[tor-browser] branch tor-browser-102.3.0esr-12.0-2 updated (98311ec00049 -> 2debb2470dbc)

This is an automated email from the git hooks/post-receive script. pierov pushed a change to branch tor-browser-102.3.0esr-12.0-2 in repository tor-browser. from 98311ec00049 fixup! Bug 27476: Implement about:torconnect captive portal within Tor Browser new 725d7fdaf484 Revert "Bug 41125: stop proxy bypass in ServiceRequest.fetch by gating with checking MOZ_PROXY_BYPASS_PROTECTION and network.proxy.allow_bypass" new fb016a0d3f40 Bug 1791689 - StaticPrefList network.proxy.allow_bypass checks MOZ_PROXY_BYPASS_PROTECTION for default value. r=robwu, a=RyanVM new 2debb2470dbc fixup! Firefox preference overrides. The 3 revisions listed above as "new" are entirely new to this repository and will be described in separate emails. The revisions listed as "add" were already present in the repository and have only been added to this reference. Summary of changes: browser/app/profile/001-base-profile.js | 2 +- modules/libpref/init/StaticPrefList.yaml | 4 ++++ services/settings/Utils.jsm | 3 --- toolkit/modules/AppConstants.jsm | 7 ------- 4 files changed, 5 insertions(+), 11 deletions(-) -- To stop receiving notification emails like this one, please contact the administrator of this repository.

This is an automated email from the git hooks/post-receive script. pierov pushed a commit to branch tor-browser-102.3.0esr-12.0-2 in repository tor-browser. commit 725d7fdaf48477196a42ebf77e933497b0e4ec76 Author: Dan Ballard <dan@mindstab.net> AuthorDate: Mon Oct 17 21:01:41 2022 -0700 Revert "Bug 41125: stop proxy bypass in ServiceRequest.fetch by gating with checking MOZ_PROXY_BYPASS_PROTECTION and network.proxy.allow_bypass" This reverts commit 4be4528b0945f6dedfa4a2c7c5b5d2b3b54e88f9. --- services/settings/Utils.jsm | 3 --- toolkit/modules/AppConstants.jsm | 7 ------- 2 files changed, 10 deletions(-) diff --git a/services/settings/Utils.jsm b/services/settings/Utils.jsm index bab0e078ea14..31ad77d28678 100644 --- a/services/settings/Utils.jsm +++ b/services/settings/Utils.jsm @@ -220,9 +220,6 @@ var Utils = { function fallbackOrReject(err) { if ( // At most one recursive Utils.fetch call (bypassProxy=false to true). - // if allowed by network.proxy.allow_bypass - AppConstants.MOZ_PROXY_BYPASS_PROTECTION || - !Services.prefs.getBoolPref("network.proxy.allow_bypass", false) || bypassProxy || Services.startup.shuttingDown || Utils.isOffline || diff --git a/toolkit/modules/AppConstants.jsm b/toolkit/modules/AppConstants.jsm index c74fd5b3dc2b..64695e4c996d 100644 --- a/toolkit/modules/AppConstants.jsm +++ b/toolkit/modules/AppConstants.jsm @@ -475,13 +475,6 @@ this.AppConstants = Object.freeze({ false, #endif - MOZ_PROXY_BYPASS_PROTECTION: -#ifdef MOZ_PROXY_BYPASS_PROTECTION - true, -#else - false, -#endif - TOR_BROWSER_UPDATE: #ifdef TOR_BROWSER_UPDATE true, -- To stop receiving notification emails like this one, please contact the administrator of this repository.

This is an automated email from the git hooks/post-receive script. pierov pushed a commit to branch tor-browser-102.3.0esr-12.0-2 in repository tor-browser. commit fb016a0d3f4030be7c07a50c2c3d313b5501c197 Author: Dan Ballard <dan@mindstab.net> AuthorDate: Thu Oct 13 19:05:00 2022 +0000 Bug 1791689 - StaticPrefList network.proxy.allow_bypass checks MOZ_PROXY_BYPASS_PROTECTION for default value. r=robwu, a=RyanVM Differential Revision: https://phabricator.services.mozilla.com/D157774 --- modules/libpref/init/StaticPrefList.yaml | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/modules/libpref/init/StaticPrefList.yaml b/modules/libpref/init/StaticPrefList.yaml index 072acf76f8c4..65de26d7184c 100644 --- a/modules/libpref/init/StaticPrefList.yaml +++ b/modules/libpref/init/StaticPrefList.yaml @@ -10510,7 +10510,11 @@ # prevent proxies from being used for that specific request. - name: network.proxy.allow_bypass type: bool +#ifdef MOZ_PROXY_BYPASS_PROTECTION + value: false +#else value: true +#endif mirror: always - name: network.proxy.parse_pac_on_socket_process -- To stop receiving notification emails like this one, please contact the administrator of this repository.

This is an automated email from the git hooks/post-receive script. pierov pushed a commit to branch tor-browser-102.3.0esr-12.0-2 in repository tor-browser. commit 2debb2470dbcac4cb1c5ca5ee05a1491fd089ea1 Author: Dan Ballard <dan@mindstab.net> AuthorDate: Mon Oct 17 21:03:02 2022 -0700 fixup! Firefox preference overrides. bug #41125: lock network.proxy.allow_bypass as there is no reason to allow it to be changed --- browser/app/profile/001-base-profile.js | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/browser/app/profile/001-base-profile.js b/browser/app/profile/001-base-profile.js index c6b088434b79..0dec75fe4f59 100644 --- a/browser/app/profile/001-base-profile.js +++ b/browser/app/profile/001-base-profile.js @@ -252,7 +252,7 @@ pref("network.protocol-handler.warn-external.mailto", true); pref("network.protocol-handler.warn-external.news", true); pref("network.protocol-handler.warn-external.nntp", true); pref("network.protocol-handler.warn-external.snews", true); -pref("network.proxy.allow_bypass", false); // #40682 +pref("network.proxy.allow_bypass", false, locked); // #40682 // Lock to 'true', which is already the firefox default, to prevent users // from making themselves fingerprintable by disabling. This pref // alters content load order in a page. See tor-browser#24686 -- To stop receiving notification emails like this one, please contact the administrator of this repository.
participants (1)
-
gitolite role