[tor-commits] [torbutton/master] Clear out old Firefox bugs.

mikeperry at torproject.org mikeperry at torproject.org
Tue Apr 5 00:36:40 UTC 2011


commit 045097194dece98b3c8df732531b0f303cf2ab72
Author: Mike Perry <mikeperry-git at fscked.org>
Date:   Mon Apr 4 17:10:24 2011 -0700

    Clear out old Firefox bugs.
    
    Also fix a couple typos found by arma.
---
 website/design/design.xml |   21 ++++++++++++++-------
 1 files changed, 14 insertions(+), 7 deletions(-)

diff --git a/website/design/design.xml b/website/design/design.xml
index c589de8..4997cfa 100644
--- a/website/design/design.xml
+++ b/website/design/design.xml
@@ -577,10 +577,10 @@ years past.
  <title><ulink
 url="https://gitweb.torproject.org/torbutton.git/blob_plain/HEAD:/src/components/torRefSpoofer.js">@torproject.org/torRefSpoofer;1</ulink></title>
  <para>
-This component handles optional referrer spoofing for Torbuton. It implements a
+This component handles optional referer spoofing for Torbutton. It implements a
 form of "smart" referer spoofing using <ulink
 url="https://developer.mozilla.org/en/Setting_HTTP_request_headers">http-on-modify-request</ulink>
-to modify the Referrer header. The code sends the default browser referrer
+to modify the Referer header. The code sends the default browser referer
 header only if the destination domain is a suffix of the source, or if the
 source is a suffix of the destination. Otherwise, it sends no referer. This
 strange suffix logic is used as a heuristic: some rare sites on the web block
@@ -2043,7 +2043,7 @@ sent. The default value is 1. The smart referer spoofing is implemented by the
 </para>
 <para>
 This setting also does not directly satisfy any Torbutton requirement, but
-some may desire to mask their referrer for general privacy concerns.
+some may desire to mask their referer for general privacy concerns.
 </para>
 </sect3>
 
@@ -2188,7 +2188,7 @@ bug interferes with Torbutton's ability to satisfy its <link
 linkend="setpreservation">Anonymity Set Preservation</link> requirement.
      </para>
     </listitem>
-
+<!--
    <listitem><ulink
 url="https://bugzilla.mozilla.org/show_bug.cgi?id=280661">Bug 280661 - SOCKS proxy server
 connection timeout hard-coded</ulink>
@@ -2202,6 +2202,7 @@ of privacy and security issues of its own (in addition to being unmaintained).
 
     </para>
    </listitem>
+-->
    <listitem><ulink
 url="https://bugzilla.mozilla.org/show_bug.cgi?id=418986">Bug 418986 - window.screen
 provides a large amount of identifiable information</ulink>
@@ -2284,7 +2285,7 @@ linkend="setpreservation">Anonymity Set Preservation</link> requirement.
       </para>
      </listitem>
     <listitem><ulink
-url="https://bugzilla.mozilla.org/show_bug.cgi?id=122752">SOCKS
+url="https://bugzilla.mozilla.org/show_bug.cgi?id=122752">Bug 122752 - SOCKS
 Username/Password Support</ulink>
     <para>
 We need <ulink url="https://developer.mozilla.org/en/nsIProxyInfo">Firefox
@@ -2334,6 +2335,7 @@ requirement on Firefox 3.
      </listitem>
     </orderedlist>
   </sect2>
+<!-- XXX: Need to create a bug for DOM storage APIs at some point -->
   <sect2 id="FirefoxWishlist">
    <title>Bugs blocking functionality</title>
    <para>
@@ -2342,7 +2344,7 @@ The following bugs impact Torbutton and similar extensions' functionality.
 
     <orderedlist>
 
-
+<!--
    <listitem><ulink
 url="https://bugzilla.mozilla.org/show_bug.cgi?id=445696">Bug 445696 -
 Extensions cannot determine if Firefox is full screen</ulink>
@@ -2355,8 +2357,9 @@ to resize maximized and minimized windows when it should not.
 
    </para>
    </listitem>
+-->
    <listitem><ulink
-url="https://bugzilla.mozilla.org/show_bug.cgi?id=629820">nsIContentPolicy::shouldLoad not
+url="https://bugzilla.mozilla.org/show_bug.cgi?id=629820">Bug 629820 - nsIContentPolicy::shouldLoad not
 called for web request in Firefox Mobile</ulink>
     <para>
 
@@ -2371,6 +2374,7 @@ which will also cause more problems for porting Torbutton.
 
     </para>
    </listitem>
+<!--
    <listitem><ulink
 url="https://bugzilla.mozilla.org/show_bug.cgi?id=290456">Bug 290456 -
 Block/clear Flash MX "cookies" as well</ulink>
@@ -2386,6 +2390,7 @@ it would be nice if there was a standard way to do this from a Firefox API.
 
    </para>
    </listitem>
+-->
    <listitem><ulink
 url="https://bugzilla.mozilla.org/show_bug.cgi?id=417869">Bug 417869 -
 Browser context is difficult to obtain from many XPCOM callbacks</ulink>
@@ -2476,6 +2481,7 @@ workarounds.
   </para>
 
     <orderedlist>
+<!--
     <listitem><ulink
 url="https://bugzilla.mozilla.org/show_bug.cgi?id=435151">Bug 435151 - XPCSafeJSObjectWrapper breaks evalInSandbox</ulink>
      <para>
@@ -2490,6 +2496,7 @@ properly though.
 
      </para>
      </listitem>
+-->
      <listitem><ulink
 url="https://bugzilla.mozilla.org/show_bug.cgi?id=440892">Bug 440892 -
 network.protocol-handler.warn-external are ignored</ulink>





More information about the tor-commits mailing list