Hi,

Below is a diff that updates Tor Browser to 13.0. The 13.0 series is
based on the new Firefox ESR (version 115).

Release notes:
https://blog.torproject.org/new-release-tor-browser-130/

Test reports or feedback is welcome!

Comments or OKs? Diff for -stable is almost identical (except for the
BUILD_DEPENDS commit to -current a couple of days ago) so I won't send
a separate diff for that.

Right now a build is still running with the
--with-branding=browser/branding/tb-release flag added to
CONFIGURE_ARGS to hopefully fix the branding of the UI (and possibly
also of the icons that are installed, as reported by george@) but that's
a minor change and I wanted to send this out already.

Caspar 


Index: meta/tor-browser/Makefile
===================================================================
RCS file: /cvs/ports/meta/tor-browser/Makefile,v
retrieving revision 1.77
diff -u -p -r1.77 Makefile
--- meta/tor-browser/Makefile   29 Sep 2023 18:01:17 -0000      1.77
+++ meta/tor-browser/Makefile   17 Oct 2023 16:15:45 -0000
@@ -2,11 +2,11 @@ COMMENT=      Tor Browser meta package
 
 MAINTAINER=    Caspar Schutijser <cas...@schutijser.com>
 
-PKGNAME=       tor-browser-12.5.6
+PKGNAME=       tor-browser-13.0
 ONLY_FOR_ARCHS =       aarch64 amd64
 
-RUN_DEPENDS=   www/tor-browser/browser>=12.5.6 \
+RUN_DEPENDS=   www/tor-browser/browser>=13.0 \
                www/tor-browser/noscript>=11.4.27 \
-               net/tor>=0.4.7.13
+               net/tor>=0.4.8.7
 
 .include <bsd.port.mk>
Index: www/tor-browser/Makefile.inc
===================================================================
RCS file: /cvs/ports/www/tor-browser/Makefile.inc,v
retrieving revision 1.74
diff -u -p -r1.74 Makefile.inc
--- www/tor-browser/Makefile.inc        29 Sep 2023 18:01:18 -0000      1.74
+++ www/tor-browser/Makefile.inc        17 Oct 2023 16:15:45 -0000
@@ -3,7 +3,7 @@ HOMEPAGE ?=             https://www.torproject.org
 PERMIT_PACKAGE ?=      Yes
 CATEGORIES =           www
 BROWSER_NAME =         tor-browser
-TB_VERSION =           12.5.6
+TB_VERSION =           13.0
 TB_PREFIX =            tb
 
 # keep meta/tor-browser in sync
Index: www/tor-browser/browser/Makefile
===================================================================
RCS file: /cvs/ports/www/tor-browser/browser/Makefile,v
retrieving revision 1.123
diff -u -p -r1.123 Makefile
--- www/tor-browser/browser/Makefile    16 Oct 2023 14:07:51 -0000      1.123
+++ www/tor-browser/browser/Makefile    17 Oct 2023 16:15:45 -0000
@@ -11,14 +11,14 @@ MOZILLA_CODENAME =  browser
 EXTRACT_SUFX =         .tar.xz
 
 PKGNAME =              ${TB_PREFIX}-browser-${TB_VERSION:S/a/alpha/}
-DISTNAME =             src-firefox-tor-browser-102.15.1esr-12.5-1-build3
+DISTNAME =             src-firefox-tor-browser-115.3.1esr-13.0-1-build2
 
 FIX_EXTRACT_PERMISSIONS        = Yes
 DISTFILES +=           ${DISTNAME}.tar.xz \
-                       tor-browser-linux64-${TB_VERSION}_ALL.tar.xz \
-                       tor-expert-bundle-${TB_VERSION}-linux-x86_64.tar.gz
+                       tor-browser-linux-x86_64-${TB_VERSION}.tar.xz \
+                       tor-expert-bundle-linux-x86_64-${TB_VERSION}.tar.gz
 
-SO_VERSION =           8.0
+SO_VERSION =           9.0
 MOZILLA_LIBS =         xul clearkey lgpllibs mozavcodec mozavutil mozgtk
 MOZILLA_LIBS +=                freebl3 nss3 nssckbi
 MOZILLA_LIBS +=                nssutil3 smime3 softokn3 ssl3
@@ -49,6 +49,7 @@ BUILD_DEPENDS +=      lang/wasi-sdk/compiler-
                        lang/wasi-libc
 # mach uses pkg_resources
 BUILD_DEPENDS +=       devel/py-setuptools${MODPY_FLAVOR}
+BUILD_DEPENDS +=       textproc/jq
 
 # uses pledge()
 # Extra:  Xcomposite.4 Xcursor.5 Xdamage.4 Xfixes.6 Xi.12 Xrender.6
@@ -67,7 +68,8 @@ CONFIGURE_ENV +=      LDFLAGS=-Wl,--threads=$
 
 # app-name etc. for tor-browser
 CONFIGURE_ARGS +=      --with-app-name=${BROWSER_NAME}                 \
-                       --with-base-browser-version=${TB_VERSION}
+                       --with-base-browser-version=${TB_VERSION}       \
+                       --enable-update-channel=release
 
 # for nss build system
 MAKE_ENV +=            BUILD_OPT=1 \
@@ -77,7 +79,7 @@ MAKE_ENV +=           BUILD_OPT=1 \
 
 RUN_DEPENDS +=         net/obfs4proxy>=0.0.14 \
                        net/snowflake_proxy>=2.4.1 \
-                       net/tor>=0.4.7.13
+                       net/tor>=0.4.8.7
 
 CONFIGURE_ARGS +=      --enable-release #1386371
 CONFIGURE_ARGS +=      --enable-sandbox
@@ -111,16 +113,12 @@ post-patch:
        # add default bridges for Pluggable Transports that we support
 .for pt in meek-azure obfs4 snowflake
        I=1; \
-       cat ${WRKDIR}/tor/pluggable_transports/bridges_list.${pt}.txt | while 
read -r line ; do \
-               echo "pref(\"extensions.torlauncher.default_bridge.${pt}.$$I\", 
\"$$line\");" >>${WRKSRC}/browser/app/profile/000-tor-browser.js; \
+       jq ".[\"bridges\"][\"${pt}\"].[]" 
${WRKDIR}/tor/pluggable_transports/pt_config.json | while read -r line ; do \
+               echo "pref(\"extensions.torlauncher.default_bridge.${pt}.$$I\", 
$$line);" >>${WRKSRC}/browser/app/profile/000-tor-browser.js; \
                I=$$((I + 1)); \
        done
 .endfor
 
-       ${SUBST_CMD} ${WRKSRC}/xpcom/build/BinaryPath.h
-       sed -i 's/"files":{[^}]*}/"files":{}/' \
-               ${WRKSRC}/third_party/rust/mp4parse/.cargo-checksum.json
-
 BROWSER_DIR = ${PREFIX}/lib/${BROWSER_NAME}
 TRUEBROWSER_DIR = ${TRUEPREFIX}/lib/${BROWSER_NAME}
 BROWSER_CFG = ${BROWSER_DIR}/${BROWSER_NAME}.cfg
@@ -155,7 +153,8 @@ post-install:
                ${PREFIX}/share/icons/hicolor/${s}x${s}/apps/${BROWSER_NAME}.png
 .endfor
        ${INSTALL_DATA_DIR} ${PREFIX}/share/icons/hicolor/scalable/apps
-       ${INSTALL_DATA} ${WRKSRC}/browser/branding/tb-release/firefox.svg 
${PREFIX}/share/icons/hicolor/scalable/apps/${BROWSER_NAME}.svg
+       ${INSTALL_DATA} 
${WRKSRC}/browser/branding/tb-release/content/tor-browser-logo.svg \
+           ${PREFIX}/share/icons/hicolor/scalable/apps/${BROWSER_NAME}.svg
 
        # link default48.png to default.png to be used by default
        # by non-icccm compliant wm
@@ -181,7 +180,7 @@ post-install:
            ${PREFIX}/bin/${BROWSER_NAME}
 
 .for f in unveil pledge
-.for t in content gpu main rdd socket utility utility-audioDecoder
+.for t in content gpu main rdd socket utility
        ${INSTALL_DATA} ${FILESDIR}/${f}.${t} 
${BROWSER_DIR}/browser/defaults/preferences/
 .endfor
 .endfor
Index: www/tor-browser/browser/distinfo
===================================================================
RCS file: /cvs/ports/www/tor-browser/browser/distinfo,v
retrieving revision 1.71
diff -u -p -r1.71 distinfo
--- www/tor-browser/browser/distinfo    29 Sep 2023 18:01:18 -0000      1.71
+++ www/tor-browser/browser/distinfo    17 Oct 2023 16:15:45 -0000
@@ -1,6 +1,6 @@
-SHA256 (mozilla/src-firefox-tor-browser-102.15.1esr-12.5-1-build3.tar.xz) = 
KnkywrL4Cj7GA34/pHXhhnx0o1KIFrhwtagS3RWnQpY=
-SHA256 (mozilla/tor-browser-linux64-12.5.6_ALL.tar.xz) = 
lZlGhyGDT9Vxox3ghfFSIZd3sazNyL23k0UtipaIGR8=
-SHA256 (mozilla/tor-expert-bundle-12.5.6-linux-x86_64.tar.gz) = 
b+u3qiQDA9OG1ouhYTZ6xW+uPA62zf3GT7XOi48Sels=
-SIZE (mozilla/src-firefox-tor-browser-102.15.1esr-12.5-1-build3.tar.xz) = 
514543008
-SIZE (mozilla/tor-browser-linux64-12.5.6_ALL.tar.xz) = 113277580
-SIZE (mozilla/tor-expert-bundle-12.5.6-linux-x86_64.tar.gz) = 17945499
+SHA256 (mozilla/src-firefox-tor-browser-115.3.1esr-13.0-1-build2.tar.xz) = 
hBoJvEkbL7Efl/E7j/FlPtWHPzyhT/lADBP+8RBjJHg=
+SHA256 (mozilla/tor-browser-linux-x86_64-13.0.tar.xz) = 
zdmPbmJo5FDoOjob+9TDCvCgKgLHvLi3bOMhcZg8DVM=
+SHA256 (mozilla/tor-expert-bundle-linux-x86_64-13.0.tar.gz) = 
tvvh0uBZljheqVBK1Q81gq76O83YdW3iHINagAxYObo=
+SIZE (mozilla/src-firefox-tor-browser-115.3.1esr-13.0-1-build2.tar.xz) = 
544764832
+SIZE (mozilla/tor-browser-linux-x86_64-13.0.tar.xz) = 119425820
+SIZE (mozilla/tor-expert-bundle-linux-x86_64-13.0.tar.gz) = 29903840
Index: www/tor-browser/browser/files/pledge.utility
===================================================================
RCS file: /cvs/ports/www/tor-browser/browser/files/pledge.utility,v
retrieving revision 1.1
diff -u -p -r1.1 pledge.utility
--- www/tor-browser/browser/files/pledge.utility        27 Oct 2022 17:37:13 
-0000      1.1
+++ www/tor-browser/browser/files/pledge.utility        17 Oct 2023 16:15:45 
-0000
@@ -1,4 +1,7 @@
 stdio
+tmppath
+rpath # gtk tries to access /usr/local/lib/gdk-pixbuf-2.0/2.10.0/loaders.cache
 recvfd
 sendfd
-unix
+prot_exec
+unix # getsockopt
Index: www/tor-browser/browser/files/pledge.utility-audioDecoder
===================================================================
RCS file: www/tor-browser/browser/files/pledge.utility-audioDecoder
diff -N www/tor-browser/browser/files/pledge.utility-audioDecoder
--- www/tor-browser/browser/files/pledge.utility-audioDecoder   27 Oct 2022 
17:37:13 -0000      1.1
+++ /dev/null   1 Jan 1970 00:00:00 -0000
@@ -1,7 +0,0 @@
-stdio
-tmppath
-rpath # gtk tries to access /usr/local/lib/gdk-pixbuf-2.0/2.10.0/loaders.cache
-recvfd
-sendfd
-prot_exec
-unix # getsockopt
Index: www/tor-browser/browser/files/unveil.utility
===================================================================
RCS file: /cvs/ports/www/tor-browser/browser/files/unveil.utility,v
retrieving revision 1.1
diff -u -p -r1.1 unveil.utility
--- www/tor-browser/browser/files/unveil.utility        27 Oct 2022 17:37:13 
-0000      1.1
+++ www/tor-browser/browser/files/unveil.utility        17 Oct 2023 16:15:45 
-0000
@@ -1 +1,3 @@
-# nothing
+/usr/lib r
+/usr/local/lib r
+/tmp rwc
Index: www/tor-browser/browser/files/unveil.utility-audioDecoder
===================================================================
RCS file: www/tor-browser/browser/files/unveil.utility-audioDecoder
diff -N www/tor-browser/browser/files/unveil.utility-audioDecoder
--- www/tor-browser/browser/files/unveil.utility-audioDecoder   27 Oct 2022 
17:37:13 -0000      1.1
+++ /dev/null   1 Jan 1970 00:00:00 -0000
@@ -1,3 +0,0 @@
-/usr/lib r
-/usr/local/lib r
-/tmp rwc
Index: 
www/tor-browser/browser/patches/patch-browser_app_profile_000-tor-browser_js
===================================================================
RCS file: 
/cvs/ports/www/tor-browser/browser/patches/patch-browser_app_profile_000-tor-browser_js,v
retrieving revision 1.4
diff -u -p -r1.4 patch-browser_app_profile_000-tor-browser_js
--- 
www/tor-browser/browser/patches/patch-browser_app_profile_000-tor-browser_js    
    6 Sep 2023 09:42:29 -0000       1.4
+++ 
www/tor-browser/browser/patches/patch-browser_app_profile_000-tor-browser_js    
    17 Oct 2023 16:15:45 -0000
@@ -3,7 +3,7 @@ Set all path-related prefs to minimize p
 Index: browser/app/profile/000-tor-browser.js
 --- browser/app/profile/000-tor-browser.js.orig
 +++ browser/app/profile/000-tor-browser.js
-@@ -114,7 +114,10 @@ pref("extensions.torlauncher.socks_port_flags", "Exten
+@@ -100,7 +100,10 @@ pref("extensions.torlauncher.socks_port_flags", "Exten
  // The tor_path is relative to the application directory. On Linux and
  // Windows this is the Browser/ directory that contains the firefox
  // executables, and on Mac OS it is the TorBrowser.app directory.
Index: 
www/tor-browser/browser/patches/patch-browser_config_mozconfigs_base-browser
===================================================================
RCS file: 
/cvs/ports/www/tor-browser/browser/patches/patch-browser_config_mozconfigs_base-browser,v
retrieving revision 1.3
diff -u -p -r1.3 patch-browser_config_mozconfigs_base-browser
--- 
www/tor-browser/browser/patches/patch-browser_config_mozconfigs_base-browser    
    6 Sep 2023 09:42:29 -0000       1.3
+++ 
www/tor-browser/browser/patches/patch-browser_config_mozconfigs_base-browser    
    17 Oct 2023 16:15:45 -0000
@@ -16,9 +16,9 @@ Index: browser/config/mozconfigs/base-br
  ac_add_options --enable-optimize
 -ac_add_options --enable-rust-simd
  
- # Bug 13379: Sign our MAR files.
- ac_add_options --enable-verify-mar
-@@ -23,13 +22,14 @@ ac_add_options --enable-bundled-fonts
+ ac_add_options --disable-unverified-updates
+ ac_add_options --enable-base-browser-update
+@@ -21,13 +20,14 @@ ac_add_options --enable-bundled-fonts
  
  ac_add_options --disable-tests
  ac_add_options --disable-debug
@@ -34,10 +34,10 @@ Index: browser/config/mozconfigs/base-br
  ac_add_options --enable-proxy-bypass-protection
  # See bugs #30575 and #32418: system policies are harmful either because they
  # could allow proxy bypass, and override a number of other preferences we set
-@@ -40,7 +40,3 @@ ac_add_options --disable-backgroundtasks
- 
- # Disable telemetry
- ac_add_options MOZ_TELEMETRY_REPORTING=
+@@ -42,7 +42,3 @@ ac_add_options MOZ_TELEMETRY_REPORTING=
+ # Disable the creation of a <something>.default that Firefox by default 
creates
+ # for old version that could not use dedicated profiles. See 
tor-browser#41542.
+ ac_add_options --disable-legacy-profile-creation
 -
 -if test -z "$WASI_SYSROOT"; then
 -    ac_add_options --without-wasm-sandboxed-libraries
Index: 
www/tor-browser/browser/patches/patch-browser_config_mozconfigs_tor-browser
===================================================================
RCS file: 
/cvs/ports/www/tor-browser/browser/patches/patch-browser_config_mozconfigs_tor-browser,v
retrieving revision 1.2
diff -u -p -r1.2 patch-browser_config_mozconfigs_tor-browser
--- www/tor-browser/browser/patches/patch-browser_config_mozconfigs_tor-browser 
6 Sep 2023 09:42:29 -0000       1.2
+++ www/tor-browser/browser/patches/patch-browser_config_mozconfigs_tor-browser 
17 Oct 2023 16:15:45 -0000
@@ -4,9 +4,9 @@ Code behind --with-relative-data-dir doe
 Index: browser/config/mozconfigs/tor-browser
 --- browser/config/mozconfigs/tor-browser.orig
 +++ browser/config/mozconfigs/tor-browser
-@@ -2,7 +2,7 @@
- 
- mk_add_options MOZ_APP_DISPLAYNAME="Tor Browser"
+@@ -8,7 +8,7 @@ mk_add_options MOZ_APP_DISPLAYNAME="Tor Browser"
+ # like Firefox does.
+ # export MOZ_APP_REMOTINGNAME="Tor Browser"
  
 -ac_add_options --with-relative-data-dir=TorBrowser/Data/Browser
 +#ac_add_options --with-relative-data-dir=TorBrowser/Data/Browser
Index: www/tor-browser/browser/patches/patch-config_makefiles_rust_mk
===================================================================
RCS file: 
/cvs/ports/www/tor-browser/browser/patches/patch-config_makefiles_rust_mk,v
retrieving revision 1.7
diff -u -p -r1.7 patch-config_makefiles_rust_mk
--- www/tor-browser/browser/patches/patch-config_makefiles_rust_mk      27 Oct 
2022 17:37:13 -0000      1.7
+++ www/tor-browser/browser/patches/patch-config_makefiles_rust_mk      17 Oct 
2023 16:15:45 -0000
@@ -5,11 +5,11 @@ https://bugzilla.mozilla.org/show_bug.cg
 Index: config/makefiles/rust.mk
 --- config/makefiles/rust.mk.orig
 +++ config/makefiles/rust.mk
-@@ -90,7 +90,8 @@ ifndef rustflags_sancov
+@@ -92,7 +92,8 @@ ifndef rustflags_sancov
  # Never enable when coverage is enabled to work around 
https://github.com/rust-lang/rust/issues/90045.
  ifndef MOZ_CODE_COVERAGE
  ifeq (,$(findstring gkrust_gtest,$(RUST_LIBRARY_FILE)))
--cargo_rustc_flags += -Clto
+-cargo_rustc_flags += -Clto$(if $(filter full,$(MOZ_LTO_RUST_CROSS)),=fat)
 +cargo_rustc_flags += -Clto=thin
 +export CARGO_PROFILE_RELEASE_LTO=thin
  endif
Index: www/tor-browser/browser/patches/patch-js_src_ctypes_libffi_src_dlmalloc_c
===================================================================
RCS file: 
www/tor-browser/browser/patches/patch-js_src_ctypes_libffi_src_dlmalloc_c
diff -N 
www/tor-browser/browser/patches/patch-js_src_ctypes_libffi_src_dlmalloc_c
--- /dev/null   1 Jan 1970 00:00:00 -0000
+++ www/tor-browser/browser/patches/patch-js_src_ctypes_libffi_src_dlmalloc_c   
17 Oct 2023 16:15:45 -0000
@@ -0,0 +1,20 @@
+use /dev/random to init memory within libffi ?
+Index: js/src/ctypes/libffi/src/dlmalloc.c
+--- js/src/ctypes/libffi/src/dlmalloc.c.orig
++++ js/src/ctypes/libffi/src/dlmalloc.c
+@@ -2525,7 +2525,6 @@ static int init_mparams(void) {
+ 
+ #if (FOOTERS && !INSECURE)
+     {
+-#if USE_DEV_RANDOM
+       int fd;
+       unsigned char buf[sizeof(size_t)];
+       /* Try to use /dev/urandom, else fall back on using time */
+@@ -2535,7 +2534,6 @@ static int init_mparams(void) {
+         close(fd);
+       }
+       else
+-#endif /* USE_DEV_RANDOM */
+         s = (size_t)(time(0) ^ (size_t)0x55555555U);
+ 
+       s |= (size_t)8U;    /* ensure nonzero */
Index: 
www/tor-browser/browser/patches/patch-js_src_jit_ProcessExecutableMemory_h
===================================================================
RCS file: 
www/tor-browser/browser/patches/patch-js_src_jit_ProcessExecutableMemory_h
diff -N 
www/tor-browser/browser/patches/patch-js_src_jit_ProcessExecutableMemory_h
--- www/tor-browser/browser/patches/patch-js_src_jit_ProcessExecutableMemory_h  
27 Oct 2022 17:37:13 -0000      1.6
+++ /dev/null   1 Jan 1970 00:00:00 -0000
@@ -1,17 +0,0 @@
-https://bugzilla.mozilla.org/show_bug.cgi?id=1347139
-
-Index: js/src/jit/ProcessExecutableMemory.h
---- js/src/jit/ProcessExecutableMemory.h.orig
-+++ js/src/jit/ProcessExecutableMemory.h
-@@ -13,8 +13,9 @@ namespace js {
- namespace jit {
- 
- // Limit on the number of bytes of executable memory to prevent JIT spraying
--// attacks.
--#if JS_BITS_PER_WORD == 32
-+// attacks. Default datasize is 768Mb on OpenBSD, keep MaxCodeBytesPerProcess
-+// low there otherwise the js engine hits ulimit quickly.
-+#if JS_BITS_PER_WORD == 32 || defined(__OpenBSD__)
- static const size_t MaxCodeBytesPerProcess = 140 * 1024 * 1024;
- #else
- // This is the largest number which satisfies various alignment static
Index: www/tor-browser/browser/patches/patch-media_ffvpx_libavcodec_x86_fft_asm
===================================================================
RCS file: 
/cvs/ports/www/tor-browser/browser/patches/patch-media_ffvpx_libavcodec_x86_fft_asm,v
retrieving revision 1.2
diff -u -p -r1.2 patch-media_ffvpx_libavcodec_x86_fft_asm
--- www/tor-browser/browser/patches/patch-media_ffvpx_libavcodec_x86_fft_asm    
15 Feb 2023 10:15:10 -0000      1.2
+++ www/tor-browser/browser/patches/patch-media_ffvpx_libavcodec_x86_fft_asm    
17 Oct 2023 16:15:45 -0000
@@ -6,7 +6,7 @@ read-only by ld.so after relocations hav
 Index: media/ffvpx/libavcodec/x86/fft.asm
 --- media/ffvpx/libavcodec/x86/fft.asm.orig
 +++ media/ffvpx/libavcodec/x86/fft.asm
-@@ -548,10 +548,6 @@ DEFINE_ARGS zc, w, n, o1, o3
+@@ -457,10 +457,6 @@ DEFINE_ARGS zc, w, n, o1, o3
  %macro FFT_DISPATCH 2; clobbers 5 GPRs, 8 XMMs
      lea r2, [dispatch_tab%1]
      mov r2, [r2 + (%2q-2)*gprsize]
@@ -17,9 +17,9 @@ Index: media/ffvpx/libavcodec/x86/fft.as
      call r2
  %endmacro ; FFT_DISPATCH
  
-@@ -731,11 +727,7 @@ DECL_PASS pass_interleave_3dnow, PASS_BIG 0
- %define pass_interleave_3dnowext pass_interleave_3dnow
- %endif
+@@ -585,11 +581,7 @@ cglobal imdct_calc, 3,5,3
+     jl      .loop
+     RET
  
 -%ifdef PIC
 -%define SECTION_REL - $$
@@ -29,7 +29,7 @@ Index: media/ffvpx/libavcodec/x86/fft.as
  
  %macro DECL_FFT 1-2 ; nbits, suffix
  %ifidn %0, 1
-@@ -773,8 +765,10 @@ fft %+ n %+ fullsuffix:
+@@ -627,8 +619,10 @@ fft %+ n %+ fullsuffix:
  %endrep
  %undef n
  
Index: 
www/tor-browser/browser/patches/patch-toolkit_components_downloads_DownloadIntegration_jsm
===================================================================
RCS file: 
www/tor-browser/browser/patches/patch-toolkit_components_downloads_DownloadIntegration_jsm
diff -N 
www/tor-browser/browser/patches/patch-toolkit_components_downloads_DownloadIntegration_jsm
--- 
www/tor-browser/browser/patches/patch-toolkit_components_downloads_DownloadIntegration_jsm
  27 Oct 2022 17:37:13 -0000      1.3
+++ /dev/null   1 Jan 1970 00:00:00 -0000
@@ -1,36 +0,0 @@
-https://bugzilla.mozilla.org/show_bug.cgi?id=1696958
-revert parts of https://hg.mozilla.org/mozilla-central/rev/aadba76932ea
-
-Index: toolkit/components/downloads/DownloadIntegration.jsm
---- toolkit/components/downloads/DownloadIntegration.jsm.orig
-+++ toolkit/components/downloads/DownloadIntegration.jsm
-@@ -58,6 +58,7 @@ ChromeUtils.defineModuleGetter(
-   "NetUtil",
-   "resource://gre/modules/NetUtil.jsm"
- );
-+ChromeUtils.defineModuleGetter(this, "OS", 
"resource://gre/modules/osfile.jsm");
- ChromeUtils.defineModuleGetter(
-   this,
-   "Services",
-@@ -367,9 +368,7 @@ var DownloadIntegration = {
-             Ci.nsIFile
-           );
-           directoryPath = directory.path;
--          await IOUtils.makeDirectory(directoryPath, {
--            createAncestors: false,
--          });
-+          await OS.File.makeDir(directoryPath, { ignoreExisting: true });
-         } catch (ex) {
-           Cu.reportError(ex);
-           // Either the preference isn't set or the directory cannot be 
created.
-@@ -958,8 +957,8 @@ var DownloadIntegration = {
-     );
- 
-     // Create the Downloads folder and ignore if it already exists.
--    return IOUtils.makeDirectory(directoryPath, {
--      createAncestors: false,
-+    return OS.File.makeDir(directoryPath, {
-+      ignoreExisting: true
-     }).then(() => directoryPath);
-   },
- 
Index: 
www/tor-browser/browser/patches/patch-toolkit_components_downloads_DownloadIntegration_sys_mjs
===================================================================
RCS file: 
www/tor-browser/browser/patches/patch-toolkit_components_downloads_DownloadIntegration_sys_mjs
diff -N 
www/tor-browser/browser/patches/patch-toolkit_components_downloads_DownloadIntegration_sys_mjs
--- /dev/null   1 Jan 1970 00:00:00 -0000
+++ 
www/tor-browser/browser/patches/patch-toolkit_components_downloads_DownloadIntegration_sys_mjs
      17 Oct 2023 16:15:45 -0000
@@ -0,0 +1,15 @@
+Make sure downloadsFolder isnt translated
+
+was previously in patch-toolkit_components_downloads_DownloadUIHelper_jsm
+Index: toolkit/components/downloads/DownloadIntegration.sys.mjs
+--- toolkit/components/downloads/DownloadIntegration.sys.mjs.orig
++++ toolkit/components/downloads/DownloadIntegration.sys.mjs
+@@ -870,7 +870,7 @@ export var DownloadIntegration = {
+     // displayed in the user interface.
+     let directoryPath = PathUtils.join(
+       this._getDirectory(aName),
+-      lazy.stringBundle.GetStringFromName("downloadsFolder")
++      "Downloads"
+     );
+ 
+     // Create the Downloads folder and ignore if it already exists.
Index: 
www/tor-browser/browser/patches/patch-toolkit_components_downloads_DownloadUIHelper_jsm
===================================================================
RCS file: 
www/tor-browser/browser/patches/patch-toolkit_components_downloads_DownloadUIHelper_jsm
diff -N 
www/tor-browser/browser/patches/patch-toolkit_components_downloads_DownloadUIHelper_jsm
--- 
www/tor-browser/browser/patches/patch-toolkit_components_downloads_DownloadUIHelper_jsm
     9 Mar 2022 20:48:33 -0000       1.2
+++ /dev/null   1 Jan 1970 00:00:00 -0000
@@ -1,13 +0,0 @@
-Make sure DownloadUIHelper.strings.downloadsFolder isnt translated
-
-Index: toolkit/components/downloads/DownloadUIHelper.jsm
---- toolkit/components/downloads/DownloadUIHelper.jsm.orig
-+++ toolkit/components/downloads/DownloadUIHelper.jsm
-@@ -154,6 +154,7 @@ XPCOMUtils.defineLazyGetter(DownloadUIHelper, "strings
-       strings[stringName] = string.value;
-     }
-   }
-+  strings["downloadsFolder"] = "Downloads";
-   return strings;
- });
- 
Index: 
www/tor-browser/browser/patches/patch-toolkit_components_processtools_ProcInfo_linux_cpp
===================================================================
RCS file: 
www/tor-browser/browser/patches/patch-toolkit_components_processtools_ProcInfo_linux_cpp
diff -N 
www/tor-browser/browser/patches/patch-toolkit_components_processtools_ProcInfo_linux_cpp
--- 
www/tor-browser/browser/patches/patch-toolkit_components_processtools_ProcInfo_linux_cpp
    27 Oct 2022 17:37:13 -0000      1.1
+++ /dev/null   1 Jan 1970 00:00:00 -0000
@@ -1,122 +0,0 @@
-about:processes for OpenBSD
-
-https://bugzilla.mozilla.org/show_bug.cgi?id=1772090
-
-Index: toolkit/components/processtools/ProcInfo_linux.cpp
---- toolkit/components/processtools/ProcInfo_linux.cpp.orig
-+++ toolkit/components/processtools/ProcInfo_linux.cpp
-@@ -13,6 +13,11 @@
- #include "nsMemoryReporterManager.h"
- #include "nsWhitespaceTokenizer.h"
- 
-+#ifdef __OpenBSD__
-+#include <sys/types.h>
-+#include <sys/sysctl.h>
-+#include <cerrno>
-+#endif
- #include <cstdio>
- #include <cstring>
- #include <unistd.h>
-@@ -24,6 +29,95 @@ namespace mozilla {
- 
- int GetCycleTimeFrequencyMHz() { return 0; }
- 
-+#ifdef __OpenBSD__
-+nsresult GetCpuTimeSinceProcessStartInMs(uint64_t* aResult) {
-+  timespec t;
-+  if (clock_gettime(CLOCK_PROCESS_CPUTIME_ID, &t) == 0) {
-+    uint64_t cpuTime =
-+        uint64_t(t.tv_sec) * 1'000'000'000u + uint64_t(t.tv_nsec);
-+    *aResult = cpuTime / PR_NSEC_PER_MSEC;
-+    return NS_OK;
-+  }
-+
-+  return NS_ERROR_FAILURE;
-+}
-+
-+nsresult GetGpuTimeSinceProcessStartInMs(uint64_t* aResult) {
-+  return NS_ERROR_NOT_IMPLEMENTED;
-+}
-+
-+ProcInfoPromise::ResolveOrRejectValue GetProcInfoSync(
-+    nsTArray<ProcInfoRequest>&& aRequests) {
-+  ProcInfoPromise::ResolveOrRejectValue result;
-+
-+  HashMap<base::ProcessId, ProcInfo> gathered;
-+  if (!gathered.reserve(aRequests.Length())) {
-+    result.SetReject(NS_ERROR_OUT_OF_MEMORY);
-+    return result;
-+  }
-+  for (const auto& request : aRequests) {
-+    size_t size;
-+    int mib[6];
-+    mib[0] = CTL_KERN;
-+    mib[1] = KERN_PROC;
-+    mib[2] = KERN_PROC_PID | KERN_PROC_SHOW_THREADS;
-+    mib[3] = request.pid;
-+    mib[4] = sizeof(kinfo_proc);
-+    mib[5] = 0;
-+    if (sysctl(mib, 6, nullptr, &size, nullptr, 0) == -1) {
-+      // Can't get info for this process. Skip it.
-+      continue;
-+    }
-+
-+    mib[5] = size / sizeof(kinfo_proc);
-+    auto procs = MakeUniqueFallible<kinfo_proc[]>(mib[5]);
-+    if (!procs) {
-+      result.SetReject(NS_ERROR_OUT_OF_MEMORY);
-+      return result;
-+    }
-+    if (sysctl(mib, 6, procs.get(), &size, nullptr, 0) == -1 &&
-+        errno != ENOMEM) {
-+      continue;
-+    }
-+
-+    ProcInfo info;
-+    info.pid = request.pid;
-+    info.childId = request.childId;
-+    info.type = request.processType;
-+    info.origin = request.origin;
-+    info.windows = std::move(request.windowInfo);
-+
-+    bool found = false;
-+    for (size_t i = 0; i < size / sizeof(kinfo_proc); i++) {
-+      const auto& p = procs[i];
-+      if (p.p_tid == -1) {
-+        // This is the process.
-+        found = true;
-+        info.cpuTime = p.p_rtime_sec * 1'000'000'000u +
-+            p.p_uutime_usec * 1'000u;
-+        info.memory = (p.p_vm_tsize + p.p_vm_dsize + p.p_vm_ssize) *
-+            getpagesize();
-+      } else {
-+        // This is one of its threads.
-+        ThreadInfo threadInfo;
-+        threadInfo.tid = p.p_tid;
-+        threadInfo.cpuTime = p.p_rtime_sec * 1'000'000'000u +
-+            p.p_uutime_usec * 1'000u;
-+        info.threads.AppendElement(threadInfo);
-+      }
-+    }
-+
-+    if (found && !gathered.put(request.pid, std::move(info))) {
-+      result.SetReject(NS_ERROR_OUT_OF_MEMORY);
-+      return result;
-+    }
-+  }
-+
-+  // ... and we're done!
-+  result.SetResolve(std::move(gathered));
-+  return result;
-+}
-+#else
- // StatReader can parse and tokenize a POSIX stat file.
- // see http://man7.org/linux/man-pages/man5/proc.5.html
- //
-@@ -340,5 +434,6 @@ ProcInfoPromise::ResolveOrRejectValue GetProcInfoSync(
-   result.SetResolve(std::move(gathered));
-   return result;
- }
-+#endif
- 
- }  // namespace mozilla
Index: 
www/tor-browser/browser/patches/patch-toolkit_components_tor-launcher_TorProcess_jsm
===================================================================
RCS file: 
www/tor-browser/browser/patches/patch-toolkit_components_tor-launcher_TorProcess_jsm
diff -N 
www/tor-browser/browser/patches/patch-toolkit_components_tor-launcher_TorProcess_jsm
--- 
www/tor-browser/browser/patches/patch-toolkit_components_tor-launcher_TorProcess_jsm
        6 Sep 2023 09:42:29 -0000       1.3
+++ /dev/null   1 Jan 1970 00:00:00 -0000
@@ -1,34 +0,0 @@
-Let geoip/geoip6 file paths be set by prefs like everything else and let
-the new getTorFile() deal with it.
-
-Index: toolkit/components/tor-launcher/TorProcess.jsm
---- toolkit/components/tor-launcher/TorProcess.jsm.orig
-+++ toolkit/components/tor-launcher/TorProcess.jsm
-@@ -242,6 +242,8 @@ class TorProcess {
-     const torrcFile = TorLauncherUtil.getTorFile("torrc", true);
-     this._dataDir = TorLauncherUtil.getTorFile("tordatadir", true);
-     const onionAuthDir = TorLauncherUtil.getTorFile("toronionauthdir", true);
-+    const geoipFile = TorLauncherUtil.getTorFile("geoip", false);
-+    const geoip6File = TorLauncherUtil.getTorFile("geoip6", false);
-     const hashedPassword = TorProtocolService.torGetPassword(true);
-     let detailsKey;
-     if (!this._exeFile) {
-@@ -270,17 +272,13 @@ class TorProcess {
-       "torrc-defaults",
-       false
-     );
--    // The geoip and geoip6 files are in the same directory as torrc-defaults.
--    const geoipFile = torrcDefaultsFile.clone();
--    geoipFile.leafName = "geoip";
--    const geoip6File = torrcDefaultsFile.clone();
--    geoip6File.leafName = "geoip6";
- 
-     this._args = [];
-     if (torrcDefaultsFile) {
-       this._args.push("--defaults-torrc");
-       this._args.push(torrcDefaultsFile.path);
-     }
-+    this._args.push("--ignore-missing-torrc");
-     this._args.push("-f");
-     this._args.push(torrcFile.path);
-     this._args.push("DataDirectory");
Index: 
www/tor-browser/browser/patches/patch-toolkit_components_tor-launcher_TorProcess_sys_mjs
===================================================================
RCS file: 
www/tor-browser/browser/patches/patch-toolkit_components_tor-launcher_TorProcess_sys_mjs
diff -N 
www/tor-browser/browser/patches/patch-toolkit_components_tor-launcher_TorProcess_sys_mjs
--- /dev/null   1 Jan 1970 00:00:00 -0000
+++ 
www/tor-browser/browser/patches/patch-toolkit_components_tor-launcher_TorProcess_sys_mjs
    17 Oct 2023 16:15:45 -0000
@@ -0,0 +1,26 @@
+Let geoip/geoip6 file paths be set by prefs like everything else and let
+the new getTorFile() deal with it.
+
+Index: toolkit/components/tor-launcher/TorProcess.sys.mjs
+--- toolkit/components/tor-launcher/TorProcess.sys.mjs.orig
++++ toolkit/components/tor-launcher/TorProcess.sys.mjs
+@@ -254,16 +254,14 @@ export class TorProcess {
+       "torrc-defaults",
+       false
+     );
+-    // The geoip and geoip6 files are in the same directory as torrc-defaults.
+-    const geoipFile = torrcDefaultsFile.clone();
+-    geoipFile.leafName = "geoip";
+-    const geoip6File = torrcDefaultsFile.clone();
+-    geoip6File.leafName = "geoip6";
++    const geoipFile = lazy.TorLauncherUtil.getTorFile("geoip", false);
++    const geoip6File = lazy.TorLauncherUtil.getTorFile("geoip6", false);
+ 
+     this.#args = [];
+     if (torrcDefaultsFile) {
+       this.#args.push("--defaults-torrc", torrcDefaultsFile.path);
+     }
++    this.#args.push("--ignore-missing-torrc");
+     this.#args.push("-f", torrcFile.path);
+     this.#args.push("DataDirectory", this.#dataDir.path);
+     this.#args.push("ClientOnionAuthDir", onionAuthDir.path);
Index: www/tor-browser/browser/patches/patch-toolkit_moz_configure
===================================================================
RCS file: 
/cvs/ports/www/tor-browser/browser/patches/patch-toolkit_moz_configure,v
retrieving revision 1.6
diff -u -p -r1.6 patch-toolkit_moz_configure
--- www/tor-browser/browser/patches/patch-toolkit_moz_configure 27 Oct 2022 
17:37:13 -0000      1.6
+++ www/tor-browser/browser/patches/patch-toolkit_moz_configure 17 Oct 2023 
16:15:45 -0000
@@ -3,7 +3,7 @@ Required to make font fingerprinting def
 Index: toolkit/moz.configure
 --- toolkit/moz.configure.orig
 +++ toolkit/moz.configure
-@@ -1770,7 +1770,7 @@ set_config(
+@@ -1837,7 +1837,7 @@ set_config(
  
  @depends(target)
  def bundled_fonts_default(target):
Index: 
www/tor-browser/browser/patches/patch-toolkit_system_gnome_nsGIOService_cpp
===================================================================
RCS file: 
www/tor-browser/browser/patches/patch-toolkit_system_gnome_nsGIOService_cpp
diff -N 
www/tor-browser/browser/patches/patch-toolkit_system_gnome_nsGIOService_cpp
--- www/tor-browser/browser/patches/patch-toolkit_system_gnome_nsGIOService_cpp 
27 Oct 2022 17:37:13 -0000      1.5
+++ /dev/null   1 Jan 1970 00:00:00 -0000
@@ -1,125 +0,0 @@
-https://bugzilla.mozilla.org/show_bug.cgi?id=1714919
-
-Try to fix opening downloaded files with registered external mimetype handlers
-after gio-launch-desktop removal in glib 2.64.
-
-more or less replaces g_app_info_launch_uris() (which relies on /bin/sh in
-2.64) calls by g_spawn_async() using a handler that should be previously
-unveiled.
-
-Index: toolkit/system/gnome/nsGIOService.cpp
---- toolkit/system/gnome/nsGIOService.cpp.orig
-+++ toolkit/system/gnome/nsGIOService.cpp
-@@ -234,13 +234,24 @@ nsGIOMimeApp::LaunchWithURI(nsIURI* aUri,
-   uris.data = const_cast<char*>(spec.get());
- 
-   GUniquePtr<GError> error;
--  gboolean result = g_app_info_launch_uris(
--      mApp, &uris, GetLaunchContext().get(), getter_Transfers(error));
--  if (!result) {
--    g_warning("Cannot launch application: %s", error->message);
-+  gchar *path = g_filename_from_uri(spec.get(), NULL, NULL);
-+  const gchar *bin = g_app_info_get_executable(mApp);
-+  if (!bin) {
-+    g_warning("no executable found for %s, maybe not unveiled ?", 
g_app_info_get_name(mApp));
-     return NS_ERROR_FAILURE;
-   }
-+  g_message("LaunchWithURI: spawning %s %s for %s", bin, path, spec.get());
-+  const gchar * const argv[] = { bin, path, NULL };
- 
-+  GSpawnFlags flags = static_cast<GSpawnFlags>(G_SPAWN_SEARCH_PATH |
-+                                               G_SPAWN_DO_NOT_REAP_CHILD);
-+  gboolean result = g_spawn_async( NULL, (char**) argv, NULL, flags, NULL, 
NULL, NULL, getter_Transfers(error));
-+
-+   if (!result) {
-+    g_warning("Cannot launch application %s with arg %s: %s", bin, path, 
error->message);
-+    return NS_ERROR_FAILURE;
-+  }
-+
-   return NS_OK;
- }
- 
-@@ -491,23 +502,18 @@ nsGIOService::GetAppForMimeType(const nsACString& aMim
-     return NS_ERROR_NOT_AVAILABLE;
-   }
- 
--#if defined(__OpenBSD__) && defined(MOZ_SANDBOX)
--  // g_app_info_get_default_for_type will fail on OpenBSD's veiled filesystem
--  // since we most likely don't have direct access to the binaries that are
--  // registered as defaults for this type.  Fake it up by just executing
--  // xdg-open via gio-launch-desktop (which we do have access to) and letting
--  // it figure out which program to execute for this MIME type
--  RefPtr<GAppInfo> app_info = dont_AddRef(g_app_info_create_from_commandline(
--      "/usr/local/bin/xdg-open",
--      nsPrintfCString("System default for %s", content_type.get()).get(),
--      G_APP_INFO_CREATE_NONE, NULL));
--#else
-   RefPtr<GAppInfo> app_info =
-       dont_AddRef(g_app_info_get_default_for_type(content_type.get(), false));
--#endif
-   if (!app_info) {
-     return NS_ERROR_FAILURE;
-   }
-+  char *t;
-+  t = g_find_program_in_path(g_app_info_get_executable(app_info));
-+  if (t != NULL) {
-+    g_debug("%s is registered as handler for %s, binary available as %s", 
g_app_info_get_executable(app_info), content_type.get(), t);
-+  } else {
-+    g_warning("%s is registered as handler for %s but not available in PATH 
(missing unveil ?)", g_app_info_get_executable(app_info), content_type.get());
-+  }
-   RefPtr<nsGIOMimeApp> mozApp = new nsGIOMimeApp(app_info.forget());
-   mozApp.forget(aApp);
-   return NS_OK;
-@@ -535,8 +541,24 @@ nsresult nsGIOService::ShowURI(nsIURI* aURI) {
-   nsAutoCString spec;
-   MOZ_TRY(aURI->GetSpec(spec));
-   GUniquePtr<GError> error;
--  if (!g_app_info_launch_default_for_uri(spec.get(), GetLaunchContext().get(),
--                                         getter_Transfers(error))) {
-+  gboolean result_uncertain;
-+  gchar *path = g_filename_from_uri(spec.get(), NULL, NULL);
-+  gchar *content_type = g_content_type_guess(path, NULL, 0, 
&result_uncertain);
-+  if (content_type != NULL && !result_uncertain) {
-+    GAppInfo* app_info = g_app_info_get_default_for_type(content_type, false);
-+    const gchar *bin = g_app_info_get_executable(app_info);
-+    if (!bin) {
-+      g_warning("no executable found for %s, maybe not unveiled ?", 
g_app_info_get_name(app_info));
-+      return NS_ERROR_FAILURE;
-+    }
-+    g_message("ShowURI: spawning %s %s for %s (content type %s)", bin, path, 
spec.get(), content_type);
-+    const gchar * const argv[] = { bin, path, NULL };
-+    GSpawnFlags flags = static_cast<GSpawnFlags>(G_SPAWN_SEARCH_PATH |
-+                                                 G_SPAWN_DO_NOT_REAP_CHILD);
-+    g_spawn_async( NULL, (char**) argv, NULL, flags, NULL, NULL, NULL, 
getter_Transfers(error));
-+  }
-+  g_free(content_type);
-+  if (error) {
-     g_warning("Could not launch default application for URI: %s",
-               error->message);
-     return NS_ERROR_FAILURE;
-@@ -549,8 +571,23 @@ static nsresult LaunchPath(const nsACString& aPath) {
-       g_file_new_for_commandline_arg(PromiseFlatCString(aPath).get()));
-   GUniquePtr<char> spec(g_file_get_uri(file));
-   GUniquePtr<GError> error;
--  g_app_info_launch_default_for_uri(spec.get(), GetLaunchContext().get(),
--                                    getter_Transfers(error));
-+  gboolean result_uncertain;
-+  gchar *path = g_filename_from_uri(spec.get(), NULL, NULL);
-+  gchar *content_type = g_content_type_guess(path, NULL, 0, 
&result_uncertain);
-+  if (content_type != NULL && !result_uncertain) {
-+    GAppInfo* app_info = g_app_info_get_default_for_type(content_type, false);
-+    const gchar *bin = g_app_info_get_executable(app_info);
-+    if (!bin) {
-+      g_warning("no executable found for %s, maybe not unveiled ?", 
g_app_info_get_name(app_info));
-+      return NS_ERROR_FAILURE;
-+    }
-+    g_message("ShowURIForInput: spawning %s %s for %s (content type %s)", 
bin, path, spec.get(), content_type);
-+    const gchar * const argv[] = { bin, path, NULL };
-+    GSpawnFlags flags = static_cast<GSpawnFlags>(G_SPAWN_SEARCH_PATH |
-+                                                 G_SPAWN_DO_NOT_REAP_CHILD);
-+    g_spawn_async( NULL, (char**) argv, NULL, flags, NULL, NULL, NULL, 
getter_Transfers(error));
-+  }
-+  g_free(content_type);
-   if (error) {
-     g_warning("Cannot launch default application: %s", error->message);
-     return NS_ERROR_FAILURE;
Index: www/tor-browser/browser/patches/patch-toolkit_xre_glxtest_cpp
===================================================================
RCS file: www/tor-browser/browser/patches/patch-toolkit_xre_glxtest_cpp
diff -N www/tor-browser/browser/patches/patch-toolkit_xre_glxtest_cpp
--- www/tor-browser/browser/patches/patch-toolkit_xre_glxtest_cpp       27 Oct 
2022 17:37:13 -0000      1.1
+++ /dev/null   1 Jan 1970 00:00:00 -0000
@@ -1,15 +0,0 @@
-https://bugzilla.mozilla.org/show_bug.cgi?id=1776713
-
-Index: toolkit/xre/glxtest.cpp
---- toolkit/xre/glxtest.cpp.orig
-+++ toolkit/xre/glxtest.cpp
-@@ -258,6 +258,9 @@ static void close_logging() {
- #define PCI_BASE_CLASS_DISPLAY 0x03
- 
- static int get_pci_status() {
-+#ifdef __OpenBSD__
-+  return 1;
-+#endif
-   void* libpci = dlopen("libpci.so.3", RTLD_LAZY);
-   if (!libpci) {
-     libpci = dlopen("libpci.so", RTLD_LAZY);
Index: www/tor-browser/browser/patches/patch-toolkit_xre_glxtest_glxtest_cpp
===================================================================
RCS file: www/tor-browser/browser/patches/patch-toolkit_xre_glxtest_glxtest_cpp
diff -N www/tor-browser/browser/patches/patch-toolkit_xre_glxtest_glxtest_cpp
--- /dev/null   1 Jan 1970 00:00:00 -0000
+++ www/tor-browser/browser/patches/patch-toolkit_xre_glxtest_glxtest_cpp       
17 Oct 2023 16:15:45 -0000
@@ -0,0 +1,13 @@
+Index: toolkit/xre/glxtest/glxtest.cpp
+--- toolkit/xre/glxtest/glxtest.cpp.orig
++++ toolkit/xre/glxtest/glxtest.cpp
+@@ -193,6 +193,9 @@ extern "C" {
+ #define PCI_BASE_CLASS_DISPLAY 0x03
+ 
+ static void get_pci_status() {
++#ifdef __OpenBSD__
++  return;
++#endif
+   log("GLX_TEST: get_pci_status start\n");
+ 
+   if (access("/sys/bus/pci/", F_OK) != 0 &&
Index: www/tor-browser/browser/patches/patch-toolkit_xre_nsXREDirProvider_cpp
===================================================================
RCS file: 
/cvs/ports/www/tor-browser/browser/patches/patch-toolkit_xre_nsXREDirProvider_cpp,v
retrieving revision 1.1
diff -u -p -r1.1 patch-toolkit_xre_nsXREDirProvider_cpp
--- www/tor-browser/browser/patches/patch-toolkit_xre_nsXREDirProvider_cpp      
6 Sep 2023 09:42:29 -0000       1.1
+++ www/tor-browser/browser/patches/patch-toolkit_xre_nsXREDirProvider_cpp      
17 Oct 2023 16:15:45 -0000
@@ -3,7 +3,7 @@ Use ~/TorBrowser-Data/Browser as the bro
 Index: toolkit/xre/nsXREDirProvider.cpp
 --- toolkit/xre/nsXREDirProvider.cpp.orig
 +++ toolkit/xre/nsXREDirProvider.cpp
-@@ -1557,6 +1557,19 @@ nsresult nsXREDirProvider::GetUserDataDirectoryHome(ns
+@@ -1433,6 +1433,19 @@ nsresult nsXREDirProvider::GetUserDataDirectoryHome(ns
    const char* homeDir = getenv("HOME");
    if (!homeDir || !*homeDir) return NS_ERROR_FAILURE;
  
@@ -23,7 +23,7 @@ Index: toolkit/xre/nsXREDirProvider.cpp
  #  ifdef ANDROID /* We want (ProfD == ProfLD) on Android. */
    aLocal = false;
  #  endif
-@@ -1576,6 +1589,7 @@ nsresult nsXREDirProvider::GetUserDataDirectoryHome(ns
+@@ -1452,6 +1465,7 @@ nsresult nsXREDirProvider::GetUserDataDirectoryHome(ns
      rv = NS_NewNativeLocalFile(nsDependentCString(homeDir), true,
                                 getter_AddRefs(localDir));
    }
@@ -31,7 +31,7 @@ Index: toolkit/xre/nsXREDirProvider.cpp
  #else
  #  error "Don't know how to get product dir on your platform"
  #endif
-@@ -1636,8 +1650,10 @@ nsresult nsXREDirProvider::GetUserDataDirectory(nsIFil
+@@ -1512,8 +1526,10 @@ nsresult nsXREDirProvider::GetUserDataDirectory(nsIFil
    nsresult rv = GetUserDataDirectoryHome(getter_AddRefs(localDir), aLocal);
    NS_ENSURE_SUCCESS(rv, rv);
  
Index: www/tor-browser/browser/patches/patch-xpcom_build_BinaryPath_h
===================================================================
RCS file: www/tor-browser/browser/patches/patch-xpcom_build_BinaryPath_h
diff -N www/tor-browser/browser/patches/patch-xpcom_build_BinaryPath_h
--- www/tor-browser/browser/patches/patch-xpcom_build_BinaryPath_h      27 Oct 
2022 17:37:13 -0000      1.1
+++ /dev/null   1 Jan 1970 00:00:00 -0000
@@ -1,13 +0,0 @@
-avoid pledge sysctl 4: 1 55 29028 1 ?
-
-Index: xpcom/build/BinaryPath.h
---- xpcom/build/BinaryPath.h.orig
-+++ xpcom/build/BinaryPath.h
-@@ -204,6 +204,7 @@ class BinaryPath {
-     mib[1] = KERN_PROC_ARGS;
-     mib[2] = getpid();
-     mib[3] = KERN_PROC_ARGV;
-+    return 
GetFromArgv0("${TRUEPREFIX}/lib/${MOZILLA_PROJECT}/${MOZILLA_PROJECT}", 
aResult);
- 
-     size_t len = 0;
-     if (sysctl(mib, 4, nullptr, &len, nullptr, 0) < 0) {
Index: 
www/tor-browser/browser/patches/patch-xpcom_io_nsAppFileLocationProvider_cpp
===================================================================
RCS file: 
/cvs/ports/www/tor-browser/browser/patches/patch-xpcom_io_nsAppFileLocationProvider_cpp,v
retrieving revision 1.1
diff -u -p -r1.1 patch-xpcom_io_nsAppFileLocationProvider_cpp
--- 
www/tor-browser/browser/patches/patch-xpcom_io_nsAppFileLocationProvider_cpp    
    6 Sep 2023 09:42:29 -0000       1.1
+++ 
www/tor-browser/browser/patches/patch-xpcom_io_nsAppFileLocationProvider_cpp    
    17 Oct 2023 16:15:45 -0000
@@ -3,7 +3,7 @@ Use ~/TorBrowser-Data/Browser as the bro
 Index: xpcom/io/nsAppFileLocationProvider.cpp
 --- xpcom/io/nsAppFileLocationProvider.cpp.orig
 +++ xpcom/io/nsAppFileLocationProvider.cpp
-@@ -402,6 +402,12 @@ nsresult nsAppFileLocationProvider::GetProductDirector
+@@ -328,6 +328,12 @@ nsresult nsAppFileLocationProvider::GetProductDirector
    if (NS_FAILED(rv)) {
      return rv;
    }
Index: www/tor-browser/browser/pkg/PLIST
===================================================================
RCS file: /cvs/ports/www/tor-browser/browser/pkg/PLIST,v
retrieving revision 1.19
diff -u -p -r1.19 PLIST
--- www/tor-browser/browser/pkg/PLIST   14 Sep 2023 06:03:49 -0000      1.19
+++ www/tor-browser/browser/pkg/PLIST   17 Oct 2023 16:15:45 -0000
@@ -29,7 +29,6 @@ lib/${BROWSER_NAME}/browser/defaults/pre
 lib/${BROWSER_NAME}/browser/defaults/preferences/pledge.rdd
 lib/${BROWSER_NAME}/browser/defaults/preferences/pledge.socket
 lib/${BROWSER_NAME}/browser/defaults/preferences/pledge.utility
-lib/${BROWSER_NAME}/browser/defaults/preferences/pledge.utility-audioDecoder
 lib/${BROWSER_NAME}/browser/defaults/preferences/unveil.content
 @sample ${SYSCONFDIR}/${MOZILLA_PROJECT}/unveil.content
 lib/${BROWSER_NAME}/browser/defaults/preferences/unveil.gpu
@@ -39,18 +38,19 @@ lib/${BROWSER_NAME}/browser/defaults/pre
 lib/${BROWSER_NAME}/browser/defaults/preferences/unveil.rdd
 lib/${BROWSER_NAME}/browser/defaults/preferences/unveil.socket
 lib/${BROWSER_NAME}/browser/defaults/preferences/unveil.utility
-lib/${BROWSER_NAME}/browser/defaults/preferences/unveil.utility-audioDecoder
 lib/${BROWSER_NAME}/browser/defaults/profile/
 lib/${BROWSER_NAME}/browser/defaults/profile/bookmarks.html
-lib/${BROWSER_NAME}/browser/features/
-lib/${BROWSER_NAME}/browser/features/onboard...@mozilla.org.xpi
 lib/${BROWSER_NAME}/browser/fontconfig/
 lib/${BROWSER_NAME}/browser/fontconfig/fonts.conf
 lib/${BROWSER_NAME}/browser/fonts/
+lib/${BROWSER_NAME}/browser/fonts/000_README.txt
 lib/${BROWSER_NAME}/browser/fonts/Arimo-Bold.ttf
 lib/${BROWSER_NAME}/browser/fonts/Arimo-BoldItalic.ttf
 lib/${BROWSER_NAME}/browser/fonts/Arimo-Italic.ttf
 lib/${BROWSER_NAME}/browser/fonts/Arimo-Regular.ttf
+lib/${BROWSER_NAME}/browser/fonts/Cousine-Bold.ttf
+lib/${BROWSER_NAME}/browser/fonts/Cousine-BoldItalic.ttf
+lib/${BROWSER_NAME}/browser/fonts/Cousine-Italic.ttf
 lib/${BROWSER_NAME}/browser/fonts/Cousine-Regular.ttf
 lib/${BROWSER_NAME}/browser/fonts/NotoNaskhArabic-Regular.ttf
 lib/${BROWSER_NAME}/browser/fonts/NotoSansAdlam-Regular.ttf
@@ -174,14 +174,14 @@ lib/${BROWSER_NAME}/browser/fonts/NotoSe
 lib/${BROWSER_NAME}/browser/fonts/NotoSerifLao-Regular.ttf
 lib/${BROWSER_NAME}/browser/fonts/NotoSerifMalayalam-Regular.ttf
 lib/${BROWSER_NAME}/browser/fonts/NotoSerifMyanmar-Regular.ttf
-lib/${BROWSER_NAME}/browser/fonts/NotoSerifNyiakengPuachueHmong-Regular.ttf
+lib/${BROWSER_NAME}/browser/fonts/NotoSerifNPHmong-Regular.ttf
 lib/${BROWSER_NAME}/browser/fonts/NotoSerifSinhala-Regular.ttf
 lib/${BROWSER_NAME}/browser/fonts/NotoSerifTamil-Regular.ttf
 lib/${BROWSER_NAME}/browser/fonts/NotoSerifTelugu-Regular.ttf
 lib/${BROWSER_NAME}/browser/fonts/NotoSerifThai-Regular.ttf
 lib/${BROWSER_NAME}/browser/fonts/NotoSerifTibetan-Regular.ttf
 lib/${BROWSER_NAME}/browser/fonts/NotoSerifYezidi-Regular.ttf
-lib/${BROWSER_NAME}/browser/fonts/STIXMath-Regular.otf
+lib/${BROWSER_NAME}/browser/fonts/STIXTwoMath-Regular.otf
 lib/${BROWSER_NAME}/browser/fonts/Tinos-Bold.ttf
 lib/${BROWSER_NAME}/browser/fonts/Tinos-BoldItalic.ttf
 lib/${BROWSER_NAME}/browser/fonts/Tinos-Italic.ttf
@@ -196,6 +196,7 @@ lib/${BROWSER_NAME}/distribution/
 lib/${BROWSER_NAME}/distribution/distribution.ini
 lib/${BROWSER_NAME}/fonts/
 lib/${BROWSER_NAME}/fonts/TwemojiMozilla.ttf
+@bin lib/${BROWSER_NAME}/glxtest
 @lib lib/${BROWSER_NAME}/libfreebl3.so.${LIBfreebl3_VERSION}
 @lib lib/${BROWSER_NAME}/libipcclientcerts.so.${LIBipcclientcerts_VERSION}
 @lib lib/${BROWSER_NAME}/liblgpllibs.so.${LIBlgpllibs_VERSION}


Reply via email to