, JSObject* WrapObject(JSContext* aCx, JS::Handle<JSObject*> aGivenProto) override; - static bool PrefEnabled(JSContext* aCx = nullptr, JSObject* aObj = nullptr); + static bool PrefEnabled(JSContext* aCx, JSObject* aObj = nullptr); static already_AddRefed<VideoFrame> Constructor( const GlobalObject& aGlobal, HTMLImageElement& aImageElement, ===================================== toolkit/components/resistfingerprinting/nsRFPService.cpp ===================================== @@ -2715,8 +2715,10 @@ bool nsRFPService::IsWebCodecsRFPTargetEnabled(JSContext* aCx) { // We know that the RFPTarget::WebCodecs is enabled, check if principal // is exempted. - // VideoFrame::PrefEnabled function can be called without a JSContext. - if (!aCx) { + if (NS_WARN_IF(!aCx)) { + MOZ_LOG(gResistFingerprintingLog, LogLevel::Warning, + ("nsRFPService::IsWebCodecsRFPTargetEnabled called with null " + "JSContext")); return true; } View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/2035d30… -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/2035d30… You're receiving this email because of your account on gitlab.torproject.org.
1 0
0 0
[Git][tpo/applications/mullvad-browser][mullvad-browser-140.6.0esr-15.0-1] Bug 1995637 - Make sure debugger object gets traced when tracing breakpoints r=iain
by ma1 (@ma1) 08 Dec '25

08 Dec '25
ma1 pushed to branch mullvad-browser-140.6.0esr-15.0-1 at The Tor Project / Applications / Mullvad Browser Commits: 720da189 by Jon Coppeard at 2025-12-06T15:56:18+01:00 Bug 1995637 - Make sure debugger object gets traced when tracing breakpoints r=iain Breakpoints currently trace |wrappedDebugger| but this doesn't keep |debugger| alive if we have nuked the CCWs. The debugger has a linked list of breakpoints that each breakpoint is part of so we need to make sure it lives at least as long as that. The patch traces the debugger's object even if our CCW to it has been nuked. Differential Revision: https://phabricator.services.mozilla.com/D271062 - - - - - 2 changed files: - js/src/debugger/Debugger.cpp - + js/src/jit-test/tests/debug/bug-1995637.js Changes: ===================================== js/src/debugger/Debugger.cpp ===================================== @@ -454,6 +454,9 @@ Breakpoint::Breakpoint(Debugger* debugger, HandleObject wrappedDebugger, void Breakpoint::trace(JSTracer* trc) { TraceEdge(trc, &wrappedDebugger, "breakpoint owner"); + // Trace the debugger object too in case |wrappedDebugger| got nuked. + TraceCrossCompartmentEdge(trc, wrappedDebugger, &debugger->object, + "breakpoint debugger object"); TraceEdge(trc, &handler, "breakpoint handler"); } ===================================== js/src/jit-test/tests/debug/bug-1995637.js ===================================== @@ -0,0 +1,66 @@ +// |jit-test| error: TypeError +gczeal(9,16); +function F1() { + if (!new.target) { throw 'must be called with new'; } + this.b = null; +} +new F1(); +new F1(); +function f5() {} +new BigUint64Array(3474); +function f14() {} +function f25(a26, a27) { + for (let i30 = 0, i31 = true; i31; i31--) { + function f37() { + function F38() {} + for (let i44 = 0, i45 = SharedArrayBuffer; i45; + (() => { + i45--; + Int8Array.principal = BigUint64Array; + function F50() {} + Int8Array.sameZoneAs = /wp(?:a?)+/imu; + const v54 = this.newGlobal(Int8Array); + const t7 = ({ __proto__: v54 }).Debugger; + const v57 = t7(F50); + const v59 = v57.getNewestFrame(i30, i45, i45, f25, v57).older; + v59.script.setBreakpoint(16, v59); + })()) {} + for (let [i134, i135] = (() => { + for (let i84 = 0, i85 = 10; i85; + (() => { + i85--; + for (let [i102, i103] = (() => { + for (let [i95, i96] = (() => { + new Uint8Array(); + return [0, 10]; + })(); i96; i96--) { + } + return [0, SharedArrayBuffer]; + })(); + i103; i103--) {} + for (let i113 = -4, i114 = 10; i114; i114--) {} + for (let i122 = 4, i123 = 10; i123--, i123; i123--) { + i123++; + } + })()) {} + return [0, SharedArrayBuffer]; + })(); + i135; i135--) { } + for (let i143 = 0, i144 = 10; i144; i144--) {} + } + f37.apply(); + } + for (let i153 = 0, i154 = 10; i154; i154--) {} + function F160(a162, a163) { + if (!new.target) { throw 'must be called with new'; } + this.c = a27; + this.h = a162; + } + new F160(234, a27); + const v167 = this.nukeAllCCWs(); + for (let i170 = 0, i171 = 10; i171; i171--) {} + try { + f25(); + } catch(e178) {} +} +f25(f25, f25); View it on GitLab: https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/720… -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/720… You're receiving this email because of your account on gitlab.torproject.org.
1 0
0 0
[Git][tpo/applications/tor-browser-build] Pushed new tag tbb-13.5.26-build1
by ma1 (@ma1) 08 Dec '25

08 Dec '25
ma1 pushed new tag tbb-13.5.26-build1 at The Tor Project / Applications / tor-browser-build -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/tree/tbb… You're receiving this email because of your account on gitlab.torproject.org.
1 0
0 0
[Git][tpo/applications/tor-browser-build][maint-13.5] Bug 41645: Prepare Tor Browser 13.5.26
by ma1 (@ma1) 08 Dec '25

08 Dec '25
ma1 pushed to branch maint-13.5 at The Tor Project / Applications / tor-browser-build Commits: cfd8ad6e by hackademix at 2025-12-08T08:55:23+01:00 Bug 41645: Prepare Tor Browser 13.5.26 - - - - - 7 changed files: - projects/browser/Bundle-Data/Docs-TBB/ChangeLog.txt - projects/browser/config - projects/firefox/config - projects/tor/config - projects/translation/config - rbm.conf - tools/fetch_changelogs.py Changes: ===================================== projects/browser/Bundle-Data/Docs-TBB/ChangeLog.txt ===================================== @@ -1,3 +1,28 @@ +Tor Browser 13.5.26 - December 09 2025 + * All Platforms + * Updated Firefox to 115.31.0esr + * Updated NoScript to 13.5.2.1984 + * Updated Tor to 0.4.8.21 + * Bug 22974: Self-host NoScript Updates [tor-browser] + * Bug 44391: Restrictions cascade blocks every capability in subframes (e.g. captchas) [tor-browser] + * Bug 44397: Rebase Tor Browser legacy onto 115.31.0esr [tor-browser] + * Bug 44409: Backport Security Fixes from Firefox 146 [tor-browser] + * Build System + * All Platforms + * Bug 41644: Self-hosted browser extensions support in relprep.py [tor-browser-build] + +Tor Browser 13.5.26 - December 09 2025 + * All Platforms + * Updated Firefox to 115.31.0esr + * Updated NoScript to 13.5.2.1984 + * Updated Tor to 0.4.8.21 + * Bug 22974: Self-host NoScript Updates [tor-browser] + * Bug 44397: Rebase Tor Browser legacy onto 115.31.0esr [tor-browser] + * Bug 44409: Backport Security Fixes from Firefox 146 [tor-browser] + * Build System + * All Platforms + * Bug 41644: Self-hosted browser extensions support in relprep.py [tor-browser-build] + Tor Browser 13.5.25 - November 13 2025 * All Platforms * Updated Tor to 0.4.8.20 ===================================== projects/browser/config ===================================== @@ -103,9 +103,9 @@ input_files: enable: '[% ! c("var/android") %]' - filename: Bundle-Data enable: '[% ! c("var/android") %]' - - URL: https://addons.mozilla.org/firefox/downloads/file/4609561/noscript-13.4.xpi + - URL: https://dist.torproject.org/torbrowser/noscript/noscript-13.5.2.1984.xpi name: noscript - sha256sum: 9496d2bc785f2b6dff36a3d6f60fa1a70d7b9a1895bc738c30387c94cd945168 + sha256sum: 4579c70b69e3198ea0bf064f9912b9341696b9ad4ed177cb19994208872425fd - URL: https://addons.mozilla.org/firefox/downloads/file/4359936/ublock_origin-1.6… name: ublock-origin sha256sum: e2cda9b2a1b0a7f6e5ef0da9f87f28df52f8560587ba2e51a3003121cfb81600 ===================================== projects/firefox/config ===================================== @@ -16,12 +16,12 @@ container: use_container: 1 var: - firefox_platform_version: 115.30.0 + firefox_platform_version: 115.31.0 firefox_version: '[% c("var/firefox_platform_version") %]esr' browser_series: '13.5' browser_rebase: 1 browser_branch: '[% c("var/browser_series") %]-[% c("var/browser_rebase") %]' - browser_build: 3 + browser_build: 2 branding_directory_prefix: 'tb' copyright_year: '[% exec("git show -s --format=%ci").remove("-.*") %]' nightly_updates_publish_dir: '[% c("var/nightly_updates_publish_dir_prefix") %]nightly-[% c("var/osname") %]' ===================================== projects/tor/config ===================================== @@ -1,6 +1,6 @@ # vim: filetype=yaml sw=2 filename: '[% project %]-[% c("version") %]-[% c("var/osname") %]-[% c("var/build_id") %].tar.[% c("compress_tar") %]' -version: 0.4.8.20 +version: 0.4.8.21 git_hash: 'tor-[% c("version") %]' git_url: https://gitlab.torproject.org/tpo/core/tor.git git_submodule: 1 ===================================== projects/translation/config ===================================== @@ -12,13 +12,13 @@ compress_tar: 'gz' steps: base-browser: base-browser: '[% INCLUDE build %]' - git_hash: df313475cfd9eba31009edca530803dd991264d7 + git_hash: d366318349af0977ff23b492fa87e436e8672fdd targets: nightly: git_hash: 'base-browser' tor-browser: tor-browser: '[% INCLUDE build %]' - git_hash: 4fcb19da2c6b62bdd96828172162bea89ee3231e + git_hash: 45b67d3be52f79e8a4b361fd04ab12f342ab0016 targets: nightly: git_hash: 'tor-browser' ===================================== rbm.conf ===================================== @@ -73,11 +73,11 @@ buildconf: git_signtag_opt: '-s' var: - torbrowser_version: '13.5.25' + torbrowser_version: '13.5.26' torbrowser_build: 'build1' # This should be the date of when the build is started. For the build # to be reproducible, browser_release_date should always be in the past. - browser_release_date: '2025/11/12 11:00:00' + browser_release_date: '2025/12/07 18:15:20' browser_release_date_timestamp: '[% USE date; date.format(c("var/browser_release_date"), "%s") %]' browser_platforms: # is_android_release and is_desktop_release are used to quickly @@ -115,9 +115,9 @@ var: updater_enabled: 1 build_mar: 1 torbrowser_incremental_from: + - 13.5.25 - 13.5.24 - 13.5.23 - - 13.5.22 mar_channel_id: '[% c("var/projectname") %]-torproject-[% c("var/channel") %]' # By default, we sort the list of installed packages. This allows sharing ===================================== tools/fetch_changelogs.py ===================================== @@ -271,7 +271,6 @@ class ChangelogBuilder: if not self.is_mullvad: names.update( { - "GeckoView": "firefox", "Tor": "tor", "OpenSSL": "openssl", "zlib": "zlib", View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/commit/c… -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/commit/c… You're receiving this email because of your account on gitlab.torproject.org.
1 0
0 0
[Git][tpo/applications/tor-browser] Pushed new tag tor-browser-140.6.0esr-15.0-1-build3
by Pier Angelo Vendrame (@pierov) 08 Dec '25

08 Dec '25
Pier Angelo Vendrame pushed new tag tor-browser-140.6.0esr-15.0-1-build3 at The Tor Project / Applications / Tor Browser -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/tree/tor-brows… You're receiving this email because of your account on gitlab.torproject.org.
1 0
0 0
[Git][tpo/applications/tor-browser][tor-browser-146.0a1-16.0-1] fixup! [android] Modify add-on support
by Pier Angelo Vendrame (@pierov) 08 Dec '25

08 Dec '25
Pier Angelo Vendrame pushed to branch tor-browser-146.0a1-16.0-1 at The Tor Project / Applications / Tor Browser Commits: ec44cc24 by clairehurst at 2025-12-08T08:52:23+01:00 fixup! [android] Modify add-on support - - - - - 2 changed files: - mobile/android/fenix/app/src/main/java/org/mozilla/fenix/FenixApplication.kt - mobile/android/fenix/app/src/main/java/org/mozilla/fenix/components/TorBrowserFeatures.kt Changes: ===================================== mobile/android/fenix/app/src/main/java/org/mozilla/fenix/FenixApplication.kt ===================================== @@ -112,6 +112,7 @@ import org.mozilla.fenix.session.VisibilityLifecycleCallback import org.mozilla.fenix.settings.doh.DefaultDohSettingsProvider import org.mozilla.fenix.settings.doh.DohSettingsProvider import org.mozilla.fenix.startupCrash.StartupCrashActivity +import org.mozilla.fenix.tor.RunOnceBootstrapped import org.mozilla.fenix.utils.Settings import org.mozilla.fenix.utils.isLargeScreenSize import org.mozilla.fenix.wallpapers.Wallpaper @@ -700,8 +701,13 @@ open class FenixApplication : LocaleAwareApplication(), Provider { components.useCases.tabsUseCases.selectTab(sessionId) }, onExtensionsLoaded = { extensions -> - components.addonUpdater.registerForFutureUpdates(extensions) - subscribeForNewAddonsIfNeeded(components.supportedAddonsChecker, extensions) + // Delay until bootstrap is finished so that it will actually update tor-browser#44303 + components.torController.registerRunOnceBootstrapped(object : RunOnceBootstrapped { + override fun onBootstrapped() { + components.addonUpdater.registerForFutureUpdates(extensions) + subscribeForNewAddonsIfNeeded(components.supportedAddonsChecker, extensions) + } + }) // Bug 1948634 - Make sure the webcompat-reporter extension is fully uninstalled. // This is added here because we need gecko to load the extension first. ===================================== mobile/android/fenix/app/src/main/java/org/mozilla/fenix/components/TorBrowserFeatures.kt ===================================== @@ -18,9 +18,7 @@ import mozilla.components.concept.engine.webextension.WebExtension import mozilla.components.concept.engine.webextension.WebExtensionRuntime import mozilla.components.support.webextensions.WebExtensionSupport import mozilla.components.support.base.log.logger.Logger -import org.mozilla.fenix.ext.components import org.mozilla.fenix.ext.settings -import org.mozilla.fenix.tor.RunOnceBootstrapped object TorBrowserFeatures { private val logger = Logger("torbrowser-features") @@ -133,26 +131,5 @@ object TorBrowserFeatures { } ) } - - /** - * Enable automatic updates for NoScript and, if we've not done it yet, force a - * one-time immediate update check, in order to upgrade old profiles and ensure we've got - * the latest stable AMO version available on first startup. - * We will do it as soon as the Tor is connected, to prevent early addonUpdater activation - * causing automatic update checks failures (components.addonUpdater being a lazy prop). - * The extension, from then on, should behave as if the user had installed it manually. - */ - context.components.torController.registerRunOnceBootstrapped(object : RunOnceBootstrapped { - override fun onBootstrapped() { - // Enable automatic updates. This must be done on every startup (tor-browser#42353) - context.components.addonUpdater.registerForFutureUpdates(NOSCRIPT_ID) - // Force an immediate update check for older installations - // and as belt-and-suspenders if scheduled updates fail (tor-browser#44293) - context.components.addonUpdater.update(NOSCRIPT_ID) - settings.noscriptUpdated = 2 - } - }) } - - } View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/ec44cc2… -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/ec44cc2… You're receiving this email because of your account on gitlab.torproject.org.
1 0
0 0
  • ← Newer
  • 1
  • ...
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • ...
  • 1973
  • Older →

HyperKitty Powered by HyperKitty version 1.3.12.