ma1 pushed to branch base-browser-128.8.0esr-14.0-1 at The Tor Project / Applications / Tor Browser
Commits: cb6f7e68 by Fatih at 2025-02-25T13:16:27+01:00 Bug 1436226: Ignore user prefs and hardware support for media capabilities when RFPTarget::MediaCapabilities is enabled. r=tjr,media-playback-reviewers,padenot
This patch mostly targeted Android, as media.mediasource.vp9.enabled is disabled on only Android and HW support takes precedence over pref, hence leaking HW support for VP9. However, we ended up modifying the patch to ignore prefs or HW support, fixing both possible user pref leak and HW support leak.
Differential Revision: https://phabricator.services.mozilla.com/D221338
- - - - - 6edc8dd7 by stransky at 2025-02-25T13:16:28+01:00 Bug 1501744 [Linux] Fill PointerEvents on the Gtk backend r=emilio
Patch author is tpxp tpxp@live.fr
Differential Revision: https://phabricator.services.mozilla.com/D215201 - - - - - 01179f98 by Fatih at 2025-02-25T13:16:29+01:00 Bug 1607032: Spoof screen orientation and angle to primary values. r=tjr,geckoview-reviewers,owlish
Differential Revision: https://phabricator.services.mozilla.com/D220904
- - - - - e7c0a790 by Henry Wilkes at 2025-02-25T13:16:31+01:00 Bug 1436462 - Use "Open in new private window" for bookmarks when in PBM. r=places-reviewers,mak
This makes the bookmark menu consistent with the "File" and context menu when using private browsing mode.
We also share the same hide item logic for these "open" items in one place in PlacesUIUtils so that they can be shared between the two consumers (regular bookmarks and managed bookmarks). This ensures that the "Open in container" item if hidden for managed bookmarks in a private window.
Differential Revision: https://phabricator.services.mozilla.com/D220120 - - - - - c2556dc4 by Fatih at 2025-02-25T13:16:32+01:00 Bug 1834307: Change StaticPrefs::general_smoothScroll() calls with nsLayoutUtils::IsSmoothScrollingEnabled. r=tjr
Differential Revision: https://phabricator.services.mozilla.com/D221363 - - - - - 4d77fe42 by Fatih at 2025-02-25T13:16:33+01:00 Bug 1834307: Check RFPTarget::CSSPrefersReducedMotion in nsLayoutUtils::IsSmoothScrollingEnabled. r=tjr
Differential Revision: https://phabricator.services.mozilla.com/D221364 - - - - - 798198af by Roger Yang at 2025-02-25T13:16:35+01:00 Bug 1862537 - Do not try to go back when it's a initial load r=android-reviewers,harrisono, a=pascalc
Differential Revision: https://phabricator.services.mozilla.com/D219782 - - - - - 254f04ac by Timothy Nikkel at 2025-02-25T13:16:36+01:00 Bug 1899180. If a channel is not nsIPrivateBrowsingChannel and has no load context, use the private browsing field from it's origin attributes. r=necko-reviewers,anti-tracking-reviewers,valentin
If the channel is not a nsIPrivateBrowsingChannel, and it also has no load context (eg inside svg images) then we will over write a non-zero mPrivateBrowsingId on the OriginAttributes of the channel with 0, making NS_UsePrivateBrowsing return false for the channel.
Differential Revision: https://phabricator.services.mozilla.com/D212083 - - - - - afe657c0 by pollymce at 2025-02-25T13:16:37+01:00 Bug 1902996 - Improve messaging for fullscreen notifications. r=android-reviewers,gl
Instead of explaining to users that they are in fullscreen mode, which may be obvious, we explain how to get out of it :) Also use a Toast rather than a custom Dialog. Update Focus too. Fix lint errors.
Differential Revision: https://phabricator.services.mozilla.com/D215782
- - - - - 52f90997 by Jon Coppeard at 2025-02-25T13:16:39+01:00 Bug 1904011 - Ignore finalized scripts when iterating code covarage tables r=iain
Differential Revision: https://phabricator.services.mozilla.com/D214799 - - - - - 07c49248 by rahulsainani at 2025-02-25T13:16:40+01:00 Bug 1906024 - Format download file names better a=diannaS
Original Revision: https://phabricator.services.mozilla.com/D220559
Differential Revision: https://phabricator.services.mozilla.com/D222254
- - - - - d247ba99 by rahulsainani at 2025-02-25T13:16:42+01:00 Bug 1906024 - Format download file names a=diannaS
Original Revision: https://phabricator.services.mozilla.com/D221771
Differential Revision: https://phabricator.services.mozilla.com/D222259 - - - - - f75d3440 by Arturo Mejia at 2025-02-25T13:16:43+01:00 Bug 1908344 - Improve prompts showing a=dmeehan - BP, tor-browser#43005
Original Revision: https://phabricator.services.mozilla.com/D216996
Differential Revision: https://phabricator.services.mozilla.com/D217718
- - - - - b2c63ec7 by Sam Foster at 2025-02-25T13:16:45+01:00 Bug 1909099 - Always clean up old session restore and sync log files. r=markh,sessionstore-reviewers,dao
Differential Revision: https://phabricator.services.mozilla.com/D217520 - - - - - 36f0ccbc by Nika Layzell at 2025-02-25T13:16:46+01:00 Bug 1911745 - Unify BrowsingContext flag coherency checks, r=mccr8
Previously these checks were largely diagnostic tools for finding bugs in other code as it evolves. This unifies the checks a bit more and makes them stronger for BrowsingContexts created over IPC, providing a place for more coherency checks to be added in the future.
Differential Revision: https://phabricator.services.mozilla.com/D218860 - - - - - 79a9cc63 by Pier Angelo Vendrame at 2025-02-25T13:16:48+01:00 Bug 1918009 - Fix the RFP-spoofed User-Agent header. r=tjr
The spoofed value of the HTTP user-agent header is not consistent with the value of navigator.userAgent on Windows, and this can lead to compatibility issues.
Differential Revision: https://phabricator.services.mozilla.com/D223745 - - - - - 866fc800 by Fatih at 2025-02-25T13:16:50+01:00 Bug 1918202: Spoof orientation based on screen size. r=tjr
Differential Revision: https://phabricator.services.mozilla.com/D221863
- - - - - 045da963 by Henry Wilkes at 2025-02-25T13:16:51+01:00 Bug 1919363 - Only show one app menu "new window" item in permanent private browsing. r=mconley
We also update the browser_private_browsing_window.js test. The previous test was limited because it was referring to non-existent "appmenu_newNavigator" and "appmenu_newPrivateWindow".
Differential Revision: https://phabricator.services.mozilla.com/D222507
- - - - - c8cc3ed3 by Fatih at 2025-02-25T13:16:53+01:00 Bug 1922204: fixup square spoofed orientation. r=tjr
Differential Revision: https://phabricator.services.mozilla.com/D224312 - - - - - 99894349 by Pier Angelo Vendrame at 2025-02-25T13:16:54+01:00 Bug 1923264 - Discard unsupported updates in selectUpdate. r=bytesized,nalexander
UpdateService.#selectUpdate currently chooses always the most recent update even when unsupported and an older but supported one is available. This commit makes #selectUpdate discard the unsupported update if a supported alternative is found.
Differential Revision: https://phabricator.services.mozilla.com/D224905 - - - - - 157e287b by Arturo Mejia at 2025-02-25T13:16:56+01:00 Bug 1836921 - Improve dialogs a=dmeehan
Original Revision: https://phabricator.services.mozilla.com/D226961
Differential Revision: https://phabricator.services.mozilla.com/D228842 - - - - - 06848ee2 by Malte Juergens at 2025-02-25T13:16:57+01:00 Bug 1909396 - Remove HTTPS-Only exception button in iframes r=freddyb,fluent-reviewers
Rationale for this can be read in Bug 1909396, but the main reason is that the iframe will get blocked regardless by mixed content blocking.
Differential Revision: https://phabricator.services.mozilla.com/D220257 - - - - - fe78833c by Makoto Kato at 2025-02-25T13:16:58+01:00 Bug 1776646 - Support EXTRA_IS_SENSITIVE for clipboard. r=geckoview-reviewers,owlish
When nsITransferable.isPrivateData is true, such as coping password or private mode, we should set EXTRA_IS_SENSITIVE to ClipData.
AndroidJunit test runner doesn't often get `ClipDescription.extras` from clipboard service in test runner. So we cannot write a unit test using AndroidJUnit test runner.
Differential Revision: https://phabricator.services.mozilla.com/D225326 - - - - - 84c87865 by Cathy Lu at 2025-02-25T13:17:00+01:00 Bug 1914797 - Part 1 + 2 + partial backout (details below)
Bug 1914797 - Part 1 - Revert bug 1868469 r=android-reviewers,jonalmeida, a=dmeehan
Differential Revision: https://phabricator.services.mozilla.com/D226431
Bug 1914797 - Part 2 - Add url change during onPageStart for slow loading sites r=android-reviewers,jonalmeida, a=dmeehan
Differential Revision: https://phabricator.services.mozilla.com/D226432
Backed out 1 changesets (bug 1914797) for causing Bug 1929028
Backed out changeset a79554879d7b (bug 1914797)
- - - - - 5df16869 by Emilio Cobos Álvarez at 2025-02-25T13:17:01+01:00 Bug 1909625 - Ignore CSS zoom and text zoom for canvas. r=gfx-reviewers,lsalzman
The spec doesn't mention anything about applying them, and other browsers don't, so let's just be consistent...
Differential Revision: https://phabricator.services.mozilla.com/D221709 - - - - - 74119659 by Emilio Cobos Álvarez at 2025-02-25T13:17:03+01:00 Bug 1918454 - Prevent divide by zero when inverting effective zoom. r=firefox-style-system-reviewers,layout-reviewers,boris
See comment.
Differential Revision: https://phabricator.services.mozilla.com/D222090 - - - - - 4f816c92 by Henry Wilkes at 2025-02-25T13:17:04+01:00 Bug 41454: Move focus after calling openPreferences for a sub-category.
Temporary fix until mozilla bug 1799153 gets a patch upstream.
- - - - - 1c73b9dc by Henry Wilkes at 2025-02-25T13:17:05+01:00 Bug 43072: Add aria label and description to moz-message-bar.
Ensures that moz-message-bar, including notifications, are announced on Orca.
This addresses upstream bugzilla bug 1895857 and should likely be replaced when it is fixed.
- - - - - 6aa9edfb by hackademix at 2025-02-25T13:17:07+01:00 Bug 42194: Fix blank net error page on failed DNS resolution with active proxy.
- - - - - 479b5878 by Henry Wilkes at 2025-02-25T13:17:08+01:00 Bug 41483: Remove the firefox override for appstrings.properties
Remove this patch after upstream bugzilla bug 1790187
- - - - - c820f741 by hackademix at 2025-02-25T13:17:10+01:00 Bug 43101: Deep link to the startup security warning explanation.
- - - - - 143e8f36 by Marco Simonelli at 2025-02-25T13:17:11+01:00 Bug 41459: WebRTC fails to build under mingw (Part 1)
- properly define NOMINMAX for just MSVC builds
- - - - - 08ed1e6b by Marco Simonelli at 2025-02-25T13:17:13+01:00 Bug 41459: WebRTC fails to build under mingw (Part 2)
- fixes required to build third_party/libwebrtc
- - - - - 246f87a9 by Marco Simonelli at 2025-02-25T13:17:14+01:00 Bug 41459: WebRTC fails to build under mingw (Part 3)
- fixes required to build third_party/sipcc
- - - - - e77e9574 by Marco Simonelli at 2025-02-25T13:17:15+01:00 Bug 41459: WebRTC fails to build under mingw (Part 4)
- fixes requried to build netwerk/sctp
- - - - - 2f1e68c7 by Marco Simonelli at 2025-02-25T13:17:17+01:00 Bug 41459: WebRTC fails to build under mingw (Part 5)
- fixes required to build dom/media/webrtc
- - - - - 74b536c5 by Marco Simonelli at 2025-02-25T13:17:18+01:00 Bug 41459: WebRTC fails to build under mingw (Part 6)
- fixes required to build dom/media/systemservices
- - - - - 018af6e3 by june wilde at 2025-02-25T13:17:19+01:00 Bug 42758: Fix WebRTC build errors.
- - - - - afbf6afa by hackademix at 2025-02-25T13:17:21+01:00 Bug 41854: Allow overriding download spam protection.
- - - - - d30c1780 by hackademix at 2025-02-25T13:17:22+01:00 Bug 42832: Download spam prevention exemption for browser extensions.
- - - - - 0e9d54bc by Pier Angelo Vendrame at 2025-02-25T13:17:24+01:00 Bug 42220: Allow for more file types to be forced-inline.
Firefox allows to open some files in the browser without any confirmation, but this will result in a disk leak, because the file will be downloaded to the temporary directory first (and not deleted, in some cases). A preference allows PDFs to be opened without being downloaded to disk. So, we introduce a similar one to do the same for all the files that are set to be opened automatically in the browser.
- - - - - 7a52f8bd by hackademix at 2025-02-25T13:17:25+01:00 Bug 42835: Create an actor to filter file data transfers
- - - - - f1705fed by Beatriz Rizental at 2025-02-25T13:17:27+01:00 Bug 42728: Modify ./mach lint to skip unused linters
- - - - - 0de0c7b1 by Gaba at 2025-02-25T13:17:28+01:00 Adding issue and merge request templates
- - - - - b427f123 by Richard Pospesel at 2025-02-25T13:17:30+01:00 Bug 42683: Create script to generate issue triage csv file from bugzilla query and git logs
- - - - - 64e9e010 by Beatriz Rizental at 2025-02-25T18:11:19+01:00 Add CI for Base Browser
- - - - - 4938b6fe by Pier Angelo Vendrame at 2025-02-25T18:11:21+01:00 Base Browser's .mozconfigs.
Bug 17858: Cannot create incremental MARs for hardened builds. Define HOST_CFLAGS, etc. to avoid compiling programs such as mbsdiff (which is part of mar-tools and is not distributed to end-users) with ASan.
Bug 21849: Don't allow SSL key logging.
Bug 25741 - TBA: Disable features at compile-time
Define MOZ_ANDROID_NETWORK_STATE and MOZ_ANDROID_LOCATION
Bug 27623 - Export MOZILLA_OFFICIAL during desktop builds
This fixes a problem where some preferences had the wrong default value. Also see bug 27472 where we made a similar fix for Android.
Bug 29859: Disable HLS support for now
Bug 30463: Explicitly disable MOZ_TELEMETRY_REPORTING
Bug 32493: Disable MOZ_SERVICES_HEALTHREPORT
Bug 33734: Set MOZ_NORMANDY to False
Bug 33851: Omit Parental Controls.
Bug 40252: Add --enable-rust-simd to our tor-browser mozconfig files
Bug 41584: Move some configuration options to base-browser level
- - - - - 8c0e7119 by Pier Angelo Vendrame at 2025-02-25T18:11:23+01:00 Tweaks to the build system
Bug 40857: Modified the fat .aar creation file
This is a workaround to build fat .aars with the compiling enviornment disabled. Mozilla does not use a similar configuration, but either runs a Firefox build and discards its output, or uses artifacts build.
We might switch to artifact builds too, and drop this patch, or write a better one to upstream. But until then we need this patch.
See also https://bugzilla.mozilla.org/show_bug.cgi?id=1763770.
Bug 41458: Prevent `mach package-multi-locale` from actually creating a package
macOS builds need some files to be moved around with ./mach package-multi-locale to create multi-locale packages. The required command isn't exposed through any other mach command. So, we patch package-multi-locale both to prevent it from failing when doing official builds and to detect any future changes on it.
- - - - - 799feff0 by Pier Angelo Vendrame at 2025-02-25T18:11:24+01:00 Bug 29320: Replace the gnu target with gnullvm for Rust.
- - - - - 66096e5c by Pier Angelo Vendrame at 2025-02-25T18:11:25+01:00 Bug 42616: Remove VideoCaptureTest.kt.
This is a workaround to fix the GeckoView build with WebRTC disabled. We should replace this workaround with a proper solution, that excludes this test when MOZ_WEBRTC is undefined/False.
- - - - - 1483d56f by Pier Angelo Vendrame at 2025-02-25T18:11:27+01:00 Bug 41108: Remove privileged macOS installation from 102
- - - - - ec4be545 by Dan Ballard at 2025-02-25T18:11:28+01:00 Bug 41149: Re-enable DLL injection protection in all builds not just nightlies
- - - - - 204ec6ce by Henry Wilkes at 2025-02-25T18:11:30+01:00 Bug 43092: Disable wayland by default in Base Browser.
- - - - - 5e7c0ba5 by Matthew Finkel at 2025-02-25T18:11:31+01:00 Bug 24796: Comment out excess permissions from GeckoView
The GeckoView AndroidManifest.xml is not preprocessed unlike Fennec's manifest, so we can't use the ifdef preprocessor guards around the permissions we do not want. Commenting the permissions is the next-best-thing.
- - - - - 1e031929 by Matthew Finkel at 2025-02-25T18:11:33+01:00 Bug 28125: Prevent non-Necko network connections
- - - - - 645713ba by Mike Perry at 2025-02-25T18:11:35+01:00 Bug 12974: Disable NTLM and Negotiate HTTP Auth
The Mozilla bugs: https://bugzilla.mozilla.org/show_bug.cgi?id=1046421, https://bugzilla.mozilla.org/show_bug.cgi?id=1261591, tor-browser#27602
- - - - - 5cdfaa72 by cypherpunks1 at 2025-02-25T18:11:36+01:00 Bug 40717: Hide Windows SSO in settings
- - - - - 6b86eba4 by Georg Koppen at 2025-02-25T18:11:37+01:00 Bug 16285: Exclude ClearKey system for now
In the past the ClearKey system had not been compiled when specifying --disable-eme. But that changed and it is even bundled nowadays (see: Mozilla's bug 1300654). We don't want to ship it right now as the use case for it is not really visible while the code had security vulnerabilities in the past.
- - - - - 8ebc271f by Kathy Brade at 2025-02-25T18:11:39+01:00 Bug 21431: Clean-up system extensions shipped in Firefox
Only ship the pdfjs extension.
- - - - - 2f93dcdc by Henry Wilkes at 2025-02-25T18:11:40+01:00 Bug 42831: Remove the shopping components.
- - - - - 54b92608 by Kathy Brade at 2025-02-25T18:11:42+01:00 Bug 33852: Clean up about:logins (LockWise) to avoid mentioning sync, etc.
Hide elements on about:logins that mention sync, "Firefox LockWise", and Mozilla's LockWise mobile apps.
Disable the "Create New Login" button when security.nocertdb is true.
- - - - - 8cd461a5 by Alex Catarineu at 2025-02-25T18:11:43+01:00 Bug 41457: Remove Mozilla permissions
Bug 40025: Remove Mozilla add-on install permissions
- - - - - e77a6758 by Kathy Brade at 2025-02-25T18:11:45+01:00 Bug 40002: Remove about:ion
Firefox Ion (previously Firefox Pioneer) is an opt-in program in which people volunteer to participate in studies that collect detailed, sensitive data about how they use their browser.
Bug 41662: Disable about:sync-logs
Even though we disable sync by default with `identity.fxaccounts.enabled`, this about: page is still avilable. We could throw an exception on the constructor of the related component, but it would result only in an error in the console, without a visible "this address does not look right" error page. If we fix the issues with MOZ_SERVICES_SYNC, we can restore the component.
- - - - - 72ccd710 by Morgan at 2025-02-25T18:11:46+01:00 Bug 42716: Disable unwanted about: pages
- - - - - 91642489 by Arthur Edelstein at 2025-02-25T18:11:48+01:00 Bug 26353: Prevent speculative connect that violated FPI.
Connections were observed in the catch-all circuit when the user entered an https or http URL in the URL bar, or typed a search term.
- - - - - 6451d110 by Alex Catarineu at 2025-02-25T18:11:49+01:00 Bug 31740: Remove some unnecessary RemoteSettings instances
More concretely, SearchService.jsm 'hijack-blocklists' and url-classifier-skip-urls.
Avoid creating instance for 'anti-tracking-url-decoration'.
If prefs are disabling their usage, avoid creating instances for 'cert-revocations' and 'intermediates'.
Do not ship JSON dumps for collections we do not expect to need. For the ones in the 'main' bucket, this prevents them from being synced unnecessarily (the code in remote-settings does so for collections in the main bucket for which a dump or local data exists). For the collections in the other buckets, we just save some size by not shipping their dumps.
We also clear the collections database on the v2 -> v3 migration.
- - - - - ff195bf9 by cypherpunks1 at 2025-02-25T18:11:51+01:00 Bug 41092: Add a RemoteSettings JSON dump for query-stripping
- - - - - 62811d35 by cypherpunks1 at 2025-02-25T18:11:53+01:00 Bug 42730: Patch RemoteSettings to use only local dumps as a data source
- - - - - ab48fb50 by Pier Angelo Vendrame at 2025-02-25T18:11:54+01:00 Bug 41635: Disable the Normandy component
Do not include Normandy at all whenever MOZ_NORMANDY is False.
- - - - - 7dc93fee by Georg Koppen at 2025-02-25T18:11:56+01:00 Bug 30541: Disable WebGL readPixel() for web content
Related Bugzilla: https://bugzilla.mozilla.org/show_bug.cgi?id=1428034
- - - - - e6f01c6d by Alex Catarineu at 2025-02-25T18:11:57+01:00 Bug 28369: Stop shipping pingsender executable
- - - - - bbfd193b by Henry Wilkes at 2025-02-25T18:11:59+01:00 Bug 42630: Disable LaterRun module.
- - - - - ac2ad3c9 by Pier Angelo Vendrame at 2025-02-25T18:12:00+01:00 Bug 41599: Always return an empty string as network ID
Firefox computes an internal network ID used to detect network changes and act consequently (e.g., to improve WebSocket UX). However, there are a few ways to get this internal network ID, so we patch them out, to be sure any new code will not be able to use them and possibly link users.
We also sent a patch to Mozilla to seed the internal network ID, to prevent any accidental leak in the future. Upstream: https://bugzilla.mozilla.org/show_bug.cgi?id=1817756
- - - - - 662cf0b4 by Pier Angelo Vendrame at 2025-02-25T18:12:02+01:00 Bug 42647: Make OS HTTP User-Agent OS spoofing configurable by pref
This commits makes it possible to disable OS spoofing in the HTTP User-Agent header, to see if matching header and JS property improve usability.
- - - - - 7eacc97b by Richard Pospesel at 2025-02-25T18:12:03+01:00 Bug 41327: Disable UrlbarProviderInterventions
- - - - - 55abf926 by Richard Pospesel at 2025-02-25T18:12:05+01:00 Bug 42037: Disable about:firefoxview page
- - - - - 22c66068 by Mike Perry at 2025-02-25T18:12:12+01:00 Firefox preference overrides.
This hack directly includes our preference changes in omni.ja.
Bug 18292: Staged updates fail on Windows
Temporarily disable staged updates on Windows.
Bug 18297: Use separate Noto JP,KR,SC,TC fonts
Bug 23404: Add Noto Sans Buginese to the macOS whitelist
Bug 23745: Set dom.indexedDB.enabled = true
Bug 13575: Disable randomised Firefox HTTP cache decay user tests. (Fernando Fernandez Mancera ffmancera@riseup.net)
Bug 17252: Enable session identifiers with FPI
Session tickets and session identifiers were isolated by OriginAttributes, so we can re-enable them by allowing the default value (true) of "security.ssl.disable_session_identifiers".
The pref "security.enable_tls_session_tickets" is obsolete (removed in https://bugzilla.mozilla.org/917049)
Bug 14952: Enable http/2 and AltSvc
In Firefox, SPDY/HTTP2 now uses Origin Attributes for isolation of connections, push streams, origin frames, etc. That means we get first-party isolation provided "privacy.firstparty.isolate" is true. So in this patch, we stop overriding "network.http.spdy.enabled" and "network.http.spdy.enabled.http2".
Alternate Services also use Origin Attributes for isolation. So we stop overriding "network.http.altsvc.enabled" and "network.http.altsvc.oe" as well.
(All 4 of the abovementioned "network.http.*" prefs adopt Firefox 60ESR's default value of true.)
However, we want to disable HTTP/2 push for now, so we set "network.http.spdy.allow-push" to false.
"network.http.spdy.enabled.http2draft" was removed in Bug 1132357. "network.http.sped.enabled.v2" was removed in Bug 912550. "network.http.sped.enabled.v3" was removed in Bug 1097944. "network.http.sped.enabled.v3-1" was removed in Bug 1248197.
Bug 26114: addons.mozilla.org is not special * Don't expose navigator.mozAddonManager on any site * Don't block NoScript from modifying addons.mozilla.org or other sites
Enable ReaderView mode again (#27281).
Bug 29916: Make sure enterprise policies are disabled
Bug 2874: Block Components.interfaces from content
Bug 26146: Spoof HTTP User-Agent header for desktop platforms
In Tor Browser 8.0, the OS was revealed in both the HTTP User-Agent header and to JavaScript code via navigator.userAgent. To avoid leaking the OS inside each HTTP request (which many web servers log), always use the Windows 7 OS value in the desktop User-Agent header. We continue to allow access to the actual OS via JavaScript, since doing so improves compatibility with web applications such as GitHub and Google Docs.
Bug 12885: Windows Jump Lists fail for Tor Browser
Jumplist entries are stored in a binary file in: %APPDATA%\Microsoft\Windows\Recent\CustomDestinations\ and has a name in the form [a-f0-9]+.customDestinations-ms
The hex at the front is unique per app, and is ultimately derived from something called the 'App User Model ID' (AUMID) via some unknown hashing method. The AUMID is provided as a key when programmatically creating, updating, and deleting a jumplist. The default behaviour in firefox is for the installer to define an AUMID for an app, and save it in the registry so that the jumplist data can be removed by the uninstaller.
However, the Tor Browser does not set this (or any other) regkey during installation, so this codepath fails and the app's AUMID is left undefined. As a result the app's AUMID ends up being defined by windows, but unknowable by Tor Browser. This unknown AUMID is used to create and modify the jumplist, but the delete API requires that we provide the app's AUMID explicitly. Since we don't know what the AUMID is (since the expected regkey where it is normally stored does not exist) jumplist deletion will fail and we will leave behind a mostly empty customDestinations-ms file. The name of the file is derived from the binary path, so an enterprising person could reverse engineer how that hex name is calculated, and generate the name for Tor Browser's default Desktop installation path to determine whether a person had used Tor Browser in the past.
The 'taskbar.grouping.useprofile' option that is enabled by this patch works around this AUMID problem by having firefox.exe create it's own AUMID based on the profile path (rather than looking for a regkey). This way, if a user goes in and enables and disables jumplist entries, the backing store is properly deleted.
Unfortunately, all windows users currently have this file lurking in the above mentioned directory and this patch will not remove it since it was created with an unknown AUMID. However, another patch could be written which goes to that directory and deletes any item containing the 'Tor Browser' string. See bug 28996.
Bug 30845: Make sure default themes and other internal extensions are enabled
Bug 28896: Enable extensions in private browsing by default
Bug 31065: Explicitly allow proxying localhost
Bug 31598: Enable letterboxing
Disable Presentation API everywhere
Bug 21549 - Use Firefox's WASM default pref. It is disabled at safer security levels.
Bug 32321: Disable Mozilla's MitM pings
Bug 19890: Disable installation of system addons
By setting the URL to "" we make sure that already installed system addons get deleted as well.
Bug 22548: Firefox downgrades VP9 videos to VP8.
On systems where H.264 is not available or no HWA, VP9 is preferred. But in Tor Browser 7.0 all youtube videos are degraded to VP8.
This behaviour can be turned off by setting media.benchmark.vp9.threshold to 0. All clients will get better experience and lower traffic, beause TBB doesn't use "Use hardware acceleration when available".
Bug 25741 - TBA: Add mobile-override of 000-tor-browser prefs
Bug 16441: Suppress "Reset Tor Browser" prompt.
Bug 29120: Use the in-memory media cache and increase its maximum size.
Bug 33697: use old search config based on list.json
Bug 33855: Ensure that site-specific browser mode is disabled.
Bug 30682: Disable Intermediate CA Preloading.
Bug 40061: Omit the Windows default browser agent from the build
Bug 40322: Consider disabling network.connectivity-service.enabled
Bug 40408: Disallow SVG Context Paint in all web content
Bug 40308: Disable network partitioning until we evaluate dFPI
Bug 40322: Consider disabling network.connectivity-service.enabled
Bug 40383: Disable dom.enable_event_timing
Bug 40423: Disable http/3
Bug 40177: Update prefs for Fx91esr
Bug 40700: Disable addons and features recommendations
Bug 40682: Disable network.proxy.allow_bypass
Bug 40736: Disable third-party cookies in PBM
Bug 19850: Enabled HTTPS-Only by default
Bug 40912: Hide the screenshot menu
Bug 41292: Disable moreFromMozilla in preferences page
Bug 40057: Ensure the CSS4 system colors are not a fingerprinting vector
Bug 24686: Set network.http.tailing.enabled to true
Bug 40183: Disable TLS ciphersuites using SHA-1
Bug 40783: Review 000-tor-browser.js and 001-base-profile.js for 102
We reviewed all the preferences we set for 102, and remove a few old ones. See the description of that issue to see all the preferences we believed were still valid for 102, and some brief description for the reasons to keep them.
- - - - - a868f235 by Pier Angelo Vendrame at 2025-02-25T18:12:14+01:00 Bug 41043: Hardcode the UI font on Linux
The mechanism to choose the UI font does not play well with our fontconfig configuration. As a result, the final criterion to choose the font for the UI was its version.
Since we hardcode Arimo as a default sans-serif on preferences, we use it also for the UI. FontConfig will fall back to some other font for scripts Arimo does not cover as expected (we tested with Japanese).
Bug 43141: Hardcode system-ui to Arimo.
- - - - - d9cc26f4 by Pier Angelo Vendrame at 2025-02-25T18:12:15+01:00 Bug 41901: Hardcode normalized FontSubstitutes.
Windows has a system to set font aliases through the registry. This allows some customization that could be used as a fingerprinting vector. Moreover, this mechanism is used by Windows itself, and different SKUs might have different default FontSubstitutes.
- - - - - d5d1910f by Alex Catarineu at 2025-02-25T18:12:17+01:00 Bug 30605: Honor privacy.spoof_english in Android
This checks `privacy.spoof_english` whenever `setLocales` is called from Fenix side and sets `intl.accept_languages` accordingly.
Bug 40198: Expose privacy.spoof_english pref in GeckoView
- - - - - db63dfd7 by Pier Angelo Vendrame at 2025-02-25T18:12:19+01:00 Bug 42562: Normalized the Accepted Languages on Android.
The OS language might be outside the list of actually supported languages and it might leak the user's region. Therefore, we force the locale reported in Accept-Language to match one we support with translations, even when it means using a not exact region tag.
- - - - - 9309a426 by Alex Catarineu at 2025-02-25T18:12:20+01:00 Bug 40171: Make WebRequest and GeckoWebExecutor First-Party aware
- - - - - e84eec7b by Alex Catarineu at 2025-02-25T18:12:22+01:00 Bug 26345: Hide tracking protection UI
- - - - - 9d466add by Henry Wilkes at 2025-02-25T18:12:24+01:00 Bug 43109: Hide Firefox Relay from settings.
This should remain disabled, see tor-browser#42814.
- - - - - a1092258 by Henry Wilkes at 2025-02-25T18:12:25+01:00 Bug 42777: Hide Website Privacy Preferences.
We hide the Website Privacy Preferences section, which controls the "global privacy control" (GPC) and "do not track" (DNT) settings.
- - - - - 596d2d72 by Morgan at 2025-02-25T18:12:27+01:00 Bug 42070: Hide "Use smooth scrolling" from settings
- - - - - bf2a97fe by Arthur Edelstein at 2025-02-25T18:12:29+01:00 Bug 18905: Hide unwanted items from help menu
Bug 25660: Remove the "New Private Window" option
- - - - - 0c707a58 by Pier Angelo Vendrame at 2025-02-25T18:12:30+01:00 Bug 41739: Remove "Website appearance" from about:preferences.
It is ignored because of RFP and it is confusing for users.
- - - - - 6aad00a3 by Henry Wilkes at 2025-02-25T18:12:32+01:00 Bug 43117: Hide "Always underline links" from settings.
- - - - - 45340dab by Pier Angelo Vendrame at 2025-02-25T18:12:34+01:00 Bug 42774: Always hide the third-pary certs UI.
- - - - - 6b9b122e by Henry Wilkes at 2025-02-25T18:12:36+01:00 Bug 43118: Hide feature recommendation (CFR) settings.
- - - - - e38453bc by Pier Angelo Vendrame at 2025-02-25T18:12:38+01:00 Bug 9173: Change the default Firefox profile directory to be relative.
This commit makes Firefox look for the default profile directory in a directory relative to the binary path. The directory can be specified through the --with-relative-data-dir. This is relative to the same directory as the firefox main binary for Linux and Windows.
On macOS, we remove Contents/MacOS from it. Or, in other words, the directory is relative to the application bundle.
This behavior can be overriden at runtime, by placing a file called system-install adjacent to the firefox main binary (also on macOS).
- - - - - 48273514 by Pier Angelo Vendrame at 2025-02-25T18:12:39+01:00 Bug 42773: Replace ~ with the original home.
In Bug 93141, Mozilla started sending users to their home when they type ~ in the URL bar. On Linux, we change $HOME for various reason, therefore you would be redirected to the spoofed home directory when typing ~. So, we check if the original home directory is known, and use that, instead.
- - - - - c675e7a8 by Alex Catarineu at 2025-02-25T18:12:41+01:00 Bug 27604: Fix addon issues when moving the profile directory
Bugzilla: https://bugzilla.mozilla.org/show_bug.cgi?id=1429838
- - - - - 17a0d35b by Mike Perry at 2025-02-25T18:12:43+01:00 Bug 13028: Prevent potential proxy bypass cases.
It looks like these cases should only be invoked in the NSS command line tools, and not the browser, but I decided to patch them anyway because there literally is a maze of network function pointers being passed around, and it's very hard to tell if some random code might not pass in the proper proxied versions of the networking code here by accident.
Bugzilla: https://bugzilla.mozilla.org/show_bug.cgi?id=1433509
- - - - - 719b41ac by Pier Angelo Vendrame at 2025-02-25T18:12:46+01:00 Bug 40309: Avoid using regional OS locales
Avoid regional OS locales if the pref `intl.regional_prefs.use_os_locales` is false but RFP is enabled.
- - - - - de6b02a5 by Matthew Finkel at 2025-02-25T18:12:47+01:00 Bug 40432: Prevent probing installed applications
Bugzilla: https://bugzilla.mozilla.org/show_bug.cgi?id=1711084
- - - - - fd9be4b3 by cypherpunks1 at 2025-02-25T18:12:49+01:00 Bug 33955: When copying an image only copy the image contents to the clipboard
- - - - - 1697f4d5 by cypherpunks1 at 2025-02-25T18:12:50+01:00 Bug 41791: Omit the source URL when copying page contents to the clipboard
- - - - - 28362b42 by hackademix at 2025-02-25T18:12:52+01:00 Bug 42288: Allow language spoofing in status messages.
- - - - - bf1d844d by Pier Angelo Vendrame at 2025-02-25T18:12:54+01:00 Bug 43196: Remove the vendor name from media notifications on Linux.
Firefox shows "vendor remoteName" as a title of the "... is playing media" notification on Linux. However, for our browser the remote name is enough, and prepending the vendor to it creates a string users usually never see.
- - - - - 6a34eb55 by Pier Angelo Vendrame at 2025-02-25T18:12:55+01:00 Base Browser strings
This commit adds all the strings needed by following Base Browser patches.
- - - - - 63800df1 by Pier Angelo Vendrame at 2025-02-25T18:12:57+01:00 Bug 41369: Improve Firefox language settings for multi-lingual packages
Change the language selector to be sorted by language code, rather than name, and to display the language code to the user.
Bug 41372: Handle Japanese as a special case in preferences on macOS
Japanese is treated in a special way on macOS. However, seeing the Japanese language tag could be confusing for users, and moreover the language name is not localized correctly like other langs.
Bug 41378: Tell users that they can change their language at the first start
With multi-lingual builds, Tor Browser matches the user's system language, but some users might want to change it. So, we tell them that it is possible, but only once.
- - - - - 2e4d2d8d by p13dz at 2025-02-25T18:12:59+01:00 Bug 40283: Workaround for the file upload bug
- - - - - 773bbf22 by hackademix at 2025-02-25T18:13:00+01:00 Bug 42019: Empty browser's clipboard on browser shutdown
- - - - - 3bffa563 by hackademix at 2025-02-25T18:13:02+01:00 Bug 42084: Ensure English spoofing works even if preferences are set out of order.
- - - - - 9303f802 by Pier Angelo Vendrame at 2025-02-25T18:13:04+01:00 Bug 41930: Remove the UI to customize accept_languages.
- - - - - 21101c7a by hackademix at 2025-02-25T18:13:05+01:00 Bug 41434: Letterboxing, preemptively apply margins in a global CSS rule to mitigate race conditions on newly created windows and tabs.
- - - - - 1fd34eb8 by hackademix at 2025-02-25T18:13:07+01:00 Bug 41434: Letterboxing, improve logging.
- - - - - 3fb82fe8 by hackademix at 2025-02-25T18:13:08+01:00 Bug 31064: Letterboxing, exempt browser extensions.
- - - - - 8016630f by hackademix at 2025-02-25T18:13:10+01:00 Bug 32411: Letterboxing, exempt view-source: URIs.
- - - - - 924041e1 by hackademix at 2025-02-25T18:13:12+01:00 Bug 42574: Letterboxing, exempt pdf.js.
- - - - - a6c19612 by hackademix at 2025-02-25T18:13:14+01:00 Bug 32308: Use direct browser sizing for letterboxing.
Bug 30556: align letterboxing with 200x100 new win width stepping
- - - - - cd698fa8 by hackademix at 2025-02-25T18:13:16+01:00 Bug 41631: Prevent weird initial window dimensions caused by subpixel computations
- - - - - 5da0f1d0 by hackademix at 2025-02-25T18:13:18+01:00 Bug 41918: Option to reuse last window size when letterboxing is enabled.
- - - - - 75af0804 by hackademix at 2025-02-25T18:13:20+01:00 Bug 41916: Letterboxing preferences UI
- - - - - a2bb8fa9 by hackademix at 2025-02-25T18:13:21+01:00 Bug 41695: Warn on window maximization without letterboxing in RFPHelper module
- - - - - e25e9a84 by hackademix at 2025-02-25T18:13:24+01:00 Bug 42443: Shrink window to match letterboxing size when the emtpy area is clicked.
- - - - - 1768e17b by Henry Wilkes at 2025-02-25T18:13:26+01:00 Bug 42528: Don't leak system scrollbar size on windows.
- - - - - 96ce0098 by Henry Wilkes at 2025-02-25T18:13:27+01:00 Bug 31575: Disable Firefox Home (Activity Stream)
Treat about:blank as the default home page and new tab page.
Avoid loading AboutNewTab in BrowserGlue.sys.mjs in order to avoid several network requests that we do not need.
Bug 41624: Disable about:pocket-* pages.
Bug 40144: Redirect about:privatebrowsing to the user's home
- - - - - 5c46a8cb by Kathy Brade at 2025-02-25T18:13:29+01:00 Bug 4234: Use the Firefox Update Process for Base Browser.
Windows: disable "runas" code path in updater (15201). Windows: avoid writing to the registry (16236). Also includes fixes for tickets 13047, 13301, 13356, 13594, 15406, 16014, 16909, 24476, and 25909.
Also fix bug 27221: purge the startup cache if the Base Browser version changed (even if the Firefox version and build ID did not change), e.g., after a minor Base Browser update.
Also fix 32616: Disable GetSecureOutputDirectoryPath() functionality.
Bug 26048: potentially confusing "restart to update" message
Within the update doorhanger, remove the misleading message that mentions that windows will be restored after an update is applied, and replace the "Restart and Restore" button label with an existing "Restart to update Tor Browser" string.
Bug 28885: notify users that update is downloading
Add a "Downloading Base Browser update" item which appears in the hamburger (app) menu while the update service is downloading a MAR file. Before this change, the browser did not indicate to the user that an update was in progress, which is especially confusing in Tor Browser because downloads often take some time. If the user clicks on the new menu item, the about dialog is opened to allow the user to see download progress.
As part of this fix, the update service was changed to always show update-related messages in the hamburger menu, even if the update was started in the foreground via the about dialog or via the "Check for Tor Browser Update" toolbar menu item. This change is consistent with the Tor Browser goal of making sure users are informed about the update process.
Removed #28885 parts of this patch which have been uplifted to Firefox.
- - - - - 540b86bf by Pier Angelo Vendrame at 2025-02-25T18:13:31+01:00 Bug 42061: Create an alpha update channel.
- - - - - 7ea5a23f by Nicolas Vigier at 2025-02-25T18:13:33+01:00 Bug 41682: Add base-browser nightly mar signing key
- - - - - 96d104a9 by Pier Angelo Vendrame at 2025-02-25T18:13:35+01:00 Bug 41603: Customize the creation of MOZ_SOURCE_URL
MOZ_SOURCE_URL is created by combining MOZ_SOURCE_REPO and MOZ_SOURCE_CHANGESET. But the code takes for granted that it refers to a Hg instance, so it combines them as `$MOZ_SOURCE_REPO/rev/$MOZ_SOURCE_CHANGESET`. With this commit, we change this logic to combine them to create a URL that is valid for GitLab. $MOZ_SOURCE_CHANGESET needs to be a commit hash, not a branch or a tag. If that is needed, we could use /-/tree/, instead of /-/commit/.
- - - - - 73ce1ff5 by Pier Angelo Vendrame at 2025-02-25T18:13:37+01:00 Bug 41698: Reword the recommendation badges in about:addons
Firefox strings use { -brand-product-name }. As a result, it seems that the fork is recommending extensions, whereas AMO curators are doing that. So, we replace the strings with custom ones that clarify that Mozilla is recommending them.
We assign the strings with JS because our translation backend does not support Fluent attributes, yet, but once it does, we should switch to them, instead.
Upstream bug: https://bugzilla.mozilla.org/show_bug.cgi?id=1825033
- - - - - 03f0f368 by Pier Angelo Vendrame at 2025-02-25T18:13:38+01:00 Bug 42438: Tweaks to the migration wizard.
Remove the items not compatible with our features (such as history) from the migration wizard.
On Linux, allow to specify an alternative home directory, since we usually change $HOME in our startup script.
- - - - - fdfeb2c9 by Alex Catarineu at 2025-02-25T18:13:40+01:00 Bug 40069: Add helpers for message passing with extensions
- - - - - 7bfffd4d by Matthew Finkel at 2025-02-25T18:13:42+01:00 Bug 41598: Prevent NoScript from being removed/disabled.
Bug 40253: Explicitly allow NoScript in Private Browsing mode.
- - - - - eb330bea by Henry Wilkes at 2025-02-25T18:13:44+01:00 Bug 41736: Hide NoScript extension's toolbar button by default.
This hides it from both the toolbar and the unified extensions panel.
We also hide the unified-extension-button if the panel would be empty: not including the NoScript button when it is hidden. As a result, this will be hidden by default until a user installs another extension (or shows the NoScript button and unpins it).
- - - - - 99d50aba by hackademix at 2025-02-25T18:13:45+01:00 Bug 41834: Hide "Can't Be Removed - learn more" menu line for uninstallable add-ons
- - - - - 470d5785 by Pier Angelo Vendrame at 2025-02-25T18:13:47+01:00 Bug 40925: Implemented the Security Level component
This component adds a new Security Level toolbar button which visually indicates the current global security level via icon (as defined by the extensions.torbutton.security_slider pref), a drop-down hanger with a short description of the current security level, and a new section in the about:preferences#privacy page where users can change their current security level. In addition, the hanger and the preferences page will show a visual warning when the user has modified prefs associated with the security level and provide a one-click 'Restore Defaults' button to get the user back on recommended settings.
Bug 40125: Expose Security Level pref in GeckoView
- - - - - cd3e5df4 by Pier Angelo Vendrame at 2025-02-25T18:13:49+01:00 Bug 40926: Implemented the New Identity feature
- - - - - 95ddffda by Henry Wilkes at 2025-02-25T18:13:51+01:00 Bug 41736: Customize toolbar for base-browser.
- - - - - 7c17e1ac by Pier Angelo Vendrame at 2025-02-25T18:13:53+01:00 Bug 42027: Base Browser migration procedures.
This commit implmenents the the Base Browser's version of _migrateUI.
- - - - - fcbc6ddf by Henry Wilkes at 2025-02-25T18:13:55+01:00 Bug 42583: Modify moz-support-link for Base Browser.
- - - - - 0dbe4ed7 by Pier Angelo Vendrame at 2025-02-25T18:13:57+01:00 Bug 43386: Use Firefox in the UA in RFP-exempt request.
XHR requests initiated by extensions are exempt from RFP. Therefore, they report the actual app name, instead of Firefox, and the actual Firefox minor version.
This happens whenever the app name has been customized and does not match a hardcoded "Firefox".
- - - - - 10ea6658 by Pier Angelo Vendrame at 2025-02-25T18:13:59+01:00 BB 43468: ScreenCaptureKit should be a weak link.
ScreenCaptureKit is not available on older macOS versions. For some reason, the upstream build have it as a weak import even though they do not specify the -weak_framework flag, whereas our builds have it as a normal import and do not work on macOS 10.15 without this patch.
- - - - -
461 changed files:
- .eslintignore - + .gitlab-ci.yml - + .gitlab/ci/docker/base/Dockerfile - + .gitlab/ci/lint.yml - + .gitlab/ci/mixins.yml - + .gitlab/ci/scripts/helpers.py - + .gitlab/issue_templates/Emergency Security Issue.md - + .gitlab/issue_templates/QA - Android.md - + .gitlab/issue_templates/QA - Desktop.md - + .gitlab/issue_templates/bug.md - + .gitlab/merge_request_templates/default.md - .prettierignore - − browser/actors/RFPHelperChild.sys.mjs - − browser/actors/RFPHelperParent.sys.mjs - browser/actors/moz.build - browser/app/Makefile.in - browser/app/macbuild/Contents/MacOS-files.in - browser/app/moz.build - browser/app/permissions - + browser/app/profile/001-base-profile.js - browser/app/profile/firefox.js - browser/base/content/aboutDialog-appUpdater.js - browser/base/content/aboutDialog.js - browser/base/content/aboutDialog.xhtml - browser/base/content/appmenu-viewcache.inc.xhtml - browser/base/content/browser-addons.js - browser/base/content/browser-context.inc - browser/base/content/browser-init.js - browser/base/content/browser-menubar.inc - browser/base/content/browser-safebrowsing.js - browser/base/content/browser-sets.inc - browser/base/content/browser.css - browser/base/content/browser.js - browser/base/content/browser.js.globals - browser/base/content/browser.xhtml - + browser/base/content/languageNotification.js - browser/base/content/main-popupset.inc.xhtml - browser/base/content/navigator-toolbox.inc.xhtml - browser/base/content/test/general/browser_private_browsing_window.js - browser/base/jar.mn - browser/base/moz.build - browser/components/BrowserContentHandler.sys.mjs - browser/components/BrowserGlue.sys.mjs - browser/components/about/AboutRedirector.cpp - browser/components/about/components.conf - browser/components/aboutlogins/AboutLoginsParent.sys.mjs - browser/components/aboutlogins/content/aboutLogins.css - browser/components/aboutlogins/content/aboutLogins.mjs - browser/components/aboutlogins/content/components/fxaccounts-button.css - browser/components/customizableui/CustomizableUI.sys.mjs - browser/components/customizableui/content/panelUI.inc.xhtml - browser/components/downloads/DownloadSpamProtection.sys.mjs - browser/components/extensions/parent/ext-browserAction.js - browser/components/migration/ChromeMigrationUtils.sys.mjs - browser/components/migration/content/migration-wizard.mjs - browser/components/moz.build - + browser/components/newidentity/content/newIdentityDialog.css - + browser/components/newidentity/content/newIdentityDialog.js - + browser/components/newidentity/content/newIdentityDialog.xhtml - + browser/components/newidentity/content/newidentity.js - + browser/components/newidentity/jar.mn - + browser/components/newidentity/moz.build - browser/components/newtab/AboutNewTabService.sys.mjs - browser/components/places/PlacesUIUtils.sys.mjs - browser/components/places/content/controller.js - browser/components/places/content/placesContextMenu.inc.xhtml - browser/components/places/tests/browser/browser_bookmark_context_menu_contents.js - browser/components/places/tests/browser/head.js - browser/components/preferences/home.inc.xhtml - browser/components/preferences/home.js - browser/components/preferences/jar.mn - + browser/components/preferences/letterboxing-middle-dark.svg - + browser/components/preferences/letterboxing-middle-light.svg - + browser/components/preferences/letterboxing-top-dark.svg - + browser/components/preferences/letterboxing-top-light.svg - + browser/components/preferences/letterboxing.css - + browser/components/preferences/letterboxing.inc.xhtml - + browser/components/preferences/letterboxing.js - browser/components/preferences/main.inc.xhtml - browser/components/preferences/main.js - browser/components/preferences/preferences.js - browser/components/preferences/preferences.xhtml - browser/components/preferences/privacy.inc.xhtml - browser/components/preferences/privacy.js - browser/components/resistfingerprinting/test/browser/browser_dynamical_window_rounding.js - browser/components/resistfingerprinting/test/browser/browser_navigator.js - browser/components/resistfingerprinting/test/browser/browser_navigator_iframes.js - browser/components/search/SearchSERPTelemetry.sys.mjs - + browser/components/securitylevel/content/securityLevel.js - + browser/components/securitylevel/content/securityLevelButton.css - + browser/components/securitylevel/content/securityLevelButton.inc.xhtml - + browser/components/securitylevel/content/securityLevelIcon.svg - + browser/components/securitylevel/content/securityLevelPanel.css - + browser/components/securitylevel/content/securityLevelPanel.inc.xhtml - + browser/components/securitylevel/content/securityLevelPreferences.css - + browser/components/securitylevel/content/securityLevelPreferences.inc.xhtml - + browser/components/securitylevel/jar.mn - + browser/components/securitylevel/moz.build - browser/components/shopping/jar.mn - browser/components/shopping/moz.build - browser/components/tabbrowser/content/tabbrowser.js - browser/components/urlbar/UrlbarProvidersManager.sys.mjs - browser/components/urlbar/UrlbarUtils.sys.mjs - browser/components/urlbar/moz.build - + browser/config/mozconfigs/base-browser - + browser/config/mozconfigs/base-browser-android - browser/confvars.sh - browser/extensions/moz.build - browser/installer/Makefile.in - browser/installer/package-manifest.in - browser/installer/windows/nsis/shared.nsh - browser/locales/Makefile.in - − browser/locales/en-US/chrome/overrides/appstrings.properties - browser/locales/jar.mn - browser/modules/BrowserWindowTracker.sys.mjs - browser/modules/HomePage.sys.mjs - browser/modules/LaterRun.sys.mjs - browser/moz.build - browser/moz.configure - browser/themes/shared/addons/unified-extensions.css - + browser/themes/shared/icons/new_identity.svg - browser/themes/shared/identity-block/identity-block.css - browser/themes/shared/jar.inc.mn - browser/themes/shared/preferences/preferences.css - browser/themes/shared/tabbrowser/tabs.css - browser/themes/shared/toolbarbutton-icons.css - build/application.ini.in - build/moz.build - build/moz.configure/init.configure - build/moz.configure/rust.configure - build/moz.configure/update-programs.configure - build/variables.py - devtools/client/aboutdebugging/src/actions/runtimes.js - docshell/base/BrowsingContext.cpp - docshell/base/BrowsingContext.h - docshell/base/URIFixup.sys.mjs - docshell/base/nsAboutRedirector.cpp - docshell/build/components.conf - dom/base/ScreenOrientation.cpp - dom/base/nsContentUtils.cpp - dom/base/nsContentUtils.h - dom/base/nsCopySupport.cpp - dom/base/nsGlobalWindowInner.cpp - dom/base/nsNodeInfoManager.cpp - dom/base/test/chrome/bug418986-1.js - dom/canvas/CanvasRenderingContext2D.cpp - dom/canvas/ClientWebGLContext.cpp - dom/ipc/WindowGlobalParent.cpp - dom/locales/moz.build - dom/media/eme/MediaKeySystemAccess.cpp - dom/media/mediacapabilities/MediaCapabilities.cpp - dom/media/mediasource/MediaSource.cpp - dom/media/mediasource/MediaSource.h - dom/media/mediasource/SourceBuffer.cpp - dom/media/systemservices/video_engine/desktop_device_info.cc - dom/media/webrtc/libwebrtcglue/VideoConduit.cpp - dom/media/webrtc/sdp/RsdparsaSdpAttributeList.cpp - dom/media/webrtc/transport/nrinterfaceprioritizer.cpp - dom/media/webrtc/transport/sigslot.h - dom/media/webrtc/transport/test/ice_unittest.cpp - dom/media/webrtc/transport/third_party/nICEr/src/net/local_addr.c - dom/media/webrtc/transport/third_party/nICEr/src/net/local_addr.h - dom/media/webrtc/transport/third_party/nICEr/src/stun/addrs-netlink.c - dom/media/webrtc/transport/third_party/nICEr/src/stun/addrs-win32.c - dom/media/webrtc/transport/third_party/nICEr/src/stun/addrs.c - dom/media/webrtc/transport/third_party/nrappkit/src/log/r_log.c - dom/media/webrtc/transport/third_party/nrappkit/src/registry/registry.c - dom/security/test/https-only/browser.toml - + dom/security/test/https-only/browser_iframe_buttons.js - + dom/security/test/https-only/file_iframe_buttons.html - dom/xslt/xslt/txMozillaXSLTProcessor.cpp - dom/xslt/xslt/txXSLTMsgsURL.h - extensions/auth/nsHttpNegotiateAuth.cpp - gfx/layers/apz/src/APZInputBridge.cpp - gfx/layers/apz/src/APZPublicUtils.cpp - gfx/layers/apz/src/GenericScrollAnimation.cpp - gfx/layers/apz/src/WheelScrollAnimation.cpp - gfx/thebes/StandardFonts-win10.inc - gfx/thebes/gfxDWriteFontList.cpp - gfx/thebes/gfxDWriteFontList.h - gfx/thebes/gfxFcPlatformFontList.cpp - gfx/thebes/gfxGDIFontList.cpp - gfx/thebes/gfxPlatformFontList.cpp - hal/android/AndroidHal.cpp - image/test/browser/browser.toml - + image/test/browser/browser_bug1899180.js - + image/test/browser/helper1899180.html - intl/locale/LocaleService.cpp - intl/strres/nsIStringBundle.idl - intl/strres/nsStringBundle.cpp - js/src/gc/Zone.cpp - + js/src/jit-test/tests/debug/bug-1904011.js - js/src/old-configure.in - layout/base/nsLayoutUtils.cpp - layout/xul/nsSliderFrame.cpp - mobile/android/android-components/components/browser/engine-gecko/src/main/java/mozilla/components/browser/engine/gecko/GeckoEngineSession.kt - mobile/android/android-components/components/browser/engine-gecko/src/test/java/mozilla/components/browser/engine/gecko/GeckoEngineSessionTest.kt - mobile/android/android-components/components/feature/app-links/src/main/java/mozilla/components/feature/app/links/SimpleRedirectDialogFragment.kt - mobile/android/android-components/components/feature/app-links/src/test/java/mozilla/components/feature/app/links/SimpleRedirectDialogFragmentTest.kt - mobile/android/android-components/components/feature/prompts/src/main/java/mozilla/components/feature/prompts/PromptFeature.kt - + mobile/android/android-components/components/feature/prompts/src/main/java/mozilla/components/feature/prompts/dialog/FullScreenNotification.kt - − mobile/android/android-components/components/feature/prompts/src/main/java/mozilla/components/feature/prompts/dialog/FullScreenNotificationDialog.kt - + mobile/android/android-components/components/feature/prompts/src/main/java/mozilla/components/feature/prompts/dialog/GestureNavUtils.kt - + mobile/android/android-components/components/feature/prompts/src/test/java/mozilla/components/feature/prompts/dialog/FullScreenNotificationTest.kt - mobile/android/android-components/components/feature/search/src/main/java/mozilla/components/feature/search/SearchUseCases.kt - mobile/android/android-components/components/feature/search/src/main/java/mozilla/components/feature/search/ext/SearchEngine.kt - mobile/android/android-components/components/feature/search/src/main/java/mozilla/components/feature/search/internal/SearchUrlBuilder.kt - mobile/android/android-components/components/feature/session/src/main/java/mozilla/components/feature/session/SessionUseCases.kt - mobile/android/android-components/components/feature/session/src/test/java/mozilla/components/feature/session/SessionUseCasesTest.kt - mobile/android/android-components/components/support/ktx/src/main/java/mozilla/components/support/ktx/kotlin/String.kt - mobile/android/android-components/components/support/ktx/src/test/java/mozilla/components/support/ktx/kotlin/StringTest.kt - mobile/android/android-components/docs/changelog.md - + mobile/android/basebrowser.configure - mobile/android/confvars.sh - mobile/android/exoplayer2/src/main/java/org/mozilla/thirdparty/com/google/android/exoplayer2/upstream/DefaultHttpDataSource.java - mobile/android/fenix/app/src/androidTest/java/org/mozilla/fenix/ui/CrashReportingTest.kt - mobile/android/fenix/app/src/main/java/org/mozilla/fenix/browser/BaseBrowserFragment.kt - mobile/android/fenix/app/src/main/java/org/mozilla/fenix/components/UseCases.kt - − mobile/android/fenix/app/src/main/res/layout/full_screen_notification_dialog.xml - mobile/android/fenix/app/src/main/res/values-be/strings.xml - mobile/android/fenix/app/src/main/res/values-bg/strings.xml - mobile/android/fenix/app/src/main/res/values-bs/strings.xml - mobile/android/fenix/app/src/main/res/values-ca/strings.xml - mobile/android/fenix/app/src/main/res/values-co/strings.xml - mobile/android/fenix/app/src/main/res/values-cs/strings.xml - mobile/android/fenix/app/src/main/res/values-cy/strings.xml - mobile/android/fenix/app/src/main/res/values-da/strings.xml - mobile/android/fenix/app/src/main/res/values-de/strings.xml - mobile/android/fenix/app/src/main/res/values-dsb/strings.xml - mobile/android/fenix/app/src/main/res/values-el/strings.xml - mobile/android/fenix/app/src/main/res/values-en-rCA/strings.xml - mobile/android/fenix/app/src/main/res/values-en-rGB/strings.xml - mobile/android/fenix/app/src/main/res/values-es-rAR/strings.xml - mobile/android/fenix/app/src/main/res/values-es-rCL/strings.xml - mobile/android/fenix/app/src/main/res/values-es-rMX/strings.xml - mobile/android/fenix/app/src/main/res/values-eu/strings.xml - mobile/android/fenix/app/src/main/res/values-fi/strings.xml - mobile/android/fenix/app/src/main/res/values-fr/strings.xml - mobile/android/fenix/app/src/main/res/values-fur/strings.xml - mobile/android/fenix/app/src/main/res/values-fy-rNL/strings.xml - mobile/android/fenix/app/src/main/res/values-gl/strings.xml - mobile/android/fenix/app/src/main/res/values-hsb/strings.xml - mobile/android/fenix/app/src/main/res/values-hy-rAM/strings.xml - mobile/android/fenix/app/src/main/res/values-ia/strings.xml - mobile/android/fenix/app/src/main/res/values-is/strings.xml - mobile/android/fenix/app/src/main/res/values-it/strings.xml - mobile/android/fenix/app/src/main/res/values-iw/strings.xml - mobile/android/fenix/app/src/main/res/values-ja/strings.xml - mobile/android/fenix/app/src/main/res/values-kab/strings.xml - mobile/android/fenix/app/src/main/res/values-kk/strings.xml - mobile/android/fenix/app/src/main/res/values-ko/strings.xml - mobile/android/fenix/app/src/main/res/values-nb-rNO/strings.xml - mobile/android/fenix/app/src/main/res/values-nl/strings.xml - mobile/android/fenix/app/src/main/res/values-nn-rNO/strings.xml - mobile/android/fenix/app/src/main/res/values-oc/strings.xml - mobile/android/fenix/app/src/main/res/values-pa-rIN/strings.xml - mobile/android/fenix/app/src/main/res/values-pl/strings.xml - mobile/android/fenix/app/src/main/res/values-pt-rBR/strings.xml - mobile/android/fenix/app/src/main/res/values-pt-rPT/strings.xml - mobile/android/fenix/app/src/main/res/values-rm/strings.xml - mobile/android/fenix/app/src/main/res/values-ru/strings.xml - mobile/android/fenix/app/src/main/res/values-sat/strings.xml - mobile/android/fenix/app/src/main/res/values-si/strings.xml - mobile/android/fenix/app/src/main/res/values-sk/strings.xml - mobile/android/fenix/app/src/main/res/values-sl/strings.xml - mobile/android/fenix/app/src/main/res/values-sq/strings.xml - mobile/android/fenix/app/src/main/res/values-sv-rSE/strings.xml - mobile/android/fenix/app/src/main/res/values-tg/strings.xml - mobile/android/fenix/app/src/main/res/values-th/strings.xml - mobile/android/fenix/app/src/main/res/values-tr/strings.xml - mobile/android/fenix/app/src/main/res/values-ug/strings.xml - mobile/android/fenix/app/src/main/res/values-vi/strings.xml - mobile/android/fenix/app/src/main/res/values-zh-rCN/strings.xml - mobile/android/fenix/app/src/main/res/values-zh-rTW/strings.xml - mobile/android/fenix/app/src/main/res/values/strings.xml - mobile/android/focus-android/app/src/main/java/org/mozilla/focus/browser/integration/FullScreenIntegration.kt - mobile/android/focus-android/app/src/main/java/org/mozilla/focus/fragment/BrowserFragment.kt - − mobile/android/focus-android/app/src/main/res/layout/dialog_full_screen_notification.xml - mobile/android/focus-android/app/src/main/res/values/strings.xml - mobile/android/focus-android/app/src/test/java/org/mozilla/focus/browser/integration/FullScreenIntegrationTest.kt - mobile/android/geckoview/api.txt - − mobile/android/geckoview/src/androidTest/java/org/mozilla/geckoview/test/VideoCaptureTest.kt - mobile/android/geckoview/src/main/AndroidManifest.xml - mobile/android/geckoview/src/main/java/org/mozilla/gecko/Clipboard.java - mobile/android/geckoview/src/main/java/org/mozilla/gecko/media/GeckoMediaDrmBridgeV21.java - mobile/android/geckoview/src/main/java/org/mozilla/geckoview/GeckoInputConnection.java - mobile/android/geckoview/src/main/java/org/mozilla/geckoview/GeckoRuntimeSettings.java - mobile/android/geckoview/src/main/java/org/mozilla/geckoview/GeckoSession.java - mobile/android/geckoview/src/main/java/org/mozilla/geckoview/WebRequest.java - mobile/android/gradle/with_gecko_binaries.gradle - mobile/android/installer/package-manifest.in - mobile/android/moz.configure - mobile/shared/chrome/geckoview/geckoview.js - mobile/shared/components/geckoview/GeckoViewStartup.sys.mjs - modules/libpref/init/StaticPrefList.yaml - modules/libpref/init/all.js - moz.configure - + mozconfig-android-aarch64 - + mozconfig-android-all - + mozconfig-android-armv7 - + mozconfig-android-x86 - + mozconfig-android-x86_64 - + mozconfig-linux-aarch64 - + mozconfig-linux-arm - + mozconfig-linux-i686 - + mozconfig-linux-x86_64 - + mozconfig-linux-x86_64-asan - + mozconfig-linux-x86_64-dev - + mozconfig-macos - + mozconfig-macos-dev - + mozconfig-windows-i686 - + mozconfig-windows-x86_64 - netwerk/protocol/http/nsHttpHandler.cpp - netwerk/protocol/http/nsHttpNTLMAuth.cpp - netwerk/sctp/src/moz.build - netwerk/sctp/src/netinet/sctp_cc_functions.c - netwerk/sctp/src/netinet/sctp_indata.c - netwerk/sctp/src/netinet/sctp_input.c - netwerk/sctp/src/netinet/sctp_output.c - netwerk/sctp/src/netinet/sctp_usrreq.c - netwerk/sctp/src/netinet/sctputil.c - netwerk/sctp/src/user_mbuf.c - netwerk/sctp/src/user_socket.c - netwerk/system/android/nsAndroidNetworkLinkService.cpp - netwerk/system/linux/nsNetworkLinkService.cpp - netwerk/system/mac/nsNetworkLinkService.mm - netwerk/system/netlink/NetlinkService.cpp - netwerk/system/win32/nsNotifyAddrListener.cpp - netwerk/url-classifier/UrlClassifierFeatureBase.cpp - netwerk/url-classifier/components.conf - old-configure.in - python/mozbuild/mozbuild/artifacts.py - python/mozbuild/mozbuild/mach_commands.py - python/mozlint/mozlint/cli.py - security/manager/ssl/RemoteSecuritySettings.sys.mjs - security/moz.build - security/nss/lib/certhigh/ocsp.c - security/nss/lib/libpkix/pkix_pl_nss/module/pkix_pl_socket.c - security/nss/lib/ssl/Makefile - security/sandbox/common/SandboxUtils.sys.mjs - services/settings/Attachments.sys.mjs - services/settings/IDBHelpers.sys.mjs - services/settings/RemoteSettingsClient.sys.mjs - services/settings/dumps/gen_last_modified.py - services/settings/dumps/main/moz.build - services/settings/remote-settings.sys.mjs - services/settings/servicesSettings.manifest - services/settings/static-dumps/main/moz.build - + services/settings/static-dumps/main/query-stripping.json - services/sync/components.conf - servo/components/style/properties/cascade.rs - servo/components/style/properties/properties.mako.rs - servo/components/style/values/computed/box.rs - servo/components/style/values/specified/length.rs - servo/ports/geckolib/glue.rs - + testing/web-platform/tests/css/css-viewport/zoom/canvas-ref.html - + testing/web-platform/tests/css/css-viewport/zoom/canvas.html - + testing/web-platform/tests/css/css-viewport/zoom/textarea-very-small-zoom-crash.html - third_party/libwebrtc/modules/audio_coding/codecs/isac/main/source/os_specific_inline.h - third_party/libwebrtc/modules/desktop_capture/desktop_capture_types.h - third_party/libwebrtc/modules/desktop_capture/win/desktop_capture_utils.cc - third_party/libwebrtc/modules/desktop_capture/win/wgc_capture_session.cc - third_party/libwebrtc/modules/desktop_capture/win/wgc_capturer_win.cc - third_party/libwebrtc/modules/desktop_capture/win/wgc_capturer_win.h - third_party/libwebrtc/modules/video_capture/windows/device_info_ds.h - third_party/libwebrtc/rtc_base/platform_thread_types.cc - third_party/libwebrtc/rtc_base/socket.h - third_party/libwebrtc/rtc_base/system/file_wrapper.cc - third_party/libwebrtc/rtc_base/win/create_direct3d_device.h - third_party/sipcc/cpr_win_types.h - third_party/sipcc/sdp_token.c - toolkit/.eslintrc.js - + toolkit/actors/FilesFilterChild.sys.mjs - + toolkit/actors/FilesFilterParent.sys.mjs - toolkit/actors/NetErrorChild.sys.mjs - toolkit/actors/moz.build - toolkit/components/antitracking/StoragePrincipalHelper.cpp - toolkit/components/antitracking/antitracking.manifest - toolkit/components/antitracking/components.conf - toolkit/components/downloads/DownloadCore.sys.mjs - toolkit/components/downloads/DownloadIntegration.sys.mjs - toolkit/components/extensions/Extension.sys.mjs - toolkit/components/extensions/ExtensionParent.sys.mjs - toolkit/components/httpsonlyerror/content/errorpage.html - toolkit/components/httpsonlyerror/content/errorpage.js - toolkit/components/moz.build - toolkit/components/remotebrowserutils/RemoteWebNavigation.sys.mjs - toolkit/components/resistfingerprinting/RFPHelper.sys.mjs - toolkit/components/resistfingerprinting/nsRFPService.cpp - toolkit/components/resistfingerprinting/nsRFPService.h - toolkit/components/search/SearchEngine.sys.mjs - toolkit/components/search/SearchService.sys.mjs - + toolkit/components/securitylevel/SecurityLevel.manifest - + toolkit/components/securitylevel/SecurityLevel.sys.mjs - + toolkit/components/securitylevel/components.conf - + toolkit/components/securitylevel/moz.build - toolkit/components/shopping/jar.mn - toolkit/components/telemetry/app/TelemetrySend.sys.mjs - toolkit/components/telemetry/moz.build - toolkit/components/windowwatcher/nsWindowWatcher.cpp - toolkit/content/jar.mn - toolkit/content/widgets/moz-message-bar/moz-message-bar.mjs - toolkit/content/widgets/moz-support-link/moz-support-link.mjs - toolkit/content/widgets/notificationbox.js - toolkit/library/moz.build - + toolkit/locales-preview/base-browser-no-translate.ftl - toolkit/locales/en-US/toolkit/about/aboutHttpsOnlyError.ftl - + toolkit/locales/en-US/toolkit/global/base-browser.ftl - toolkit/locales/jar.mn - toolkit/modules/ActorManagerParent.sys.mjs - toolkit/modules/AppConstants.sys.mjs - toolkit/modules/FinderParent.sys.mjs - toolkit/modules/LogManager.sys.mjs - toolkit/modules/RemotePageAccessManager.sys.mjs - toolkit/modules/UpdateUtils.sys.mjs - toolkit/modules/moz.build - toolkit/mozapps/extensions/AddonManager.sys.mjs - toolkit/mozapps/extensions/content/aboutaddons.html - toolkit/mozapps/extensions/content/aboutaddons.js - toolkit/mozapps/extensions/internal/XPIDatabase.sys.mjs - toolkit/mozapps/extensions/internal/XPIProvider.sys.mjs - toolkit/mozapps/extensions/test/browser/head.js - toolkit/mozapps/extensions/test/xpcshell/head_addons.js - toolkit/mozapps/update/UpdateService.sys.mjs - toolkit/mozapps/update/UpdateServiceStub.sys.mjs - toolkit/mozapps/update/common/updatehelper.cpp - toolkit/mozapps/update/tests/data/sharedUpdateXML.js - + toolkit/mozapps/update/tests/unit_aus_update/mixedUnsupported.js - toolkit/mozapps/update/tests/unit_aus_update/xpcshell.toml - toolkit/mozapps/update/updater/launchchild_osx.mm - toolkit/mozapps/update/updater/moz.build - toolkit/mozapps/update/updater/nightly_aurora_level3_primary.der - toolkit/mozapps/update/updater/nightly_aurora_level3_secondary.der - toolkit/mozapps/update/updater/updater.cpp - toolkit/themes/shared/findbar.css - toolkit/xre/LauncherRegistryInfo.cpp - toolkit/xre/MacLaunchHelper.h - toolkit/xre/MacLaunchHelper.mm - toolkit/xre/MacRunFromDmgUtils.mm - toolkit/xre/dllservices/mozglue/WindowsDllBlocklist.cpp - toolkit/xre/nsAppRunner.cpp - toolkit/xre/nsIXREDirProvider.idl - toolkit/xre/nsUpdateDriver.cpp - toolkit/xre/nsXREDirProvider.cpp - toolkit/xre/nsXREDirProvider.h - tools/lint/fluent-lint/exclusions.yml - + tools/torbrowser/generate-bugzilla-triage-csv.sh - uriloader/base/nsDocLoader.cpp - uriloader/base/nsURILoader.cpp - uriloader/exthandler/nsExternalHelperAppService.cpp - widget/ScrollbarDrawingWin.cpp - widget/ScrollbarDrawingWin11.cpp - widget/android/WebExecutorSupport.cpp - widget/android/nsClipboard.cpp - widget/cocoa/nsChildView.mm - widget/gtk/MPRISServiceHandler.cpp - widget/gtk/nsWindow.cpp - widget/windows/WinTaskbar.cpp - widget/windows/nsDataObj.cpp - xpcom/io/nsAppFileLocationProvider.cpp - xpfe/appshell/AppWindow.cpp
The diff was not included because it is too large.
View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/compare/0ab79d6...