-
e1e2b747
by Henry Wilkes at 2025-08-28T15:29:32+02:00
BB 41454: Move focus after calling openPreferences for a sub-category.
Temporary fix until mozilla bug 1799153 gets a patch upstream.
-
e6e31c85
by Henry Wilkes at 2025-08-28T15:29:33+02:00
BB 43072: Add aria label and description to moz-message-bar.
Ensures that moz-message-bar, including notifications, are announced on
Orca.
This addresses upstream bugzilla bug 1895857 and should likely be
replaced when it is fixed.
-
5453b4f4
by Henry Wilkes at 2025-08-28T15:29:33+02:00
BB 42739: Use the brand name for profile error messages.
Some messages in profileSelection.properties use gAppData->name as
variable inputs. However, gAppData->name is still "Firefox" for our
base-browser builds, rather than the user-facing browser name. We swap
these instances with the displayed brand name instead.
-
a632aa50
by Henry Wilkes at 2025-08-28T15:29:34+02:00
BB 41483: Remove the firefox override for appstrings.properties
Remove this patch after upstream bugzilla bug 1790187
-
40a7c81a
by Marco Simonelli at 2025-08-28T15:29:35+02:00
BB 41459: WebRTC fails to build under mingw (Part 1)
- properly define NOMINMAX for just MSVC builds
-
c97ea65d
by Marco Simonelli at 2025-08-28T15:30:23+02:00
BB 41459: WebRTC fails to build under mingw (Part 2)
- fixes required to build third_party/libwebrtc
-
e26b89ea
by Marco Simonelli at 2025-08-28T15:30:26+02:00
BB 41459: WebRTC fails to build under mingw (Part 3)
- fixes required to build third_party/sipcc
-
a4aa224e
by Marco Simonelli at 2025-08-28T15:30:27+02:00
BB 41459: WebRTC fails to build under mingw (Part 4)
- fixes requried to build netwerk/sctp
-
0e44237d
by Marco Simonelli at 2025-08-28T18:54:23+02:00
BB 41459: WebRTC fails to build under mingw (Part 5)
- fixes required to build dom/media/webrtc
-
7a5fcc49
by Marco Simonelli at 2025-08-28T18:54:24+02:00
BB 41459: WebRTC fails to build under mingw (Part 6)
- fixes required to build dom/media/systemservices
-
db9c9201
by june wilde at 2025-08-28T18:54:25+02:00
BB 42758: Fix WebRTC build errors.
-
64f0da68
by hackademix at 2025-08-28T18:54:25+02:00
BB 41854: Allow overriding download spam protection.
-
45fd3c62
by hackademix at 2025-08-28T18:54:26+02:00
BB 42832: Download spam prevention exemption for browser extensions.
-
0b808fb7
by Pier Angelo Vendrame at 2025-08-28T18:54:27+02:00
BB 42220: Allow for more file types to be forced-inline.
Firefox allows to open some files in the browser without any
confirmation, but this will result in a disk leak, because the file will
be downloaded to the temporary directory first (and not deleted, in some
cases).
A preference allows PDFs to be opened without being downloaded to disk.
So, we introduce a similar one to do the same for all the files that are
set to be opened automatically in the browser.
-
491be95b
by hackademix at 2025-09-15T15:43:51+02:00
fixup! BB 42220: Allow for more file types to be forced-inline.
This reverts commit 90dbc9451a30f7d68384e26fe38517534bf7e302.
-
01ee2fb2
by Pier Angelo Vendrame at 2025-09-15T15:43:59+02:00
BB 42220: Allow for more file types to be forced-inline.
Firefox allows to open some files in the browser without any
confirmation, but this will result in a disk leak, because the file will
be downloaded to the temporary directory first (and not deleted, in some
cases).
A preference allows PDFs to be opened without being downloaded to disk.
So, we introduce a similar one to do the same for all the files that are
set to be opened automatically in the browser, except svg and html files
to prevent XSS hazards (see BB 43211).
-
0ff6310c
by Beatriz Rizental at 2025-09-15T15:43:59+02:00
fixup! BB 42220: Allow for more file types to be forced-inline.
Fix lints.
-
5a77f529
by hackademix at 2025-09-15T15:44:00+02:00
BB 42835: Create an actor to filter file data transfers
-
a1d281f4
by Pier Angelo Vendrame at 2025-09-15T15:44:00+02:00
BB 44103: Remove ref-names from attr's .git_archival.txt.
The currently vendored copy of python-attrs's .git_archival.txt
includes a ref-names field which might make source tarballs not
reproducible.
Upstream fixed this in da2333cd37747d692d5c78b0c94bd400ff883a9a,
therefore we apply the same change until Mozilla vendors an updated
copy of python-attrs.
See also https://bugzilla.mozilla.org/show_bug.cgi?id=1980103.
-
a8c5f084
by Pier Angelo Vendrame at 2025-09-15T15:44:00+02:00
BB 43664: Automatically check the PBM checkbox when in always-on PBM.
-
e5950149
by hackademix at 2025-09-15T15:44:01+02:00
BB 44125: Do not offer to save signatures by default in Private Browsing Mode
-
a09cdb2b
by Beatriz Rizental at 2025-09-15T15:44:01+02:00
BB 43564: Modify ./mach bootstrap for Base Browser
-
4c3a76bd
by Beatriz Rizental at 2025-09-15T15:44:01+02:00
fixup! BB 43564: Modify ./mach bootstrap for Base Browser
EXTRA: Stop asking to configure git during bootstrap.
-
29f7c79e
by Beatriz Rizental at 2025-09-15T15:44:02+02:00
fixup! BB 43564: Modify ./mach bootstrap for Base Browser
-
1d4dfdf3
by Beatriz Rizental at 2025-09-15T15:44:02+02:00
fixup! BB 43564: Modify ./mach bootstrap for Base Browser
-
6ede41ce
by Beatriz Rizental at 2025-09-15T15:44:02+02:00
fixup! BB 43564: Modify ./mach bootstrap for Base Browser
-
807b3321
by Beatriz Rizental at 2025-09-15T15:44:03+02:00
BB 42728: Modify ./mach lint to skip unused linters
-
e5389748
by Morgan at 2025-09-15T15:44:03+02:00
BB 43615: Add Gitlab Issue and Merge Request templates
-
78336715
by Morgan at 2025-09-15T15:44:04+02:00
fixup! BB 43615: Add Gitlab Issue and Merge Request templates
update branch creation section now that we have tags from the firefox repo
-
7b9472cb
by Morgan at 2025-09-15T15:44:04+02:00
fixup! BB 43615: Add Gitlab Issue and Merge Request templates
Update priority labels
-
f40df9dc
by Morgan at 2025-09-15T15:44:04+02:00
fixup! BB 43615: Add Gitlab Issue and Merge Request templates
add Apps::Impact::High label to release prep issues
-
bf5fbb96
by Morgan at 2025-09-15T15:44:05+02:00
fixup! BB 43615: Add Gitlab Issue and Merge Request templates
Bug 43534: Update rebase templates
-
4d6fa5d6
by Henry Wilkes at 2025-09-15T15:44:05+02:00
BB 41803: Add some developer tools for working on tor-browser.
-
48570fb5
by Beatriz Rizental at 2025-09-15T15:44:05+02:00
fixup! BB 41803: Add some developer tools for working on tor-browser.
-
68a83228
by Richard Pospesel at 2025-09-15T15:44:06+02:00
BB 42683: Create script to generate issue triage csv file from bugzilla query and git logs
-
a1475dec
by Henry Wilkes at 2025-09-15T15:44:06+02:00
BB 42305: Add script to combine translation files across versions.
-
cad7e1d6
by Beatriz Rizental at 2025-09-15T15:44:07+02:00
fixup! BB 42305: Add script to combine translation files across versions.
-
cd6caa16
by Beatriz Rizental at 2025-09-15T15:44:07+02:00
BB 43535: Enable tests
-
1387854a
by Beatriz Rizental at 2025-09-15T15:44:07+02:00
Add CI for Base Browser
-
64039601
by Beatriz Rizental at 2025-09-15T15:44:08+02:00
fixup! Add CI for Base Browser
-
474e9868
by Beatriz Rizental at 2025-09-15T15:44:08+02:00
fixup! Add CI for Base Browser
Run all of our python tests everytime.
This is a quick workaround for tests to pass, before I address it
properly in tor-browser#44149
-
efe621bc
by Pier Angelo Vendrame at 2025-09-15T15:44:09+02:00
Base Browser's .mozconfigs.
Bug 17858: Cannot create incremental MARs for hardened builds.
Define HOST_CFLAGS, etc. to avoid compiling programs such as mbsdiff
(which is part of mar-tools and is not distributed to end-users) with
ASan.
Bug 21849: Don't allow SSL key logging.
Bug 25741 - TBA: Disable features at compile-time
Define MOZ_ANDROID_NETWORK_STATE and MOZ_ANDROID_LOCATION
Bug 27623 - Export MOZILLA_OFFICIAL during desktop builds
This fixes a problem where some preferences had the wrong default value.
Also see bug 27472 where we made a similar fix for Android.
Bug 29859: Disable HLS support for now
Bug 30463: Explicitly disable MOZ_TELEMETRY_REPORTING
Bug 32493: Disable MOZ_SERVICES_HEALTHREPORT
Bug 33734: Set MOZ_NORMANDY to False
Bug 33851: Omit Parental Controls.
Bug 40252: Add --enable-rust-simd to our tor-browser mozconfig files
Bug 41584: Move some configuration options to base-browser level
-
00975647
by Pier Angelo Vendrame at 2025-09-15T15:44:09+02:00
Tweaks to the build system
Bug 40857: Modified the fat .aar creation file
This is a workaround to build fat .aars with the compiling enviornment
disabled.
Mozilla does not use a similar configuration, but either runs a Firefox
build and discards its output, or uses artifacts build.
We might switch to artifact builds too, and drop this patch, or write a
better one to upstream. But until then we need this patch.
See also https://bugzilla.mozilla.org/show_bug.cgi?id=1763770.
Bug 41458: Prevent `mach package-multi-locale` from actually creating a package
macOS builds need some files to be moved around with
./mach package-multi-locale to create multi-locale packages.
The required command isn't exposed through any other mach command.
So, we patch package-multi-locale both to prevent it from failing when
doing official builds and to detect any future changes on it.
-
71867150
by Pier Angelo Vendrame at 2025-09-15T15:44:09+02:00
BB 29320: Replace the gnu target with gnullvm for Rust.
-
d5df5659
by Pier Angelo Vendrame at 2025-09-15T15:44:10+02:00
BB 42616: Remove VideoCaptureTest.kt.
This is a workaround to fix the GeckoView build with WebRTC disabled.
We should replace this workaround with a proper solution, that
excludes this test when MOZ_WEBRTC is undefined/False.
-
4e9382c5
by Pier Angelo Vendrame at 2025-09-15T15:44:10+02:00
BB 41108: Remove privileged macOS installation from 102
-
cf490e4e
by Dan Ballard at 2025-09-15T15:44:10+02:00
BB 41149: Re-enable DLL injection protection in all builds not just nightlies
-
1f604c62
by Henry Wilkes at 2025-09-15T15:44:11+02:00
BB 43092: Disable wayland by default in Base Browser.
-
cfb3222e
by Matthew Finkel at 2025-09-15T15:44:11+02:00
BB 24796: Comment out excess permissions from GeckoView
The GeckoView AndroidManifest.xml is not preprocessed unlike Fennec's
manifest, so we can't use the ifdef preprocessor guards around the
permissions we do not want. Commenting the permissions is the
next-best-thing.
-
03c99019
by Matthew Finkel at 2025-09-15T15:44:12+02:00
BB 28125: Prevent non-Necko network connections
-
9d577842
by Mike Perry at 2025-09-15T15:44:12+02:00
BB 12974: Disable NTLM and Negotiate HTTP Auth
The Mozilla bugs: https://bugzilla.mozilla.org/show_bug.cgi?id=1046421,
https://bugzilla.mozilla.org/show_bug.cgi?id=1261591, tor-browser#27602
-
c7f5a212
by cypherpunks1 at 2025-09-15T15:44:12+02:00
BB 40717: Hide Windows SSO in settings
-
11943575
by Georg Koppen at 2025-09-15T15:44:13+02:00
BB 16285: Exclude ClearKey system for now
In the past the ClearKey system had not been compiled when specifying
--disable-eme. But that changed and it is even bundled nowadays (see:
Mozilla's bug 1300654). We don't want to ship it right now as the use
case for it is not really visible while the code had security
vulnerabilities in the past.
-
52c42412
by Kathy Brade at 2025-09-15T15:44:13+02:00
BB 21431: Clean-up system extensions shipped in Firefox
Only ship the pdfjs extension.
-
4c2dcc80
by Kathy Brade at 2025-09-15T15:44:13+02:00
BB 33852: Clean up about:logins (LockWise) to avoid mentioning sync, etc.
Hide elements on about:logins that mention sync, "Firefox LockWise", and
Mozilla's LockWise mobile apps.
Disable the "Create New Login" button when security.nocertdb is true.
-
fe238ae7
by Henry Wilkes at 2025-09-15T15:44:14+02:00
fixup! BB 33852: Clean up about:logins (LockWise) to avoid mentioning sync, etc.
TB 44128: Fix about:logins to be able to hard disable the "new-login-button".
-
b7eb2601
by Alex Catarineu at 2025-09-15T15:44:14+02:00
BB 41457: Remove Mozilla permissions
Bug 40025: Remove Mozilla add-on install permissions
-
11c13def
by Henry Wilkes at 2025-09-15T15:44:14+02:00
BB 44045: Disable ML features.
-
1fb0e708
by Henry Wilkes at 2025-09-15T15:44:15+02:00
fixup! BB 44045: Disable ML features.
TB 44045: Moved changes to the correct target.
-
8bada149
by Beatriz Rizental at 2025-09-15T15:44:15+02:00
fixup! BB 44045: Disable ML features.
Remove usage of deleted GenAI module.
-
c67c9515
by Kathy Brade at 2025-09-15T15:44:16+02:00
BB 41662: Disable about:sync-logs
Even though we disable sync by default with
`identity.fxaccounts.enabled`, this about: page is still avilable.
We could throw an exception on the constructor of the related
component, but it would result only in an error in the console, without
a visible "this address does not look right" error page.
If we fix the issues with MOZ_SERVICES_SYNC, we can restore the
component.
-
bdf602d3
by Morgan at 2025-09-15T15:44:16+02:00
BB 42716: Disable unwanted about: pages
-
01629407
by Pier Angelo Vendrame at 2025-09-15T15:44:16+02:00
fixup! BB 42716: Disable unwanted about: pages
BB 43795: Restore the URL classifier XPCOM components.
Move the commit where we disable about:urlclassifier.
-
d34fb7e0
by Arthur Edelstein at 2025-09-15T15:44:17+02:00
BB 26353: Prevent speculative connect that violated FPI.
Connections were observed in the catch-all circuit when
the user entered an https or http URL in the URL bar, or
typed a search term.
-
18764fd5
by Alex Catarineu at 2025-09-15T15:44:17+02:00
BB 31740: Remove some unnecessary RemoteSettings instances
More concretely, SearchService.jsm 'hijack-blocklists' and
url-classifier-skip-urls.
Avoid creating instance for 'anti-tracking-url-decoration'.
If prefs are disabling their usage, avoid creating instances for
'cert-revocations' and 'intermediates'.
Do not ship JSON dumps for collections we do not expect to need. For
the ones in the 'main' bucket, this prevents them from being synced
unnecessarily (the code in remote-settings does so for collections
in the main bucket for which a dump or local data exists). For the
collections in the other buckets, we just save some size by not
shipping their dumps.
We also clear the collections database on the v2 -> v3 migration.
-
bfd4edea
by Pier Angelo Vendrame at 2025-09-15T15:44:17+02:00
fixup! BB 31740: Remove some unnecessary RemoteSettings instances
BB 43795: Restore the URL classifier XPCOM components.
We are not really interested in removing them.
We're interested in them not calling Mozilla.
However, we have a central patch for RemoteSettings, so we do not need
to patch the single user.
Or, if we did, at least we should patch
UrlClassifierExceptionListService where it creates its RemoteSettings
instance.
-
9c447e5e
by cypherpunks1 at 2025-09-15T15:44:18+02:00
BB 41092: Add a RemoteSettings JSON dump for query-stripping
-
0d997a55
by cypherpunks1 at 2025-09-15T15:44:18+02:00
BB 42730: Patch RemoteSettings to use only local dumps as a data source
-
7bfb34f2
by Pier Angelo Vendrame at 2025-09-15T15:44:19+02:00
fixup! BB 42730: Patch RemoteSettings to use only local dumps as a data source
Make explicit that blanking REMOTE_SETTINGS_SERVER_URL is our change.
-
c46918dc
by Pier Angelo Vendrame at 2025-09-15T15:44:19+02:00
BB 43525: Skip Remote Settings for search engine customization.
Also, add some bundled search engines.
-
a78adeff
by Beatriz Rizental at 2025-09-15T15:44:19+02:00
fixup! BB 43525: Skip Remote Settings for search engine customization.
-
716aab2d
by Pier Angelo Vendrame at 2025-09-15T15:44:20+02:00
BB 41635: Disable the Normandy component
Do not include Normandy at all whenever MOZ_NORMANDY is False.
-
d858df14
by Georg Koppen at 2025-09-15T15:44:20+02:00
BB 30541: Disable WebGL readPixel() for web content
Related Bugzilla: https://bugzilla.mozilla.org/show_bug.cgi?id=1428034
-
e23d7505
by Alex Catarineu at 2025-09-15T15:44:20+02:00
BB 28369: Stop shipping pingsender executable
-
c34c3186
by Henry Wilkes at 2025-09-15T15:44:21+02:00
BB 42630: Disable LaterRun module.
-
81717a8c
by Pier Angelo Vendrame at 2025-09-15T15:44:21+02:00
BB 41599: Always return an empty string as network ID
Firefox computes an internal network ID used to detect network changes
and act consequently (e.g., to improve WebSocket UX).
However, there are a few ways to get this internal network ID, so we
patch them out, to be sure any new code will not be able to use them and
possibly link users.
We also sent a patch to Mozilla to seed the internal network ID, to
prevent any accidental leak in the future.
Upstream: https://bugzilla.mozilla.org/show_bug.cgi?id=1817756
-
a38a2334
by Pier Angelo Vendrame at 2025-09-15T15:44:22+02:00
BB 43386: Use Firefox in the UA in RFP-exempt request.
XHR requests initiated by extensions are exempt from RFP.
Therefore, they report the actual app name, instead of Firefox, and the
actual Firefox minor version.
This happens whenever the app name has been customized and does not
match a hardcoded "Firefox".
-
c68e5633
by Richard Pospesel at 2025-09-15T15:44:22+02:00
BB 41327: Disable UrlbarProviderInterventions
-
e0d23fa8
by Richard Pospesel at 2025-09-15T15:44:22+02:00
BB 42037: Disable about:firefoxview page
-
a2d3fc3a
by Henry Wilkes at 2025-09-15T15:44:23+02:00
fixup! BB 42037: Disable about:firefoxview page
TB 43726: Drop comments about resolved bugzilla issues.
-
15ea5a4a
by Beatriz Rizental at 2025-09-15T15:44:23+02:00
fixup! BB 42037: Disable about:firefoxview page
Fix lints.
-
592cd753
by Mike Perry at 2025-09-15T15:44:24+02:00
Firefox preference overrides.
-
4526123d
by Henry Wilkes at 2025-09-15T15:44:24+02:00
fixup! Firefox preference overrides.
TB 44045: Disable ML features.
-
b607c642
by Pier Angelo Vendrame at 2025-09-15T15:44:24+02:00
fixup! Firefox preference overrides.
BB 41131: Make sure background tasks are not used for shutdown cleanup.
privacy.sanitize.sanitizeOnShutdown (disabled by default) might try to
use background tasks, without checking whether they are actually
available (they are not for us, as we disable them at build time).
-
a327cda5
by Beatriz Rizental at 2025-09-15T15:44:25+02:00
fixup! Firefox preference overrides.
-
f27e417c
by Beatriz Rizental at 2025-09-15T15:44:25+02:00
fixup! Firefox preference overrides.
-
e5845ded
by Pier Angelo Vendrame at 2025-09-15T15:44:26+02:00
fixup! Firefox preference overrides.
BB 43950: Disable HEVC.
HEVC support can be used for fingerprinting, as it's hardware-dependent
on some systems, or depends on distribution support/installed packages
for Linux.
-
d1fb5cf9
by Pier Angelo Vendrame at 2025-09-15T15:44:26+02:00
fixup! Firefox preference overrides.
BB 43959: Switch to Noto Color Emoji on Linux and Windows.
It has better compatibility than Twemoji Mozilla and upstream also did
it in Bug 1939359 (for Linux).
We don't use Segoe UI Emoji on Windows, so we enable Noto Color Emoji
also on Windows.
-
2d289208
by Pier Angelo Vendrame at 2025-09-15T15:44:26+02:00
BB 43140: Tighten up fonts on Linux.
We ship a fontconfig configuration to esnure all Linux users have the
same defaults and reduce the chances of fingerprinting.
We used to add this file in tor-browser-build, but some users might
skip it by using the browser executable without the wrapper script.
Therefore, we decided to activate the file with the FontConfig API
instead of the environment variables.
Bug 41043: Hardcode the UI font on Linux
The mechanism to choose the UI font does not play well with our
fontconfig configuration. As a result, the final criterion to choose
the font for the UI was its version.
Since we hardcode Arimo as a default sans-serif on preferences, we use
it also for the UI. FontConfig will fall back to some other font for
scripts Arimo does not cover as expected (we tested with Japanese).
Bug 43141: Hardcode system-ui to Arimo.
-
3f55f2b6
by Pier Angelo Vendrame at 2025-09-15T15:44:27+02:00
BB 43322: Customize the font visibility lists.
Customize the lists of fonts to assign base visibility to in
base browser and derivatives.
Also, rename the files with the upstream lists, to make sure we do not
use them by mistake.
-
ae9a5e75
by Alex Catarineu at 2025-09-15T15:44:27+02:00
BB 30605: Honor privacy.spoof_english in Android
This checks `privacy.spoof_english` whenever `setLocales` is
called from Fenix side and sets `intl.accept_languages`
accordingly.
Bug 40198: Expose privacy.spoof_english pref in GeckoView
-
c37a4244
by Pier Angelo Vendrame at 2025-09-15T15:44:28+02:00
BB 42562: Normalized the Accepted Languages on Android.
The OS language might be outside the list of actually supported
languages and it might leak the user's region.
Therefore, we force the locale reported in Accept-Language to match one
we support with translations, even when it means using a not exact
region tag.
-
b7de4593
by Alex Catarineu at 2025-09-15T15:44:28+02:00
BB 40171: Make WebRequest and GeckoWebExecutor First-Party aware
-
31736391
by Alex Catarineu at 2025-09-15T15:44:28+02:00
BB 26345: Hide tracking protection UI
-
4e8a53c9
by Henry Wilkes at 2025-09-15T15:44:29+02:00
BB 43109: Hide Firefox Relay from settings.
This should remain disabled, see tor-browser#42814.
-
71648670
by Henry Wilkes at 2025-09-15T15:44:29+02:00
BB 42777: Hide Website Privacy Preferences.
We hide the Website Privacy Preferences section, which controls the
"global privacy control" (GPC) and "do not track" (DNT) settings.
-
5af20705
by Morgan at 2025-09-15T15:44:30+02:00
BB 42070: Hide "Use smooth scrolling" from settings
-
b0045fab
by Arthur Edelstein at 2025-09-15T15:44:30+02:00
BB 18905: Hide unwanted items from help menu
Bug 25660: Remove the "New Private Window" option
-
73f9c2bc
by Henry Wilkes at 2025-09-15T15:44:30+02:00
fixup! BB 18905: Hide unwanted items from help menu
TB 43903: Hide "Report broken site" items.
-
7c3c2cfb
by Pier Angelo Vendrame at 2025-09-15T15:44:31+02:00
BB 41739: Remove "Website appearance" from about:preferences.
It is ignored because of RFP and it is confusing for users.
-
389fe783
by Henry Wilkes at 2025-09-15T15:44:31+02:00
BB 43117: Hide "Always underline links" from settings.
-
458bec11
by Pier Angelo Vendrame at 2025-09-15T15:44:32+02:00
BB 42774: Always hide the third-pary certs UI.
-
8af9291d
by Henry Wilkes at 2025-09-15T15:44:32+02:00
BB 43118: Hide feature recommendation (CFR) settings.
-
7aff1498
by Pier Angelo Vendrame at 2025-09-15T15:44:32+02:00
BB 9173: Change the default Firefox profile directory to be relative.
This commit makes Firefox look for the default profile directory in a
directory relative to the binary path.
The directory can be specified through the --with-relative-data-dir.
This is relative to the same directory as the firefox main binary for
Linux and Windows.
On macOS, we remove Contents/MacOS from it.
Or, in other words, the directory is relative to the application
bundle.
This behavior can be overriden at runtime, by placing a file called
system-install adjacent to the firefox main binary (also on macOS).
-
6960a903
by Pier Angelo Vendrame at 2025-09-15T15:44:33+02:00
BB 42773: Replace ~ with the original home.
In Bug 93141, Mozilla started sending users to their home when they type
~ in the URL bar.
On Linux, we change $HOME for various reason, therefore you would be
redirected to the spoofed home directory when typing ~.
So, we check if the original home directory is known, and use that,
instead.
-
7e25452f
by Alex Catarineu at 2025-09-15T15:44:33+02:00
BB 27604: Fix addon issues when moving the profile directory
Bugzilla: https://bugzilla.mozilla.org/show_bug.cgi?id=1429838
-
979bc917
by Mike Perry at 2025-09-15T15:44:33+02:00
BB 13028: Prevent potential proxy bypass cases.
It looks like these cases should only be invoked in the NSS command line
tools, and not the browser, but I decided to patch them anyway because there
literally is a maze of network function pointers being passed around, and it's
very hard to tell if some random code might not pass in the proper proxied
versions of the networking code here by accident.
Bugzilla: https://bugzilla.mozilla.org/show_bug.cgi?id=1433509
-
5a7f4237
by Pier Angelo Vendrame at 2025-09-15T15:44:34+02:00
BB 40309: Avoid using regional OS locales
Avoid regional OS locales if the pref
`intl.regional_prefs.use_os_locales` is false but RFP is enabled.
-
f64cacd1
by Matthew Finkel at 2025-09-15T15:44:34+02:00
BB 40432: Prevent probing installed applications
Bugzilla: https://bugzilla.mozilla.org/show_bug.cgi?id=1711084
-
6c519749
by Henry Wilkes at 2025-09-15T15:44:35+02:00
BB 29745: Limit remote access to content accessible resources
-
6f88d656
by cypherpunks1 at 2025-09-15T15:44:35+02:00
BB 33955: When copying an image only copy the image contents to the clipboard
-
4fb76718
by cypherpunks1 at 2025-09-15T15:44:35+02:00
BB 41791: Omit the source URL when copying page contents to the clipboard
-
d1317f5b
by Pier Angelo Vendrame at 2025-09-15T15:44:36+02:00
BB 43196: Remove the vendor name from media notifications on Linux.
Firefox shows "vendor remoteName" as a title of the "... is playing
media" notification on Linux.
However, for our browser the remote name is enough, and prepending the
vendor to it creates a string users usually never see.
-
51077c3b
by Pier Angelo Vendrame at 2025-09-15T15:44:36+02:00
Base Browser strings
This commit adds all the strings needed by following Base Browser
patches.
-
ed4658d5
by Henry Wilkes at 2025-09-15T15:44:37+02:00
fixup! Base Browser strings
TB 44030: Add strings for the new security level warning dialog.
-
f880384c
by Henry Wilkes at 2025-09-15T15:44:37+02:00
fixup! Base Browser strings
TB 44034: Update new identity checkbox string.
-
b820897c
by Henry Wilkes at 2025-09-15T15:44:37+02:00
BB 42583: Modify moz-support-link for Base Browser.
-
f1cd399b
by Pier Angelo Vendrame at 2025-09-15T15:44:38+02:00
BB 41369: Improve Firefox language settings for multi-lingual packages
Change the language selector to be sorted by language code, rather than
name, and to display the language code to the user.
Bug 41372: Handle Japanese as a special case in preferences on macOS
Japanese is treated in a special way on macOS. However, seeing the
Japanese language tag could be confusing for users, and moreover the
language name is not localized correctly like other langs.
Bug 41378: Tell users that they can change their language at the first start
With multi-lingual builds, Tor Browser matches the user's system
language, but some users might want to change it.
So, we tell them that it is possible, but only once.
-
ece149cc
by p13dz at 2025-09-15T15:44:38+02:00
BB 40283: Workaround for the file upload bug
-
23d93e08
by hackademix at 2025-09-15T15:44:38+02:00
BB 42019: Empty browser's clipboard on browser shutdown
-
45fc7353
by Pier Angelo Vendrame at 2025-09-15T15:44:39+02:00
fixup! BB 42019: Empty browser's clipboard on browser shutdown
BB 43770: Follow upstream's BrowserGlue simplifications.
ClipboardPrivacy to its own file and initialize it from the manifest,
rather than from BrowserGlue.
-
8fbabebe
by hackademix at 2025-09-15T15:44:39+02:00
BB 42084: Ensure English spoofing works even if preferences are set out of order.
-
fdb2c527
by Pier Angelo Vendrame at 2025-09-15T15:44:40+02:00
BB 41930: Remove the UI to customize accept_languages.
-
f66bd7b3
by hackademix at 2025-09-15T15:44:40+02:00
BB 32308: Use direct browser sizing for letterboxing.
Bug 30556: align letterboxing with 200x100 new win width stepping
-
3000aba3
by hackademix at 2025-09-15T15:44:40+02:00
fixup! BB 32308: Use direct browser sizing for letterboxing.
BB 44041: Make dialog overlays cover the correct area without fixed positioning.
-
64c2615e
by hackademix at 2025-09-15T15:44:41+02:00
BB 41631: Prevent weird initial window dimensions caused by subpixel computations
-
17e8a181
by hackademix at 2025-09-15T15:44:41+02:00
BB 41918: Option to reuse last window size when letterboxing is enabled.
-
a737babe
by hackademix at 2025-09-15T15:44:42+02:00
BB 41916: Letterboxing preferences UI
-
c6f98fb9
by hackademix at 2025-09-15T15:44:42+02:00
BB 41695: Warn on window maximization without letterboxing in RFPHelper module
-
f8db6563
by hackademix at 2025-09-15T15:44:42+02:00
BB 42443: Shrink window to match letterboxing size when the emtpy area is clicked.
-
8fdf9651
by hackademix at 2025-09-15T15:44:43+02:00
BB 41919: Letterboxing, add temporarily visible web content-size indicator on window resizing.
-
71cb7b20
by Henry Wilkes at 2025-09-15T15:44:43+02:00
BB 42528: Don't leak system scrollbar size on windows.
-
8cc031ad
by Henry Wilkes at 2025-09-15T15:44:44+02:00
BB 31575: Disable Firefox Home (Activity Stream)
Treat about:blank as the default home page and new tab page.
BB 43886: Disable the newtab component/addon.
Bug 41624: Disable about:pocket-* pages.
Bug 40144: Redirect about:privatebrowsing to the user's home
-
bf7190f4
by Kathy Brade at 2025-09-15T15:44:44+02:00
BB 4234: Use the Firefox Update Process for Base Browser.
Windows: disable "runas" code path in updater (15201).
Windows: avoid writing to the registry (16236).
Also includes fixes for tickets 13047, 13301, 13356, 13594, 15406,
16014, 16909, 24476, and 25909.
Also fix bug 27221: purge the startup cache if the Base Browser
version changed (even if the Firefox version and build ID did
not change), e.g., after a minor Base Browser update.
Also fix 32616: Disable GetSecureOutputDirectoryPath() functionality.
Bug 26048: potentially confusing "restart to update" message
Within the update doorhanger, remove the misleading message that mentions
that windows will be restored after an update is applied, and replace the
"Restart and Restore" button label with an existing
"Restart to update Tor Browser" string.
Bug 28885: notify users that update is downloading
Add a "Downloading Base Browser update" item which appears in the
hamburger (app) menu while the update service is downloading a MAR
file. Before this change, the browser did not indicate to the user
that an update was in progress, which is especially confusing in
Tor Browser because downloads often take some time. If the user
clicks on the new menu item, the about dialog is opened to allow
the user to see download progress.
As part of this fix, the update service was changed to always show
update-related messages in the hamburger menu, even if the update
was started in the foreground via the about dialog or via the
"Check for Tor Browser Update" toolbar menu item. This change is
consistent with the Tor Browser goal of making sure users are
informed about the update process.
Removed #28885 parts of this patch which have been uplifted to Firefox.
-
3cd66cb9
by Pier Angelo Vendrame at 2025-09-15T15:44:44+02:00
BB 42061: Create an alpha update channel.
-
4ee7b8c0
by Nicolas Vigier at 2025-09-15T15:44:45+02:00
BB 41682: Add base-browser nightly mar signing key
-
60af3006
by Pier Angelo Vendrame at 2025-09-15T15:44:45+02:00
BB 41603: Customize the creation of MOZ_SOURCE_URL
MOZ_SOURCE_URL is created by combining MOZ_SOURCE_REPO and
MOZ_SOURCE_CHANGESET.
But the code takes for granted that it refers to a Hg instance, so it
combines them as `$MOZ_SOURCE_REPO/rev/$MOZ_SOURCE_CHANGESET`.
With this commit, we change this logic to combine them to create a URL
that is valid for GitLab.
$MOZ_SOURCE_CHANGESET needs to be a commit hash, not a branch or a tag.
If that is needed, we could use /-/tree/, instead of /-/commit/.
-
d98d8677
by Pier Angelo Vendrame at 2025-09-15T15:44:45+02:00
BB 42438: Tweaks to the migration wizard.
Remove the items not compatible with our features (such as history) from
the migration wizard.
On Linux, allow to specify an alternative home directory, since we
usually change $HOME in our startup script.
-
eb187e2d
by Alex Catarineu at 2025-09-15T15:44:46+02:00
BB 40069: Add helpers for message passing with extensions
-
eb933ccd
by Matthew Finkel at 2025-09-15T15:44:46+02:00
BB 41598: Prevent NoScript from being removed/disabled.
Bug 40253: Explicitly allow NoScript in Private Browsing mode.
-
d4fe88ed
by Henry Wilkes at 2025-09-15T15:44:47+02:00
BB 41581: Hide NoScript extension's toolbar button by default.
This hides it from both the toolbar and the unified extensions panel.
We also hide the unified-extension-button if the panel would be empty:
not including the NoScript button when it is hidden. As a result, this
will be hidden by default until a user installs another extension (or
shows the NoScript button and unpins it).
-
0d14d4a7
by hackademix at 2025-09-15T15:44:47+02:00
BB 41834: Hide "Can't Be Removed - learn more" menu line for uninstallable add-ons
-
9f18525e
by Henry Wilkes at 2025-09-15T15:44:47+02:00
BB 41736: Customize toolbar for base-browser.
-
9a5933b1
by Henry Wilkes at 2025-09-15T15:44:48+02:00
BB 43864: Modify the urlbar for Base Browser.
-
b4b0021d
by Henry Wilkes at 2025-09-15T15:44:48+02:00
BB 44040: Modify prompt service for Base Browser.
-
cfaa83a7
by Henry Wilkes at 2025-09-15T15:44:48+02:00
BB 43902: Modify the new sidebar for Base Browser.
-
b103867f
by Pier Angelo Vendrame at 2025-09-15T15:44:49+02:00
BB 40925: Implemented the Security Level component
This component adds a new Security Level toolbar button which visually
indicates the current global security level via icon (as defined by the
extensions.torbutton.security_slider pref), a drop-down hanger with a
short description of the current security level, and a new section in
the about:preferences#privacy page where users can change their current
security level. In addition, the hanger and the preferences page will
show a visual warning when the user has modified prefs associated with
the security level and provide a one-click 'Restore Defaults' button to
get the user back on recommended settings.
Bug 40125: Expose Security Level pref in GeckoView
-
971755aa
by Henry Wilkes at 2025-09-15T15:44:49+02:00
fixup! BB 40925: Implemented the Security Level component
TB 44030: Show a warning before restarting the browser when applying a
new security level.
Also adapt the existing warning to use a destructive button and the
button "Restart Tor Browser" rather than just "Restart".
-
a7e07f9f
by Pier Angelo Vendrame at 2025-09-15T15:44:50+02:00
fixup! BB 40925: Implemented the Security Level component
BB 43770: Follow upstream's BrowserGlue simplifications.
Initialize the security level notification from the manifest.
Also, since it was the only occurrence of the file path, move it to the
moz-src:// scheme.
-
738fc75c
by Henry Wilkes at 2025-09-15T15:44:50+02:00
fixup! BB 40925: Implemented the Security Level component
TB 43966: Add a warning notification for users when they enter the
custom security level state.
-
f52775c6
by Pier Angelo Vendrame at 2025-09-15T15:44:50+02:00
BB 40926: Implemented the New Identity feature
-
90b428f5
by Henry Wilkes at 2025-09-15T15:44:51+02:00
fixup! BB 40926: Implemented the New Identity feature
TB 44034: Update new identity checkbox string.
TB 44040: Use the prompt API for new identity.
-
b0778dd8
by Beatriz Rizental at 2025-09-15T15:44:51+02:00
fixup! BB 40926: Implemented the New Identity feature
-
fbb9010d
by Pier Angelo Vendrame at 2025-09-15T15:44:52+02:00
BB 42027: Base Browser migration procedures.
This commit implmenents the the Base Browser's version of _migrateUI.
-
582d2b15
by Henry Wilkes at 2025-09-15T15:44:52+02:00
fixup! BB 42027: Base Browser migration procedures.
TB 44045: Clear the user values for the now locked ML preferences.
-
2f869b97
by Pier Angelo Vendrame at 2025-09-15T15:44:52+02:00
fixup! BB 42027: Base Browser migration procedures.
BB 43770: Follow upstream's BrowserGlue simplifications.
-
2f28dbc6
by Henry Wilkes at 2025-09-15T15:44:53+02:00
TB 42308: Create README for tor-browser.
We drop the README.txt that comes from Mozilla Firefox and add README.md
for tor-browser.
-
c527788d
by Morgan at 2025-09-15T15:44:53+02:00
fixup! TB 42308: Create README for tor-browser.
Links in the README pointed to a 404 page with no indication of the new
location of these pages.
Update both links.
Fixes: tpo/applications/tor-browser#44061
-
51543898
by Morgan at 2025-09-15T15:44:53+02:00
TB 43616: Customize Gitlab Issue and Merge Request templates
-
98035501
by Morgan at 2025-09-15T15:44:54+02:00
fixup! TB 43616: Customize Gitlab Issue and Merge Request templates
update the triage issue to be a general review issue; include release notes in review
-
ff85918f
by Morgan at 2025-09-15T15:44:54+02:00
fixup! TB 43616: Customize Gitlab Issue and Merge Request templates
Update priority labels
-
10811db6
by Morgan at 2025-09-15T15:44:55+02:00
fixup! TB 43616: Customize Gitlab Issue and Merge Request templates
add Tor Browser 16.0 milestone to the firefox review
-
a80668de
by Morgan at 2025-09-15T15:44:55+02:00
fixup! TB 43616: Customize Gitlab Issue and Merge Request templates
-
0693c972
by Morgan at 2025-09-15T15:44:55+02:00
fixup! TB 43616: Customize Gitlab Issue and Merge Request templates
add Apps::Impact::High label to release prep issues
-
f3979656
by Morgan at 2025-09-15T15:44:56+02:00
fixup! TB 43616: Customize Gitlab Issue and Merge Request templates
Bug 43534: Update rebase template
-
2bd28c2e
by Beatriz Rizental at 2025-09-15T15:44:56+02:00
Add CI for Tor Browser
-
fed80e6f
by Richard Pospesel at 2025-09-15T15:44:56+02:00
TB 41089: Add tor-browser build scripts + Makefile to tor-browser
-
b6f5cbf2
by Beatriz Rizental at 2025-09-15T15:44:57+02:00
fixup! TB 41089: Add tor-browser build scripts + Makefile to tor-browser
-
908b784c
by Alex Catarineu at 2025-09-15T15:44:57+02:00
Add TorStrings module for localization
-
690ce533
by Henry Wilkes at 2025-09-15T15:44:58+02:00
Tor Browser strings
This commit adds all the strings needed for Tor Browser patches.
-
3cc57d1b
by Henry Wilkes at 2025-09-15T15:44:58+02:00
Tor Browser localization migration scripts.
-
9fe02b95
by Mike Perry at 2025-09-15T15:44:58+02:00
TB 2176: Rebrand Firefox to TorBrowser
See also Bugs #5194, #7187, #8115, #8219.
This patch does some basic renaming of Firefox to TorBrowser. The rest of the
branding is done by images and icons.
Also fix bug 27905.
Bug 25702: Update Tor Browser icon to follow design guidelines
- Updated all of the branding in /browser/branding/official with new 'stable'
icon series.
- Updated /extensions/onboarding/content/img/tor-watermark.png with new icon and
add the source svg in the same directory
- Copied /browser/branding/official over /browser/branding/nightly and the new
/browser/branding/alpha directories. Replaced content with 'nightly' and
'alpha' icon series.
Updated VisualElements_70.png and VisualElements_150.png with updated icons in
each branding directory (fixes #22654)
- Updated firefox.VisualElementsManfiest.xml with updated colors in each
branding directory
- Added firefox.svg to each branding directory from which all the other icons
are derived (apart from document.icns and document.ico)
- Added default256.png and default512.png icons
- Updated aboutTBUpdate.css to point to branding-aware icon128.png and removed
original icon
- Use the Tor Browser icon within devtools/client/themes/images/.
Bug 30631: Blurry Tor Browser icon on macOS app switcher
It would seem the png2icns tool does not generate correct icns files and
so on macOS the larger icons were missing resulting in blurry icons in
the OS chrome. Regenerated the padded icons in a macOS VM using
iconutil.
Bug 28196: preparations for using torbutton tor-browser-brand.ftl
A small change to Fluent FileSource class is required so that we
can register a new source without its supported locales being
counted as available locales for the browser.
Bug 31803: Replaced about:debugging logo with flat version
Bug 21724: Make Firefox and Tor Browser distinct macOS apps
When macOS opens a document or selects a default browser, it sometimes
uses the CFBundleSignature. Changing from the Firefox MOZB signature to
a different signature TORB allows macOS to distinguish between Firefox
and Tor Browser.
Bug 32092: Fix Tor Browser Support link in preferences
For bug 40562, we moved onionPattern* from bug 27476 to here, as
about:tor needs these files but it is included earlier.
Bug 41278: Create Tor Browser styled pdf logo similar to the vanilla Firefox one
Bug 42088: New application icons (used in-app and on linux).
Bug 42087: New application icons (windows).
-
a73f781e
by Henry Wilkes at 2025-09-15T15:44:59+02:00
fixup! TB 2176: Rebrand Firefox to TorBrowser
TB 44142: Add missing document_pdf.svg file.
-
5f75bfc6
by Henry Wilkes at 2025-09-15T15:44:59+02:00
Customize moz-toggle for tor-browser.
-
e85e94b7
by Henry Wilkes at 2025-09-15T15:44:59+02:00
fixup! Customize moz-toggle for tor-browser.
TB 43727: Drop the moz-toggle label-align-after attribute.
Upstream now does this by default. Instead we add the label-align-before
attribute for the exception in about:tor.
-
60ee9169
by Henry Wilkes at 2025-09-15T15:45:00+02:00
TB 43087: Add onion-pattern to be used on Tor pages.
-
43e0f2e4
by Henry Wilkes at 2025-09-15T15:45:00+02:00
TB 41817: tor-browser semantic colors.
-
5ddccb4d
by Henry Wilkes at 2025-09-15T15:45:00+02:00
fixup! TB 41817: tor-browser semantic colors.
TB 42025: Use new purple colours.
-
ac035ff9
by Henry Wilkes at 2025-09-15T15:45:01+02:00
TB 41917: Change letterboxing styling for Tor Browser.
-
0f185b18
by Henry Wilkes at 2025-09-15T15:45:01+02:00
TB 42110: Add TorUIUtils module for common tor component methods.
-
86809f29
by Henry Wilkes at 2025-09-15T15:45:02+02:00
TB 42583: Modify moz-support-link for Tor Browser.
-
fba2d06c
by sanketh at 2025-09-15T15:45:02+02:00
TB 40209: Implement Basic Crypto Safety
Adds a CryptoSafety actor which detects when you've copied a crypto
address from a HTTP webpage and shows a warning.
Closes #40209.
Bug 40428: Fix string attribute names
-
28511ee0
by Mike Perry at 2025-09-15T15:45:02+02:00
TB3: Tor Browser's official .mozconfigs.
Also:
Add an --enable-tor-browser-data-outside-app-dir configure option
Add --with-tor-browser-version configure option
Bug 31457: disable per-installation profiles
The dedicated profiles (per-installation) feature does not interact
well with our bundled profiles on Linux and Windows, and it also causes
multiple profiles to be created on macOS under TorBrowser-Data.
Bug 31935: Disable profile downgrade protection.
Since Tor Browser does not support more than one profile, disable
the prompt and associated code that offers to create one when a
version downgrade situation is detected.
Add --enable-tor-browser-update build option
Bug 40793: moved Tor configuration options from old-configure.in to moz.configure
Bug 41584: Move some configuration options to base-browser level
-
98ce1422
by Henry Wilkes at 2025-09-15T15:45:03+02:00
TB 41340: Enable TOR_BROWSER_NIGHTLY_BUILD features for dev and nightly builds
tor-browser#41285: Enable fluent warnings.
-
c82064c0
by Pier Angelo Vendrame at 2025-09-15T15:45:03+02:00
TB 40562: Added Tor Browser preferences to 000-tor-browser.js
Before reordering patches, we used to keep the Tor-related patches
(torbutton and tor-launcher) at the beginning.
After that issue, we decided to move them towards the end.
In addition to that, we have decided to move Tor Browser-only
preferences there, too, to make Base Browser-only fixups easier to
apply.
-
131b6698
by Pier Angelo Vendrame at 2025-09-15T15:45:04+02:00
TB 13252: Customize profile management on macOS
On macOS we allow both portable mode and system installation.
However, in the latter case, we customize Firefox's directories to
match the hierarchy we use for the portable mode.
Also, display an informative error message if the TorBrowser-Data
directory cannot be created due to an "access denied" or a
"read only volume" error.
-
a413c182
by Pier Angelo Vendrame at 2025-09-15T15:45:04+02:00
TB 40933: Add tor-launcher functionality
Bug 41926: Reimplement the control port
-
476ebb18
by Pier Angelo Vendrame at 2025-09-15T15:45:04+02:00
fixup! TB 40933: Add tor-launcher functionality
BB 43770: Follow upstream's BrowserGlue simplifications.
Moved the call to firstWindowLoaded to the manifest.
-
622159be
by Cecylia Bocovich at 2025-09-15T15:45:05+02:00
Lox integration
-
2581e848
by Richard Pospesel at 2025-09-15T15:45:05+02:00
TB 40597: Implement TorSettings module
- migrated in-page settings read/write implementation from about:preferences#tor
to the TorSettings module
- TorSettings initially loads settings from the tor daemon, and saves them to
firefox prefs
- TorSettings notifies observers when a setting has changed; currently only
QuickStart notification is implemented for parity with previous preference
notify logic in about:torconnect and about:preferences#tor
- about:preferences#tor, and about:torconnect now read and write settings
thorugh the TorSettings module
- all tor settings live in the torbrowser.settings.* preference branch
- removed unused pref modify permission for about:torconnect content page from
AsyncPrefs.jsm
Bug 40645: Migrate Moat APIs to Moat.jsm module
-
a8ed57b3
by Arthur Edelstein at 2025-09-15T15:45:05+02:00
TB 3455: Add DomainIsolator, for isolating circuit by domain.
Add an XPCOM component that registers a ProtocolProxyChannelFilter
which sets the username/password for each web request according to
url bar domain.
Bug 9442: Add New Circuit button
Bug 13766: Set a 10 minute circuit dirty timeout for the catch-all circ.
Bug 19206: Include a 128 bit random tag as part of the domain isolator nonce.
Bug 19206: Clear out the domain isolator state on `New Identity`.
Bug 21201.2: Isolate by firstPartyDomain from OriginAttributes
Bug 21745: Fix handling of catch-all circuit
Bug 41741: Refactor the domain isolator and new circuit
-
9e257f40
by Henry Wilkes at 2025-09-15T15:45:06+02:00
TB 41600: Add a tor circuit display panel.
-
b04f1719
by Pier Angelo Vendrame at 2025-09-15T15:45:06+02:00
TB 42247: Android helpers for the TorProvider
GeckoView is missing some API we use on desktop for the integration
with the tor daemon, such as subprocess.
Therefore, we need to implement them in Java and plumb the data
back and forth between JS and Java.
-
8e10fd98
by hackademix at 2025-09-15T15:45:06+02:00
TB 8324: Prevent DNS proxy bypasses caused by Drag&Drop
Bug 41613: Skip Drang & Drop filtering for DNS-safe URLs
-
0f5513e5
by Beatriz Rizental at 2025-09-15T15:45:07+02:00
fixup! TB 8324: Prevent DNS proxy bypasses caused by Drag&Drop
-
493e5c33
by Pier Angelo Vendrame at 2025-09-15T15:45:07+02:00
fixup! TB 8324: Prevent DNS proxy bypasses caused by Drag&Drop
BB 43770: Follow upstream's BrowserGlue simplifications.
-
82c0ef62
by Matthew Finkel at 2025-09-15T15:45:08+02:00
TB 25741: TBA: Disable GeckoNetworkManager
The browser should not need information related to the network
interface or network state, tor should take care of that.
-
3d7a67aa
by Pier Angelo Vendrame at 2025-09-15T15:45:08+02:00
TB 40807: Added QRCode.js to toolkit/modules
-
9c41fb89
by Richard Pospesel at 2025-09-15T15:45:08+02:00
TB 31286: Implementation of bridge, proxy, and firewall settings in about:preferences#connection
This patch adds a new about:preferences#connection page which allows
modifying bridge, proxy, and firewall settings from within Tor Browser.
All of the functionality present in tor-launcher's Network
Configuration panel is present:
- Setting built-in bridges
- Requesting bridges from BridgeDB via moat
- Using user-provided bridges
- Configuring SOCKS4, SOCKS5, and HTTP/HTTPS proxies
- Setting firewall ports
- Viewing and Copying Tor's logs
- The Networking Settings in General preferences has been removed
Bug 40774: Update about:preferences page to match new UI designs
-
68f5abf0
by Pier Angelo Vendrame at 2025-09-15T15:45:09+02:00
fixup! TB 31286: Implementation of bridge, proxy, and firewall settings in about:preferences#connection
TB 44095: Rename connectionPane.xhtml to .inc.xhtml.
Let's improve consistency.
Also, we need to explicitly enable formatting on this, since .inc.xhtml
files are excluded by default.
-
af5cbe70
by Henry Wilkes at 2025-09-15T15:45:09+02:00
fixup! TB 31286: Implementation of bridge, proxy, and firewall settings in about:preferences#connection
TB 43727: Drop the moz-toggle label-align-after attribute.
-
c3e77baf
by Henry Wilkes at 2025-09-15T15:45:09+02:00
fixup! TB 31286: Implementation of bridge, proxy, and firewall settings in about:preferences#connection
TB 44115: Make the remove all bridges dialog button destructive.
-
262cce0b
by Henry Wilkes at 2025-09-15T15:45:10+02:00
fixup! TB 31286: Implementation of bridge, proxy, and firewall settings in about:preferences#connection
TB 42025: Use new purple colours.
-
c1d7298d
by Henry Wilkes at 2025-09-15T15:45:10+02:00
fixup! TB 31286: Implementation of bridge, proxy, and firewall settings in about:preferences#connection
TB 44145: Use --icon-color and --icon-color-critical for the connection
status icons.
-
fd4f806b
by Richard Pospesel at 2025-09-15T15:45:11+02:00
TB 27476: Implement about:torconnect captive portal within Tor Browser
- implements new about:torconnect page as tor-launcher replacement
- adds new torconnect component to browser
- tor process management functionality remains implemented in tor-launcher through the TorProtocolService module
- adds warning/error box to about:preferences#tor when not connected to tor
Bug 40773: Update the about:torconnect frontend page to match additional UI flows.
Bug 41608: Add a toolbar status button and a urlbar "Connect" button.
-
d794dd6b
by Henry Wilkes at 2025-09-15T15:45:11+02:00
fixup! TB 27476: Implement about:torconnect captive portal within Tor Browser
TB 43727: Drop the moz-toggle label-align-after attribute.
-
68b6dcdc
by Beatriz Rizental at 2025-09-15T15:45:11+02:00
fixup! TB 27476: Implement about:torconnect captive portal within Tor Browser
-
b20d8cc2
by Henry Wilkes at 2025-09-15T15:45:12+02:00
fixup! TB 27476: Implement about:torconnect captive portal within Tor Browser
TB 42025: Use new purple colours.
-
269500b5
by Henry Wilkes at 2025-09-15T15:45:12+02:00
fixup! TB 27476: Implement about:torconnect captive portal within Tor Browser
TB 44145: Use --icon-color and --icon-color-critical for the connection
status icons.
-
14398805
by Beatriz Rizental at 2025-09-15T15:45:12+02:00
fixup! TB 27476: Implement about:torconnect captive portal within Tor
Browser
Fix lints.
-
b42c49f5
by Beatriz Rizental at 2025-09-15T15:45:13+02:00
Temporary changes to about:torconnect for Android.
-
b26e1b8d
by Henry Wilkes at 2025-09-15T15:45:13+02:00
TB 43405: Show a prompt whenever we fail to apply Tor settings.
-
f2741b56
by Pier Angelo Vendrame at 2025-09-15T15:45:14+02:00
fixup! TB 43405: Show a prompt whenever we fail to apply Tor settings.
BB 43770: Follow upstream's BrowserGlue simplifications.
-
8cfa90b9
by Henry Wilkes at 2025-09-15T15:45:14+02:00
TB 7494: Create local home page for TBB.
Bug 41333: Update about:tor to new design. Including:
+ make the favicon match the branding icon.
+ make the location bar show a search icon.
-
051fa559
by Henry Wilkes at 2025-09-15T15:45:14+02:00
fixup! TB 7494: Create local home page for TBB.
TB 43727: Align "Onionize" label before the toggle.
-
aaf5d7eb
by Beatriz Rizental at 2025-09-15T15:45:15+02:00
fixup! TB 7494: Create local home page for TBB.
-
1ad6f02e
by Pier Angelo Vendrame at 2025-09-15T15:45:15+02:00
TB 41668: Tweaks to the Base Browser updater for Tor Browser
This commit was once part of "Bug 4234: Use the Firefox Update Process
for Tor Browser.".
However, some parts of it were not needed for Base Browser and some
derivative browsers.
Therefore, we extracted from that commit the parts for Tor Browser
legacy, and we add them back to the patch set with this commit.
-
8c9fca25
by Kathy Brade at 2025-09-15T15:45:15+02:00
TB 12647: Support symlinks in the updater.
-
e79e3a7b
by Georg Koppen at 2025-09-15T15:45:16+02:00
TB 32658: Create a new MAR signing key
It's time for our rotation again: Move the backup key in the front
position and add a new backup key.
Bug 33803: Move our primary nightly MAR signing key to tor-browser
Bug 33803: Add a secondary nightly MAR signing key
-
a1b9fc55
by Pier Angelo Vendrame at 2025-09-15T15:45:16+02:00
TB 42891: Set the bundled search engine for Tor Browser.
After upstream changes between Firefox 115 and 128, we had to
completely rework the way in which we define our search engines.
This commit replaces the old "Omnibox: Add DDG, Startpage, Disconnect,
Youtube, Twitter; remove Amazon, eBay, bing".
With that commit, we customized a list of addons IDs to ship as
built-in search engines, but then upsteam moved to using only
RemoteSettings.
The configuration has many more fields, and it would be quite long to
include it in the source code. Therefore, we use some local JSON files
and load the settings from them.
-
bf46fcc3
by Pier Angelo Vendrame at 2025-09-15T15:45:17+02:00
fixup! TB 42891: Set the bundled search engine for Tor Browser.
TB 43728: Update search engine icon sizes.
The .ico we're using for DDG and Wikipedia already contains the 32px
variant, so update the size. Firefox should already do the best choice
between the two available sizes.
For Startpage, update the favicon, and ship both the 16px and the 32px
icons.
-
caadb27b
by Pier Angelo Vendrame at 2025-09-15T15:45:17+02:00
fixup! TB 42891: Set the bundled search engine for Tor Browser.
TB 43525: Move search engine customization to SearchEngineSelector.
-
564ec020
by Pier Angelo Vendrame at 2025-09-15T15:45:17+02:00
amend! TB 42891: Set the bundled search engine for Tor Browser.
TB 42891: Set the bundled search engine for Tor Browser.
-
68fabf51
by Pier Angelo Vendrame at 2025-09-15T15:45:18+02:00
fixup! TB 42891: Set the bundled search engine for Tor Browser.
Remove the torBrowser JSON files that aren't used anymore.
-
790e581f
by Henry Wilkes at 2025-09-15T15:45:18+02:00
TB 41906: Hide DNS over HTTPS preferences.
-
f2a6f958
by Richard Pospesel at 2025-09-15T15:45:18+02:00
TB 23247: Communicating security expectations for .onion
Encrypting pages hosted on Onion Services with SSL/TLS is redundant
(in terms of hiding content) as all traffic within the Tor network is
already fully encrypted. Therefore, serving HTTP pages from an Onion
Service is more or less fine.
Prior to this patch, Tor Browser would mostly treat pages delivered
via Onion Services as well as pages delivered in the ordinary fashion
over the internet in the same way. This created some inconsistencies
in behaviour and misinformation presented to the user relating to the
security of pages delivered via Onion Services:
- HTTP Onion Service pages did not have any 'lock' icon indicating
the site was secure
- HTTP Onion Service pages would be marked as unencrypted in the Page
Info screen
- Mixed-mode content restrictions did not apply to HTTP Onion Service
pages embedding Non-Onion HTTP content
This patch fixes the above issues, and also adds several new 'Onion'
icons to the mix to indicate all of the various permutations of Onion
Services hosted HTTP or HTTPS pages with HTTP or HTTPS content.
Strings for Onion Service Page Info page are pulled from Torbutton's
localization strings.
-
1d79b6f3
by Beatriz Rizental at 2025-09-15T15:45:19+02:00
fixup! TB 23247: Communicating security expectations for .onion
-
75f6a409
by Kathy Brade at 2025-09-15T15:45:19+02:00
TB 30237: Add v3 onion services client authentication prompt
When Tor informs the browser that client authentication is needed,
temporarily load about:blank instead of about:neterror and prompt
for the user's key.
If a correctly formatted key is entered, use Tor's ONION_CLIENT_AUTH_ADD
control port command to add the key (via Torbutton's control port
module) and reload the page.
If the user cancels the prompt, display the standard about:neterror
"Unable to connect" page. This requires a small change to
browser/actors/NetErrorChild.jsm to account for the fact that the
docShell no longer has the failedChannel information. The failedChannel
is used to extract TLS-related error info, which is not applicable
in the case of a canceled .onion authentication prompt.
Add a leaveOpen option to PopupNotifications.show so we can display
error messages within the popup notification doorhanger without
closing the prompt.
Add support for onion services strings to the TorStrings module.
Add support for Tor extended SOCKS errors (Tor proposal 304) to the
socket transport and SOCKS layers. Improved display of all of these
errors will be implemented as part of bug 30025.
Also fixes bug 19757:
Add a "Remember this key" checkbox to the client auth prompt.
Add an "Onion Services Authentication" section within the
about:preferences "Privacy & Security section" to allow
viewing and removal of v3 onion client auth keys that have
been stored on disk.
Also fixes bug 19251: use enhanced error pages for onion service errors.
-
addd2dd6
by Alex Catarineu at 2025-09-15T15:45:20+02:00
TB 21952: Implement Onion-Location
Whenever a valid Onion-Location HTTP header (or corresponding HTML
<meta> http-equiv attribute) is found in a document load, we either
redirect to it (if the user opted-in via preference) or notify the
presence of an onionsite alternative with a badge in the urlbar.
-
fcb24257
by Beatriz Rizental at 2025-09-15T15:45:20+02:00
fixup! TB 21952: Implement Onion-Location
-
5d1c77a5
by Pier Angelo Vendrame at 2025-09-15T15:45:20+02:00
TB 40458: Implement .tor.onion aliases
We have enabled HTTPS-Only mode, therefore we do not need
HTTPS-Everywhere anymore.
However, we want to keep supporting .tor.onion aliases (especially for
securedrop).
Therefore, in this patch we implemented the parsing of HTTPS-Everywhere
rulesets, and the redirect of .tor.onion domains.
Actually, Tor Browser believes they are actual domains. We change them
on the fly on the SOCKS proxy requests to resolve the domain, and on
the code that verifies HTTPS certificates.
-
53a09d19
by Beatriz Rizental at 2025-09-15T15:45:21+02:00
fixup! TB 40458: Implement .tor.onion aliases
-
645a01a9
by Pier Angelo Vendrame at 2025-09-15T15:45:21+02:00
fixup! TB 40458: Implement .tor.onion aliases
Use proper private method and members.
-
17ec572f
by Pier Angelo Vendrame at 2025-09-15T15:45:22+02:00
fixup! TB 40458: Implement .tor.onion aliases
BB 43770: Follow upstream's BrowserGlue simplifications.
-
e2708a06
by Pier Angelo Vendrame at 2025-09-15T15:45:22+02:00
TB 11698: Incorporate Tor Browser Manual pages into Tor Browser
This patch associates the about:manual page to a translated page that
must be injected to browser/omni.ja after the build.
The content must be placed in chrome/browser/content/browser/manual/, so
that is then available at chrome://browser/content/manual/.
We preferred giving absolute freedom to the web team, rather than having
to change the patch in case of changes on the documentation.
-
7e1c3213
by Pier Angelo Vendrame at 2025-09-15T15:45:22+02:00
TB 41435: Add a Tor Browser migration function
For now this function only deletes old language packs for which we are
already packaging the strings with the application.
-
4321592c
by Pier Angelo Vendrame at 2025-09-15T15:45:23+02:00
fixup! TB 41435: Add a Tor Browser migration function
BB 43770: Follow upstream's BrowserGlue simplifications.
-
06da7cff
by Henry Wilkes at 2025-09-15T15:45:23+02:00
fixup! TB 41435: Add a Tor Browser migration function
TB 44180: Clear YEC 2024 preference.
-
138112af
by Dan Ballard at 2025-09-15T15:45:23+02:00
TB 40701: Add security warning when downloading a file
Shown in the downloads panel, about:downloads and places.xhtml.
-
a583b411
by Henry Wilkes at 2025-09-15T15:45:24+02:00
TB 41736: Customize toolbar for tor-browser.
-
ee47bb2a
by hackademix at 2025-09-15T15:45:24+02:00
TB 41728: Pin bridges.torproject.org domains to Let's Encrypt's root cert public key
-
5030d225
by Richard Pospesel at 2025-09-15T15:45:24+02:00
TB 41822: Unconditionally disable default browser UX in about:preferences
-
4d32829c
by Beatriz Rizental at 2025-09-15T15:45:25+02:00
TB 43817: Add tests for Tor Browser
This is a catch all commits for adding any tests or
testing infrastructure that doesn't obviously fit
any other commit.
-
ddf2bf0f
by Cecylia Bocovich at 2025-09-15T15:45:25+02:00
Temporary commit: manually place generated wasm files
These files are built reproducibly using tor-browser-build: https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/merge_requests/715
We're manually adding them here while working on the interface, but
eventually these should be placed in the right location using
tor-browser-build.
-
4957dd6c
by Pier Angelo Vendrame at 2025-09-15T15:45:25+02:00
[android] TBA strings
-
5ff186c9
by clairehurst at 2025-09-15T15:45:26+02:00
fixup! [android] TBA strings
tor-browser#43179 Make persistent 'private tabs' notification distinct from Firefox's
-
ef27f153
by Henry Wilkes at 2025-09-15T15:45:26+02:00
fixup! [android] TBA strings
TB 43179: Fixup the string comments for translators.
-
44438a66
by Dan Ballard at 2025-09-15T15:45:27+02:00
TB 42660: Disable ProxySelector.openConnectionWithProxy and NOPify CrashReporter.sendCrashReport
-
7e5d5665
by Dan Ballard at 2025-09-15T15:45:27+02:00
TB 43006: Disable RFP for Font Visibility on Android
-
bf382987
by Pier Angelo Vendrame at 2025-09-15T15:45:27+02:00
fixup! TB 43006: Disable RFP for Font Visibility on Android
TB 43943: Refactor fontvis exclusion on Android.
Rather than updating Document, we can use
nsRFPService::HandleExeptionalRFPTargets.
-
570aef1d
by Matthew Finkel at 2025-09-15T15:45:28+02:00
TB 40005: [android] Modify Default toolbar menu
Originally android-components#40005.
-
a704b3c1
by Alex Catarineu at 2025-09-15T15:45:28+02:00
TB 34378: [android] Port external helper app prompting
Together with the corresponding fenix patch, this allows all `startActivity`
that may open external apps to be replaced by `TorUtils.startActivityPrompt`.
Originally, android-components#40007 and fenix#34378.
-
d657a34f
by Alex Catarineu at 2025-09-15T15:45:28+02:00
TB 40002: [android] Ensure system download manager is not used
Originally, android-components#40002.
android-components#40075: Support scoped storage to enable downloads on API < 29
- in android-components!7, we blocked all usage of Scoped
Storage in an attempt to block usage of Android's
DownloadManager, which is known to cause proxy bypasses
- as of Android API 29, downloads will not work without Scoped Storage,
causing all downlaods to fail (see: fenix##40192)
- here, we enable usage of scoped storage for API >= 29, but block
calls to DownloadManager on API < 29
-
3eaaff31
by Beatriz Rizental at 2025-09-15T15:45:29+02:00
TB 40009: [android] Change the default search engines
Originally, android-components#40009.
This matches the search engines from desktop, that is:
DDG as the default, then YouTube, Google, DDGOnion,
Startpage, Twitter, Wikipedia and Yahoo.
android-components#40062: Update DuckDuckGo onion search plugin
-
f3dd5efc
by Pier Angelo Vendrame at 2025-09-15T15:45:29+02:00
fixup! TB 40009: [android] Change the default search engines
TB 44139: Restore inactive search plugins (Android).
We remove some plugins, but they do not have any effect.
So, restore them and stop deleting in future branches.
-
5fff63e5
by Beatriz Rizental at 2025-09-15T15:45:29+02:00
TB 42191: [android] Temporary StrictMode relaxation to clear the thumbnail cache.
-
9f77adc7
by hackademix at 2025-09-15T15:45:30+02:00
[android] Modify add-on support
Bug 41160: One-time ultimate switch Tor Browser Android to HTTPS-Only.
Bug 41159: Remove HTTPS-Everywhere extension from Tor Browser Android.
Bug 41094: Enable HTTPS-Only Mode by default in Tor Browser Android.
Turn shouldUseHttpsOnly's default to true.
Bug 40225: Bundled extensions don't get updated with Android Tor
Browser updates.
Bug 40030: Install NoScript addon on startup.
Also 40070: Consider storing the list of recommended addons
This implements our own AddonsProvider, which loads the list of
available addons from assets instead of fetching it from an
endpoint.
Also, we hide the uninstall button for builtin addons.
Bug 40058: Hide option for disallowing addon in private mode
-
08d67c54
by Alex Catarineu at 2025-09-15T15:45:30+02:00
[android] Modify Addon support
android-components#40011: Hide option for disallowing addons in private mode
android-components#40016: Allow inheriting from AddonCollectionProvider
This will allow implementing our own AddonsProvider in fenix.
-
465ef393
by Alex Catarineu at 2025-09-15T15:45:31+02:00
TB 40015: [android] Port padlock states for .onion services
Originally, android-components#40015.
-
70ab2a7e
by Matthew Finkel at 2025-09-15T15:45:31+02:00
[android] Modify Tracking Protection configuration
android-components#40020: Disable third-party cookies
android-components#40024: Disable tracking protection by default
-
b3b621b3
by Alex Catarineu at 2025-09-15T15:45:31+02:00
TB 34439 [android]: Isolate Icon loader on Android.
Originally, android-components#34439.
-
ba5b1e05
by Matthew Finkel at 2025-09-15T15:45:32+02:00
[android] Disable features and functionality
Bug 33594: Disable data collection by default (Glean)
Bug 40019: Adjust is disabled on Release when data collection is disabled
Bug 34338: Disable the crash reporter
Bug 40014: Neuter Google Advertising ID
Bug 40018: Disable Push service
Bug 40034: Disable PWA onboading
Bug 40072: Disable Tracking Protection
Bug 40061: Do not show "Send to device" in sharing menu
Bug 40109: Reduce requested permissions
Exclude LOCATION and NETWORK_STATE
-
1861d764
by Beatriz Rizental at 2025-09-15T15:45:32+02:00
fixup! [android] Disable features and functionality
-
76d7d3ad
by Matthew Finkel at 2025-09-15T15:45:32+02:00
TB 40032 [android]: Set usesCleartextTraffic as false
Originally, fenix#40032.
-
00d7cba1
by Matthew Finkel at 2025-09-15T15:45:33+02:00
[android] Rename as Tor Browser
Bug 40020: Change applicationId
Bug 40020: Change app name
Bug 40020: Change deeplink scheme
Bug 40020: Change App icons
Bug 40073: Use correct branding on About page
Bug 40088: Use Tor Browser logo in migration screen
-
3dd36218
by clairehurst at 2025-09-15T15:45:33+02:00
fixup! [android] Rename as Tor Browser
tor-browser#43179 Make persistent 'private tabs' notification distinct from Firefox's
-
a366dbea
by Georg Koppen at 2025-09-15T15:45:34+02:00
[android] Modify build system
Bug 40083: Make locale ordering in BuildConfig deterministic
Bug 40042: Add option do overwrite timestamp in extension version
Bug 40059: Use MOZ_BUILD_DATE for versionCode
At the same time we adapt MOZ_BUILD_DATE to our needs where it is
actually used and not in tor-browser-build. This gives us more
flexibility. See: tor-browser-build#40084.
Bug 40067: Fix reproducibility issue in classes2.dex
We make sure our MOZ_BUILD_DATE gets used as a source for showing date
related information on the Fenix about page.
Bug 40071: Show only supported locales
Bug 40064: Use Gecko Beta for Nightly and Debug variants
Bug 40123: Allow building the instrumented tests apks for variants other than debug
This allows to specify the variant of the instrumented tests via
a `testBuildType` gradle argument. It also applies a workaround for
a R8 issue from https://issuetracker.google.com/issues/140851070.
Bug 40143: Use deterministic date in Test apk
The build config was using Date() when generating the Test apk's
versionName.
-
353d388e
by Pier Angelo Vendrame at 2025-09-15T15:45:34+02:00
fixup! [android] Modify build system
TB 43826: Drop an unneeded version customization.
When the patch was originally created
(android-components@abf37979a74f34730dd8e8323d8a9aad184884c3), it
replaced a Date additions that prevented reproducible builds.
However, Mozilla themselves removed that Date in Bug 1824818, so we do
not need this part of the patch anymore.
-
bbbc078d
by Pier Angelo Vendrame at 2025-09-15T15:45:34+02:00
fixup! [android] Modify build system
TB 43799: Check we passed the objdir to tba-sign-devbuilds.sh.
When we initially created tba-sign-devbuilds.sh, it was easy to find
the APKs. However, after Bug 1951190, they are inside the obj-*
directory, which can be customized in mozconfig.
So, the easiest way to deal with this, was to ask the caller to provide
that obj directory. Not passing it will very likely make the script
fail, so with this commit we added a check to output a more meaningful
error message.
-
3afd2771
by Nicolas Vigier at 2025-09-15T15:45:35+02:00
TB 43987 [Android]: disable optimization for org.mozilla.experiments.nimbus.Nimbus
Fixing a reproducibility issue.
-
880aff23
by Beatriz Rizental at 2025-09-15T15:45:35+02:00
[android] Override settings
-
fb6efea1
by Alex Catarineu at 2025-09-15T15:45:35+02:00
TB 40087 [android]: Implement a switch for spoof English.
Originally, fenix#40087 and android-components#40019.
-
a491d323
by Matthew Finkel at 2025-09-15T15:45:36+02:00
TB 34403 [android]: Disable Normal mode by default.
Originally, fenix#34403.
-
4021e9e5
by Matthew Finkel at 2025-09-15T15:45:36+02:00
TB 40016 [android]: Don't install WebCompat webext.
Originally, fenix#40016.
-
83defadd
by Matthew Finkel at 2025-09-15T15:45:37+02:00
[android] Modify UI/UX
Bug 40015: Modify Home menu
Bug 40016: Hide unwanted Settings
Bug 40016: Modify Default toolbar menu
Bug 40016: Add Donate settings button
Bug 40016: Move Allow Screenshots under Advanced
Bug 40016: Don't install WebCompat webext
Bug 40016: Don't onboard Search Suggestions
Bug 40094: Do not use MasterPasswordTipProvider in HomeFragment
Bug 40095: Hide "Sign in to sync" in bookmarks
Bug 40031: Hide Mozilla-specific items on About page
Bug 40063: Do not sort search engines alphabetically
Bug 40141: Hide EME site permission
Bug 40166: Hide "Normal" tab (again) and Sync tab in TabTray
Bug 40167: Hide "Save to Collection" in menu
Bug 40172: Find the Quit button
Bug 40186: Hide Credit Cards in Settings
Bug 40198: Spoof English toggle now overlaps with locale list
-
5b55e575
by Matthew Finkel at 2025-09-15T15:45:37+02:00
TB 40026 [android]: Implement Security Level settings on Android.
Originally, fenix#40026.
-
052ff95a
by Dan Ballard at 2025-09-15T15:45:37+02:00
TB 41972: [android] Disable Mozilla onboarding
-
0b776c37
by Dan Ballard at 2025-09-15T15:45:38+02:00
TB 41878: [android] Add standalone Tor Bootstrap
-
9e846e3f
by Matthew Finkel at 2025-09-15T15:45:38+02:00
TB 40041 [android]: Implement Tor Network Settings
Originally, fenix#40041.
-
f8c21970
by clairehurst at 2025-09-15T15:45:38+02:00
fixup! TB 40041 [android]: Implement Tor Network Settings
Better fix for #44036 Crash on opening "Search Settings" on android
-
edbe03b1
by clairehurst at 2025-09-15T15:45:39+02:00
[android] Implement Android-native Connection Assist UI
-
c9610e9c
by clairehurst at 2025-09-15T15:45:39+02:00
fixup! [android] Implement Android-native Connection Assist UI
Bug_43699: Properly clear dummy about pages
-
8ae1c5a8
by clairehurst at 2025-09-15T15:45:39+02:00
fixup! [android] Implement Android-native Connection Assist UI
Bug_44081: Swiping away the "private tabs" notification requires rebootstrapping.
-
ecd31d76
by clairehurst at 2025-09-15T15:45:40+02:00
TB 42655 [android]: Implement "New circuit for this site" on Android
-
b0a3b454
by clairehurst at 2025-09-15T15:45:40+02:00
TB 42089: [android] Remove ability to submit site support requests
-
9e32926c
by clairehurst at 2025-09-15T15:45:41+02:00
[android] Delete unused media
-
b0875ef1
by Beatriz Rizental at 2025-09-15T15:45:41+02:00
TB 43243: [android] Implement Android launch test
Also remove exit call from terminate function.
It causes all espresso tests to crash on exit and otherwise doesn't do anything.
-
40149fda
by Beatriz Rizental at 2025-09-15T15:45:41+02:00
TB 42669: [android] Use custom no-op app-services
Fetch the custom built no-op application services library
from tor-browser-build when building for Android.
-
c1703601
by Beatriz Rizental at 2025-09-15T15:45:42+02:00
fixup! TB 42669: [android] Use custom no-op app-services
-
5f3b5b0c
by Beatriz Rizental at 2025-09-15T15:45:42+02:00
Various Android workarounds
-
9e4f78a8
by Beatriz Rizental at 2025-09-15T15:45:42+02:00
TB 43564: Modify ./mach bootstrap for Tor Browser
-
7cd3a533
by Beatriz Rizental at 2025-09-15T15:45:43+02:00
fixup! TB 43564: Modify ./mach bootstrap for Tor Browser
-
40ec6966
by Beatriz Rizental at 2025-09-15T15:45:43+02:00
Bug 41197 - [android] Disable autofill
Firefox is an Autofill service. From the Android docs:
> An autofill service is an app that makes it easier for users to fil
> out forms by injecting data into the views of other apps. Autofill
> services can also retrieve user data from the views in an app and
> store it for use at a later time. Autofill services are usually
> provided by apps that manage user data, such as password managers.
Tor Browser is not an autofill service. All of the autofill backend
is disabled at build time, since it lives in application-services.
This commit disabled the client side of autofill.
-
bd99a747
by hackademix at 2025-09-15T15:45:44+02:00
TB 44127: Do not show macOS Privacy hint on network error pages
-
0e019b2e
by Henry Wilkes at 2025-09-15T15:45:44+02:00
TB 43901: Modify about:license for Tor Browser.
We also drop about:rights.
-
de9f8f5f
by Beatriz Rizental at 2025-09-15T15:45:44+02:00
fixup! TB 43901: Modify about:license for Tor Browser.
-
b948d157
by clairehurst at 2025-09-15T15:45:45+02:00
TB 44098: [android] Disable sync
tor-browser#44098 Bookmarks offer a way to go to sync in 15.0a1
-
31d5732e
by Beatriz Rizental at 2025-09-15T15:45:45+02:00
fixup! BB 43564: Modify ./mach bootstrap for Tor Browser