[tor-commits] [Git][tpo/applications/mullvad-browser][mullvad-browser-115.11.0esr-13.0-1] Bug 1828259 - Close XUL popup when entering/exiting fullscreen; r=smaug

2024-06-10 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch mullvad-browser-115.11.0esr-13.0-1 at The Tor Project / 
Applications / Mullvad Browser


Commits:
262d3d99 by Edgar Chen at 2024-06-10T20:24:04+02:00
Bug 1828259 - Close XUL popup when entering/exiting fullscreen; r=smaug

Differential Revision: https://phabricator.services.mozilla.com/D209355
- - - - -


1 changed file:

- xpfe/appshell/AppWindow.cpp


Changes:

=
xpfe/appshell/AppWindow.cpp
=
@@ -3018,6 +3018,9 @@ void AppWindow::FullscreenChanged(bool aInFullscreen) {
 
 void AppWindow::FinishFullscreenChange(bool aInFullscreen) {
   mFullscreenChangeState = FullscreenChangeState::NotChanging;
+  if (nsXULPopupManager* pm = nsXULPopupManager::GetInstance()) {
+pm->Rollup({});
+  }
   if (mDocShell) {
 if (nsCOMPtr ourWindow = mDocShell->GetWindow()) {
   ourWindow->FinishFullscreenChange(aInFullscreen);



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/262d3d99cc1fbc4b3aea211ca6190d432b92e5fd

-- 
This project does not include diff previews in email notifications.
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/262d3d99cc1fbc4b3aea211ca6190d432b92e5fd
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][base-browser-115.11.0esr-13.0-1] Bug 1828259 - Close XUL popup when entering/exiting fullscreen; r=smaug

2024-06-10 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch base-browser-115.11.0esr-13.0-1 at The Tor Project / 
Applications / Tor Browser


Commits:
89e409e8 by Edgar Chen at 2024-06-10T20:20:59+02:00
Bug 1828259 - Close XUL popup when entering/exiting fullscreen; r=smaug

Differential Revision: https://phabricator.services.mozilla.com/D209355
- - - - -


1 changed file:

- xpfe/appshell/AppWindow.cpp


Changes:

=
xpfe/appshell/AppWindow.cpp
=
@@ -3018,6 +3018,9 @@ void AppWindow::FullscreenChanged(bool aInFullscreen) {
 
 void AppWindow::FinishFullscreenChange(bool aInFullscreen) {
   mFullscreenChangeState = FullscreenChangeState::NotChanging;
+  if (nsXULPopupManager* pm = nsXULPopupManager::GetInstance()) {
+pm->Rollup({});
+  }
   if (mDocShell) {
 if (nsCOMPtr ourWindow = mDocShell->GetWindow()) {
   ourWindow->FinishFullscreenChange(aInFullscreen);



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/89e409e83f0b8f3018bf746b2966a9f01309b20b

-- 
This project does not include diff previews in email notifications.
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/89e409e83f0b8f3018bf746b2966a9f01309b20b
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][tor-browser-115.11.0esr-13.0-1] Bug 1828259 - Close XUL popup when entering/exiting fullscreen; r=smaug

2024-06-10 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch tor-browser-115.11.0esr-13.0-1 at The Tor Project / 
Applications / Tor Browser


Commits:
8fc6e0c6 by Edgar Chen at 2024-06-10T20:15:15+02:00
Bug 1828259 - Close XUL popup when entering/exiting fullscreen; r=smaug

Differential Revision: https://phabricator.services.mozilla.com/D209355
- - - - -


1 changed file:

- xpfe/appshell/AppWindow.cpp


Changes:

=
xpfe/appshell/AppWindow.cpp
=
@@ -3018,6 +3018,9 @@ void AppWindow::FullscreenChanged(bool aInFullscreen) {
 
 void AppWindow::FinishFullscreenChange(bool aInFullscreen) {
   mFullscreenChangeState = FullscreenChangeState::NotChanging;
+  if (nsXULPopupManager* pm = nsXULPopupManager::GetInstance()) {
+pm->Rollup({});
+  }
   if (mDocShell) {
 if (nsCOMPtr ourWindow = mDocShell->GetWindow()) {
   ourWindow->FinishFullscreenChange(aInFullscreen);



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/8fc6e0c6dd460d9ce144482c9c0181cec6318cbd

-- 
This project does not include diff previews in email notifications.
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/8fc6e0c6dd460d9ce144482c9c0181cec6318cbd
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/mullvad-browser][mullvad-browser-115.11.0esr-13.5-1] fixup! Bug 41916: Letterboxing preferences UI

2024-06-03 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch mullvad-browser-115.11.0esr-13.5-1 at The Tor Project / 
Applications / Mullvad Browser


Commits:
1b8016ae by hackademix at 2024-06-03T10:09:33+02:00
fixup! Bug 41916: Letterboxing preferences UI

Import gLetterboxingPrefs for the linter.

- - - - -


1 changed file:

- browser/components/preferences/main.js


Changes:

=
browser/components/preferences/main.js
=
@@ -3,6 +3,7 @@
  * You can obtain one at http://mozilla.org/MPL/2.0/. */
 
 /* import-globals-from extensionControlled.js */
+/* import-globals-from letterboxing.js */
 /* import-globals-from preferences.js */
 /* import-globals-from /toolkit/mozapps/preferences/fontbuilder.js */
 /* import-globals-from /browser/base/content/aboutDialog-appUpdater.js */



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/1b8016ae3a8b3b168fb7696cbc1dfdfd029b0928

-- 
This project does not include diff previews in email notifications.
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/1b8016ae3a8b3b168fb7696cbc1dfdfd029b0928
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][base-browser-115.11.0esr-13.5-1] fixup! Bug 41916: Letterboxing preferences UI

2024-06-03 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch base-browser-115.11.0esr-13.5-1 at The Tor Project / 
Applications / Tor Browser


Commits:
9054cfca by hackademix at 2024-06-03T10:07:55+02:00
fixup! Bug 41916: Letterboxing preferences UI

Import gLetterboxingPrefs for the linter.

- - - - -


1 changed file:

- browser/components/preferences/main.js


Changes:

=
browser/components/preferences/main.js
=
@@ -3,6 +3,7 @@
  * You can obtain one at http://mozilla.org/MPL/2.0/. */
 
 /* import-globals-from extensionControlled.js */
+/* import-globals-from letterboxing.js */
 /* import-globals-from preferences.js */
 /* import-globals-from /toolkit/mozapps/preferences/fontbuilder.js */
 /* import-globals-from /browser/base/content/aboutDialog-appUpdater.js */



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/9054cfca3b97324401e39e30ce64adad97f42b5d

-- 
This project does not include diff previews in email notifications.
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/9054cfca3b97324401e39e30ce64adad97f42b5d
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][tor-browser-115.11.0esr-13.5-1] fixup! Bug 41916: Letterboxing preferences UI

2024-06-03 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch tor-browser-115.11.0esr-13.5-1 at The Tor Project / 
Applications / Tor Browser


Commits:
2c413893 by hackademix at 2024-06-03T10:01:17+02:00
fixup! Bug 41916: Letterboxing preferences UI

Import gLetterboxingPrefs for the linter.

- - - - -


1 changed file:

- browser/components/preferences/main.js


Changes:

=
browser/components/preferences/main.js
=
@@ -3,6 +3,7 @@
  * You can obtain one at http://mozilla.org/MPL/2.0/. */
 
 /* import-globals-from extensionControlled.js */
+/* import-globals-from letterboxing.js */
 /* import-globals-from preferences.js */
 /* import-globals-from /toolkit/mozapps/preferences/fontbuilder.js */
 /* import-globals-from /browser/base/content/aboutDialog-appUpdater.js */



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/2c4138938b93d9db1767d27f52aaae892dd3c662

-- 
This project does not include diff previews in email notifications.
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/2c4138938b93d9db1767d27f52aaae892dd3c662
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser-build][main] Bug 41148: Update NoScript license to GPL V3.

2024-05-16 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch main at The Tor Project / Applications / tor-browser-build


Commits:
1dc061f3 by hackademix at 2024-05-16T12:45:58+02:00
Bug 41148: Update NoScript license to GPL V3.

- - - - -


1 changed file:

- projects/browser/Bundle-Data/Docs/Licenses/NoScript.txt


Changes:

=
projects/browser/Bundle-Data/Docs/Licenses/NoScript.txt
=
@@ -1,9 +1,9 @@
 NoScript - a Firefox extension for whitelist driven safe JavaScript execution
-Copyright (C) 2005-2023 Giorgio Maone - https://maone.net
+Copyright (C) 2005-2024 Giorgio Maone - https://maone.net
 
 This program is free software; you can redistribute it and/or modify
 it under the terms of the GNU General Public License as published by
-the Free Software Foundation; either version 2 of the License, or
+the Free Software Foundation; either version 3 of the License, or
 (at your option) any later version.
 
 This program is distributed in the hope that it will be useful,



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/commit/1dc061f398221edfc706b68bcaf94324a6c76ab7

-- 
This project does not include diff previews in email notifications.
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/commit/1dc061f398221edfc706b68bcaf94324a6c76ab7
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/firefox-android][firefox-android-115.2.1-13.5-1] fixup! Disable features and functionality

2024-05-14 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch firefox-android-115.2.1-13.5-1 at The Tor Project / 
Applications / firefox-android


Commits:
6eaa81ce by hackademix at 2024-05-15T07:39:36+02:00
fixup! Disable features and functionality

Bug 42578: Reject Android open in Tor Browser intent

- - - - -


1 changed file:

- 
fenix/app/src/main/java/org/mozilla/fenix/home/intent/HomeDeepLinkIntentProcessor.kt


Changes:

=
fenix/app/src/main/java/org/mozilla/fenix/home/intent/HomeDeepLinkIntentProcessor.kt
=
@@ -90,6 +90,15 @@ class HomeDeepLinkIntentProcessor(
 logger.info("Not opening deep link: $url")
 return
 }
+if (BuildConfig.DEEP_LINK_SCHEME.startsWith("torbrowser")) {
+// tor-browser#42578
+// TODO:
+// Maybe just warn users about linkability but
+// give them the choice to open anyway, once
+// the other deep link related issues are fixed.
+logger.info("Tor Browser rejects open intent deep link: 
$deepLink")
+return
+}
 
 activity.openToBrowserAndLoad(
 url,



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/firefox-android/-/commit/6eaa81ce1a0101fdbaa513d22e946f77cdf910d1

-- 
This project does not include diff previews in email notifications.
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/firefox-android/-/commit/6eaa81ce1a0101fdbaa513d22e946f77cdf910d1
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/firefox-android] Pushed new tag firefox-android-115.2.1-13.0-1-build16

2024-05-10 Thread ma1 (@ma1) via tor-commits


ma1 pushed new tag firefox-android-115.2.1-13.0-1-build16 at The Tor Project / 
Applications / firefox-android

-- 
This project does not include diff previews in email notifications.
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/firefox-android/-/tree/firefox-android-115.2.1-13.0-1-build16
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][tor-browser-115.11.0esr-13.0-1] fixup! Bug 30237: Add v3 onion services client authentication prompt

2024-05-09 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch tor-browser-115.11.0esr-13.0-1 at The Tor Project / 
Applications / Tor Browser


Commits:
e4ed3f35 by hackademix at 2024-05-09T17:49:50+02:00
fixup! Bug 30237: Add v3 onion services client authentication prompt

Bug 42557: Fix regression in Onion Services authentication prompt focus

- - - - -


1 changed file:

- browser/components/onionservices/content/authPrompt.js


Changes:

=
browser/components/onionservices/content/authPrompt.js
=
@@ -81,8 +81,18 @@ const OnionAuthPrompt = (function () {
   );
 },
 
+_autoFocus(event) {
+  event.target.ownerGlobal.focus();
+},
+
 _onPromptShowing(aWarningMessage) {
   let xulDoc = this._browser.ownerDocument;
+
+  // Force back focus: tor-browser#41856
+  (this._popupElem = xulDoc.getElementById(
+"tor-clientauth-notification"
+  ))?.addEventListener("click", this._autoFocus);
+
   let descElem = xulDoc.getElementById("tor-clientauth-notification-desc");
   if (descElem) {
 // Handle replacement of the onion name within the localized
@@ -153,6 +163,7 @@ const OnionAuthPrompt = (function () {
   this._boundOnKeyFieldInput = undefined;
 }
   }
+  this._popupElem?.removeEventListener("click", this._autoFocus);
 },
 
 _onKeyFieldKeyPress(aEvent) {



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/e4ed3f35d87f8351bc5a6aa3fd2263ec06ad5413

-- 
This project does not include diff previews in email notifications.
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/e4ed3f35d87f8351bc5a6aa3fd2263ec06ad5413
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/mullvad-browser][mullvad-browser-115.11.0esr-13.5-1] Bug 42574: Letterboxing, exempt pdf.js.

2024-05-09 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch mullvad-browser-115.11.0esr-13.5-1 at The Tor Project / 
Applications / Mullvad Browser


Commits:
d53848c0 by hackademix at 2024-05-09T10:52:58+02:00
Bug 42574: Letterboxing, exempt pdf.js.

- - - - -


1 changed file:

- toolkit/components/resistfingerprinting/RFPHelper.sys.mjs


Changes:

=
toolkit/components/resistfingerprinting/RFPHelper.sys.mjs
=
@@ -475,6 +475,8 @@ class _RFPHelper {
 return (
   // ... privileged pages
   contentPrincipal.isSystemPrincipal ||
+  // pdf.js
+  contentPrincipal.origin.startsWith("resource://pdf.js") ||
   // ... about: URIs EXCEPT about:blank
   (currentURI.schemeIs("about") && currentURI.filePath !== "blank") ||
   // ... source code



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/d53848c06c860e836bb01f2563f656f84108796e

-- 
This project does not include diff previews in email notifications.
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/d53848c06c860e836bb01f2563f656f84108796e
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][base-browser-115.11.0esr-13.5-1] Bug 42574: Letterboxing, exempt pdf.js.

2024-05-09 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch base-browser-115.11.0esr-13.5-1 at The Tor Project / 
Applications / Tor Browser


Commits:
98625d72 by hackademix at 2024-05-09T10:50:26+02:00
Bug 42574: Letterboxing, exempt pdf.js.

- - - - -


1 changed file:

- toolkit/components/resistfingerprinting/RFPHelper.sys.mjs


Changes:

=
toolkit/components/resistfingerprinting/RFPHelper.sys.mjs
=
@@ -475,6 +475,8 @@ class _RFPHelper {
 return (
   // ... privileged pages
   contentPrincipal.isSystemPrincipal ||
+  // pdf.js
+  contentPrincipal.origin.startsWith("resource://pdf.js") ||
   // ... about: URIs EXCEPT about:blank
   (currentURI.schemeIs("about") && currentURI.filePath !== "blank") ||
   // ... source code



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/98625d720cc300c866462fd414df7d2797b862fc

-- 
This project does not include diff previews in email notifications.
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/98625d720cc300c866462fd414df7d2797b862fc
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][tor-browser-115.11.0esr-13.5-1] Bug 42574: Letterboxing, exempt pdf.js.

2024-05-09 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch tor-browser-115.11.0esr-13.5-1 at The Tor Project / 
Applications / Tor Browser


Commits:
410bb24f by hackademix at 2024-05-08T22:26:45+02:00
Bug 42574: Letterboxing, exempt pdf.js.

- - - - -


1 changed file:

- toolkit/components/resistfingerprinting/RFPHelper.sys.mjs


Changes:

=
toolkit/components/resistfingerprinting/RFPHelper.sys.mjs
=
@@ -475,6 +475,8 @@ class _RFPHelper {
 return (
   // ... privileged pages
   contentPrincipal.isSystemPrincipal ||
+  // pdf.js
+  contentPrincipal.origin.startsWith("resource://pdf.js") ||
   // ... about: URIs EXCEPT about:blank
   (currentURI.schemeIs("about") && currentURI.filePath !== "blank") ||
   // ... source code



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/410bb24f88c40ca4283c86c8c002f4d747500605

-- 
This project does not include diff previews in email notifications.
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/410bb24f88c40ca4283c86c8c002f4d747500605
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][tor-browser-115.11.0esr-13.5-1] fixup! Bug 30237: Add v3 onion services client authentication prompt

2024-05-08 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch tor-browser-115.11.0esr-13.5-1 at The Tor Project / 
Applications / Tor Browser


Commits:
02b5bf73 by hackademix at 2024-05-08T12:48:22+02:00
fixup! Bug 30237: Add v3 onion services client authentication prompt

Bug 42557: Fix regression in Onion Services authentication prompt focus

- - - - -


1 changed file:

- browser/components/onionservices/content/authPrompt.js


Changes:

=
browser/components/onionservices/content/authPrompt.js
=
@@ -356,6 +356,13 @@ var OnionAuthPrompt = {
   this._showWarning(undefined);
 });
 
+// Force back focus on click: tor-browser#41856
+document
+  .getElementById("tor-clientauth-notification")
+  .addEventListener("click", () => {
+window.focus();
+  });
+
 Services.obs.addObserver(this, this._topics.clientAuthMissing);
 Services.obs.addObserver(this, this._topics.clientAuthIncorrect);
   },



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/02b5bf73b39d480db8a8f85530aff89011386c17

-- 
This project does not include diff previews in email notifications.
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/02b5bf73b39d480db8a8f85530aff89011386c17
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/mullvad-browser][mullvad-browser-115.10.0esr-13.5-1] fixup! Bug 40926: Implemented the New Identity feature

2024-04-22 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch mullvad-browser-115.10.0esr-13.5-1 at The Tor Project / 
Applications / Mullvad Browser


Commits:
04899df2 by hackademix at 2024-04-22T18:27:14+02:00
fixup! Bug 40926: Implemented the New Identity feature

Bug 42532: Use the HomePage module for new identity checks.

- - - - -


1 changed file:

- browser/components/newidentity/content/newidentity.js


Changes:

=
browser/components/newidentity/content/newidentity.js
=
@@ -395,15 +395,12 @@ XPCOMUtils.defineLazyGetter(this, "NewIdentityButton", () 
=> {
   return new Promise(resolve => {
 // Open a new window forcing the about:privatebrowsing page 
(tor-browser#41765)
 // unless user explicitly overrides this policy (tor-browser #42236)
-const homePref = "browser.startup.homepage";
 const trustedHomePref = "browser.startup.homepage.new_identity";
-const homeURL = Services.prefs.getStringPref(homePref, "");
-const defaultHomeURL = Services.prefs
-  .getDefaultBranch("")
-  .getStringPref(homePref, "");
+const homeURL = HomePage.get();
+const defaultHomeURL = HomePage.getDefault();
 const isTrustedHome =
   homeURL === defaultHomeURL ||
-  homeURL.startsWith("chrome://") || // about:blank and other built-ins
+  homeURL === "chrome://browser/content/blanktab.html" || // 
about:blank
   homeURL === Services.prefs.getStringPref(trustedHomePref, "");
 const isCustomHome =
   Services.prefs.getIntPref("browser.startup.page") === 1;



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/04899df27a6539200bc71dbce26a05f644cfa07c

-- 
This project does not include diff previews in email notifications.
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/04899df27a6539200bc71dbce26a05f644cfa07c
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][base-browser-115.10.0esr-13.5-1] fixup! Bug 40926: Implemented the New Identity feature

2024-04-22 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch base-browser-115.10.0esr-13.5-1 at The Tor Project / 
Applications / Tor Browser


Commits:
5616a8da by hackademix at 2024-04-22T18:26:36+02:00
fixup! Bug 40926: Implemented the New Identity feature

Bug 42532: Use the HomePage module for new identity checks.

- - - - -


1 changed file:

- browser/components/newidentity/content/newidentity.js


Changes:

=
browser/components/newidentity/content/newidentity.js
=
@@ -395,15 +395,12 @@ XPCOMUtils.defineLazyGetter(this, "NewIdentityButton", () 
=> {
   return new Promise(resolve => {
 // Open a new window forcing the about:privatebrowsing page 
(tor-browser#41765)
 // unless user explicitly overrides this policy (tor-browser #42236)
-const homePref = "browser.startup.homepage";
 const trustedHomePref = "browser.startup.homepage.new_identity";
-const homeURL = Services.prefs.getStringPref(homePref, "");
-const defaultHomeURL = Services.prefs
-  .getDefaultBranch("")
-  .getStringPref(homePref, "");
+const homeURL = HomePage.get();
+const defaultHomeURL = HomePage.getDefault();
 const isTrustedHome =
   homeURL === defaultHomeURL ||
-  homeURL.startsWith("chrome://") || // about:blank and other built-ins
+  homeURL === "chrome://browser/content/blanktab.html" || // 
about:blank
   homeURL === Services.prefs.getStringPref(trustedHomePref, "");
 const isCustomHome =
   Services.prefs.getIntPref("browser.startup.page") === 1;



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/5616a8da37ac9bdac4f0d9df222b1f6fffa537d5

-- 
This project does not include diff previews in email notifications.
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/5616a8da37ac9bdac4f0d9df222b1f6fffa537d5
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][tor-browser-115.10.0esr-13.5-1] fixup! Bug 40926: Implemented the New Identity feature

2024-04-22 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch tor-browser-115.10.0esr-13.5-1 at The Tor Project / 
Applications / Tor Browser


Commits:
d98ff16e by hackademix at 2024-04-22T17:06:04+02:00
fixup! Bug 40926: Implemented the New Identity feature

Bug 42532: Use the HomePage module for new identity checks.

- - - - -


1 changed file:

- browser/components/newidentity/content/newidentity.js


Changes:

=
browser/components/newidentity/content/newidentity.js
=
@@ -395,15 +395,12 @@ XPCOMUtils.defineLazyGetter(this, "NewIdentityButton", () 
=> {
   return new Promise(resolve => {
 // Open a new window forcing the about:privatebrowsing page 
(tor-browser#41765)
 // unless user explicitly overrides this policy (tor-browser #42236)
-const homePref = "browser.startup.homepage";
 const trustedHomePref = "browser.startup.homepage.new_identity";
-const homeURL = Services.prefs.getStringPref(homePref, "");
-const defaultHomeURL = Services.prefs
-  .getDefaultBranch("")
-  .getStringPref(homePref, "");
+const homeURL = HomePage.get();
+const defaultHomeURL = HomePage.getDefault();
 const isTrustedHome =
   homeURL === defaultHomeURL ||
-  homeURL.startsWith("chrome://") || // about:blank and other built-ins
+  homeURL === "chrome://browser/content/blanktab.html" || // 
about:blank
   homeURL === Services.prefs.getStringPref(trustedHomePref, "");
 const isCustomHome =
   Services.prefs.getIntPref("browser.startup.page") === 1;



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/d98ff16e559684f1d4792f2b3b1279f3cd659f51

-- 
This project does not include diff previews in email notifications.
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/d98ff16e559684f1d4792f2b3b1279f3cd659f51
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/mullvad-browser][mullvad-browser-115.10.0esr-13.5-1] fixup! Bug 41631: Prevent weird initial window dimensions caused by subpixel computations

2024-04-16 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch mullvad-browser-115.10.0esr-13.5-1 at The Tor Project / 
Applications / Mullvad Browser


Commits:
a17ec8e0 by hackademix at 2024-04-16T22:18:31+02:00
fixup! Bug 41631: Prevent weird initial window dimensions caused by subpixel 
computations

Bug 42520: Correctly record new initial window size after auto-shrinking

- - - - -


1 changed file:

- toolkit/components/resistfingerprinting/RFPHelper.sys.mjs


Changes:

=
toolkit/components/resistfingerprinting/RFPHelper.sys.mjs
=
@@ -633,9 +633,16 @@ class _RFPHelper {
   lazy.logConsole.error(e);
 }
   }
-  if (needToShrink) {
-win.shrinkToLetterbox();
-this._recordWindowSize(win);
+  if (needToShrink && win.shrinkToLetterbox()) {
+win.addEventListener(
+  "resize",
+  () => {
+// We need to record the "new" initial size in this listener
+// because resized dimensions are not immediately available.
+RFPHelper._recordWindowSize(win);
+  },
+  { once: true }
+);
   }
 });
   },
@@ -741,23 +748,30 @@ class _RFPHelper {
   }
 
   _recordWindowSize(aWindow) {
-aWindow._rfpOriginalSize = {
-  width: aWindow.outerWidth,
-  height: aWindow.outerHeight,
-  containerHeight: aWindow.gBrowser.getBrowserContainer()?.clientHeight,
-};
-log("Recording original window size", aWindow._rfpOriginalSize);
+aWindow.promiseDocumentFlushed(() => {
+  aWindow._rfpOriginalSize = {
+width: aWindow.outerWidth,
+height: aWindow.outerHeight,
+containerHeight: aWindow.gBrowser.getBrowserContainer()?.clientHeight,
+  };
+  log("Recording original window size", aWindow._rfpOriginalSize);
+});
   }
 
   // We will attach this method to each browser window. When called
   // it will instantly resize the window to exactly fit the selected
   // (possibly letterboxed) browser.
+  // Returns true if a window resize will occur, false otherwise.
   shrinkToLetterbox() {
 let { selectedBrowser } = this.gBrowser;
 let stack = selectedBrowser.closest(".browserStack");
 const outer = stack.getBoundingClientRect();
 const inner = selectedBrowser.getBoundingClientRect();
-this.resizeBy(inner.width - outer.width, inner.height - outer.height);
+if (inner.width !== outer.witdh || inner.height !== outer.height) {
+  this.resizeBy(inner.width - outer.width, inner.height - outer.height);
+  return true;
+}
+return false;
   }
 
   _onWindowDoubleClick(e) {



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/a17ec8e069203abfe8d90c6ed7119312097a354d

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/a17ec8e069203abfe8d90c6ed7119312097a354d
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][base-browser-115.10.0esr-13.5-1] fixup! Bug 41631: Prevent weird initial window dimensions caused by subpixel computations

2024-04-16 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch base-browser-115.10.0esr-13.5-1 at The Tor Project / 
Applications / Tor Browser


Commits:
97575530 by hackademix at 2024-04-16T22:17:42+02:00
fixup! Bug 41631: Prevent weird initial window dimensions caused by subpixel 
computations

Bug 42520: Correctly record new initial window size after auto-shrinking

- - - - -


1 changed file:

- toolkit/components/resistfingerprinting/RFPHelper.sys.mjs


Changes:

=
toolkit/components/resistfingerprinting/RFPHelper.sys.mjs
=
@@ -633,9 +633,16 @@ class _RFPHelper {
   lazy.logConsole.error(e);
 }
   }
-  if (needToShrink) {
-win.shrinkToLetterbox();
-this._recordWindowSize(win);
+  if (needToShrink && win.shrinkToLetterbox()) {
+win.addEventListener(
+  "resize",
+  () => {
+// We need to record the "new" initial size in this listener
+// because resized dimensions are not immediately available.
+RFPHelper._recordWindowSize(win);
+  },
+  { once: true }
+);
   }
 });
   },
@@ -741,23 +748,30 @@ class _RFPHelper {
   }
 
   _recordWindowSize(aWindow) {
-aWindow._rfpOriginalSize = {
-  width: aWindow.outerWidth,
-  height: aWindow.outerHeight,
-  containerHeight: aWindow.gBrowser.getBrowserContainer()?.clientHeight,
-};
-log("Recording original window size", aWindow._rfpOriginalSize);
+aWindow.promiseDocumentFlushed(() => {
+  aWindow._rfpOriginalSize = {
+width: aWindow.outerWidth,
+height: aWindow.outerHeight,
+containerHeight: aWindow.gBrowser.getBrowserContainer()?.clientHeight,
+  };
+  log("Recording original window size", aWindow._rfpOriginalSize);
+});
   }
 
   // We will attach this method to each browser window. When called
   // it will instantly resize the window to exactly fit the selected
   // (possibly letterboxed) browser.
+  // Returns true if a window resize will occur, false otherwise.
   shrinkToLetterbox() {
 let { selectedBrowser } = this.gBrowser;
 let stack = selectedBrowser.closest(".browserStack");
 const outer = stack.getBoundingClientRect();
 const inner = selectedBrowser.getBoundingClientRect();
-this.resizeBy(inner.width - outer.width, inner.height - outer.height);
+if (inner.width !== outer.witdh || inner.height !== outer.height) {
+  this.resizeBy(inner.width - outer.width, inner.height - outer.height);
+  return true;
+}
+return false;
   }
 
   _onWindowDoubleClick(e) {



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/9757553093631c9142890b0b35f7b4927d70999b

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/9757553093631c9142890b0b35f7b4927d70999b
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][tor-browser-115.10.0esr-13.5-1] fixup! Bug 41631: Prevent weird initial window dimensions caused by subpixel computations

2024-04-16 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch tor-browser-115.10.0esr-13.5-1 at The Tor Project / 
Applications / Tor Browser


Commits:
334c638e by hackademix at 2024-04-16T17:24:54+02:00
fixup! Bug 41631: Prevent weird initial window dimensions caused by subpixel 
computations

Bug 42520: Correctly record new initial window size after auto-shrinking

- - - - -


1 changed file:

- toolkit/components/resistfingerprinting/RFPHelper.sys.mjs


Changes:

=
toolkit/components/resistfingerprinting/RFPHelper.sys.mjs
=
@@ -633,9 +633,16 @@ class _RFPHelper {
   lazy.logConsole.error(e);
 }
   }
-  if (needToShrink) {
-win.shrinkToLetterbox();
-this._recordWindowSize(win);
+  if (needToShrink && win.shrinkToLetterbox()) {
+win.addEventListener(
+  "resize",
+  () => {
+// We need to record the "new" initial size in this listener
+// because resized dimensions are not immediately available.
+RFPHelper._recordWindowSize(win);
+  },
+  { once: true }
+);
   }
 });
   },
@@ -741,23 +748,30 @@ class _RFPHelper {
   }
 
   _recordWindowSize(aWindow) {
-aWindow._rfpOriginalSize = {
-  width: aWindow.outerWidth,
-  height: aWindow.outerHeight,
-  containerHeight: aWindow.gBrowser.getBrowserContainer()?.clientHeight,
-};
-log("Recording original window size", aWindow._rfpOriginalSize);
+aWindow.promiseDocumentFlushed(() => {
+  aWindow._rfpOriginalSize = {
+width: aWindow.outerWidth,
+height: aWindow.outerHeight,
+containerHeight: aWindow.gBrowser.getBrowserContainer()?.clientHeight,
+  };
+  log("Recording original window size", aWindow._rfpOriginalSize);
+});
   }
 
   // We will attach this method to each browser window. When called
   // it will instantly resize the window to exactly fit the selected
   // (possibly letterboxed) browser.
+  // Returns true if a window resize will occur, false otherwise.
   shrinkToLetterbox() {
 let { selectedBrowser } = this.gBrowser;
 let stack = selectedBrowser.closest(".browserStack");
 const outer = stack.getBoundingClientRect();
 const inner = selectedBrowser.getBoundingClientRect();
-this.resizeBy(inner.width - outer.width, inner.height - outer.height);
+if (inner.width !== outer.witdh || inner.height !== outer.height) {
+  this.resizeBy(inner.width - outer.width, inner.height - outer.height);
+  return true;
+}
+return false;
   }
 
   _onWindowDoubleClick(e) {



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/334c638e5c21a40441674c8ffc1fadbbaff3e67d

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/334c638e5c21a40441674c8ffc1fadbbaff3e67d
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/mullvad-browser][mullvad-browser-115.10.0esr-13.5-1] fixup! Base Browser strings

2024-04-16 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch mullvad-browser-115.10.0esr-13.5-1 at The Tor Project / 
Applications / Mullvad Browser


Commits:
9eaf8f6d by hackademix at 2024-04-16T13:14:32+02:00
fixup! Base Browser strings

MB 288: Standardize capitalization in Letterboxing preferences

- - - - -


1 changed file:

- browser/locales/en-US/browser/base-browser.ftl


Changes:

=
browser/locales/en-US/browser/base-browser.ftl
=
@@ -84,7 +84,7 @@ letterboxing-window-size-header = Window size
 letterboxing-remember-size =
 .label = Reuse last window size when opening a new window
 .accesskey = R
-letterboxing-alignment-header = Content Alignment
+letterboxing-alignment-header = Content alignment
 letterboxing-alignment-description = Choose where you want to align the 
website’s content.
 letterboxing-alignment-top = Top
 letterboxing-alignment-middle = Middle



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/9eaf8f6d1689a9160aa813f71b3226b67aa34ea2

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/9eaf8f6d1689a9160aa813f71b3226b67aa34ea2
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][base-browser-115.10.0esr-13.5-1] fixup! Base Browser strings

2024-04-16 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch base-browser-115.10.0esr-13.5-1 at The Tor Project / 
Applications / Tor Browser


Commits:
e98e00fa by hackademix at 2024-04-16T13:12:56+02:00
fixup! Base Browser strings

MB 288: Standardize capitalization in Letterboxing preferences

- - - - -


1 changed file:

- browser/locales/en-US/browser/base-browser.ftl


Changes:

=
browser/locales/en-US/browser/base-browser.ftl
=
@@ -84,7 +84,7 @@ letterboxing-window-size-header = Window size
 letterboxing-remember-size =
 .label = Reuse last window size when opening a new window
 .accesskey = R
-letterboxing-alignment-header = Content Alignment
+letterboxing-alignment-header = Content alignment
 letterboxing-alignment-description = Choose where you want to align the 
website’s content.
 letterboxing-alignment-top = Top
 letterboxing-alignment-middle = Middle



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/e98e00fa9e255946bc9c2b157b6340f50c9eaa0e

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/e98e00fa9e255946bc9c2b157b6340f50c9eaa0e
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][tor-browser-115.10.0esr-13.5-1] fixup! Base Browser strings

2024-04-16 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch tor-browser-115.10.0esr-13.5-1 at The Tor Project / 
Applications / Tor Browser


Commits:
1f1f3ab2 by hackademix at 2024-04-16T13:09:00+02:00
fixup! Base Browser strings

MB 288: Standardize capitalization in Letterboxing preferences

- - - - -


1 changed file:

- browser/locales/en-US/browser/base-browser.ftl


Changes:

=
browser/locales/en-US/browser/base-browser.ftl
=
@@ -84,7 +84,7 @@ letterboxing-window-size-header = Window size
 letterboxing-remember-size =
 .label = Reuse last window size when opening a new window
 .accesskey = R
-letterboxing-alignment-header = Content Alignment
+letterboxing-alignment-header = Content alignment
 letterboxing-alignment-description = Choose where you want to align the 
website’s content.
 letterboxing-alignment-top = Top
 letterboxing-alignment-middle = Middle



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/1f1f3ab2fe67c4f164f28717782c9dc237e2de18

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/1f1f3ab2fe67c4f164f28717782c9dc237e2de18
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][tor-browser-115.10.0esr-13.5-1] fixup! Bug 41803: Add some developer tools for working on tor-browser.

2024-04-16 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch tor-browser-115.10.0esr-13.5-1 at The Tor Project / 
Applications / Tor Browser


Commits:
bbc4a77b by hackademix at 2024-04-16T13:01:03+02:00
fixup! Bug 41803: Add some developer tools for working on tor-browser.

Bug 42516: Make tb-dev worktree-compatible

- - - - -


1 changed file:

- browser/locales/en-US/browser/base-browser.ftl


Changes:

=
browser/locales/en-US/browser/base-browser.ftl
=
@@ -84,7 +84,7 @@ letterboxing-window-size-header = Window size
 letterboxing-remember-size =
 .label = Reuse last window size when opening a new window
 .accesskey = R
-letterboxing-alignment-header = Content Alignment
+letterboxing-alignment-header = Content alignment
 letterboxing-alignment-description = Choose where you want to align the 
website’s content.
 letterboxing-alignment-top = Top
 letterboxing-alignment-middle = Middle



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/bbc4a77bdade246d170e0f76afb74fcbc4b75a53

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/bbc4a77bdade246d170e0f76afb74fcbc4b75a53
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][tor-browser-115.10.0esr-13.5-1] fixup! Bug 41803: Add some developer tools for working on tor-browser.

2024-04-15 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch tor-browser-115.10.0esr-13.5-1 at The Tor Project / 
Applications / Tor Browser


Commits:
89a5a7fd by hackademix at 2024-04-15T11:52:47+02:00
fixup! Bug 41803: Add some developer tools for working on tor-browser.

Bug 42516: Make tb-dev worktree-compatible

- - - - -


1 changed file:

- tools/torbrowser/tb-dev


Changes:

=
tools/torbrowser/tb-dev
=
@@ -57,10 +57,12 @@ def get_local_root():
 global local_root
 if local_root is None:
 try:
+# Make sure we have a matching remote in this git repository. 
Should raise Exception if we don't.
+get_upstream_name()
 git_root = git_get(["rev-parse", "--show-toplevel"])[0]
-except subprocess.CalledProcessError:
+except Exception:
 git_root = None
-if git_root is None or os.path.basename(git_root) != "tor-browser":
+if git_root is None:
 local_root = ""
 else:
 local_root = git_root



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/89a5a7fd311640a4b50b951bcf8ef1b035aa37bb

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/89a5a7fd311640a4b50b951bcf8ef1b035aa37bb
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/mullvad-browser][mullvad-browser-115.9.0esr-13.5-1] fixup! Bug 40926: Implemented the New Identity feature

2024-04-08 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch mullvad-browser-115.9.0esr-13.5-1 at The Tor Project / 
Applications / Mullvad Browser


Commits:
1c3780c3 by hackademix at 2024-04-08T09:42:42+02:00
fixup! Bug 40926: Implemented the New Identity feature

MB 283: Make new identity homepage check brand-agnostic.

- - - - -


1 changed file:

- browser/components/newidentity/content/newidentity.js


Changes:

=
browser/components/newidentity/content/newidentity.js
=
@@ -398,8 +398,11 @@ XPCOMUtils.defineLazyGetter(this, "NewIdentityButton", () 
=> {
 const homePref = "browser.startup.homepage";
 const trustedHomePref = "browser.startup.homepage.new_identity";
 const homeURL = Services.prefs.getStringPref(homePref, "");
+const defaultHomeURL = Services.prefs
+  .getDefaultBranch("")
+  .getStringPref(homePref, "");
 const isTrustedHome =
-  homeURL === "about:tor" ||
+  homeURL === defaultHomeURL ||
   homeURL.startsWith("chrome://") || // about:blank and other built-ins
   homeURL === Services.prefs.getStringPref(trustedHomePref, "");
 const isCustomHome =



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/1c3780c33bf57714c959e3db3809138f6ee178f3

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/1c3780c33bf57714c959e3db3809138f6ee178f3
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][base-browser-115.9.0esr-13.5-1] fixup! Bug 40926: Implemented the New Identity feature

2024-04-08 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch base-browser-115.9.0esr-13.5-1 at The Tor Project / 
Applications / Tor Browser


Commits:
96048e5a by hackademix at 2024-04-08T09:39:24+02:00
fixup! Bug 40926: Implemented the New Identity feature

MB 283: Make new identity homepage check brand-agnostic.

- - - - -


1 changed file:

- browser/components/newidentity/content/newidentity.js


Changes:

=
browser/components/newidentity/content/newidentity.js
=
@@ -398,8 +398,11 @@ XPCOMUtils.defineLazyGetter(this, "NewIdentityButton", () 
=> {
 const homePref = "browser.startup.homepage";
 const trustedHomePref = "browser.startup.homepage.new_identity";
 const homeURL = Services.prefs.getStringPref(homePref, "");
+const defaultHomeURL = Services.prefs
+  .getDefaultBranch("")
+  .getStringPref(homePref, "");
 const isTrustedHome =
-  homeURL === "about:tor" ||
+  homeURL === defaultHomeURL ||
   homeURL.startsWith("chrome://") || // about:blank and other built-ins
   homeURL === Services.prefs.getStringPref(trustedHomePref, "");
 const isCustomHome =



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/96048e5a606a85de4ce8f913f72c1a0b6aa81a9b

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/96048e5a606a85de4ce8f913f72c1a0b6aa81a9b
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][tor-browser-115.9.0esr-13.5-1] fixup! Bug 40926: Implemented the New Identity feature

2024-04-08 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch tor-browser-115.9.0esr-13.5-1 at The Tor Project / 
Applications / Tor Browser


Commits:
4d7d8276 by hackademix at 2024-04-08T09:31:41+02:00
fixup! Bug 40926: Implemented the New Identity feature

MB 283: Make new identity homepage check brand-agnostic.

- - - - -


1 changed file:

- browser/components/newidentity/content/newidentity.js


Changes:

=
browser/components/newidentity/content/newidentity.js
=
@@ -398,8 +398,11 @@ XPCOMUtils.defineLazyGetter(this, "NewIdentityButton", () 
=> {
 const homePref = "browser.startup.homepage";
 const trustedHomePref = "browser.startup.homepage.new_identity";
 const homeURL = Services.prefs.getStringPref(homePref, "");
+const defaultHomeURL = Services.prefs
+  .getDefaultBranch("")
+  .getStringPref(homePref, "");
 const isTrustedHome =
-  homeURL === "about:tor" ||
+  homeURL === defaultHomeURL ||
   homeURL.startsWith("chrome://") || // about:blank and other built-ins
   homeURL === Services.prefs.getStringPref(trustedHomePref, "");
 const isCustomHome =



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/4d7d82768694b80a2621228cc78c1379958e2733

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/4d7d82768694b80a2621228cc78c1379958e2733
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/mullvad-browser][mullvad-browser-115.9.0esr-13.5-1] Bug 1886852 - Avoid registering unnecessary MessageManager listeners when SHIP is enabled, r=smaug!

2024-03-26 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch mullvad-browser-115.9.0esr-13.5-1 at The Tor Project / 
Applications / Mullvad Browser


Commits:
b6e29f24 by Nika Layzell at 2024-03-26T18:25:59+01:00
Bug 1886852 - Avoid registering unnecessary MessageManager listeners when SHIP 
is enabled, r=smaug!

Differential Revision: https://phabricator.services.mozilla.com/D205377
- - - - -


1 changed file:

- browser/components/sessionstore/SessionStore.sys.mjs


Changes:

=
browser/components/sessionstore/SessionStore.sys.mjs
=
@@ -1422,6 +1422,13 @@ var SessionStoreInternal = {
* and thus enables communication with OOP tabs.
*/
   receiveMessage(aMessage) {
+if (Services.appinfo.sessionHistoryInParent) {
+  throw new Error(
+`received unexpected message '${aMessage.name}' with ` +
+  `sessionHistoryInParent enabled`
+  );
+}
+
 // If we got here, that means we're dealing with a frame message
 // manager message, so the target will be a .
 var browser = aMessage.target;
@@ -1600,14 +1607,14 @@ var SessionStoreInternal = {
 // internal data about the window.
 aWindow.__SSi = this._generateWindowID();
 
-let mm = aWindow.getGroupMessageManager("browsers");
-MESSAGES.forEach(msg => {
-  let listenWhenClosed = CLOSED_MESSAGES.has(msg);
-  mm.addMessageListener(msg, this, listenWhenClosed);
-});
-
-// Load the frame script after registering listeners.
 if (!Services.appinfo.sessionHistoryInParent) {
+  let mm = aWindow.getGroupMessageManager("browsers");
+  MESSAGES.forEach(msg => {
+let listenWhenClosed = CLOSED_MESSAGES.has(msg);
+mm.addMessageListener(msg, this, listenWhenClosed);
+  });
+
+  // Load the frame script after registering listeners.
   mm.loadFrameScript(
 "chrome://browser/content/content-sessionStore.js",
 true,
@@ -2083,8 +2090,10 @@ var SessionStoreInternal = {
 // Cache the window state until it is completely gone.
 DyingWindowCache.set(aWindow, winData);
 
-let mm = aWindow.getGroupMessageManager("browsers");
-MESSAGES.forEach(msg => mm.removeMessageListener(msg, this));
+if (!Services.appinfo.sessionHistoryInParent) {
+  let mm = aWindow.getGroupMessageManager("browsers");
+  MESSAGES.forEach(msg => mm.removeMessageListener(msg, this));
+}
 
 this._saveableClosedWindowData.delete(winData);
 delete aWindow.__SSi;



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/b6e29f242a7c5e1f24d76c01579d4bc93f86b0ad

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/b6e29f242a7c5e1f24d76c01579d4bc93f86b0ad
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][base-browser-115.9.0esr-13.5-1] Bug 1886852 - Avoid registering unnecessary MessageManager listeners when SHIP is enabled, r=smaug!

2024-03-26 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch base-browser-115.9.0esr-13.5-1 at The Tor Project / 
Applications / Tor Browser


Commits:
8e8ac7a1 by Nika Layzell at 2024-03-26T18:23:53+01:00
Bug 1886852 - Avoid registering unnecessary MessageManager listeners when SHIP 
is enabled, r=smaug!

Differential Revision: https://phabricator.services.mozilla.com/D205377
- - - - -


1 changed file:

- browser/components/sessionstore/SessionStore.sys.mjs


Changes:

=
browser/components/sessionstore/SessionStore.sys.mjs
=
@@ -1422,6 +1422,13 @@ var SessionStoreInternal = {
* and thus enables communication with OOP tabs.
*/
   receiveMessage(aMessage) {
+if (Services.appinfo.sessionHistoryInParent) {
+  throw new Error(
+`received unexpected message '${aMessage.name}' with ` +
+  `sessionHistoryInParent enabled`
+  );
+}
+
 // If we got here, that means we're dealing with a frame message
 // manager message, so the target will be a .
 var browser = aMessage.target;
@@ -1600,14 +1607,14 @@ var SessionStoreInternal = {
 // internal data about the window.
 aWindow.__SSi = this._generateWindowID();
 
-let mm = aWindow.getGroupMessageManager("browsers");
-MESSAGES.forEach(msg => {
-  let listenWhenClosed = CLOSED_MESSAGES.has(msg);
-  mm.addMessageListener(msg, this, listenWhenClosed);
-});
-
-// Load the frame script after registering listeners.
 if (!Services.appinfo.sessionHistoryInParent) {
+  let mm = aWindow.getGroupMessageManager("browsers");
+  MESSAGES.forEach(msg => {
+let listenWhenClosed = CLOSED_MESSAGES.has(msg);
+mm.addMessageListener(msg, this, listenWhenClosed);
+  });
+
+  // Load the frame script after registering listeners.
   mm.loadFrameScript(
 "chrome://browser/content/content-sessionStore.js",
 true,
@@ -2083,8 +2090,10 @@ var SessionStoreInternal = {
 // Cache the window state until it is completely gone.
 DyingWindowCache.set(aWindow, winData);
 
-let mm = aWindow.getGroupMessageManager("browsers");
-MESSAGES.forEach(msg => mm.removeMessageListener(msg, this));
+if (!Services.appinfo.sessionHistoryInParent) {
+  let mm = aWindow.getGroupMessageManager("browsers");
+  MESSAGES.forEach(msg => mm.removeMessageListener(msg, this));
+}
 
 this._saveableClosedWindowData.delete(winData);
 delete aWindow.__SSi;



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/8e8ac7a1877e4be2d02e58e513f383b89cc6300d

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/8e8ac7a1877e4be2d02e58e513f383b89cc6300d
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/mullvad-browser] Pushed new tag mullvad-browser-115.9.1esr-13.0-1-build1

2024-03-22 Thread ma1 (@ma1) via tor-commits


ma1 pushed new tag mullvad-browser-115.9.1esr-13.0-1-build1 at The Tor Project 
/ Applications / Mullvad Browser

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/tree/mullvad-browser-115.9.1esr-13.0-1-build1
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/mullvad-browser][mullvad-browser-115.9.1esr-13.0-1] 18 commits: MB 38: Mullvad Browser configuration

2024-03-22 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch mullvad-browser-115.9.1esr-13.0-1 at The Tor Project / 
Applications / Mullvad Browser


Commits:
e27339b2 by Pier Angelo Vendrame at 2024-03-22T13:30:37+01:00
MB 38: Mullvad Browser configuration

- - - - -
890fc86e by Pier Angelo Vendrame at 2024-03-22T13:30:38+01:00
MB 1: Mullvad Browser branding

See also:
mullvad-browser#5: Product name and directory customization
mullvad-browser#12: Create new branding directories and integrate Mullvad 
icons+branding
mullvad-browser#14: Remove Default Built-in bookmarks
mullvad-browser#35: Add custom PDF icons for Windows builds
mullvad-browser#48: Replace Mozilla copyright and legal trademarks in 
mullvadbrowser.exe metadata
mullvad-browser#51: Update trademark string
mullvad-browser#104: Update shipped dll metadata copyright/licensing info
mullvad-browser#107: Add alpha and nightly icons

- - - - -
8457cfe2 by Pier Angelo Vendrame at 2024-03-22T13:30:39+01:00
MB 20: Allow packaged-addons in PBM.

We install a few addons from the distribution directory, but they are
not automatically enabled for PBM mode.
This commit modifies the code that installs them to also add the PBM
permission to the known ones.

- - - - -
9ebfee4d by Pier Angelo Vendrame at 2024-03-22T13:30:40+01:00
MB 63: Customize some about pages for Mullvad Browser

Also:
mullvad-browser#57: Purge unneeded about: pages

- - - - -
c73a54ab by Pier Angelo Vendrame at 2024-03-22T14:07:02+01:00
MB 37: Customization for the about dialog

- - - - -
0643bbdd by Henry Wilkes at 2024-03-22T14:07:03+01:00
MB 39: Add home page about:mullvad-browser

- - - - -
6e0a04f3 by hackademix at 2024-03-22T14:07:05+01:00
MB 97: Remove UI cues to install new extensions.

- - - - -
5d3323fe by hackademix at 2024-03-22T14:07:06+01:00
MB 47: uBlock Origin customization

- - - - -
e6a2e35b by Pier Angelo Vendrame at 2024-03-22T14:07:08+01:00
MB 21: Disable the password manager

This commit disables the about:login page and removes the Login and
Password section of about:preferences.

We do not do anything to the real password manager of Firefox, that is
in toolkit: it contains C++ parts that make it difficult to actually
prevent it from being built..

Finally, we modify the the function that opens about:login to report an
error in the console so that we can quickly get a backtrace to the code
that tries to use it.

- - - - -
58d1dbda by Pier Angelo Vendrame at 2024-03-22T14:07:09+01:00
MB 87: Disable the default browser box on Windows and Linux

Windows and Linux will be distributed only as portable apps at the
beginning, so they should not be settable as default browsers.
We will need to improve the logic once we decide to ship system-wide
installers, too.

- - - - -
a055020f by Pier Angelo Vendrame at 2024-03-22T14:07:10+01:00
MB 112: Updater customization for Mullvad Browser

MB 71: Set the updater base URL to Mullvad domain

- - - - -
233c5e02 by Nicolas Vigier at 2024-03-22T14:07:12+01:00
MB 79: Add Mullvad Browser MAR signing keys

MB 256: Add mullvad-browser nightly mar signing key

- - - - -
f424d0a6 by Pier Angelo Vendrame at 2024-03-22T14:07:14+01:00
MB 34: Hide unsafe and unwanted preferences UI

about:preferences allow to override some of our defaults, that could
be fingeprintable or have some other unwanted consequences.

- - - - -
f0d45502 by Pier Angelo Vendrame at 2024-03-22T14:07:15+01:00
MB 160: Disable the cookie exceptions button

Besides disabling the Delete on close checkbox, disable also the
Manage Exceptions button when always using PBM.

- - - - -
31171acd by hackademix at 2024-03-22T14:07:16+01:00
MB 163: prevent uBlock Origin from being uninstalled/disabled

- - - - -
1f741e74 by Richard Pospesel at 2024-03-22T14:07:17+01:00
MB 188: Customize Gitlab Issue and Merge templates

- - - - -
a86d6ab2 by rui hildt at 2024-03-22T14:07:18+01:00
MB 213: Customize the search engines list

- - - - -
6cd85fb3 by hackademix at 2024-03-22T14:07:19+01:00
MB 214: Enable cross-tab identity leak protection in quiet mode

- - - - -


30 changed files:

- + .gitlab/issue_templates/Rebase Browser - Alpha.md
- + .gitlab/issue_templates/Rebase Browser - Stable.md
- .gitlab/merge_request_templates/default.md
- browser/app/Makefile.in
- browser/app/macbuild/Contents/Info.plist.in
- browser/app/module.ver
- browser/app/firefox.exe.manifest → browser/app/mullvadbrowser.exe.manifest
- + browser/app/profile/000-mullvad-browser.js
- browser/app/profile/001-base-profile.js
- browser/base/content/aboutDialog.xhtml
- browser/base/content/appmenu-viewcache.inc.xhtml
- browser/base/content/browser-menubar.inc
- browser/base/content/browser-places.js
- browser/base/content/browser.js
- browser/base/content/default-bookmarks.html
- browser/base/content/nsContextMenu.js
- browser/base/content/overrides/app-license.html
- browser/base/content/pageinfo/pageInfo.xhtml
- browser/base/content/utilityOverlay.js
- browser/branding/branding-common.mozbuild
- + browser/branding/mb-alpha/VisualElements_150.png
- + 

[tor-commits] [Git][tpo/applications/tor-browser-build][maint-13.0] Bug 41108, 41109: Prepare Tor and Mullvad Browser Stable 13.0.13

2024-03-22 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch maint-13.0 at The Tor Project / Applications / 
tor-browser-build


Commits:
49992f2b by Richard Pospesel at 2024-03-22T13:04:30+00:00
Bug 41108, 41109: Prepare Tor and Mullvad Browser Stable 13.0.13

- - - - -


5 changed files:

- projects/browser/Bundle-Data/Docs-MB/ChangeLog.txt
- projects/browser/Bundle-Data/Docs-TBB/ChangeLog.txt
- projects/firefox/config
- projects/translation/config
- rbm.conf


Changes:

=
projects/browser/Bundle-Data/Docs-MB/ChangeLog.txt
=
@@ -1,3 +1,9 @@
+Mullvad Browser 13.0.13 - March 22 2024
+ * Windows + macOS + Linux
+   * Updated Firefox to 115.9.1esr
+   * Bug 42473: ESR 115.9.1 fixes [tor-browser]
+   * Bug 277: Rebase Mullvad Browser stable onto Firefox 115.9.1esr 
[mullvad-browser]
+
 Mullvad Browser 13.0.12 - March 19 2024
  * All Platforms
* Updated Firefox to 115.9.0esr


=
projects/browser/Bundle-Data/Docs-TBB/ChangeLog.txt
=
@@ -1,3 +1,9 @@
+Tor Browser 13.0.13 - March 22 2024
+ * Windows + macOS + Linux
+   * Updated Firefox to 115.9.1esr
+   * Bug 42473: ESR 115.9.1 fixes [tor-browser]
+   * Bug 42474: Rebase stable browsers on 115.9.1 [tor-browser]
+
 Tor Browser 13.0.12 - March 19 2024
  * All Platforms
* Updated Snowflake to 2.9.2


=
projects/firefox/config
=
@@ -14,13 +14,11 @@ container:
   use_container: 1
 
 var:
-  firefox_platform_version: 115.9.0
+  firefox_platform_version: 115.9.1
   firefox_version: '[% c("var/firefox_platform_version") %]esr'
   browser_series: '13.0'
   browser_branch: '[% c("var/browser_series") %]-1'
-  # update the mullvadbrowser specific override for 115.10.0
-  # torbrowser had an extra firefox build tag
-  browser_build: 3
+  browser_build: 1
   branding_directory_prefix: 'tb'
   copyright_year: '[% exec("git show -s --format=%ci").remove("-.*") %]'
   nightly_updates_publish_dir: '[% c("var/nightly_updates_publish_dir_prefix") 
%]nightly-[% c("var/osname") %]'
@@ -104,7 +102,6 @@ targets:
   mullvadbrowser:
 git_url: https://gitlab.torproject.org/tpo/applications/mullvad-browser.git
 var:
-  browser_build: 2
   branding_directory_prefix: 'mb'
   gitlab_project: 
https://gitlab.torproject.org/tpo/applications/mullvad-browser
   updater_url: 'https://cdn.mullvad.net/browser/update_responses/update_1/'


=
projects/translation/config
=
@@ -12,13 +12,13 @@ compress_tar: 'gz'
 steps:
   base-browser:
 base-browser: '[% INCLUDE build %]'
-git_hash: a4d224e82808529e135259e04fb58fb39b90da2d
+git_hash: 8e04ca3c5f440ed8f16b2069ae9565e4b044ec29
 targets:
   nightly:
 git_hash: 'base-browser'
   tor-browser:
 tor-browser: '[% INCLUDE build %]'
-git_hash: e7aabc54138211e23bc60af1abe492c8bc68ce4b
+git_hash: bf2fac60a6c41aa67b8147f22a638d498ac2dcdd
 targets:
   nightly:
 git_hash: 'tor-browser'
@@ -32,7 +32,7 @@ steps:
 fenix: '[% INCLUDE build %]'
 # We need to bump the commit before releasing but just pointing to a branch
 # might cause too much rebuidling of the Firefox part.
-git_hash: ef6bef5e373108c4e633998b517e4bc8c297770a
+git_hash: c5d462fc3513f23fc74193c7a5c31027fc07672d
 compress_tar: 'zst'
 targets:
   nightly:


=
rbm.conf
=
@@ -73,13 +73,13 @@ buildconf:
   git_signtag_opt: '-s'
 
 var:
-  torbrowser_version: '13.0.12'
-  torbrowser_build: 'build2'
+  torbrowser_version: '13.0.13'
+  torbrowser_build: 'build1'
   torbrowser_incremental_from:
+- '13.0.12'
 - '[% IF c("var/tor-browser") %]13.0.11[% END %]'
 - '13.0.10'
-- '13.0.9'
-- '[% IF c("var/mullvad-browser") %]13.0.7[% END %]'
+- '[% IF c("var/mullvad-browser") %]13.0.9[% END %]'
   updater_enabled: 1
   build_mar: 1
   mar_channel_id: '[% c("var/projectname") %]-torproject-[% c("var/channel") 
%]'



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/commit/49992f2bf9f1c86b0930fdab06d1cfaac63decaf

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/commit/49992f2bf9f1c86b0930fdab06d1cfaac63decaf
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/mullvad-browser] Pushed new tag FIREFOX_115_9_1esr_BUILD1

2024-03-22 Thread ma1 (@ma1) via tor-commits


ma1 pushed new tag FIREFOX_115_9_1esr_BUILD1 at The Tor Project / Applications 
/ Mullvad Browser

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/tree/FIREFOX_115_9_1esr_BUILD1
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/mullvad-browser] Pushed new tag base-browser-115.9.1esr-13.0-1-build1

2024-03-22 Thread ma1 (@ma1) via tor-commits


ma1 pushed new tag base-browser-115.9.1esr-13.0-1-build1 at The Tor Project / 
Applications / Mullvad Browser

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/tree/base-browser-115.9.1esr-13.0-1-build1
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/mullvad-browser] Pushed new branch mullvad-browser-115.9.1esr-13.0-1

2024-03-22 Thread ma1 (@ma1) via tor-commits


ma1 pushed new branch mullvad-browser-115.9.1esr-13.0-1 at The Tor Project / 
Applications / Mullvad Browser

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/tree/mullvad-browser-115.9.1esr-13.0-1
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser] Pushed new tag base-browser-115.9.1esr-13.0-1-build1

2024-03-22 Thread ma1 (@ma1) via tor-commits


ma1 pushed new tag base-browser-115.9.1esr-13.0-1-build1 at The Tor Project / 
Applications / Tor Browser

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/tree/base-browser-115.9.1esr-13.0-1-build1
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser] Pushed new tag tor-browser-115.9.1esr-13.0-1-build1

2024-03-22 Thread ma1 (@ma1) via tor-commits


ma1 pushed new tag tor-browser-115.9.1esr-13.0-1-build1 at The Tor Project / 
Applications / Tor Browser

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/tree/tor-browser-115.9.1esr-13.0-1-build1
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][tor-browser-115.9.0esr-13.5-1] Bug 1886852 - Avoid registering unnecessary MessageManager listeners when SHIP is enabled, r=smaug!

2024-03-22 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch tor-browser-115.9.0esr-13.5-1 at The Tor Project / 
Applications / Tor Browser


Commits:
b7fc915f by Nika Layzell at 2024-03-21T22:41:17+01:00
Bug 1886852 - Avoid registering unnecessary MessageManager listeners when SHIP 
is enabled, r=smaug!

Differential Revision: https://phabricator.services.mozilla.com/D205377
- - - - -


1 changed file:

- browser/components/sessionstore/SessionStore.sys.mjs


Changes:

=
browser/components/sessionstore/SessionStore.sys.mjs
=
@@ -1422,6 +1422,13 @@ var SessionStoreInternal = {
* and thus enables communication with OOP tabs.
*/
   receiveMessage(aMessage) {
+if (Services.appinfo.sessionHistoryInParent) {
+  throw new Error(
+`received unexpected message '${aMessage.name}' with ` +
+  `sessionHistoryInParent enabled`
+  );
+}
+
 // If we got here, that means we're dealing with a frame message
 // manager message, so the target will be a .
 var browser = aMessage.target;
@@ -1600,14 +1607,14 @@ var SessionStoreInternal = {
 // internal data about the window.
 aWindow.__SSi = this._generateWindowID();
 
-let mm = aWindow.getGroupMessageManager("browsers");
-MESSAGES.forEach(msg => {
-  let listenWhenClosed = CLOSED_MESSAGES.has(msg);
-  mm.addMessageListener(msg, this, listenWhenClosed);
-});
-
-// Load the frame script after registering listeners.
 if (!Services.appinfo.sessionHistoryInParent) {
+  let mm = aWindow.getGroupMessageManager("browsers");
+  MESSAGES.forEach(msg => {
+let listenWhenClosed = CLOSED_MESSAGES.has(msg);
+mm.addMessageListener(msg, this, listenWhenClosed);
+  });
+
+  // Load the frame script after registering listeners.
   mm.loadFrameScript(
 "chrome://browser/content/content-sessionStore.js",
 true,
@@ -2083,8 +2090,10 @@ var SessionStoreInternal = {
 // Cache the window state until it is completely gone.
 DyingWindowCache.set(aWindow, winData);
 
-let mm = aWindow.getGroupMessageManager("browsers");
-MESSAGES.forEach(msg => mm.removeMessageListener(msg, this));
+if (!Services.appinfo.sessionHistoryInParent) {
+  let mm = aWindow.getGroupMessageManager("browsers");
+  MESSAGES.forEach(msg => mm.removeMessageListener(msg, this));
+}
 
 this._saveableClosedWindowData.delete(winData);
 delete aWindow.__SSi;



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/b7fc915f3ed100830bd8574a62f9cd653c1ec250

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/b7fc915f3ed100830bd8574a62f9cd653c1ec250
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser] Deleted branch tor-browser-115.9.1esr-13.0.1

2024-03-22 Thread ma1 (@ma1) via tor-commits


ma1 deleted branch tor-browser-115.9.1esr-13.0.1 at The Tor Project / 
Applications / Tor Browser

-- 

You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser] Pushed new branch tor-browser-115.9.1esr-13.0-1

2024-03-22 Thread ma1 (@ma1) via tor-commits


ma1 pushed new branch tor-browser-115.9.1esr-13.0-1 at The Tor Project / 
Applications / Tor Browser

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/tree/tor-browser-115.9.1esr-13.0-1
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser] Pushed new branch tor-browser-115.9.1esr-13.0.1

2024-03-22 Thread ma1 (@ma1) via tor-commits


ma1 pushed new branch tor-browser-115.9.1esr-13.0.1 at The Tor Project / 
Applications / Tor Browser

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/tree/tor-browser-115.9.1esr-13.0.1
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser] Pushed new tag FIREFOX_115_9_1esr_BUILD1

2024-03-22 Thread ma1 (@ma1) via tor-commits


ma1 pushed new tag FIREFOX_115_9_1esr_BUILD1 at The Tor Project / Applications 
/ Tor Browser

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/tree/FIREFOX_115_9_1esr_BUILD1
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser] Pushed new branch base-browser-115.9.1esr-13.0-1

2024-03-22 Thread ma1 (@ma1) via tor-commits


ma1 pushed new branch base-browser-115.9.1esr-13.0-1 at The Tor Project / 
Applications / Tor Browser

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/tree/base-browser-115.9.1esr-13.0-1
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/mullvad-browser][mullvad-browser-115.9.0esr-13.5-1] Bug 42443: Shrink window to match letterboxing size when the emtpy area is clicked.

2024-03-13 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch mullvad-browser-115.9.0esr-13.5-1 at The Tor Project / 
Applications / Mullvad Browser


Commits:
bec1f691 by hackademix at 2024-03-13T20:37:37+01:00
Bug 42443: Shrink window to match letterboxing size when the emtpy area is 
clicked.

- - - - -


1 changed file:

- toolkit/components/resistfingerprinting/RFPHelper.sys.mjs


Changes:

=
toolkit/components/resistfingerprinting/RFPHelper.sys.mjs
=
@@ -750,8 +750,27 @@ class _RFPHelper {
 });
   }
 
+  // We will attach this method to each browser window. When called
+  // it will instantly resize the window to exactly fit the selected
+  // (possibly letterboxed) browser.
+  shrinkToLetterbox() {
+let { selectedBrowser } = this.gBrowser;
+let stack = selectedBrowser.closest(".browserStack");
+const outer = stack.getBoundingClientRect();
+const inner = selectedBrowser.getBoundingClientRect();
+this.resizeBy(inner.width - outer.width, inner.height - outer.height);
+  }
+
+  _onWindowDoubleClick(e) {
+if (e.target.classList.contains("browserStack")) {
+  e.currentTarget.shrinkToLetterbox();
+}
+  }
+
   _attachWindow(aWindow) {
 aWindow.addEventListener("sizemodechange", windowResizeHandler);
+aWindow.shrinkToLetterbox = this.shrinkToLetterbox;
+aWindow.addEventListener("dblclick", this._onWindowDoubleClick);
 aWindow.gBrowser.addTabsProgressListener(this);
 aWindow.addEventListener("TabOpen", this);
 const resizeObserver = (aWindow._rfpResizeObserver =
@@ -783,9 +802,12 @@ class _RFPHelper {
   let browser = tab.linkedBrowser;
   this._resetContentSize(browser);
 }
+aWindow.removeEventListener("dblclick", this._onWindowDoubleClick);
+delete aWindow.shrinkToLetterbox;
 aWindow.removeEventListener("sizemodechange", windowResizeHandler);
   }
 
+
   _handleDOMWindowOpened(win) {
 let self = this;
 



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/bec1f6915db5ce909545dfb1aa5266ab79b97a97

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/bec1f6915db5ce909545dfb1aa5266ab79b97a97
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][base-browser-115.9.0esr-13.5-1] Bug 42443: Shrink window to match letterboxing size when the emtpy area is clicked.

2024-03-13 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch base-browser-115.9.0esr-13.5-1 at The Tor Project / 
Applications / Tor Browser


Commits:
aefa5f37 by hackademix at 2024-03-13T20:35:54+01:00
Bug 42443: Shrink window to match letterboxing size when the emtpy area is 
clicked.

- - - - -


1 changed file:

- toolkit/components/resistfingerprinting/RFPHelper.sys.mjs


Changes:

=
toolkit/components/resistfingerprinting/RFPHelper.sys.mjs
=
@@ -750,8 +750,27 @@ class _RFPHelper {
 });
   }
 
+  // We will attach this method to each browser window. When called
+  // it will instantly resize the window to exactly fit the selected
+  // (possibly letterboxed) browser.
+  shrinkToLetterbox() {
+let { selectedBrowser } = this.gBrowser;
+let stack = selectedBrowser.closest(".browserStack");
+const outer = stack.getBoundingClientRect();
+const inner = selectedBrowser.getBoundingClientRect();
+this.resizeBy(inner.width - outer.width, inner.height - outer.height);
+  }
+
+  _onWindowDoubleClick(e) {
+if (e.target.classList.contains("browserStack")) {
+  e.currentTarget.shrinkToLetterbox();
+}
+  }
+
   _attachWindow(aWindow) {
 aWindow.addEventListener("sizemodechange", windowResizeHandler);
+aWindow.shrinkToLetterbox = this.shrinkToLetterbox;
+aWindow.addEventListener("dblclick", this._onWindowDoubleClick);
 aWindow.gBrowser.addTabsProgressListener(this);
 aWindow.addEventListener("TabOpen", this);
 const resizeObserver = (aWindow._rfpResizeObserver =
@@ -783,9 +802,12 @@ class _RFPHelper {
   let browser = tab.linkedBrowser;
   this._resetContentSize(browser);
 }
+aWindow.removeEventListener("dblclick", this._onWindowDoubleClick);
+delete aWindow.shrinkToLetterbox;
 aWindow.removeEventListener("sizemodechange", windowResizeHandler);
   }
 
+
   _handleDOMWindowOpened(win) {
 let self = this;
 



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/aefa5f37615c1ec1b271b135dd75b7ffc113ddd3

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/aefa5f37615c1ec1b271b135dd75b7ffc113ddd3
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][tor-browser-115.9.0esr-13.5-1] Bug 42443: Shrink window to match letterboxing size when the emtpy area is clicked.

2024-03-13 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch tor-browser-115.9.0esr-13.5-1 at The Tor Project / 
Applications / Tor Browser


Commits:
c99204f2 by hackademix at 2024-03-13T16:39:27+01:00
Bug 42443: Shrink window to match letterboxing size when the emtpy area is 
clicked.

- - - - -


1 changed file:

- toolkit/components/resistfingerprinting/RFPHelper.sys.mjs


Changes:

=
toolkit/components/resistfingerprinting/RFPHelper.sys.mjs
=
@@ -750,8 +750,27 @@ class _RFPHelper {
 });
   }
 
+  // We will attach this method to each browser window. When called
+  // it will instantly resize the window to exactly fit the selected
+  // (possibly letterboxed) browser.
+  shrinkToLetterbox() {
+let { selectedBrowser } = this.gBrowser;
+let stack = selectedBrowser.closest(".browserStack");
+const outer = stack.getBoundingClientRect();
+const inner = selectedBrowser.getBoundingClientRect();
+this.resizeBy(inner.width - outer.width, inner.height - outer.height);
+  }
+
+  _onWindowDoubleClick(e) {
+if (e.target.classList.contains("browserStack")) {
+  e.currentTarget.shrinkToLetterbox();
+}
+  }
+
   _attachWindow(aWindow) {
 aWindow.addEventListener("sizemodechange", windowResizeHandler);
+aWindow.shrinkToLetterbox = this.shrinkToLetterbox;
+aWindow.addEventListener("dblclick", this._onWindowDoubleClick);
 aWindow.gBrowser.addTabsProgressListener(this);
 aWindow.addEventListener("TabOpen", this);
 const resizeObserver = (aWindow._rfpResizeObserver =
@@ -783,9 +802,12 @@ class _RFPHelper {
   let browser = tab.linkedBrowser;
   this._resetContentSize(browser);
 }
+aWindow.removeEventListener("dblclick", this._onWindowDoubleClick);
+delete aWindow.shrinkToLetterbox;
 aWindow.removeEventListener("sizemodechange", windowResizeHandler);
   }
 
+
   _handleDOMWindowOpened(win) {
 let self = this;
 



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/c99204f2656a665e7cc90ac3a1b1760f41e63168

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/c99204f2656a665e7cc90ac3a1b1760f41e63168
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/mullvad-browser][mullvad-browser-115.8.0esr-13.5-1] fixup! Bug 41918: Option to reuse last window size when letterboxing is enabled.

2024-03-06 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch mullvad-browser-115.8.0esr-13.5-1 at The Tor Project / 
Applications / Mullvad Browser


Commits:
6da931f7 by hackademix at 2024-03-06T22:12:22+01:00
fixup! Bug 41918: Option to reuse last window size when letterboxing is enabled.

Fixes typo in RFHelper.sys.mjs (Service - Services).

- - - - -


1 changed file:

- toolkit/components/resistfingerprinting/RFPHelper.sys.mjs


Changes:

=
toolkit/components/resistfingerprinting/RFPHelper.sys.mjs
=
@@ -223,7 +223,7 @@ class _RFPHelper {
   _handlePrefChanged(data) {
 switch (data) {
   case kPrefResistFingerprinting:
-Service.prefs.clearUserPref(kPrefLetterboxingDidForceSize);
+Services.prefs.clearUserPref(kPrefLetterboxingDidForceSize);
 this._handleResistFingerprintingChanged();
 break;
   case kPrefSpoofEnglish:
@@ -231,7 +231,7 @@ class _RFPHelper {
 this._handleSpoofEnglishChanged();
 break;
   case kPrefLetterboxing:
-Service.prefs.clearUserPref(kPrefLetterboxingDidForceSize);
+Services.prefs.clearUserPref(kPrefLetterboxingDidForceSize);
   case kPrefLetterboxingVcenter:
   case kPrefLetterboxingGradient:
 this._handleLetterboxingPrefChanged();



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/6da931f7fb7e664dc662d0df06b5b91242611626

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/6da931f7fb7e664dc662d0df06b5b91242611626
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][base-browser-115.8.0esr-13.5-1] fixup! Bug 41918: Option to reuse last window size when letterboxing is enabled.

2024-03-06 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch base-browser-115.8.0esr-13.5-1 at The Tor Project / 
Applications / Tor Browser


Commits:
1564281f by hackademix at 2024-03-06T22:10:59+01:00
fixup! Bug 41918: Option to reuse last window size when letterboxing is enabled.

Fixes typo in RFHelper.sys.mjs (Service - Services).

- - - - -


1 changed file:

- toolkit/components/resistfingerprinting/RFPHelper.sys.mjs


Changes:

=
toolkit/components/resistfingerprinting/RFPHelper.sys.mjs
=
@@ -223,7 +223,7 @@ class _RFPHelper {
   _handlePrefChanged(data) {
 switch (data) {
   case kPrefResistFingerprinting:
-Service.prefs.clearUserPref(kPrefLetterboxingDidForceSize);
+Services.prefs.clearUserPref(kPrefLetterboxingDidForceSize);
 this._handleResistFingerprintingChanged();
 break;
   case kPrefSpoofEnglish:
@@ -231,7 +231,7 @@ class _RFPHelper {
 this._handleSpoofEnglishChanged();
 break;
   case kPrefLetterboxing:
-Service.prefs.clearUserPref(kPrefLetterboxingDidForceSize);
+Services.prefs.clearUserPref(kPrefLetterboxingDidForceSize);
   case kPrefLetterboxingVcenter:
   case kPrefLetterboxingGradient:
 this._handleLetterboxingPrefChanged();



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/1564281fd5a03cfe772074be9b41c2927513d189

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/1564281fd5a03cfe772074be9b41c2927513d189
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][tor-browser-115.8.0esr-13.5-1] fixup! Bug 41918: Option to reuse last window size when letterboxing is enabled.

2024-03-06 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch tor-browser-115.8.0esr-13.5-1 at The Tor Project / 
Applications / Tor Browser


Commits:
03dbfffc by hackademix at 2024-03-06T22:06:28+01:00
fixup! Bug 41918: Option to reuse last window size when letterboxing is enabled.

Fixes typo in RFHelper.sys.mjs (Service - Services).

- - - - -


1 changed file:

- toolkit/components/resistfingerprinting/RFPHelper.sys.mjs


Changes:

=
toolkit/components/resistfingerprinting/RFPHelper.sys.mjs
=
@@ -223,7 +223,7 @@ class _RFPHelper {
   _handlePrefChanged(data) {
 switch (data) {
   case kPrefResistFingerprinting:
-Service.prefs.clearUserPref(kPrefLetterboxingDidForceSize);
+Services.prefs.clearUserPref(kPrefLetterboxingDidForceSize);
 this._handleResistFingerprintingChanged();
 break;
   case kPrefSpoofEnglish:
@@ -231,7 +231,7 @@ class _RFPHelper {
 this._handleSpoofEnglishChanged();
 break;
   case kPrefLetterboxing:
-Service.prefs.clearUserPref(kPrefLetterboxingDidForceSize);
+Services.prefs.clearUserPref(kPrefLetterboxingDidForceSize);
   case kPrefLetterboxingVcenter:
   case kPrefLetterboxingGradient:
 this._handleLetterboxingPrefChanged();



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/03dbfffc3cdaa9584c49fe61dbfe887d2bcfdb41

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/03dbfffc3cdaa9584c49fe61dbfe887d2bcfdb41
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser-build][main] Bug 41092: Use an uncompressed omni.ja to improve final apk compression.

2024-02-27 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch main at The Tor Project / Applications / tor-browser-build


Commits:
5333cc52 by Giorgio Maone at 2024-02-26T20:26:46+00:00
Bug 41092: Use an uncompressed omni.ja to improve final apk compression.

- - - - -


1 changed file:

- projects/browser/build.android


Changes:

=
projects/browser/build.android
=
@@ -35,10 +35,7 @@ unzip ../omni.ja
 [% END -%]
 [% c('zip', {
 zip_src   => [ '.' ],
-zip_args  => '../assets/omni.ja',
-use_7z=> 1,
-'7z_bin'  => '7zz',
-'7z_opts' => '-mx9',
+zip_args  => '-0 ../assets/omni.ja',
   }) %]
 popd
 



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/commit/5333cc52d7c1e0d8a6d9d252a24757f6f66df814

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/commit/5333cc52d7c1e0d8a6d9d252a24757f6f66df814
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/mullvad-browser][mullvad-browser-115.7.0esr-13.5-1] fixup! Bug 32308: use direct browser sizing for letterboxing.

2024-02-07 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch mullvad-browser-115.7.0esr-13.5-1 at The Tor Project / 
Applications / Mullvad Browser


Commits:
800f6ebf by hackademix at 2024-02-07T18:53:36+01:00
fixup! Bug 32308: use direct browser sizing for letterboxing.

Bug 42389: make the betterboxing gradient actually work.

- - - - -


1 changed file:

- browser/base/content/browser.css


Changes:

=
browser/base/content/browser.css
=
@@ -168,7 +168,6 @@ body {
 
 .letterboxing.letterboxing-gradient .browserContainer {
   background: linear-gradient(283deg, var(--letterboxing-gradient-color1) 0%, 
var(--letterboxing-gradient-color2) 100%), var(--letterboxing-bgcolor);
-  box-shadow: rgba(0, 0, 0, 0.5) 0px -1px 2px;
 }
 
 :root:not([inDOMFullscreen]) .letterboxing 
.browserContainer:not(.responsive-mode)
@@ -231,12 +230,12 @@ body {
   border-top-right-radius: var(--letterboxing-border-top-radius);
   width: var(--letterboxing-width) !important;
   height: var(--letterboxing-height) !important;
+  background: var(--letterboxing-gradient-color2);
 }
 
 :root:not([inDOMFullscreen]) .letterboxing.letterboxing-ready 
.browserContainer:not(.responsive-mode)
   > .browserStack:not(.exclude-letterboxing) {
   place-content: var(--letterboxing-vertical-alignment) center;
-  background: var(--letterboxing-bgcolor);
 }
 
 #toolbar-menubar[autohide="true"] {



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/800f6ebf17fbbc8bacc303bd13828c33f01cecf7

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/800f6ebf17fbbc8bacc303bd13828c33f01cecf7
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][tor-browser-115.7.0esr-13.5-1] fixup! Bug 32308: use direct browser sizing for letterboxing.

2024-02-07 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch tor-browser-115.7.0esr-13.5-1 at The Tor Project / 
Applications / Tor Browser


Commits:
c13c55f4 by hackademix at 2024-02-07T18:42:34+01:00
fixup! Bug 32308: use direct browser sizing for letterboxing.

Bug 42389: make the betterboxing gradient actually work.

- - - - -


1 changed file:

- browser/base/content/browser.css


Changes:

=
browser/base/content/browser.css
=
@@ -168,7 +168,6 @@ body {
 
 .letterboxing.letterboxing-gradient .browserContainer {
   background: linear-gradient(283deg, var(--letterboxing-gradient-color1) 0%, 
var(--letterboxing-gradient-color2) 100%), var(--letterboxing-bgcolor);
-  box-shadow: rgba(0, 0, 0, 0.5) 0px -1px 2px;
 }
 
 :root:not([inDOMFullscreen]) .letterboxing 
.browserContainer:not(.responsive-mode)
@@ -231,12 +230,12 @@ body {
   border-top-right-radius: var(--letterboxing-border-top-radius);
   width: var(--letterboxing-width) !important;
   height: var(--letterboxing-height) !important;
+  background: var(--letterboxing-gradient-color2);
 }
 
 :root:not([inDOMFullscreen]) .letterboxing.letterboxing-ready 
.browserContainer:not(.responsive-mode)
   > .browserStack:not(.exclude-letterboxing) {
   place-content: var(--letterboxing-vertical-alignment) center;
-  background: var(--letterboxing-bgcolor);
 }
 
 #toolbar-menubar[autohide="true"] {



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/c13c55f4af6b80a89fd1256d7659087217da8e43

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/c13c55f4af6b80a89fd1256d7659087217da8e43
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/mullvad-browser][mullvad-browser-115.7.0esr-13.5-1] Bug 1867408 - NSS backport

2024-01-22 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch mullvad-browser-115.7.0esr-13.5-1 at The Tor Project / 
Applications / Mullvad Browser


Commits:
00f5c6d8 by hackademix at 2024-01-22T17:00:26+01:00
Bug 1867408 - NSS backport

- - - - -


1 changed file:

- security/nss/lib/ssl/sslsecur.c


Changes:

=
security/nss/lib/ssl/sslsecur.c
=
@@ -488,7 +488,12 @@ ssl_SendSavedWriteData(sslSocket *ss)
 if (rv < 0) {
 return rv;
 }
-ss->pendingBuf.len -= rv;
+if (rv > ss->pendingBuf.len) {
+PORT_Assert(0); /* This shouldn't happen */
+ss->pendingBuf.len = 0;
+} else {
+ss->pendingBuf.len -= rv;
+}
 if (ss->pendingBuf.len > 0 && rv > 0) {
 /* UGH !! This shifts the whole buffer down by copying it */
 PORT_Memmove(ss->pendingBuf.buf, ss->pendingBuf.buf + rv,



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/00f5c6d87febe04ecaa181a892fcb01ff1f6526d

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/00f5c6d87febe04ecaa181a892fcb01ff1f6526d
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/mullvad-browser][mullvad-browser-115.7.0esr-13.0-1] Bug 1867408 - NSS backport

2024-01-22 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch mullvad-browser-115.7.0esr-13.0-1 at The Tor Project / 
Applications / Mullvad Browser


Commits:
e0af4349 by hackademix at 2024-01-22T16:57:26+01:00
Bug 1867408 - NSS backport

- - - - -


1 changed file:

- security/nss/lib/ssl/sslsecur.c


Changes:

=
security/nss/lib/ssl/sslsecur.c
=
@@ -488,7 +488,12 @@ ssl_SendSavedWriteData(sslSocket *ss)
 if (rv < 0) {
 return rv;
 }
-ss->pendingBuf.len -= rv;
+if (rv > ss->pendingBuf.len) {
+PORT_Assert(0); /* This shouldn't happen */
+ss->pendingBuf.len = 0;
+} else {
+ss->pendingBuf.len -= rv;
+}
 if (ss->pendingBuf.len > 0 && rv > 0) {
 /* UGH !! This shifts the whole buffer down by copying it */
 PORT_Memmove(ss->pendingBuf.buf, ss->pendingBuf.buf + rv,



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/e0af43495ec05b2f0b4a4f035ca4ca6935b54307

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/e0af43495ec05b2f0b4a4f035ca4ca6935b54307
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][base-browser-115.7.0esr-13.5-1] Bug 1867408 - NSS backport

2024-01-22 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch base-browser-115.7.0esr-13.5-1 at The Tor Project / 
Applications / Tor Browser


Commits:
eed2de42 by hackademix at 2024-01-22T16:56:41+01:00
Bug 1867408 - NSS backport

- - - - -


1 changed file:

- security/nss/lib/ssl/sslsecur.c


Changes:

=
security/nss/lib/ssl/sslsecur.c
=
@@ -488,7 +488,12 @@ ssl_SendSavedWriteData(sslSocket *ss)
 if (rv < 0) {
 return rv;
 }
-ss->pendingBuf.len -= rv;
+if (rv > ss->pendingBuf.len) {
+PORT_Assert(0); /* This shouldn't happen */
+ss->pendingBuf.len = 0;
+} else {
+ss->pendingBuf.len -= rv;
+}
 if (ss->pendingBuf.len > 0 && rv > 0) {
 /* UGH !! This shifts the whole buffer down by copying it */
 PORT_Memmove(ss->pendingBuf.buf, ss->pendingBuf.buf + rv,



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/eed2de42dbce5898281b4987eecf29fed0303769

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/eed2de42dbce5898281b4987eecf29fed0303769
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][base-browser-115.7.0esr-13.0-1] Bug 1867408 - NSS backport

2024-01-22 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch base-browser-115.7.0esr-13.0-1 at The Tor Project / 
Applications / Tor Browser


Commits:
6c906dba by hackademix at 2024-01-22T16:46:05+01:00
Bug 1867408 - NSS backport

- - - - -


1 changed file:

- security/nss/lib/ssl/sslsecur.c


Changes:

=
security/nss/lib/ssl/sslsecur.c
=
@@ -488,7 +488,12 @@ ssl_SendSavedWriteData(sslSocket *ss)
 if (rv < 0) {
 return rv;
 }
-ss->pendingBuf.len -= rv;
+if (rv > ss->pendingBuf.len) {
+PORT_Assert(0); /* This shouldn't happen */
+ss->pendingBuf.len = 0;
+} else {
+ss->pendingBuf.len -= rv;
+}
 if (ss->pendingBuf.len > 0 && rv > 0) {
 /* UGH !! This shifts the whole buffer down by copying it */
 PORT_Memmove(ss->pendingBuf.buf, ss->pendingBuf.buf + rv,



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/6c906dba9373f791bf5b3ef99d57d334274dea20

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/6c906dba9373f791bf5b3ef99d57d334274dea20
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][tor-browser-115.7.0esr-13.5-1] Bug 1867408 - NSS backport

2024-01-22 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch tor-browser-115.7.0esr-13.5-1 at The Tor Project / 
Applications / Tor Browser


Commits:
cbeecf99 by hackademix at 2024-01-22T16:29:11+01:00
Bug 1867408 - NSS backport

- - - - -


1 changed file:

- security/nss/lib/ssl/sslsecur.c


Changes:

=
security/nss/lib/ssl/sslsecur.c
=
@@ -488,7 +488,12 @@ ssl_SendSavedWriteData(sslSocket *ss)
 if (rv < 0) {
 return rv;
 }
-ss->pendingBuf.len -= rv;
+if (rv > ss->pendingBuf.len) {
+PORT_Assert(0); /* This shouldn't happen */
+ss->pendingBuf.len = 0;
+} else {
+ss->pendingBuf.len -= rv;
+}
 if (ss->pendingBuf.len > 0 && rv > 0) {
 /* UGH !! This shifts the whole buffer down by copying it */
 PORT_Memmove(ss->pendingBuf.buf, ss->pendingBuf.buf + rv,



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/cbeecf99ee499c4f1d428f105ad86d0f6762f64a

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/cbeecf99ee499c4f1d428f105ad86d0f6762f64a
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/firefox-android][firefox-android-115.2.1-13.0-1] 10 commits: fixup! Bug 1823316 - Use 'Snackbar' themed Dialog to notify on making app full-screen

2024-01-11 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch firefox-android-115.2.1-13.0-1 at The Tor Project / 
Applications / firefox-android


Commits:
753c937e by hackademix at 2024-01-11T16:53:03+01:00
fixup! Bug 1823316 - Use Snackbar themed Dialog to notify on making 
app full-screen

Fix tor-browser#42355 backporting regression.

- - - - -
0cd27910 by t-p-white at 2024-01-11T16:53:04+01:00
Bug 1864549 - Fix for IllegalStateException in full screen notification dialog

- - - - -
a7cafd1b by Alexandru2909 at 2024-01-11T16:53:04+01:00
Bug 1810776 - Move DismissedTabBackground into its own file

- - - - -
e40a62ad by DreVla at 2024-01-11T16:53:05+01:00
Bug 1828493 - Apply purple overlay on list item when in multi-select

When having the list layout for tabs tray and entering multi-select
mode, the selected list items should have a purple non opaque overlay
on the thumbnail, as it was before in the XML implementation.

- - - - -
b4e5ab52 by Alexandru2909 at 2024-01-11T16:53:05+01:00
Bug 1810776 - Add SwipeToDismiss to composed tabs tray

- - - - -
20a18e5b by Noah Bond at 2024-01-11T16:53:05+01:00
Bug 1815579 - Improve performance of image loading in tab items

- - - - -
a07ec0d9 by Noah Bond at 2024-01-11T16:53:06+01:00
Bug 1840896 - Remove `rememberSaveable` since bitmaps are not serializable

- - - - -
a860d4a3 by Noah Bond at 2024-01-11T16:53:06+01:00
Bug 1844967 - Improve performance of tab thumbnail loading in Compose

- - - - -
0481dabe by Matthew Tighe at 2024-01-11T16:53:07+01:00
Bug 1721904 - update thumbnail caching on app open

- - - - -
3400c111 by hackademix at 2024-01-11T16:53:07+01:00
Bug 42191: Temporary StrictMode relaxation to clear the thumbnail cache.

- - - - -


30 changed files:

- 
android-components/components/browser/state/src/main/java/mozilla/components/browser/state/action/BrowserAction.kt
- 
android-components/components/browser/state/src/main/java/mozilla/components/browser/state/reducer/ContentStateReducer.kt
- 
android-components/components/browser/tabstray/src/main/java/mozilla/components/browser/tabstray/TabViewHolder.kt
- 
android-components/components/browser/tabstray/src/test/java/mozilla/components/browser/tabstray/DefaultTabViewHolderTest.kt
- 
android-components/components/browser/thumbnails/src/main/java/mozilla/components/browser/thumbnails/ThumbnailsMiddleware.kt
- 
android-components/components/browser/thumbnails/src/main/java/mozilla/components/browser/thumbnails/storage/ThumbnailStorage.kt
- 
android-components/components/browser/thumbnails/src/main/java/mozilla/components/browser/thumbnails/utils/ThumbnailDiskCache.kt
- 
android-components/components/browser/thumbnails/src/test/java/mozilla/components/browser/thumbnails/ThumbnailsMiddlewareTest.kt
- 
android-components/components/browser/thumbnails/src/test/java/mozilla/components/browser/thumbnails/loader/ThumbnailLoaderTest.kt
- 
android-components/components/browser/thumbnails/src/test/java/mozilla/components/browser/thumbnails/storage/ThumbnailStorageTest.kt
- 
android-components/components/browser/thumbnails/src/test/java/mozilla/components/browser/thumbnails/utils/ThumbnailDiskCacheTest.kt
- 
android-components/components/concept/base/src/main/java/mozilla/components/concept/base/images/ImageRequest.kt
- 
android-components/components/feature/prompts/src/main/java/mozilla/components/feature/prompts/dialog/FullScreenNotificationDialog.kt
- fenix/app/src/main/java/org/mozilla/fenix/browser/BaseBrowserFragment.kt
- fenix/app/src/main/java/org/mozilla/fenix/browser/TabPreview.kt
- fenix/app/src/main/java/org/mozilla/fenix/browser/ToolbarGestureHandler.kt
- + fenix/app/src/main/java/org/mozilla/fenix/compose/SwipeToDismiss.kt
- + fenix/app/src/main/java/org/mozilla/fenix/compose/TabThumbnail.kt
- fenix/app/src/main/java/org/mozilla/fenix/compose/ThumbnailCard.kt
- + fenix/app/src/main/java/org/mozilla/fenix/compose/ThumbnailImage.kt
- fenix/app/src/main/java/org/mozilla/fenix/compose/list/ListItem.kt
- + 
fenix/app/src/main/java/org/mozilla/fenix/compose/tabstray/DismissedTabBackground.kt
- fenix/app/src/main/java/org/mozilla/fenix/compose/tabstray/TabGridItem.kt
- fenix/app/src/main/java/org/mozilla/fenix/compose/tabstray/TabListItem.kt
- fenix/app/src/main/java/org/mozilla/fenix/home/collections/CollectionItem.kt
- 
fenix/app/src/main/java/org/mozilla/fenix/home/recentsyncedtabs/view/RecentSyncedTab.kt
- 
fenix/app/src/main/java/org/mozilla/fenix/home/recentsyncedtabs/view/RecentSyncedTabViewHolder.kt
- 
fenix/app/src/main/java/org/mozilla/fenix/home/recenttabs/view/RecentTabViewHolder.kt
- fenix/app/src/main/java/org/mozilla/fenix/home/recenttabs/view/RecentTabs.kt
- fenix/app/src/main/java/org/mozilla/fenix/tabstray/TabsTray.kt


The diff was not included because it is too large.


View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/firefox-android/-/compare/dadeaa78a62f166eebbeb100f43ab73ba9ba995e...3400c111a643a01594f3a4818fd21e78c6a9c9ed

-- 
View it on GitLab: 

[tor-commits] [Git][tpo/applications/firefox-android][firefox-android-115.2.1-13.5-1] 2 commits: fixup! Bug 1823316 - Use 'Snackbar' themed Dialog to notify on making app full-screen

2024-01-09 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch firefox-android-115.2.1-13.5-1 at The Tor Project / 
Applications / firefox-android


Commits:
a57e5d10 by hackademix at 2024-01-10T08:41:06+01:00
fixup! Bug 1823316 - Use Snackbar themed Dialog to notify on making 
app full-screen

Fix tor-browser#42355 backporting regression.

- - - - -
c1397e81 by t-p-white at 2024-01-10T08:41:06+01:00
Bug 1864549 - Fix for IllegalStateException in full screen notification dialog

- - - - -


2 changed files:

- 
android-components/components/feature/prompts/src/main/java/mozilla/components/feature/prompts/dialog/FullScreenNotificationDialog.kt
- fenix/app/src/main/java/org/mozilla/fenix/browser/BaseBrowserFragment.kt


Changes:

=
android-components/components/feature/prompts/src/main/java/mozilla/components/feature/prompts/dialog/FullScreenNotificationDialog.kt
=
@@ -59,11 +59,12 @@ class FullScreenNotificationDialog(@LayoutRes val layout: 
Int) :
 window.setGravity(Gravity.BOTTOM)
 window.clearFlags(WindowManager.LayoutParams.FLAG_DIM_BEHIND)
 }
+}
 
-lifecycleScope.launch {
-delay(SNACKBAR_DURATION_LONG_MS)
-dismiss()
-}
+// Attempt to automatically dismiss the dialog after the given 
duration.
+lifecycleScope.launch {
+delay(SNACKBAR_DURATION_LONG_MS)
+dialog?.dismiss()
 }
 }
 }


=
fenix/app/src/main/java/org/mozilla/fenix/browser/BaseBrowserFragment.kt
=
@@ -1491,6 +1491,7 @@ abstract class BaseBrowserFragment :
 parentFragmentManager,
 )
 
+activity?.enterToImmersiveMode()
 (view as? SwipeGestureLayout)?.isSwipeEnabled = false
 browserToolbarView.collapse()
 browserToolbarView.view.isVisible = false



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/firefox-android/-/compare/be02ec8601e43571da6c25a504f4633e54fd72e7...c1397e812f0a6cecfc44af411d6b7f222fc99164

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/firefox-android/-/compare/be02ec8601e43571da6c25a504f4633e54fd72e7...c1397e812f0a6cecfc44af411d6b7f222fc99164
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/firefox-android][firefox-android-115.2.1-13.0-1] fixup! Modify add-on support

2024-01-08 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch firefox-android-115.2.1-13.0-1 at The Tor Project / 
Applications / firefox-android


Commits:
cb98e7b2 by hackademix at 2024-01-08T19:54:56+01:00
fixup! Modify add-on support

Bug 42353: Fix NoScript automatic updates.

- - - - -


1 changed file:

- fenix/app/src/main/java/org/mozilla/fenix/components/TorBrowserFeatures.kt


Changes:

=
fenix/app/src/main/java/org/mozilla/fenix/components/TorBrowserFeatures.kt
=
@@ -136,37 +136,37 @@ object TorBrowserFeatures {
 }
 
 /**
- *  If we have not done it yet, enable automatic updates for NoScript 
and force a
+ *  Enable automatic updates for NoScript and, if we've not done it 
yet, force a
  *  one-time immediate update check, in order to upgrade old profiles 
and ensure we've got
  *  the latest stable AMO version available on first startup.
  *  We will do it as soon as the Tor is connected, to prevent early 
addonUpdater activation
  *  causing automatic update checks failures (components.addonUpdater 
being a lazy prop).
  *  The extension, from then on, should behave as if the user had 
installed it manually.
  */
-if (settings.noscriptUpdated == 0) {
-context.components.torController.registerTorListener(object : 
TorEvents {
-override fun onTorConnected() {
-
context.components.torController.unregisterTorListener(this)
-// Enable automatic updates
-
context.components.addonUpdater.registerForFutureUpdates(NOSCRIPT_ID)
-// Force an immediate update check
+context.components.torController.registerTorListener(object : 
TorEvents {
+override fun onTorConnected() {
+context.components.torController.unregisterTorListener(this)
+// Enable automatic updates. This must be done on every 
startup (tor-browser#42353)
+
context.components.addonUpdater.registerForFutureUpdates(NOSCRIPT_ID)
+// Force a one-time immediate update check for older 
installations
+if (settings.noscriptUpdated < 2) {
 context.components.addonUpdater.update(NOSCRIPT_ID)
-settings.noscriptUpdated = 1
+settings.noscriptUpdated = 2
 }
+}
 
-@SuppressWarnings("EmptyFunctionBlock")
-override fun onTorConnecting() {
-}
+@SuppressWarnings("EmptyFunctionBlock")
+override fun onTorConnecting() {
+}
 
-@SuppressWarnings("EmptyFunctionBlock")
-override fun onTorStopped() {
-}
+@SuppressWarnings("EmptyFunctionBlock")
+override fun onTorStopped() {
+}
 
-@SuppressWarnings("EmptyFunctionBlock")
-override fun onTorStatusUpdate(entry: String?, status: 
String?) {
-}
-})
-}
+@SuppressWarnings("EmptyFunctionBlock")
+override fun onTorStatusUpdate(entry: String?, status: String?) {
+}
+})
 }
 
 



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/firefox-android/-/commit/cb98e7b217abdf3c675856a7bbb0386748bfb987

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/firefox-android/-/commit/cb98e7b217abdf3c675856a7bbb0386748bfb987
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/firefox-android][firefox-android-115.2.1-13.5-1] fixup! Modify add-on support

2024-01-02 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch firefox-android-115.2.1-13.5-1 at The Tor Project / 
Applications / firefox-android


Commits:
be02ec86 by hackademix at 2023-12-30T19:51:11+01:00
fixup! Modify add-on support

Bug 42353: Fix NoScript automatic updates.

- - - - -


1 changed file:

- fenix/app/src/main/java/org/mozilla/fenix/components/TorBrowserFeatures.kt


Changes:

=
fenix/app/src/main/java/org/mozilla/fenix/components/TorBrowserFeatures.kt
=
@@ -136,37 +136,37 @@ object TorBrowserFeatures {
 }
 
 /**
- *  If we have not done it yet, enable automatic updates for NoScript 
and force a
+ *  Enable automatic updates for NoScript and, if we've not done it 
yet, force a
  *  one-time immediate update check, in order to upgrade old profiles 
and ensure we've got
  *  the latest stable AMO version available on first startup.
  *  We will do it as soon as the Tor is connected, to prevent early 
addonUpdater activation
  *  causing automatic update checks failures (components.addonUpdater 
being a lazy prop).
  *  The extension, from then on, should behave as if the user had 
installed it manually.
  */
-if (settings.noscriptUpdated == 0) {
-context.components.torController.registerTorListener(object : 
TorEvents {
-override fun onTorConnected() {
-
context.components.torController.unregisterTorListener(this)
-// Enable automatic updates
-
context.components.addonUpdater.registerForFutureUpdates(NOSCRIPT_ID)
-// Force an immediate update check
+context.components.torController.registerTorListener(object : 
TorEvents {
+override fun onTorConnected() {
+context.components.torController.unregisterTorListener(this)
+// Enable automatic updates. This must be done on every 
startup (tor-browser#42353)
+
context.components.addonUpdater.registerForFutureUpdates(NOSCRIPT_ID)
+// Force a one-time immediate update check for older 
installations
+if (settings.noscriptUpdated < 2) {
 context.components.addonUpdater.update(NOSCRIPT_ID)
-settings.noscriptUpdated = 1
+settings.noscriptUpdated = 2
 }
+}
 
-@SuppressWarnings("EmptyFunctionBlock")
-override fun onTorConnecting() {
-}
+@SuppressWarnings("EmptyFunctionBlock")
+override fun onTorConnecting() {
+}
 
-@SuppressWarnings("EmptyFunctionBlock")
-override fun onTorStopped() {
-}
+@SuppressWarnings("EmptyFunctionBlock")
+override fun onTorStopped() {
+}
 
-@SuppressWarnings("EmptyFunctionBlock")
-override fun onTorStatusUpdate(entry: String?, status: 
String?) {
-}
-})
-}
+@SuppressWarnings("EmptyFunctionBlock")
+override fun onTorStatusUpdate(entry: String?, status: String?) {
+}
+})
 }
 
 



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/firefox-android/-/commit/be02ec8601e43571da6c25a504f4633e54fd72e7

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/firefox-android/-/commit/be02ec8601e43571da6c25a504f4633e54fd72e7
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser-build][maint-13.0] Bug 41050: Improve disk leak sanitization on startup.

2023-12-19 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch maint-13.0 at The Tor Project / Applications / 
tor-browser-build


Commits:
8ebeb4d1 by hackademix at 2023-12-19T17:15:07+01:00
Bug 41050: Improve disk leak sanitization on startup.

- - - - -


1 changed file:

- projects/browser/RelativeLink/start-browser


Changes:

=
projects/browser/RelativeLink/start-browser
=
@@ -258,18 +258,32 @@ HOME="${PWD}"
 export HOME
 
 # Prevent disk leaks in $HOME/.local/share (tor-browser#17560)
+function erase_leaky() {
+   local leaky="$1"
+   [ -e "$leaky" ] &&
+   ( srm -r "$leaky" ||
+ wipe -r "$leaky" ||
+ find "$leaky" -type f -exec shred -u {} \; ;
+ rm -rf "$leaky"
+   ) > /dev/null 2>&1
+}
 local_dir="$HOME/.local/"
 share_dir="$local_dir/share"
-if [ -d "$share_dir" ]; then
-( srm -r "$share_dir" ||
-  wipe -r "$share_dir" ||
-  find "$share_dir" -type f -exec shred -u {} \; ;
-  rm -rf "$share_dir"
-) > /dev/null 2>&1
-else
-mkdir -p "$local_dir"
+# We don't want to mess with symlinks, possibly pointing outside the
+# Browser directory (tor-browser-build#41050).
+# We're not using realpath/readlink for consistency with the (possibly
+# outdated) availability assumptions made elsewhere in this script.
+if ! [ -L "$local_dir" -o -L "$share_dir" ]; then
+   if [ -d "$share_dir" ]; then
+   for leaky_path in "gvfs-metadata" "recently-used.xbel"; do
+   erase_leaky "$share_dir/$leaky_path"
+   done
+   else
+   mkdir -p "$local_dir"
+   fi
+   ln -fs /dev/null "$share_dir"
 fi
-ln -fs /dev/null "$share_dir"
+[ -L "$HOME/.cache" ] || erase_leaky "$HOME/.cache/nvidia"
 
 [% IF c("var/tor-browser") -%]
 SYSARCHITECTURE=$(getconf LONG_BIT)



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/commit/8ebeb4d1651dfbd73d96df293e115835ccf7de83

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/commit/8ebeb4d1651dfbd73d96df293e115835ccf7de83
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser-build][main] Bug 41050: Improve disk leak sanitization on startup.

2023-12-19 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch main at The Tor Project / Applications / tor-browser-build


Commits:
5a97ba07 by hackademix at 2023-12-19T10:22:07+01:00
Bug 41050: Improve disk leak sanitization on startup.

- - - - -


1 changed file:

- projects/browser/RelativeLink/start-browser


Changes:

=
projects/browser/RelativeLink/start-browser
=
@@ -258,18 +258,32 @@ HOME="${PWD}"
 export HOME
 
 # Prevent disk leaks in $HOME/.local/share (tor-browser#17560)
+function erase_leaky() {
+   local leaky="$1"
+   [ -e "$leaky" ] &&
+   ( srm -r "$leaky" ||
+ wipe -r "$leaky" ||
+ find "$leaky" -type f -exec shred -u {} \; ;
+ rm -rf "$leaky"
+   ) > /dev/null 2>&1
+}
 local_dir="$HOME/.local/"
 share_dir="$local_dir/share"
-if [ -d "$share_dir" ]; then
-( srm -r "$share_dir" ||
-  wipe -r "$share_dir" ||
-  find "$share_dir" -type f -exec shred -u {} \; ;
-  rm -rf "$share_dir"
-) > /dev/null 2>&1
-else
-mkdir -p "$local_dir"
+# We don't want to mess with symlinks, possibly pointing outside the
+# Browser directory (tor-browser-build#41050).
+# We're not using realpath/readlink for consistency with the (possibly
+# outdated) availability assumptions made elsewhere in this script.
+if ! [ -L "$local_dir" -o -L "$share_dir" ]; then
+   if [ -d "$share_dir" ]; then
+   for leaky_path in "gvfs-metadata" "recently-used.xbel"; do
+   erase_leaky "$share_dir/$leaky_path"
+   done
+   else
+   mkdir -p "$local_dir"
+   fi
+   ln -fs /dev/null "$share_dir"
 fi
-ln -fs /dev/null "$share_dir"
+[ -L "$HOME/.cache" ] || erase_leaky "$HOME/.cache/nvidia"
 
 [% IF c("var/tor-browser") -%]
 SYSARCHITECTURE=$(getconf LONG_BIT)



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/commit/5a97ba07148a176580dd536a65dc7ebba6565775

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/commit/5a97ba07148a176580dd536a65dc7ebba6565775
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/firefox-android] Pushed new tag firefox-android-115.2.1-13.5-1-build3

2023-12-14 Thread ma1 (@ma1) via tor-commits


ma1 pushed new tag firefox-android-115.2.1-13.5-1-build3 at The Tor Project / 
Applications / firefox-android

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/firefox-android/-/tree/firefox-android-115.2.1-13.5-1-build3
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/firefox-android] Pushed new tag firefox-android-115.2.1-13.0-1-build11

2023-12-14 Thread ma1 (@ma1) via tor-commits


ma1 pushed new tag firefox-android-115.2.1-13.0-1-build11 at The Tor Project / 
Applications / firefox-android

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/firefox-android/-/tree/firefox-android-115.2.1-13.0-1-build11
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/mullvad-browser] Pushed new branch mullvad-browser-115.6.0esr-13.0-1

2023-12-12 Thread ma1 (@ma1) via tor-commits


ma1 pushed new branch mullvad-browser-115.6.0esr-13.0-1 at The Tor Project / 
Applications / Mullvad Browser

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/tree/mullvad-browser-115.6.0esr-13.0-1
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser] Pushed new tag tor-browser-115.6.0esr-13.0-1-build1

2023-12-12 Thread ma1 (@ma1) via tor-commits


ma1 pushed new tag tor-browser-115.6.0esr-13.0-1-build1 at The Tor Project / 
Applications / Tor Browser

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/tree/tor-browser-115.6.0esr-13.0-1-build1
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser] Pushed new tag base-browser-115.6.0esr-13.0-1-build1

2023-12-12 Thread ma1 (@ma1) via tor-commits


ma1 pushed new tag base-browser-115.6.0esr-13.0-1-build1 at The Tor Project / 
Applications / Tor Browser

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/tree/base-browser-115.6.0esr-13.0-1-build1
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][base-browser-115.6.0esr-13.0-1] 96 commits: Bug 1819160 - Map Android ids to doc/accessible id pairs. r=Jamie

2023-12-12 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch base-browser-115.6.0esr-13.0-1 at The Tor Project / 
Applications / Tor Browser


Commits:
7a271e76 by Eitan Isaacson at 2023-12-12T10:11:36+01:00
Bug 1819160 - Map Android ids to doc/accessible id pairs. r=Jamie

Differential Revision: https://phabricator.services.mozilla.com/D179737
- - - - -
1aeb8e9a by Pier Angelo Vendrame at 2023-12-12T10:11:38+01:00
Bug 1832523 - Allow using NSS to sign and verify MAR signatures. 
r=application-update-reviewers,glandium,bytesized

Allow using NSS for checking MAR signatures also in platforms where
OS-native APIs are used by default, i.e., macOS and Windows.

Differential Revision: https://phabricator.services.mozilla.com/D177743
- - - - -
b24d9851 by Pier Angelo Vendrame at 2023-12-12T10:11:39+01:00
Bug 1849129: Prevent exceptions caused by extensions from interrupting the 
SearchService initialization. r=search-reviewers,Standard8

Differential Revision: https://phabricator.services.mozilla.com/D186456
- - - - -
5a91e514 by Emilio Cobos Álvarez at 2023-12-12T10:11:40+01:00
Bug 1853731 - Use html:img for message-bar-icon. 
r=Gijs,dao,settings-reviewers,desktop-theme-reviewers,sfoster

Differential Revision: https://phabricator.services.mozilla.com/D188521
- - - - -
508750c9 by Pier Angelo Vendrame at 2023-12-12T10:11:42+01:00
Bug 1854117 - Sort the DLL blocklist flags. r=mossop,win-reviewers,gstoll

Differential Revision: https://phabricator.services.mozilla.com/D188716
- - - - -
77de2fd4 by Eden Chuang at 2023-12-12T10:11:44+01:00
Bug 1738426 - Ignoring status 206 and vary header checking for opaque response 
in Cache API. r=asuth

Differential Revision: https://phabricator.services.mozilla.com/D186431
- - - - -
67aded6b by edgul at 2023-12-12T10:11:45+01:00
Bug 1802057 - Block the following characters from use in the cookie name in the 
cookie string: 0x3B (semi-colon), 0x3D (equals), and 0x7F (del) 
r=dveditz,cookie-reviewers

Differential Revision: https://phabricator.services.mozilla.com/D182373

- - - - -
bbdd1c20 by Kelsey Gilbert at 2023-12-12T10:11:47+01:00
Bug 1819497 - Dont race on static bool for initialization. 
r=gfx-reviewers,aosmond

We could do non-racy static init here (e.g. with a static initializer
self-calling-closure), but there doesnt seem to be a strong reason for
this. Lets just use a switch and get robustness from -Werror=switch.

Differential Revision: https://phabricator.services.mozilla.com/D188054
- - - - -
74375e3e by Mark Banner at 2023-12-12T10:11:48+01:00
Bug 1845752. r=ckerschb

Differential Revision: https://phabricator.services.mozilla.com/D186676
- - - - -
781671e6 by Bob Owen at 2023-12-12T10:11:50+01:00
Bug 1850072: Initialize RecordedDrawTargetCreation::mHasExistingData. r=jrmuizel

This also specializes ElementStreamFormat for bool.

Differential Revision: https://phabricator.services.mozilla.com/D187794
- - - - -
b490578e by Malte Juergens at 2023-12-12T10:11:51+01:00
Bug 1850200 - Add delay to HTTPS-Only Continue to HTTPS Site button 
r=freddyb

Differential Revision: https://phabricator.services.mozilla.com/D187887
- - - - -
8c6e9d8b by Andreas Pehrson at 2023-12-12T10:11:52+01:00
Bug 1851803 - Introduce SourceMediaTrack::mDirectDisabledMode. r=karlt

Similar to MediaTrack::mDisabledMode, but this is for uses on the
SourceMediaTrack producer thread. It is still signaled via a control message
from the control thread to maintain order of operations, and is protected by the
SourceMediaTrack mutex.

Differential Revision: https://phabricator.services.mozilla.com/D187554
- - - - -
08194c97 by Henry Wilkes at 2023-12-12T10:11:54+01:00
Bug 41454: Move focus after calling openPreferences for a sub-category.

Temporary fix until mozilla bug 1799153 gets a patch upstream.

- - - - -
f1e6fccb by hackademix at 2023-12-12T10:11:55+01:00
Bug 42194: Fix blank net error page on failed DNS resolution with active proxy.

- - - - -
aea0ac32 by Henry Wilkes at 2023-12-12T10:11:57+01:00
Bug 41483: Remove the firefox override for appstrings.properties

Remove this patch after upstream bugzilla bug 1790187

- - - - -
aa213fc6 by Pier Angelo Vendrame at 2023-12-12T10:11:58+01:00
Bug 41116: Normalize system fonts.

System fonts are an enormous fingerprinting vector.
Even with font allow lists and with our custom configuration on Linux,
which counter metrics measurements, getComputedStyle leaks several
details.
This patch counters both these kinds of attacks.

- - - - -
f23d0f24 by Marco Simonelli at 2023-12-12T10:12:00+01:00
Bug 41459: WebRTC fails to build under mingw (Part 1)

- properly define NOMINMAX for just MSVC builds

- - - - -
04147c9d by Marco Simonelli at 2023-12-12T10:12:02+01:00
Bug 41459: WebRTC fails to build under mingw (Part 2)

- fixes required to build third_party/libwebrtc

- - - - -
bba03917 by Marco Simonelli at 2023-12-12T10:12:03+01:00
Bug 41459: WebRTC fails to build under mingw (Part 3)

- fixes required to build third_party/sipcc

- - - - -
dac39a70 by Marco Simonelli at 2023-12-12T10:12:04+01:00

[tor-commits] [Git][tpo/applications/tor-browser] Pushed new tag FIREFOX_115_6_0esr_BUILD1

2023-12-12 Thread ma1 (@ma1) via tor-commits


ma1 pushed new tag FIREFOX_115_6_0esr_BUILD1 at The Tor Project / Applications 
/ Tor Browser

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/tree/FIREFOX_115_6_0esr_BUILD1
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser] Pushed new branch tor-browser-115.6.0esr-13.0-1

2023-12-12 Thread ma1 (@ma1) via tor-commits


ma1 pushed new branch tor-browser-115.6.0esr-13.0-1 at The Tor Project / 
Applications / Tor Browser

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/tree/tor-browser-115.6.0esr-13.0-1
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser] Pushed new branch base-browser-115.6.0esr-13.0-1

2023-12-12 Thread ma1 (@ma1) via tor-commits


ma1 pushed new branch base-browser-115.6.0esr-13.0-1 at The Tor Project / 
Applications / Tor Browser

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/tree/base-browser-115.6.0esr-13.0-1
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser-build] Pushed new tag mb-13.0.6-build1

2023-12-04 Thread ma1 (@ma1) via tor-commits


ma1 pushed new tag mb-13.0.6-build1 at The Tor Project / Applications / 
tor-browser-build

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/tree/mb-13.0.6-build1
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser-build] Pushed new tag tbb-13.0.6-build1

2023-12-04 Thread ma1 (@ma1) via tor-commits


ma1 pushed new tag tbb-13.0.6-build1 at The Tor Project / Applications / 
tor-browser-build

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/tree/tbb-13.0.6-build1
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/mullvad-browser] Pushed new tag mullvad-browser-115.5.0esr-13.0-1-build3

2023-12-04 Thread ma1 (@ma1) via tor-commits


ma1 pushed new tag mullvad-browser-115.5.0esr-13.0-1-build3 at The Tor Project 
/ Applications / Mullvad Browser

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/tree/mullvad-browser-115.5.0esr-13.0-1-build3
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser] Pushed new tag tor-browser-115.5.0esr-13.0-1-build4

2023-12-04 Thread ma1 (@ma1) via tor-commits


ma1 pushed new tag tor-browser-115.5.0esr-13.0-1-build4 at The Tor Project / 
Applications / Tor Browser

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/tree/tor-browser-115.5.0esr-13.0-1-build4
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][tor-browser-115.5.0esr-13.0-1] fixup! Bug 23247: Communicating security expectations for .onion

2023-12-04 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch tor-browser-115.5.0esr-13.0-1 at The Tor Project / 
Applications / Tor Browser


Commits:
91e057ca by cypherpunks1 at 2023-12-04T13:06:55+01:00
fixup! Bug 23247: Communicating security expectations for .onion

Bug 42231: Improve the network monitor patch for http onion resources

- - - - -


2 changed files:

- devtools/client/netmonitor/src/components/SecurityState.js
- devtools/shared/network-observer/NetworkHelper.sys.mjs


Changes:

=
devtools/client/netmonitor/src/components/SecurityState.js
=
@@ -41,7 +41,7 @@ class SecurityState extends Component {
 
 const {
   securityState,
-  urlDetails: { isLocal },
+  urlDetails: { host, isLocal },
 } = item;
 const iconClassList = ["requests-security-state-icon"];
 
@@ -50,7 +50,11 @@ class SecurityState extends Component {
 
 // Locally delivered files such as http://localhost and file:// paths
 // are considered to have been delivered securely.
-if (isLocal) {
+if (
+  isLocal ||
+  (host?.endsWith(".onion") &&
+Services.prefs.getBoolPref("dom.securecontext.allowlist_onions", 
false))
+) {
   realSecurityState = "secure";
 }
 


=
devtools/shared/network-observer/NetworkHelper.sys.mjs
=
@@ -596,9 +596,6 @@ export var NetworkHelper = {
 
 // The request did not contain any security info.
 if (!securityInfo) {
-  if (httpActivity.hostname && httpActivity.hostname.endsWith(".onion")) {
-info.state = "secure";
-  }
   return info;
 }
 
@@ -650,11 +647,7 @@ export var NetworkHelper = {
 // schemes other than https and wss are subject to
 // downgrade/etc at the scheme level and should always be
 // considered insecure
-if (httpActivity.hostname && httpActivity.hostname.endsWith(".onion")) 
{
-  info.state = "secure";
-} else {
-  info.state = "insecure";
-}
+info.state = "insecure";
   } else if (state & wpl.STATE_IS_SECURE) {
 // The connection is secure if the scheme is sufficient
 info.state = "secure";



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/91e057ca292b1231023c37c2baf5f23f3729d5ea

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/91e057ca292b1231023c37c2baf5f23f3729d5ea
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser-build][maint-13.0] Bug 17560: prevent disk leaks in $HOME/.local/share.

2023-11-29 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch maint-13.0 at The Tor Project / Applications / 
tor-browser-build


Commits:
eb925334 by hackademix at 2023-11-29T23:53:35+01:00
Bug 17560: prevent disk leaks in $HOME/.local/share.

- - - - -


2 changed files:

- projects/browser/RelativeLink/start-browser
- projects/browser/gtk3-settings.ini


Changes:

=
projects/browser/RelativeLink/start-browser
=
@@ -257,6 +257,20 @@ fi
 HOME="${PWD}"
 export HOME
 
+# Prevent disk leaks in $HOME/.local/share (tor-browser#17560)
+local_dir="$HOME/.local/"
+share_dir="$local_dir/share"
+if [ -d "$share_dir" ]; then
+( srm -r "$share_dir" ||
+  wipe -r "$share_dir" ||
+  find "$share_dir" -type f -exec shred -u {} \; ;
+  rm -rf "$share_dir"
+) > /dev/null 2>&1
+else
+mkdir -p "$local_dir"
+fi
+ln -fs /dev/null "$share_dir"
+
 [% IF c("var/tor-browser") -%]
 SYSARCHITECTURE=$(getconf LONG_BIT)
 TORARCHITECTURE=$(expr "$(file TorBrowser/Tor/tor)" : '.*ELF \([[:digit:]]*\)')


=
projects/browser/gtk3-settings.ini
=
@@ -1,2 +1,4 @@
 [Settings]
 gtk-primary-button-warps-slider = false
+gtk-recent-files-max-age=0
+gtk-recent-files-limit=0



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/commit/eb9253345ef4d18dbd2edec19b4abd331a443fb2

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/commit/eb9253345ef4d18dbd2edec19b4abd331a443fb2
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser-build] Pushed new tag mb-13.0.4-build1

2023-11-20 Thread ma1 (@ma1) via tor-commits


ma1 pushed new tag mb-13.0.4-build1 at The Tor Project / Applications / 
tor-browser-build

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/tree/mb-13.0.4-build1
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser-build] Pushed new tag tbb-13.0.4-build1

2023-11-20 Thread ma1 (@ma1) via tor-commits


ma1 pushed new tag tbb-13.0.4-build1 at The Tor Project / Applications / 
tor-browser-build

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/tree/tbb-13.0.4-build1
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/mullvad-browser] Pushed new tag mullvad-browser-115.5.0esr-13.0-1-build2

2023-11-20 Thread ma1 (@ma1) via tor-commits


ma1 pushed new tag mullvad-browser-115.5.0esr-13.0-1-build2 at The Tor Project 
/ Applications / Mullvad Browser

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/tree/mullvad-browser-115.5.0esr-13.0-1-build2
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser] Pushed new tag base-browser-115.5.0esr-13.0-1-build2

2023-11-20 Thread ma1 (@ma1) via tor-commits


ma1 pushed new tag base-browser-115.5.0esr-13.0-1-build2 at The Tor Project / 
Applications / Tor Browser

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/tree/base-browser-115.5.0esr-13.0-1-build2
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser] Pushed new tag tor-browser-115.5.0esr-13.0-1-build2

2023-11-20 Thread ma1 (@ma1) via tor-commits


ma1 pushed new tag tor-browser-115.5.0esr-13.0-1-build2 at The Tor Project / 
Applications / Tor Browser

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/tree/tor-browser-115.5.0esr-13.0-1-build2
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][base-browser-115.5.0esr-13.0-1] fixup! Firefox preference overrides.

2023-11-16 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch base-browser-115.5.0esr-13.0-1 at The Tor Project / 
Applications / Tor Browser


Commits:
030db1b1 by hackademix at 2023-11-16T16:14:56+01:00
fixup! Firefox preference overrides.

Bug 42277: Enable storage.sync to fix broken webextensions

- - - - -


1 changed file:

- browser/app/profile/001-base-profile.js


Changes:

=
browser/app/profile/001-base-profile.js
=
@@ -569,8 +569,6 @@ pref("extensions.abuseReport.enabled", false);
 // Therefore, do not allow download of additional language packs. They are not 
a
 // privacy/security threat, we are disabling them for UX reasons. See bug 
41377.
 pref("intl.multilingual.downloadEnabled", false);
-// Disk activity: Disable storage.sync (tor-browser#41424)
-pref("webextensions.storage.sync.enabled", false);
 
 // Enforce certificate pinning, see: https://bugs.torproject.org/16206
 pref("security.cert_pinning.enforcement_level", 2);



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/030db1b1f2801f92bed9fd68700674a14e03289f

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/030db1b1f2801f92bed9fd68700674a14e03289f
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/mullvad-browser][mullvad-browser-115.5.0esr-13.0-1] fixup! Firefox preference overrides.

2023-11-16 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch mullvad-browser-115.5.0esr-13.0-1 at The Tor Project / 
Applications / Mullvad Browser


Commits:
7ce3d34f by hackademix at 2023-11-16T16:13:36+01:00
fixup! Firefox preference overrides.

MB 250: Enable storage.sync to fix broken webextensions

- - - - -


1 changed file:

- browser/app/profile/001-base-profile.js


Changes:

=
browser/app/profile/001-base-profile.js
=
@@ -567,8 +567,6 @@ pref("extensions.abuseReport.enabled", false);
 // Therefore, do not allow download of additional language packs. They are not 
a
 // privacy/security threat, we are disabling them for UX reasons. See bug 
41377.
 pref("intl.multilingual.downloadEnabled", false);
-// Disk activity: Disable storage.sync (tor-browser#41424)
-pref("webextensions.storage.sync.enabled", false);
 
 // Enforce certificate pinning, see: https://bugs.torproject.org/16206
 pref("security.cert_pinning.enforcement_level", 2);



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/7ce3d34f3cac8d776c27a0331b2afb0be2872f70

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/7ce3d34f3cac8d776c27a0331b2afb0be2872f70
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][tor-browser-115.5.0esr-13.0-1] fixup! Firefox preference overrides.

2023-11-16 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch tor-browser-115.5.0esr-13.0-1 at The Tor Project / 
Applications / Tor Browser


Commits:
2c6df91f by hackademix at 2023-11-16T16:09:40+01:00
fixup! Firefox preference overrides.

Bug 42277: Enable storage.sync to fix broken webextensions

- - - - -


1 changed file:

- browser/app/profile/001-base-profile.js


Changes:

=
browser/app/profile/001-base-profile.js
=
@@ -569,8 +569,6 @@ pref("extensions.abuseReport.enabled", false);
 // Therefore, do not allow download of additional language packs. They are not 
a
 // privacy/security threat, we are disabling them for UX reasons. See bug 
41377.
 pref("intl.multilingual.downloadEnabled", false);
-// Disk activity: Disable storage.sync (tor-browser#41424)
-pref("webextensions.storage.sync.enabled", false);
 
 // Enforce certificate pinning, see: https://bugs.torproject.org/16206
 pref("security.cert_pinning.enforcement_level", 2);



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/2c6df91fe933bc263ef8dcba38c04b67da54cf9a

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/2c6df91fe933bc263ef8dcba38c04b67da54cf9a
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][tor-browser-115.4.0esr-13.5-1] fixup! Firefox preference overrides.

2023-11-14 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch tor-browser-115.4.0esr-13.5-1 at The Tor Project / 
Applications / Tor Browser


Commits:
b1ee157e by hackademix at 2023-11-14T16:49:30+01:00
fixup! Firefox preference overrides.

- - - - -


1 changed file:

- browser/app/profile/001-base-profile.js


Changes:

=
browser/app/profile/001-base-profile.js
=
@@ -568,8 +568,6 @@ pref("extensions.abuseReport.enabled", false);
 // Therefore, do not allow download of additional language packs. They are not 
a
 // privacy/security threat, we are disabling them for UX reasons. See bug 
41377.
 pref("intl.multilingual.downloadEnabled", false);
-// Disk activity: Disable storage.sync (tor-browser#41424)
-pref("webextensions.storage.sync.enabled", false);
 
 // Enforce certificate pinning, see: https://bugs.torproject.org/16206
 pref("security.cert_pinning.enforcement_level", 2);



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/b1ee157eca70da94a746750890a40ac8aedc3b5f

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/b1ee157eca70da94a746750890a40ac8aedc3b5f
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][base-browser-115.4.0esr-13.5-1] fixup! Firefox preference overrides.

2023-11-14 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch base-browser-115.4.0esr-13.5-1 at The Tor Project / 
Applications / Tor Browser


Commits:
d2547154 by hackademix at 2023-11-14T16:48:51+01:00
fixup! Firefox preference overrides.

- - - - -


1 changed file:

- browser/app/profile/001-base-profile.js


Changes:

=
browser/app/profile/001-base-profile.js
=
@@ -568,8 +568,6 @@ pref("extensions.abuseReport.enabled", false);
 // Therefore, do not allow download of additional language packs. They are not 
a
 // privacy/security threat, we are disabling them for UX reasons. See bug 
41377.
 pref("intl.multilingual.downloadEnabled", false);
-// Disk activity: Disable storage.sync (tor-browser#41424)
-pref("webextensions.storage.sync.enabled", false);
 
 // Enforce certificate pinning, see: https://bugs.torproject.org/16206
 pref("security.cert_pinning.enforcement_level", 2);



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/d25471547dc13074683a6c295326ed19ab4a239a

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/d25471547dc13074683a6c295326ed19ab4a239a
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/mullvad-browser][mullvad-browser-115.4.0esr-13.5-1] fixup! Firefox preference overrides.

2023-11-14 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch mullvad-browser-115.4.0esr-13.5-1 at The Tor Project / 
Applications / Mullvad Browser


Commits:
c4345c65 by hackademix at 2023-11-14T10:55:14+01:00
fixup! Firefox preference overrides.

- - - - -


1 changed file:

- browser/app/profile/001-base-profile.js


Changes:

=
browser/app/profile/001-base-profile.js
=
@@ -566,8 +566,6 @@ pref("extensions.abuseReport.enabled", false);
 // Therefore, do not allow download of additional language packs. They are not 
a
 // privacy/security threat, we are disabling them for UX reasons. See bug 
41377.
 pref("intl.multilingual.downloadEnabled", false);
-// Disk activity: Disable storage.sync (tor-browser#41424)
-pref("webextensions.storage.sync.enabled", false);
 
 // Enforce certificate pinning, see: https://bugs.torproject.org/16206
 pref("security.cert_pinning.enforcement_level", 2);



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/c4345c650900ab37d477640c37a90c3828e743ee

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/c4345c650900ab37d477640c37a90c3828e743ee
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser-build][main] Bug 17560: prevent disk leaks in $HOME/.local/share.

2023-11-14 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch main at The Tor Project / Applications / tor-browser-build


Commits:
0de02285 by hackademix at 2023-11-14T10:18:11+01:00
Bug 17560: prevent disk leaks in $HOME/.local/share.

- - - - -


2 changed files:

- projects/browser/RelativeLink/start-browser
- projects/browser/gtk3-settings.ini


Changes:

=
projects/browser/RelativeLink/start-browser
=
@@ -257,6 +257,20 @@ fi
 HOME="${PWD}"
 export HOME
 
+# Prevent disk leaks in $HOME/.local/share (tor-browser#17560)
+local_dir="$HOME/.local/"
+share_dir="$local_dir/share"
+if [ -d "$share_dir" ]; then
+( srm -r "$share_dir" ||
+  wipe -r "$share_dir" ||
+  find "$share_dir" -type f -exec shred -u {} \; ;
+  rm -rf "$share_dir"
+) > /dev/null 2>&1
+else
+mkdir -p "$local_dir"
+fi
+ln -fs /dev/null "$share_dir"
+
 [% IF c("var/tor-browser") -%]
 SYSARCHITECTURE=$(getconf LONG_BIT)
 TORARCHITECTURE=$(expr "$(file TorBrowser/Tor/tor)" : '.*ELF \([[:digit:]]*\)')


=
projects/browser/gtk3-settings.ini
=
@@ -1,2 +1,4 @@
 [Settings]
 gtk-primary-button-warps-slider = false
+gtk-recent-files-max-age=0
+gtk-recent-files-limit=0



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/commit/0de02285584259398c8c96688aacb4431897d7a8

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/commit/0de02285584259398c8c96688aacb4431897d7a8
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/mullvad-browser][mullvad-browser-115.4.0esr-13.0-1] Bug 42194: Fix blank net error page on failed DNS resolution with active proxy.

2023-11-08 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch mullvad-browser-115.4.0esr-13.0-1 at The Tor Project / 
Applications / Mullvad Browser


Commits:
23d4e4c4 by hackademix at 2023-11-08T13:45:19+01:00
Bug 42194: Fix blank net error page on failed DNS resolution with active proxy.

- - - - -


1 changed file:

- toolkit/actors/NetErrorChild.sys.mjs


Changes:

=
toolkit/actors/NetErrorChild.sys.mjs
=
@@ -133,12 +133,15 @@ export class NetErrorChild extends RemotePageChild {
 shortDesc.appendChild(span);
   },
 };
-
-Services.uriFixup.checkHost(
-  info.fixedURI,
-  onLookupCompleteListener,
-  this.document.nodePrincipal.originAttributes
-);
+try {
+  Services.uriFixup.checkHost(
+info.fixedURI,
+onLookupCompleteListener,
+this.document.nodePrincipal.originAttributes
+  );
+} catch (e) {
+  // DNS resolution may fail synchronously if forbidden by proxy
+}
   }
 
   // Get the header from the http response of the failed channel. This function



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/23d4e4c459c271d9f0d6346b897f006de68dd3e6

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/23d4e4c459c271d9f0d6346b897f006de68dd3e6
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][base-browser-115.4.0esr-13.0-1] Bug 42194: Fix blank net error page on failed DNS resolution with active proxy.

2023-11-08 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch base-browser-115.4.0esr-13.0-1 at The Tor Project / 
Applications / Tor Browser


Commits:
6f9292eb by hackademix at 2023-11-08T13:44:18+01:00
Bug 42194: Fix blank net error page on failed DNS resolution with active proxy.

- - - - -


1 changed file:

- toolkit/actors/NetErrorChild.sys.mjs


Changes:

=
toolkit/actors/NetErrorChild.sys.mjs
=
@@ -133,12 +133,15 @@ export class NetErrorChild extends RemotePageChild {
 shortDesc.appendChild(span);
   },
 };
-
-Services.uriFixup.checkHost(
-  info.fixedURI,
-  onLookupCompleteListener,
-  this.document.nodePrincipal.originAttributes
-);
+try {
+  Services.uriFixup.checkHost(
+info.fixedURI,
+onLookupCompleteListener,
+this.document.nodePrincipal.originAttributes
+  );
+} catch (e) {
+  // DNS resolution may fail synchronously if forbidden by proxy
+}
   }
 
   // Get the header from the http response of the failed channel. This function



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/6f9292eb84cc2ca0323a7c7cdf0fd4c4f8c21c04

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/6f9292eb84cc2ca0323a7c7cdf0fd4c4f8c21c04
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][tor-browser-115.4.0esr-13.0-1] Bug 42194: Fix blank net error page on failed DNS resolution with active proxy.

2023-11-08 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch tor-browser-115.4.0esr-13.0-1 at The Tor Project / 
Applications / Tor Browser


Commits:
20f764ba by hackademix at 2023-11-08T13:41:58+01:00
Bug 42194: Fix blank net error page on failed DNS resolution with active proxy.

- - - - -


1 changed file:

- toolkit/actors/NetErrorChild.sys.mjs


Changes:

=
toolkit/actors/NetErrorChild.sys.mjs
=
@@ -140,12 +140,15 @@ export class NetErrorChild extends RemotePageChild {
 shortDesc.appendChild(span);
   },
 };
-
-Services.uriFixup.checkHost(
-  info.fixedURI,
-  onLookupCompleteListener,
-  this.document.nodePrincipal.originAttributes
-);
+try {
+  Services.uriFixup.checkHost(
+info.fixedURI,
+onLookupCompleteListener,
+this.document.nodePrincipal.originAttributes
+  );
+} catch (e) {
+  // DNS resolution may fail synchronously if forbidden by proxy
+}
   }
 
   // Get the header from the http response of the failed channel. This function



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/20f764bab4814a0430c00b054815dccef0683bf3

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/20f764bab4814a0430c00b054815dccef0683bf3
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/mullvad-browser][mullvad-browser-115.4.0esr-13.5-1] Bug 42194: Fix blank net error page on failed DNS resolution with active proxy.

2023-11-07 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch mullvad-browser-115.4.0esr-13.5-1 at The Tor Project / 
Applications / Mullvad Browser


Commits:
5cb306c9 by hackademix at 2023-11-07T17:22:34+01:00
Bug 42194: Fix blank net error page on failed DNS resolution with active proxy.

- - - - -


1 changed file:

- toolkit/actors/NetErrorChild.sys.mjs


Changes:

=
toolkit/actors/NetErrorChild.sys.mjs
=
@@ -133,12 +133,15 @@ export class NetErrorChild extends RemotePageChild {
 shortDesc.appendChild(span);
   },
 };
-
-Services.uriFixup.checkHost(
-  info.fixedURI,
-  onLookupCompleteListener,
-  this.document.nodePrincipal.originAttributes
-);
+try {
+  Services.uriFixup.checkHost(
+info.fixedURI,
+onLookupCompleteListener,
+this.document.nodePrincipal.originAttributes
+  );
+} catch (e) {
+  // DNS resolution may fail synchronously if forbidden by proxy
+}
   }
 
   // Get the header from the http response of the failed channel. This function



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/5cb306c903900ad8dde25b57bae052927b95ded3

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/5cb306c903900ad8dde25b57bae052927b95ded3
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][base-browser-115.4.0esr-13.5-1] Bug 42194: Fix blank net error page on failed DNS resolution with active proxy.

2023-11-07 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch base-browser-115.4.0esr-13.5-1 at The Tor Project / 
Applications / Tor Browser


Commits:
c06034d3 by hackademix at 2023-11-07T17:19:49+01:00
Bug 42194: Fix blank net error page on failed DNS resolution with active proxy.

- - - - -


1 changed file:

- toolkit/actors/NetErrorChild.sys.mjs


Changes:

=
toolkit/actors/NetErrorChild.sys.mjs
=
@@ -133,12 +133,15 @@ export class NetErrorChild extends RemotePageChild {
 shortDesc.appendChild(span);
   },
 };
-
-Services.uriFixup.checkHost(
-  info.fixedURI,
-  onLookupCompleteListener,
-  this.document.nodePrincipal.originAttributes
-);
+try {
+  Services.uriFixup.checkHost(
+info.fixedURI,
+onLookupCompleteListener,
+this.document.nodePrincipal.originAttributes
+  );
+} catch (e) {
+  // DNS resolution may fail synchronously if forbidden by proxy
+}
   }
 
   // Get the header from the http response of the failed channel. This function



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/c06034d3b43a8cb1db0b155527901124924355e5

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/c06034d3b43a8cb1db0b155527901124924355e5
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][tor-browser-115.4.0esr-13.5-1] Bug 42194: Fix blank net error page on failed DNS resolution with active proxy.

2023-11-07 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch tor-browser-115.4.0esr-13.5-1 at The Tor Project / 
Applications / Tor Browser


Commits:
aa90395e by hackademix at 2023-11-07T12:56:55+01:00
Bug 42194: Fix blank net error page on failed DNS resolution with active proxy.

- - - - -


1 changed file:

- toolkit/actors/NetErrorChild.sys.mjs


Changes:

=
toolkit/actors/NetErrorChild.sys.mjs
=
@@ -140,12 +140,15 @@ export class NetErrorChild extends RemotePageChild {
 shortDesc.appendChild(span);
   },
 };
-
-Services.uriFixup.checkHost(
-  info.fixedURI,
-  onLookupCompleteListener,
-  this.document.nodePrincipal.originAttributes
-);
+try {
+  Services.uriFixup.checkHost(
+info.fixedURI,
+onLookupCompleteListener,
+this.document.nodePrincipal.originAttributes
+  );
+} catch (e) {
+  // DNS resolution may fail synchronously if forbidden by proxy
+}
   }
 
   // Get the header from the http response of the failed channel. This function



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/aa90395e3ee52897434d71254d0df48c1582befe

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/aa90395e3ee52897434d71254d0df48c1582befe
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][tor-browser-115.4.0esr-13.5-1] fixup! Bug 23247: Communicating security expectations for .onion

2023-11-06 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch tor-browser-115.4.0esr-13.5-1 at The Tor Project / 
Applications / Tor Browser


Commits:
8627f8e1 by cypherpunks1 at 2023-11-06T21:22:17+00:00
fixup! Bug 23247: Communicating security expectations for .onion

Bug 42231: Improve the network monitor patch for http onion resources

- - - - -


2 changed files:

- devtools/client/netmonitor/src/components/SecurityState.js
- devtools/shared/network-observer/NetworkHelper.sys.mjs


Changes:

=
devtools/client/netmonitor/src/components/SecurityState.js
=
@@ -41,7 +41,7 @@ class SecurityState extends Component {
 
 const {
   securityState,
-  urlDetails: { isLocal },
+  urlDetails: { host, isLocal },
 } = item;
 const iconClassList = ["requests-security-state-icon"];
 
@@ -50,7 +50,11 @@ class SecurityState extends Component {
 
 // Locally delivered files such as http://localhost and file:// paths
 // are considered to have been delivered securely.
-if (isLocal) {
+if (
+  isLocal ||
+  (host?.endsWith(".onion") &&
+Services.prefs.getBoolPref("dom.securecontext.allowlist_onions", 
false))
+) {
   realSecurityState = "secure";
 }
 


=
devtools/shared/network-observer/NetworkHelper.sys.mjs
=
@@ -596,9 +596,6 @@ export var NetworkHelper = {
 
 // The request did not contain any security info.
 if (!securityInfo) {
-  if (httpActivity.hostname && httpActivity.hostname.endsWith(".onion")) {
-info.state = "secure";
-  }
   return info;
 }
 
@@ -650,11 +647,7 @@ export var NetworkHelper = {
 // schemes other than https and wss are subject to
 // downgrade/etc at the scheme level and should always be
 // considered insecure
-if (httpActivity.hostname && httpActivity.hostname.endsWith(".onion")) 
{
-  info.state = "secure";
-} else {
-  info.state = "insecure";
-}
+info.state = "insecure";
   } else if (state & wpl.STATE_IS_SECURE) {
 // The connection is secure if the scheme is sufficient
 info.state = "secure";



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/8627f8e1f78a8fc2ce2ba12b3b5314c020f7ca8f

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/8627f8e1f78a8fc2ce2ba12b3b5314c020f7ca8f
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/mullvad-browser] Pushed new tag mullvad-browser-115.4.0esr-13.0-1-build2

2023-10-23 Thread ma1 (@ma1) via tor-commits


ma1 pushed new tag mullvad-browser-115.4.0esr-13.0-1-build2 at The Tor Project 
/ Applications / Mullvad Browser

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/tree/mullvad-browser-115.4.0esr-13.0-1-build2
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser] Pushed new tag base-browser-115.4.0esr-13.0-1-build2

2023-10-23 Thread ma1 (@ma1) via tor-commits


ma1 pushed new tag base-browser-115.4.0esr-13.0-1-build2 at The Tor Project / 
Applications / Tor Browser

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/tree/base-browser-115.4.0esr-13.0-1-build2
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


  1   2   >