[tor-commits] [Git][tpo/applications/tor-browser][tor-browser-128.1.0esr-14.0-1] 13 commits: dropme! Bug 30237: Add v3 onion services client authentication prompt

morgan (@morgan) git at gitlab.torproject.org
Wed Aug 14 21:25:50 UTC 2024



morgan pushed to branch tor-browser-128.1.0esr-14.0-1 at The Tor Project / Applications / Tor Browser


Commits:
54c55848 by Pier Angelo Vendrame at 2024-08-14T20:45:05+00:00
dropme! Bug 30237: Add v3 onion services client authentication prompt

Drop this change to make the following rebase easier.

- - - - -
4d0c6f53 by Pier Angelo Vendrame at 2024-08-14T20:45:05+00:00
fixup! Firefox preference overrides.

Bug 42596: Add preferences for log levels.

Added a comment to start a section where we can put the various default
log levels.

- - - - -
edceacf8 by Pier Angelo Vendrame at 2024-08-14T20:45:05+00:00
fixup! Bug 40926: Implemented the New Identity feature

Bug 42596: Add preferences for log levels.

- - - - -
f6c72cec by Pier Angelo Vendrame at 2024-08-14T20:45:05+00:00
fixup! Bug 40562: Added Tor Browser preferences to 000-tor-browser.js

Bug 42596: Add preferences for log levels.

Added a comment to start a section where we can put the various default
log levels.

- - - - -
57a7116e by Pier Angelo Vendrame at 2024-08-14T20:45:05+00:00
fixup! Bug 40933: Add tor-launcher functionality

Bug 42596: Add preferences for log levels.

- - - - -
778a6111 by Pier Angelo Vendrame at 2024-08-14T20:45:05+00:00
fixup! Lox integration

Bug 42596: Add preferences for log levels.

- - - - -
45a30339 by Pier Angelo Vendrame at 2024-08-14T20:45:05+00:00
fixup! Bug 40597: Implement TorSettings module

Bug 42596: Add preferences for log levels.

- - - - -
1dc73588 by Pier Angelo Vendrame at 2024-08-14T20:45:05+00:00
fixup! Bug 3455: Add DomainIsolator, for isolating circuit by domain.

Bug 42596: Add preferences for log levels.

- - - - -
29101148 by Pier Angelo Vendrame at 2024-08-14T20:45:05+00:00
fixup! Bug 41600: Add a tor circuit display panel.

Bug 42596: Add preferences for log levels.

- - - - -
e0e6c02b by Pier Angelo Vendrame at 2024-08-14T20:45:05+00:00
fixup! Bug 42247: Android helpers for the TorProvider

Bug 42596: Add preferences for log levels.

- - - - -
ed55e544 by Pier Angelo Vendrame at 2024-08-14T20:45:05+00:00
fixup! Bug 8324: Prevent DNS proxy bypasses caused by Drag&Drop

Bug 42596: Add preferences for log levels.

- - - - -
3d71f241 by Pier Angelo Vendrame at 2024-08-14T20:45:05+00:00
fixup! Bug 30237: Add v3 onion services client authentication prompt

Bug 42596: Add preferences for log levels.

- - - - -
b4e46ed0 by Pier Angelo Vendrame at 2024-08-14T20:45:05+00:00
fixup! Bug 40458: Implement .tor.onion aliases

Bug 42596: Add preferences for log levels.

- - - - -


14 changed files:

- browser/app/profile/000-tor-browser.js
- browser/app/profile/001-base-profile.js
- browser/components/newidentity/content/newidentity.js
- browser/components/onionservices/OnionAliasStore.sys.mjs
- browser/components/onionservices/TorRequestWatch.sys.mjs
- browser/components/torcircuit/content/torCircuitPanel.js
- toolkit/components/lox/Lox.sys.mjs
- toolkit/components/tor-launcher/TorControlPort.sys.mjs
- toolkit/components/tor-launcher/TorDomainIsolator.sys.mjs
- toolkit/components/tor-launcher/TorProvider.sys.mjs
- toolkit/modules/DragDropFilter.sys.mjs
- toolkit/modules/TorAndroidIntegration.sys.mjs
- toolkit/modules/TorConnect.sys.mjs
- toolkit/modules/TorSettings.sys.mjs


Changes:

=====================================
browser/app/profile/000-tor-browser.js
=====================================
@@ -101,6 +101,7 @@ pref("extensions.torlauncher.tor_path", "");
 // which is TorBrowser-Data/ if it exists as a sibling of the application
 // directory. If TorBrowser-Data/ does not exist, these paths are relative
 // to the TorBrowser/ directory within the application directory.
+pref
 pref("extensions.torlauncher.torrc_path", "");
 pref("extensions.torlauncher.tordatadir_path", "");
 
@@ -108,3 +109,17 @@ pref("extensions.torlauncher.tordatadir_path", "");
 pref("extensions.torlauncher.bridgedb_front", "www.phpmyadmin.net");
 pref("extensions.torlauncher.bridgedb_reflector", "https://1723079976.rsc.cdn77.org");
 pref("extensions.torlauncher.moat_service", "https://bridges.torproject.org/moat");
+
+// Log levels
+pref("browser.tor_provider.log_level", "Warn");
+pref("browser.tor_provider.cp_log_level", "Warn");
+pref("lox.log_level", "Warn");
+pref("torbrowser.bootstrap.log_level", "Info");
+pref("browser.torsettings.log_level", "Warn");
+pref("browser.tordomainisolator.loglevel", "Warn");
+pref("browser.torcircuitpanel.loglevel", "Log");
+pref("browser.tor_android.log_level", "Info");
+pref("browser.dragdropfilter.log_level", "Warn");
+pref("browser.onionAuthPrompt.loglevel", "Warn");
+pref("browser.onionalias.log_level", "Warn");
+pref("browser.torRequestWatch.log_level", "Warn");


=====================================
browser/app/profile/001-base-profile.js
=====================================
@@ -649,7 +649,8 @@ pref("privacy.query_stripping.strip_on_share.enabled", true);
 // Disable platform text recogniition functionality (tor-browser#42057)
 pref("dom.text-recognition.enabled", false);
 
-pref("browser.onionAuthPrompt.loglevel", "Warn");
+// Log levels
+pref("browser.new_identity.log_level", "Info");
 
 #ifdef XP_WIN
 pref("browser.taskbar.lists.enabled", false);


=====================================
browser/components/newidentity/content/newidentity.js
=====================================
@@ -8,7 +8,6 @@ ChromeUtils.defineLazyGetter(this, "NewIdentityButton", () => {
   // Logger adapted from CustomizableUI.jsm
   const logger = (() => {
     const consoleOptions = {
-      maxLogLevel: "Info",
       maxLogLevelPref: "browser.new_identity.log_level",
       prefix: "NewIdentity",
     };


=====================================
browser/components/onionservices/OnionAliasStore.sys.mjs
=====================================
@@ -29,11 +29,9 @@ const SECURE_DROP = {
 };
 
 const kPrefOnionAliasEnabled = "browser.urlbar.onionRewrites.enabled";
-const kPrefOnionAliasLogLevel = "browser.onionalias.log_level";
 
 const log = console.createInstance({
-  maxLogLevel: "Warn",
-  maxLogLevelPref: kPrefOnionAliasLogLevel,
+  maxLogLevelPref: "browser.onionalias.log_level",
   prefix: "OnionAlias",
 });
 


=====================================
browser/components/onionservices/TorRequestWatch.sys.mjs
=====================================
@@ -3,7 +3,6 @@
  * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
 
 const log = console.createInstance({
-  maxLogLevel: "Warn",
   maxLogLevelPref: "browser.torRequestWatch.log_level",
   prefix: "TorRequestWatch",
 });


=====================================
browser/components/torcircuit/content/torCircuitPanel.js
=====================================
@@ -56,7 +56,6 @@ var gTorCircuitPanel = {
 
     this._log = console.createInstance({
       prefix: "TorCircuitPanel",
-      maxLogLevel: "Log",
       maxLogLevelPref: "browser.torcircuitpanel.loglevel",
     });
 


=====================================
toolkit/components/lox/Lox.sys.mjs
=====================================
@@ -9,7 +9,6 @@ const lazy = {};
 
 ChromeUtils.defineLazyGetter(lazy, "logger", () => {
   return console.createInstance({
-    maxLogLevel: "Warn",
     maxLogLevelPref: "lox.log_level",
     prefix: "Lox",
   });


=====================================
toolkit/components/tor-launcher/TorControlPort.sys.mjs
=====================================
@@ -5,7 +5,6 @@
 import { TorParsers } from "resource://gre/modules/TorParsers.sys.mjs";
 
 const logger = console.createInstance({
-  maxLogLevel: "Warn",
   maxLogLevelPref: "browser.tor_provider.cp_log_level",
   prefix: "TorControlPort",
 });


=====================================
toolkit/components/tor-launcher/TorDomainIsolator.sys.mjs
=====================================
@@ -25,7 +25,6 @@ XPCOMUtils.defineLazyServiceGetters(lazy, {
 
 const logger = console.createInstance({
   prefix: "TorDomainIsolator",
-  maxLogLevel: "Warn",
   maxLogLevelPref: "browser.tordomainisolator.loglevel",
 });
 


=====================================
toolkit/components/tor-launcher/TorProvider.sys.mjs
=====================================
@@ -19,7 +19,6 @@ ChromeUtils.defineESModuleGetters(lazy, {
 });
 
 const logger = console.createInstance({
-  maxLogLevel: "Warn",
   maxLogLevelPref: "browser.tor_provider.log_level",
   prefix: "TorProvider",
 });


=====================================
toolkit/modules/DragDropFilter.sys.mjs
=====================================
@@ -14,8 +14,7 @@ ChromeUtils.defineLazyGetter(lazy, "logger", () => {
   // fission.enforceBlocklistedPrefsInSubprocesses is true).
   // (Or maybe this crash used to happen when the logger was not lazy, and maybe
   // the preferences were not ready, yet?)
-  return new console.createInstance({
-    maxLogLevel: "Warn",
+  return console.createInstance({
     maxLogLevelPref: "browser.dragdropfilter.log_level",
     prefix: "DragDropFilter",
   });


=====================================
toolkit/modules/TorAndroidIntegration.sys.mjs
=====================================
@@ -19,7 +19,6 @@ const Prefs = Object.freeze({
 });
 
 const logger = console.createInstance({
-  maxLogLevel: "Info",
   maxLogLevelPref: Prefs.logLevel,
   prefix: "TorAndroidIntegration",
 });


=====================================
toolkit/modules/TorConnect.sys.mjs
=====================================
@@ -74,7 +74,6 @@ export class TorConnectError extends Error {
 
 ChromeUtils.defineLazyGetter(lazy, "logger", () =>
   console.createInstance({
-    maxLogLevel: "Info",
     maxLogLevelPref: TorConnectPrefs.log_level,
     prefix: "TorConnect",
   })


=====================================
toolkit/modules/TorSettings.sys.mjs
=====================================
@@ -14,7 +14,6 @@ ChromeUtils.defineESModuleGetters(lazy, {
 
 ChromeUtils.defineLazyGetter(lazy, "logger", () => {
   return console.createInstance({
-    maxLogLevel: "Warn",
     maxLogLevelPref: "browser.torsettings.log_level",
     prefix: "TorSettings",
   });



View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/compare/190db2e18c0dfbf20fb8af877672d44d39a81aa4...b4e46ed02f5055ca47290f6166525a522d790bf9

-- 
View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/compare/190db2e18c0dfbf20fb8af877672d44d39a81aa4...b4e46ed02f5055ca47290f6166525a522d790bf9
You're receiving this email because of your account on gitlab.torproject.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.torproject.org/pipermail/tor-commits/attachments/20240814/42f17131/attachment-0001.htm>


More information about the tor-commits mailing list