boklm pushed to branch main at The Tor Project / Applications / tor-browser-build
Commits:
bd681918 by Nicolas Vigier at 2025-01-16T16:25:25+01:00
Bug 41345: Set GOTOOLCHAIN=local
- - - - -
1 changed file:
- projects/go/build
Changes:
=====================================
projects/go/build
=====================================
@@ -51,6 +51,10 @@ cd /var/tmp/dist/go/src
# so remove it to preserve reproducibility of the output.
rm -rf /var/tmp/dist/go/pkg/obj/go-build/
+# Disable go autoupdates (tor-browser-build#41345)
+# See https://go.dev/doc/toolchain
+sed -i -e 's/^GOTOOLCHAIN=.*/GOTOOLCHAIN=local/' /var/tmp/dist/go/go.env
+
cd /var/tmp/dist
[% c('tar', {
tar_src => [ project ],
View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/commit/b…
--
View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/commit/b…
You're receiving this email because of your account on gitlab.torproject.org.
morgan pushed to branch mullvad-browser-128.6.0esr-14.5-1 at The Tor Project / Applications / Mullvad Browser
Commits:
701cc572 by Pier Angelo Vendrame at 2025-01-15T15:49:07+00:00
fixup! Firefox preference overrides.
BB 41065: Hardcode the limit of storage quota.
Currently, we return min(10GB, 0.2 * available space in the fs).
This is bad for systems that have less than 50GB free, especially live
systems, such as Tails.
Set a pref to replace the available space with a hardcoded limit
(5GiB).
- - - - -
1 changed file:
- browser/app/profile/001-base-profile.js
Changes:
=====================================
browser/app/profile/001-base-profile.js
=====================================
@@ -87,6 +87,15 @@ pref("browser.sessionstore.privacy_level", 2);
// Use the in-memory media cache and increase its maximum size (#29120)
pref("browser.privatebrowsing.forceMediaMemoryCache", true);
pref("media.memory_cache_max_size", 65536);
+// tor-browser#41065: lie about the available quota.
+// This value is in KiB, and will be divided by 5. Currently: 50GiB, to be
+// coherent with Firefox's usual value. However, this might be too much for live
+// systems.
+// This will be the limit also after granting the persistent storage permission,
+// but we are not interested in it, since we support only PBM.
+// We can come back to it, and hardcode the two spaced differently, if we ever
+// think we need it.
+pref("dom.quotaManager.temporaryStorage.fixedLimit", 52428800);
// Disable restore in case of crash (tor-browser#41503)
// This should not be needed in PBM, but we added it anyway like other options.
pref("browser.sessionstore.resume_from_crash", false);
View it on GitLab: https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/701…
--
View it on GitLab: https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/701…
You're receiving this email because of your account on gitlab.torproject.org.
morgan pushed to branch base-browser-128.6.0esr-14.5-1 at The Tor Project / Applications / Tor Browser
Commits:
3a015664 by Pier Angelo Vendrame at 2025-01-15T15:47:59+00:00
fixup! Firefox preference overrides.
BB 41065: Hardcode the limit of storage quota.
Currently, we return min(10GB, 0.2 * available space in the fs).
This is bad for systems that have less than 50GB free, especially live
systems, such as Tails.
Set a pref to replace the available space with a hardcoded limit
(5GiB).
- - - - -
1 changed file:
- browser/app/profile/001-base-profile.js
Changes:
=====================================
browser/app/profile/001-base-profile.js
=====================================
@@ -87,6 +87,15 @@ pref("browser.sessionstore.privacy_level", 2);
// Use the in-memory media cache and increase its maximum size (#29120)
pref("browser.privatebrowsing.forceMediaMemoryCache", true);
pref("media.memory_cache_max_size", 65536);
+// tor-browser#41065: lie about the available quota.
+// This value is in KiB, and will be divided by 5. Currently: 50GiB, to be
+// coherent with Firefox's usual value. However, this might be too much for live
+// systems.
+// This will be the limit also after granting the persistent storage permission,
+// but we are not interested in it, since we support only PBM.
+// We can come back to it, and hardcode the two spaced differently, if we ever
+// think we need it.
+pref("dom.quotaManager.temporaryStorage.fixedLimit", 52428800);
// Disable restore in case of crash (tor-browser#41503)
// This should not be needed in PBM, but we added it anyway like other options.
pref("browser.sessionstore.resume_from_crash", false);
View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/3a01566…
--
View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/3a01566…
You're receiving this email because of your account on gitlab.torproject.org.
morgan pushed to branch tor-browser-128.6.0esr-14.5-1 at The Tor Project / Applications / Tor Browser
Commits:
3ee46ad9 by Pier Angelo Vendrame at 2025-01-15T14:13:53+00:00
fixup! Firefox preference overrides.
BB 41065: Hardcode the limit of storage quota.
Currently, we return min(10GB, 0.2 * available space in the fs).
This is bad for systems that have less than 50GB free, especially live
systems, such as Tails.
Set a pref to replace the available space with a hardcoded limit
(5GiB).
- - - - -
1 changed file:
- browser/app/profile/001-base-profile.js
Changes:
=====================================
browser/app/profile/001-base-profile.js
=====================================
@@ -87,6 +87,15 @@ pref("browser.sessionstore.privacy_level", 2);
// Use the in-memory media cache and increase its maximum size (#29120)
pref("browser.privatebrowsing.forceMediaMemoryCache", true);
pref("media.memory_cache_max_size", 65536);
+// tor-browser#41065: lie about the available quota.
+// This value is in KiB, and will be divided by 5. Currently: 50GiB, to be
+// coherent with Firefox's usual value. However, this might be too much for live
+// systems.
+// This will be the limit also after granting the persistent storage permission,
+// but we are not interested in it, since we support only PBM.
+// We can come back to it, and hardcode the two spaced differently, if we ever
+// think we need it.
+pref("dom.quotaManager.temporaryStorage.fixedLimit", 52428800);
// Disable restore in case of crash (tor-browser#41503)
// This should not be needed in PBM, but we added it anyway like other options.
pref("browser.sessionstore.resume_from_crash", false);
View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/3ee46ad…
--
View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/3ee46ad…
You're receiving this email because of your account on gitlab.torproject.org.
Pier Angelo Vendrame pushed to branch tor-browser-128.6.0esr-14.5-1 at The Tor Project / Applications / Tor Browser
Commits:
9891ea34 by clairehurst at 2025-01-14T18:24:40+00:00
[android] Bug_43351: Add function to disable forcing ALL CAPS for the fenix snackbar action button text
This is needed because the default snackbar will force all caps, which can cause problems in some languages. See tor-browser#43351 and bugzilla bug 1935387.
TODO: Remove once the forced all caps is removed by mozilla.
- - - - -
2 changed files:
- mobile/android/fenix/app/src/main/java/org/mozilla/fenix/HomeActivity.kt
- mobile/android/fenix/app/src/main/java/org/mozilla/fenix/components/FenixSnackbar.kt
Changes:
=====================================
mobile/android/fenix/app/src/main/java/org/mozilla/fenix/HomeActivity.kt
=====================================
@@ -1121,6 +1121,7 @@ open class HomeActivity : LocaleAwareAppCompatActivity(), NavHostActivity, TorIn
isDisplayedWithBrowserToolbar = true,
)
.setText(getString(R.string.connection_assist_connect_to_tor_before_opening_links))
+ .setAllCapsForActionButton(false)
.setAction(getString(R.string.connection_assist_connect_to_tor_before_opening_links_confirmation)) {
torConnectionAssistViewModel.handleConnect(searchTermOrURL)
if (navHost.navController.previousBackStackEntry?.destination?.id == R.id.torConnectionAssistFragment) {
=====================================
mobile/android/fenix/app/src/main/java/org/mozilla/fenix/components/FenixSnackbar.kt
=====================================
@@ -100,6 +100,14 @@ class FenixSnackbar private constructor(
}
}
+ /**
+ * @param textAllCaps Present the text in ALL CAPS. This may use a small-caps form when available.
+ * Overwrites the default value set in fenix_snackbar.xml
+ */
+ fun setAllCapsForActionButton(textAllCaps: Boolean) = this.apply {
+ binding.snackbarBtn.isAllCaps = textAllCaps
+ }
+
companion object {
const val LENGTH_LONG = Snackbar.LENGTH_LONG
const val LENGTH_SHORT = Snackbar.LENGTH_SHORT
View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/9891ea3…
--
View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/9891ea3…
You're receiving this email because of your account on gitlab.torproject.org.