This is an automated email from the git hooks/post-receive script.
pierov pushed a change to branch tor-browser-102.3.0esr-12.0-2 in repository tor-browser.
from 98311ec00049 fixup! Bug 27476: Implement about:torconnect captive portal within Tor Browser new 725d7fdaf484 Revert "Bug 41125: stop proxy bypass in ServiceRequest.fetch by gating with checking MOZ_PROXY_BYPASS_PROTECTION and network.proxy.allow_bypass" new fb016a0d3f40 Bug 1791689 - StaticPrefList network.proxy.allow_bypass checks MOZ_PROXY_BYPASS_PROTECTION for default value. r=robwu, a=RyanVM new 2debb2470dbc fixup! Firefox preference overrides.
The 3 revisions listed above as "new" are entirely new to this repository and will be described in separate emails. The revisions listed as "add" were already present in the repository and have only been added to this reference.
Summary of changes: browser/app/profile/001-base-profile.js | 2 +- modules/libpref/init/StaticPrefList.yaml | 4 ++++ services/settings/Utils.jsm | 3 --- toolkit/modules/AppConstants.jsm | 7 ------- 4 files changed, 5 insertions(+), 11 deletions(-)
This is an automated email from the git hooks/post-receive script.
pierov pushed a commit to branch tor-browser-102.3.0esr-12.0-2 in repository tor-browser.
commit 725d7fdaf48477196a42ebf77e933497b0e4ec76 Author: Dan Ballard dan@mindstab.net AuthorDate: Mon Oct 17 21:01:41 2022 -0700
Revert "Bug 41125: stop proxy bypass in ServiceRequest.fetch by gating with checking MOZ_PROXY_BYPASS_PROTECTION and network.proxy.allow_bypass"
This reverts commit 4be4528b0945f6dedfa4a2c7c5b5d2b3b54e88f9. --- services/settings/Utils.jsm | 3 --- toolkit/modules/AppConstants.jsm | 7 ------- 2 files changed, 10 deletions(-)
diff --git a/services/settings/Utils.jsm b/services/settings/Utils.jsm index bab0e078ea14..31ad77d28678 100644 --- a/services/settings/Utils.jsm +++ b/services/settings/Utils.jsm @@ -220,9 +220,6 @@ var Utils = { function fallbackOrReject(err) { if ( // At most one recursive Utils.fetch call (bypassProxy=false to true). - // if allowed by network.proxy.allow_bypass - AppConstants.MOZ_PROXY_BYPASS_PROTECTION || - !Services.prefs.getBoolPref("network.proxy.allow_bypass", false) || bypassProxy || Services.startup.shuttingDown || Utils.isOffline || diff --git a/toolkit/modules/AppConstants.jsm b/toolkit/modules/AppConstants.jsm index c74fd5b3dc2b..64695e4c996d 100644 --- a/toolkit/modules/AppConstants.jsm +++ b/toolkit/modules/AppConstants.jsm @@ -475,13 +475,6 @@ this.AppConstants = Object.freeze({ false, #endif
- MOZ_PROXY_BYPASS_PROTECTION: -#ifdef MOZ_PROXY_BYPASS_PROTECTION - true, -#else - false, -#endif - TOR_BROWSER_UPDATE: #ifdef TOR_BROWSER_UPDATE true,
This is an automated email from the git hooks/post-receive script.
pierov pushed a commit to branch tor-browser-102.3.0esr-12.0-2 in repository tor-browser.
commit fb016a0d3f4030be7c07a50c2c3d313b5501c197 Author: Dan Ballard dan@mindstab.net AuthorDate: Thu Oct 13 19:05:00 2022 +0000
Bug 1791689 - StaticPrefList network.proxy.allow_bypass checks MOZ_PROXY_BYPASS_PROTECTION for default value. r=robwu, a=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D157774 --- modules/libpref/init/StaticPrefList.yaml | 4 ++++ 1 file changed, 4 insertions(+)
diff --git a/modules/libpref/init/StaticPrefList.yaml b/modules/libpref/init/StaticPrefList.yaml index 072acf76f8c4..65de26d7184c 100644 --- a/modules/libpref/init/StaticPrefList.yaml +++ b/modules/libpref/init/StaticPrefList.yaml @@ -10510,7 +10510,11 @@ # prevent proxies from being used for that specific request. - name: network.proxy.allow_bypass type: bool +#ifdef MOZ_PROXY_BYPASS_PROTECTION + value: false +#else value: true +#endif mirror: always
- name: network.proxy.parse_pac_on_socket_process
This is an automated email from the git hooks/post-receive script.
pierov pushed a commit to branch tor-browser-102.3.0esr-12.0-2 in repository tor-browser.
commit 2debb2470dbcac4cb1c5ca5ee05a1491fd089ea1 Author: Dan Ballard dan@mindstab.net AuthorDate: Mon Oct 17 21:03:02 2022 -0700
fixup! Firefox preference overrides.
bug #41125: lock network.proxy.allow_bypass as there is no reason to allow it to be changed --- browser/app/profile/001-base-profile.js | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/browser/app/profile/001-base-profile.js b/browser/app/profile/001-base-profile.js index c6b088434b79..0dec75fe4f59 100644 --- a/browser/app/profile/001-base-profile.js +++ b/browser/app/profile/001-base-profile.js @@ -252,7 +252,7 @@ pref("network.protocol-handler.warn-external.mailto", true); pref("network.protocol-handler.warn-external.news", true); pref("network.protocol-handler.warn-external.nntp", true); pref("network.protocol-handler.warn-external.snews", true); -pref("network.proxy.allow_bypass", false); // #40682 +pref("network.proxy.allow_bypass", false, locked); // #40682 // Lock to 'true', which is already the firefox default, to prevent users // from making themselves fingerprintable by disabling. This pref // alters content load order in a page. See tor-browser#24686
tor-commits@lists.torproject.org