[tor-commits] [Git][tpo/applications/tor-browser][tor-browser-115.2.0esr-13.0-1] Bug 42084: Ensure spoofing works even if preferences are set out of order.
ma1 pushed to branch tor-browser-115.2.0esr-13.0-1 at The Tor Project / Applications / Tor Browser Commits: 8cff1681 by hackademix at 2023-09-12T10:37:14+02:00 Bug 42084: Ensure spoofing works even if preferences are set out of order. - - - - - 1 changed file: - toolkit/components/resistfingerprinting/RFPHelper.sys.mjs Changes: = toolkit/components/resistfingerprinting/RFPHelper.sys.mjs = @@ -158,6 +158,9 @@ class _RFPHelper { // Add RFP and Letterboxing observers if prefs are enabled this._handleResistFingerprintingChanged(); this._handleLetterboxingPrefChanged(); + +// Synchronize language preferences if accidentally messed up (tor-browser#42084) +this._handleSpoofEnglishChanged(); } uninit() { @@ -211,6 +214,7 @@ class _RFPHelper { this._handleResistFingerprintingChanged(); break; case kPrefSpoofEnglish: + case "intl.accept_languages": this._handleSpoofEnglishChanged(); break; case kPrefLetterboxing: @@ -259,6 +263,7 @@ class _RFPHelper { } _handleSpoofEnglishChanged() { +Services.prefs.removeObserver("intl.accept_languages", this); switch (Services.prefs.getIntPref(kPrefSpoofEnglish)) { case 0: // will prompt // This should only happen when turning privacy.resistFingerprinting off. @@ -277,6 +282,8 @@ class _RFPHelper { case 2: // spoof Services.prefs.setCharPref("intl.accept_languages", "en-US, en"); Services.prefs.setBoolPref("javascript.use_us_english_locale", true); +// Ensure spoofing works if preferences are set out of order +Services.prefs.addObserver("intl.accept_languages", this); break; default: break; View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/8cff1681b5043289085fa21e1a1927c59e5b4c47 -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/8cff1681b5043289085fa21e1a1927c59e5b4c47 You're receiving this email because of your account on gitlab.torproject.org. ___ tor-commits mailing list tor-commits@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits
[tor-commits] [Git][tpo/applications/tor-browser][base-browser-102.15.0esr-12.5-1] Bug 42084: Ensure spoofing works even if preferences are set out of order.
ma1 pushed to branch base-browser-102.15.0esr-12.5-1 at The Tor Project / Applications / Tor Browser Commits: 60d54c03 by hackademix at 2023-09-12T11:15:40+02:00 Bug 42084: Ensure spoofing works even if preferences are set out of order. - - - - - 1 changed file: - toolkit/components/resistfingerprinting/RFPHelper.jsm Changes: = toolkit/components/resistfingerprinting/RFPHelper.jsm = @@ -163,6 +163,9 @@ class _RFPHelper { // Add RFP and Letterboxing observers if prefs are enabled this._handleResistFingerprintingChanged(); this._handleLetterboxingPrefChanged(); + +// Synchronize language preferences if accidentally messed up (tor-browser#42084) +this._handleSpoofEnglishChanged(); } uninit() { @@ -216,6 +219,7 @@ class _RFPHelper { this._handleResistFingerprintingChanged(); break; case kPrefSpoofEnglish: + case "intl.accept_languages": this._handleSpoofEnglishChanged(); break; case kPrefLetterboxing: @@ -264,6 +268,7 @@ class _RFPHelper { } _handleSpoofEnglishChanged() { +Services.prefs.removeObserver("intl.accept_languages", this); switch (Services.prefs.getIntPref(kPrefSpoofEnglish)) { case 0: // will prompt // This should only happen when turning privacy.resistFingerprinting off. @@ -282,6 +287,8 @@ class _RFPHelper { case 2: // spoof Services.prefs.setCharPref("intl.accept_languages", "en-US, en"); Services.prefs.setBoolPref("javascript.use_us_english_locale", true); +// Ensure spoofing works if preferences are set out of order +Services.prefs.addObserver("intl.accept_languages", this); break; default: break; View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/60d54c0397f07788859617643d26c9f7db8d05c2 -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/60d54c0397f07788859617643d26c9f7db8d05c2 You're receiving this email because of your account on gitlab.torproject.org. ___ tor-commits mailing list tor-commits@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits
[tor-commits] [Git][tpo/applications/tor-browser][tor-browser-102.15.0esr-12.5-1] Bug 42084: Ensure spoofing works even if preferences are set out of order.
ma1 pushed to branch tor-browser-102.15.0esr-12.5-1 at The Tor Project / Applications / Tor Browser Commits: 6f9146d0 by hackademix at 2023-09-12T11:11:13+02:00 Bug 42084: Ensure spoofing works even if preferences are set out of order. - - - - - 1 changed file: - toolkit/components/resistfingerprinting/RFPHelper.jsm Changes: = toolkit/components/resistfingerprinting/RFPHelper.jsm = @@ -163,6 +163,9 @@ class _RFPHelper { // Add RFP and Letterboxing observers if prefs are enabled this._handleResistFingerprintingChanged(); this._handleLetterboxingPrefChanged(); + +// Synchronize language preferences if accidentally messed up (tor-browser#42084) +this._handleSpoofEnglishChanged(); } uninit() { @@ -216,6 +219,7 @@ class _RFPHelper { this._handleResistFingerprintingChanged(); break; case kPrefSpoofEnglish: + case "intl.accept_languages": this._handleSpoofEnglishChanged(); break; case kPrefLetterboxing: @@ -264,6 +268,7 @@ class _RFPHelper { } _handleSpoofEnglishChanged() { +Services.prefs.removeObserver("intl.accept_languages", this); switch (Services.prefs.getIntPref(kPrefSpoofEnglish)) { case 0: // will prompt // This should only happen when turning privacy.resistFingerprinting off. @@ -282,6 +287,8 @@ class _RFPHelper { case 2: // spoof Services.prefs.setCharPref("intl.accept_languages", "en-US, en"); Services.prefs.setBoolPref("javascript.use_us_english_locale", true); +// Ensure spoofing works if preferences are set out of order +Services.prefs.addObserver("intl.accept_languages", this); break; default: break; View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/6f9146d08cd9a15845cf3444a8a691c06a4e1fe7 -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/6f9146d08cd9a15845cf3444a8a691c06a4e1fe7 You're receiving this email because of your account on gitlab.torproject.org. ___ tor-commits mailing list tor-commits@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits
[tor-commits] [Git][tpo/applications/tor-browser][base-browser-115.2.0esr-13.0-1] Bug 42084: Ensure English spoofing works even if preferences are set out of order.
ma1 pushed to branch base-browser-115.2.0esr-13.0-1 at The Tor Project / Applications / Tor Browser Commits: 44ffc800 by hackademix at 2023-09-12T11:56:26+02:00 Bug 42084: Ensure English spoofing works even if preferences are set out of order. - - - - - 1 changed file: - toolkit/components/resistfingerprinting/RFPHelper.sys.mjs Changes: = toolkit/components/resistfingerprinting/RFPHelper.sys.mjs = @@ -158,6 +158,9 @@ class _RFPHelper { // Add RFP and Letterboxing observers if prefs are enabled this._handleResistFingerprintingChanged(); this._handleLetterboxingPrefChanged(); + +// Synchronize language preferences if accidentally messed up (tor-browser#42084) +this._handleSpoofEnglishChanged(); } uninit() { @@ -211,6 +214,7 @@ class _RFPHelper { this._handleResistFingerprintingChanged(); break; case kPrefSpoofEnglish: + case "intl.accept_languages": this._handleSpoofEnglishChanged(); break; case kPrefLetterboxing: @@ -259,6 +263,7 @@ class _RFPHelper { } _handleSpoofEnglishChanged() { +Services.prefs.removeObserver("intl.accept_languages", this); switch (Services.prefs.getIntPref(kPrefSpoofEnglish)) { case 0: // will prompt // This should only happen when turning privacy.resistFingerprinting off. @@ -277,6 +282,8 @@ class _RFPHelper { case 2: // spoof Services.prefs.setCharPref("intl.accept_languages", "en-US, en"); Services.prefs.setBoolPref("javascript.use_us_english_locale", true); +// Ensure spoofing works if preferences are set out of order +Services.prefs.addObserver("intl.accept_languages", this); break; default: break; View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/44ffc800c98607bf7652b1e56f765e925b47f9dd -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/44ffc800c98607bf7652b1e56f765e925b47f9dd You're receiving this email because of your account on gitlab.torproject.org. ___ tor-commits mailing list tor-commits@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits
[tor-commits] [Git][tpo/applications/tor-browser][tor-browser-115.2.0esr-13.0-1] fixup! Bug 23247: Communicating security expectations for .onion
ma1 pushed to branch tor-browser-115.2.0esr-13.0-1 at The Tor Project / Applications / Tor Browser Commits: 03a24c6d by cypherpunks1 at 2023-09-08T22:06:56+00:00 fixup! Bug 23247: Communicating security expectations for .onion Bug 41934: Treat unencrypted websocket connections to onion services as secure - - - - - 1 changed file: - dom/websocket/WebSocket.cpp Changes: = dom/websocket/WebSocket.cpp = @@ -1734,12 +1734,15 @@ nsresult WebSocketImpl::Init(JSContext* aCx, bool aIsSecure, } // Don't allow https:// to open ws:// - if (!mIsServerSide && !mSecure && + if (!mIsServerSide && !mSecure && aIsSecure && !Preferences::GetBool("network.websocket.allowInsecureFromHTTPS", false) && !nsMixedContentBlocker::IsPotentiallyTrustworthyLoopbackHost( mAsciiHost)) { -if (aIsSecure) { +nsCOMPtr uri; +nsresult rv = NS_NewURI(getter_AddRefs(uri), mURI); +NS_ENSURE_SUCCESS(rv, rv); +if (!nsMixedContentBlocker::IsPotentiallyTrustworthyOnion(uri)) { return NS_ERROR_DOM_SECURITY_ERR; } } View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/03a24c6d2d0aefd323223134215fdd7e405cbf87 -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/03a24c6d2d0aefd323223134215fdd7e405cbf87 You're receiving this email because of your account on gitlab.torproject.org. ___ tor-commits mailing list tor-commits@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits
[tor-commits] [Git][tpo/applications/tor-browser-build] Pushed new tag mb-12.5.3-build1
ma1 pushed new tag mb-12.5.3-build1 at The Tor Project / Applications / tor-browser-build -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/tree/mb-12.5.3-build1 You're receiving this email because of your account on gitlab.torproject.org. ___ tor-commits mailing list tor-commits@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits
[tor-commits] [Git][tpo/applications/tor-browser-build] Pushed new tag tbb-12.5.3-build1
ma1 pushed new tag tbb-12.5.3-build1 at The Tor Project / Applications / tor-browser-build -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/tree/tbb-12.5.3-build1 You're receiving this email because of your account on gitlab.torproject.org. ___ tor-commits mailing list tor-commits@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits
[tor-commits] [Git][tpo/applications/tor-browser][base-browser-115.2.0esr-13.0-1] Bug 41881: Don't persist custom network requests on private windows
ma1 pushed to branch base-browser-115.2.0esr-13.0-1 at The Tor Project / Applications / Tor Browser Commits: 95b3625a by cypherpunks1 at 2023-09-08T11:45:15+01:00 Bug 41881: Dont persist custom network requests on private windows - - - - - 1 changed file: - devtools/client/netmonitor/src/components/new-request/HTTPCustomRequestPanel.js Changes: = devtools/client/netmonitor/src/components/new-request/HTTPCustomRequestPanel.js = @@ -4,6 +4,11 @@ "use strict"; +const lazy = {}; +ChromeUtils.defineESModuleGetters(lazy, { + PrivateBrowsingUtils: "resource://gre/modules/PrivateBrowsingUtils.sys.mjs", +}); + const { Component, createFactory, @@ -122,10 +127,12 @@ class HTTPCustomRequestPanel extends Component { async componentDidMount() { let { connector, request } = this.props; -const persistedCustomRequest = await asyncStorage.getItem( - "devtools.netmonitor.customRequest" -); -request = request || persistedCustomRequest; +if (!lazy.PrivateBrowsingUtils.isWindowPrivate(window)) { + const persistedCustomRequest = await asyncStorage.getItem( +"devtools.netmonitor.customRequest" + ); + request = request || persistedCustomRequest; +} if (!request) { this.setState({ _isStateDataReady: true }); @@ -191,7 +198,9 @@ class HTTPCustomRequestPanel extends Component { } componentWillUnmount() { -asyncStorage.setItem("devtools.netmonitor.customRequest", this.state); +if (!lazy.PrivateBrowsingUtils.isWindowPrivate(window)) { + asyncStorage.setItem("devtools.netmonitor.customRequest", this.state); +} } handleChangeURL(event) { View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/95b3625a85b67f859adecbb436a4f44e1aec3ee0 -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/95b3625a85b67f859adecbb436a4f44e1aec3ee0 You're receiving this email because of your account on gitlab.torproject.org. ___ tor-commits mailing list tor-commits@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits
[tor-commits] [Git][tpo/applications/tor-browser][tor-browser-115.2.0esr-13.0-1] Bug 41881: Don't persist custom network requests on private windows
ma1 pushed to branch tor-browser-115.2.0esr-13.0-1 at The Tor Project / Applications / Tor Browser Commits: d66f99f2 by cypherpunks1 at 2023-09-08T10:16:52+00:00 Bug 41881: Dont persist custom network requests on private windows - - - - - 1 changed file: - devtools/client/netmonitor/src/components/new-request/HTTPCustomRequestPanel.js Changes: = devtools/client/netmonitor/src/components/new-request/HTTPCustomRequestPanel.js = @@ -4,6 +4,11 @@ "use strict"; +const lazy = {}; +ChromeUtils.defineESModuleGetters(lazy, { + PrivateBrowsingUtils: "resource://gre/modules/PrivateBrowsingUtils.sys.mjs", +}); + const { Component, createFactory, @@ -122,10 +127,12 @@ class HTTPCustomRequestPanel extends Component { async componentDidMount() { let { connector, request } = this.props; -const persistedCustomRequest = await asyncStorage.getItem( - "devtools.netmonitor.customRequest" -); -request = request || persistedCustomRequest; +if (!lazy.PrivateBrowsingUtils.isWindowPrivate(window)) { + const persistedCustomRequest = await asyncStorage.getItem( +"devtools.netmonitor.customRequest" + ); + request = request || persistedCustomRequest; +} if (!request) { this.setState({ _isStateDataReady: true }); @@ -191,7 +198,9 @@ class HTTPCustomRequestPanel extends Component { } componentWillUnmount() { -asyncStorage.setItem("devtools.netmonitor.customRequest", this.state); +if (!lazy.PrivateBrowsingUtils.isWindowPrivate(window)) { + asyncStorage.setItem("devtools.netmonitor.customRequest", this.state); +} } handleChangeURL(event) { View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/d66f99f26f2a0b41d5d40bc430a386f48abdae1c -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/d66f99f26f2a0b41d5d40bc430a386f48abdae1c You're receiving this email because of your account on gitlab.torproject.org. ___ tor-commits mailing list tor-commits@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits
[tor-commits] [Git][tpo/applications/tor-browser][tor-browser-115.4.0esr-13.5-1] Bug 42194: Fix blank net error page on failed DNS resolution with active proxy.
ma1 pushed to branch tor-browser-115.4.0esr-13.5-1 at The Tor Project / Applications / Tor Browser Commits: aa90395e by hackademix at 2023-11-07T12:56:55+01:00 Bug 42194: Fix blank net error page on failed DNS resolution with active proxy. - - - - - 1 changed file: - toolkit/actors/NetErrorChild.sys.mjs Changes: = toolkit/actors/NetErrorChild.sys.mjs = @@ -140,12 +140,15 @@ export class NetErrorChild extends RemotePageChild { shortDesc.appendChild(span); }, }; - -Services.uriFixup.checkHost( - info.fixedURI, - onLookupCompleteListener, - this.document.nodePrincipal.originAttributes -); +try { + Services.uriFixup.checkHost( +info.fixedURI, +onLookupCompleteListener, +this.document.nodePrincipal.originAttributes + ); +} catch (e) { + // DNS resolution may fail synchronously if forbidden by proxy +} } // Get the header from the http response of the failed channel. This function View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/aa90395e3ee52897434d71254d0df48c1582befe -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/aa90395e3ee52897434d71254d0df48c1582befe You're receiving this email because of your account on gitlab.torproject.org. ___ tor-commits mailing list tor-commits@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits
[tor-commits] [Git][tpo/applications/tor-browser][base-browser-115.4.0esr-13.5-1] Bug 42194: Fix blank net error page on failed DNS resolution with active proxy.
ma1 pushed to branch base-browser-115.4.0esr-13.5-1 at The Tor Project / Applications / Tor Browser Commits: c06034d3 by hackademix at 2023-11-07T17:19:49+01:00 Bug 42194: Fix blank net error page on failed DNS resolution with active proxy. - - - - - 1 changed file: - toolkit/actors/NetErrorChild.sys.mjs Changes: = toolkit/actors/NetErrorChild.sys.mjs = @@ -133,12 +133,15 @@ export class NetErrorChild extends RemotePageChild { shortDesc.appendChild(span); }, }; - -Services.uriFixup.checkHost( - info.fixedURI, - onLookupCompleteListener, - this.document.nodePrincipal.originAttributes -); +try { + Services.uriFixup.checkHost( +info.fixedURI, +onLookupCompleteListener, +this.document.nodePrincipal.originAttributes + ); +} catch (e) { + // DNS resolution may fail synchronously if forbidden by proxy +} } // Get the header from the http response of the failed channel. This function View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/c06034d3b43a8cb1db0b155527901124924355e5 -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/c06034d3b43a8cb1db0b155527901124924355e5 You're receiving this email because of your account on gitlab.torproject.org. ___ tor-commits mailing list tor-commits@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits
[tor-commits] [Git][tpo/applications/mullvad-browser][mullvad-browser-115.4.0esr-13.5-1] Bug 42194: Fix blank net error page on failed DNS resolution with active proxy.
ma1 pushed to branch mullvad-browser-115.4.0esr-13.5-1 at The Tor Project / Applications / Mullvad Browser Commits: 5cb306c9 by hackademix at 2023-11-07T17:22:34+01:00 Bug 42194: Fix blank net error page on failed DNS resolution with active proxy. - - - - - 1 changed file: - toolkit/actors/NetErrorChild.sys.mjs Changes: = toolkit/actors/NetErrorChild.sys.mjs = @@ -133,12 +133,15 @@ export class NetErrorChild extends RemotePageChild { shortDesc.appendChild(span); }, }; - -Services.uriFixup.checkHost( - info.fixedURI, - onLookupCompleteListener, - this.document.nodePrincipal.originAttributes -); +try { + Services.uriFixup.checkHost( +info.fixedURI, +onLookupCompleteListener, +this.document.nodePrincipal.originAttributes + ); +} catch (e) { + // DNS resolution may fail synchronously if forbidden by proxy +} } // Get the header from the http response of the failed channel. This function View it on GitLab: https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/5cb306c903900ad8dde25b57bae052927b95ded3 -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/5cb306c903900ad8dde25b57bae052927b95ded3 You're receiving this email because of your account on gitlab.torproject.org. ___ tor-commits mailing list tor-commits@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits
[tor-commits] [Git][tpo/applications/tor-browser][tor-browser-115.4.0esr-13.5-1] fixup! Bug 23247: Communicating security expectations for .onion
ma1 pushed to branch tor-browser-115.4.0esr-13.5-1 at The Tor Project / Applications / Tor Browser Commits: 8627f8e1 by cypherpunks1 at 2023-11-06T21:22:17+00:00 fixup! Bug 23247: Communicating security expectations for .onion Bug 42231: Improve the network monitor patch for http onion resources - - - - - 2 changed files: - devtools/client/netmonitor/src/components/SecurityState.js - devtools/shared/network-observer/NetworkHelper.sys.mjs Changes: = devtools/client/netmonitor/src/components/SecurityState.js = @@ -41,7 +41,7 @@ class SecurityState extends Component { const { securityState, - urlDetails: { isLocal }, + urlDetails: { host, isLocal }, } = item; const iconClassList = ["requests-security-state-icon"]; @@ -50,7 +50,11 @@ class SecurityState extends Component { // Locally delivered files such as http://localhost and file:// paths // are considered to have been delivered securely. -if (isLocal) { +if ( + isLocal || + (host?.endsWith(".onion") && +Services.prefs.getBoolPref("dom.securecontext.allowlist_onions", false)) +) { realSecurityState = "secure"; } = devtools/shared/network-observer/NetworkHelper.sys.mjs = @@ -596,9 +596,6 @@ export var NetworkHelper = { // The request did not contain any security info. if (!securityInfo) { - if (httpActivity.hostname && httpActivity.hostname.endsWith(".onion")) { -info.state = "secure"; - } return info; } @@ -650,11 +647,7 @@ export var NetworkHelper = { // schemes other than https and wss are subject to // downgrade/etc at the scheme level and should always be // considered insecure -if (httpActivity.hostname && httpActivity.hostname.endsWith(".onion")) { - info.state = "secure"; -} else { - info.state = "insecure"; -} +info.state = "insecure"; } else if (state & wpl.STATE_IS_SECURE) { // The connection is secure if the scheme is sufficient info.state = "secure"; View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/8627f8e1f78a8fc2ce2ba12b3b5314c020f7ca8f -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/8627f8e1f78a8fc2ce2ba12b3b5314c020f7ca8f You're receiving this email because of your account on gitlab.torproject.org. ___ tor-commits mailing list tor-commits@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits
[tor-commits] [Git][tpo/applications/tor-browser][tor-browser-115.3.0esr-13.0-1] fixup! Firefox preference overrides.
ma1 pushed to branch tor-browser-115.3.0esr-13.0-1 at The Tor Project / Applications / Tor Browser Commits: 37ddf133 by hackademix at 2023-09-20T17:19:01+00:00 fixup! Firefox preference overrides. Bug 41945: disable cookie banner automatic dismissal. - - - - - 1 changed file: - browser/app/profile/001-base-profile.js Changes: = browser/app/profile/001-base-profile.js = @@ -203,6 +203,12 @@ pref("browser.newtabpage.activity-stream.default.sites", ""); pref("browser.newtabpage.activity-stream.feeds.telemetry", false); pref("browser.newtabpage.activity-stream.telemetry", false); +// tor-browser#41945 - disable automatic cookie banners dismissal until +// we're sure it does not causes fingerprinting risks or other issues. +pref("cookiebanners.service.mode", 0); +pref("cookiebanners.service.mode.privateBrowsing", 0); +pref("cookiebanners.ui.desktop.enabled", false); + // tor-browser#40788: disable AS's calls to home. // Notice that null is between quotes because it is a JSON string. // Keep checked firefox.js to see if new entries are added. View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/37ddf1330f0dfce7473a7077434add6ff4b0db12 -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/37ddf1330f0dfce7473a7077434add6ff4b0db12 You're receiving this email because of your account on gitlab.torproject.org. ___ tor-commits mailing list tor-commits@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits
[tor-commits] [Git][tpo/applications/tor-browser][base-browser-115.3.0esr-13.0-1] fixup! Firefox preference overrides.
ma1 pushed to branch base-browser-115.3.0esr-13.0-1 at The Tor Project / Applications / Tor Browser Commits: 1c325548 by hackademix at 2023-09-20T19:24:35+02:00 fixup! Firefox preference overrides. Bug 41945: disable cookie banner automatic dismissal. - - - - - 1 changed file: - browser/app/profile/001-base-profile.js Changes: = browser/app/profile/001-base-profile.js = @@ -203,6 +203,12 @@ pref("browser.newtabpage.activity-stream.default.sites", ""); pref("browser.newtabpage.activity-stream.feeds.telemetry", false); pref("browser.newtabpage.activity-stream.telemetry", false); +// tor-browser#41945 - disable automatic cookie banners dismissal until +// we're sure it does not causes fingerprinting risks or other issues. +pref("cookiebanners.service.mode", 0); +pref("cookiebanners.service.mode.privateBrowsing", 0); +pref("cookiebanners.ui.desktop.enabled", false); + // tor-browser#40788: disable AS's calls to home. // Notice that null is between quotes because it is a JSON string. // Keep checked firefox.js to see if new entries are added. View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/1c325548139b586cf097be3b72a5445d67945b3f -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/1c325548139b586cf097be3b72a5445d67945b3f You're receiving this email because of your account on gitlab.torproject.org. ___ tor-commits mailing list tor-commits@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits
[tor-commits] [Git][tpo/applications/mullvad-browser][mullvad-browser-115.3.1esr-13.0-1] fixup! Bug 40926: Implemented the New Identity feature
ma1 pushed to branch mullvad-browser-115.3.1esr-13.0-1 at The Tor Project / Applications / Mullvad Browser Commits: 56b44ebf by hackademix at 2023-10-05T19:06:10+02:00 fixup! Bug 40926: Implemented the New Identity feature Bug 41765: Force about:privatebrowsing in new identity window. - - - - - 2 changed files: - browser/base/content/browser.js - browser/components/newidentity/content/newidentity.js Changes: = browser/base/content/browser.js = @@ -4523,7 +4523,7 @@ function OpenBrowserWindow(options) { var extraFeatures = ""; if (options && options.private && PrivateBrowsingUtils.enabled) { extraFeatures = ",private"; -if (!PrivateBrowsingUtils.permanentPrivateBrowsing) { +if (!PrivateBrowsingUtils.permanentPrivateBrowsing || options.private === "no-home") { // Force the new window to load about:privatebrowsing instead of the default home page defaultArgs = "about:privatebrowsing"; } = browser/components/newidentity/content/newidentity.js = @@ -433,11 +433,8 @@ XPCOMUtils.defineLazyGetter(this, "NewIdentityButton", () => { openNewWindow() { logger.info("Opening a new window"); return new Promise(resolve => { -// Open a new window with the default homepage -// We could pass {private: true} but we do not because we enforce -// browser.privatebrowsing.autostart = true. -// What about users that change settings? -const win = OpenBrowserWindow(); +// Open a new window forcing the about:privatebrowsing page (tor-browser#41765) +const win = OpenBrowserWindow({private: "no-home"}); // This mechanism to know when the new window is ready is used by // OpenBrowserWindow itself (see its definition in browser.js). win.addEventListener("MozAfterPaint", () => resolve(), { once: true }); View it on GitLab: https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/56b44ebf7798edac17111bf6cef1e48c53393125 -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/56b44ebf7798edac17111bf6cef1e48c53393125 You're receiving this email because of your account on gitlab.torproject.org. ___ tor-commits mailing list tor-commits@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits
[tor-commits] [Git][tpo/applications/tor-browser][base-browser-115.3.1esr-13.0-1] fixup! Bug 40926: Implemented the New Identity feature
ma1 pushed to branch base-browser-115.3.1esr-13.0-1 at The Tor Project / Applications / Tor Browser Commits: b5574131 by hackademix at 2023-10-05T19:03:10+02:00 fixup! Bug 40926: Implemented the New Identity feature Bug 41765: Force about:privatebrowsing in new identity window. - - - - - 2 changed files: - browser/base/content/browser.js - browser/components/newidentity/content/newidentity.js Changes: = browser/base/content/browser.js = @@ -4521,7 +4521,7 @@ function OpenBrowserWindow(options) { var extraFeatures = ""; if (options && options.private && PrivateBrowsingUtils.enabled) { extraFeatures = ",private"; -if (!PrivateBrowsingUtils.permanentPrivateBrowsing) { +if (!PrivateBrowsingUtils.permanentPrivateBrowsing || options.private === "no-home") { // Force the new window to load about:privatebrowsing instead of the default home page defaultArgs = "about:privatebrowsing"; } = browser/components/newidentity/content/newidentity.js = @@ -433,11 +433,8 @@ XPCOMUtils.defineLazyGetter(this, "NewIdentityButton", () => { openNewWindow() { logger.info("Opening a new window"); return new Promise(resolve => { -// Open a new window with the default homepage -// We could pass {private: true} but we do not because we enforce -// browser.privatebrowsing.autostart = true. -// What about users that change settings? -const win = OpenBrowserWindow(); +// Open a new window forcing the about:privatebrowsing page (tor-browser#41765) +const win = OpenBrowserWindow({private: "no-home"}); // This mechanism to know when the new window is ready is used by // OpenBrowserWindow itself (see its definition in browser.js). win.addEventListener("MozAfterPaint", () => resolve(), { once: true }); View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/b55741315122b13231ad5de610230859b9c83cf9 -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/b55741315122b13231ad5de610230859b9c83cf9 You're receiving this email because of your account on gitlab.torproject.org. ___ tor-commits mailing list tor-commits@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits
[tor-commits] [Git][tpo/applications/tor-browser][tor-browser-115.3.1esr-13.0-1] fixup! Bug 40926: Implemented the New Identity feature
ma1 pushed to branch tor-browser-115.3.1esr-13.0-1 at The Tor Project / Applications / Tor Browser Commits: c62d3405 by hackademix at 2023-10-05T17:34:00+02:00 fixup! Bug 40926: Implemented the New Identity feature Bug 41765: Force about:privatebrowsing in new identity window. - - - - - 2 changed files: - browser/base/content/browser.js - browser/components/newidentity/content/newidentity.js Changes: = browser/base/content/browser.js = @@ -4585,7 +4585,7 @@ function OpenBrowserWindow(options) { var extraFeatures = ""; if (options && options.private && PrivateBrowsingUtils.enabled) { extraFeatures = ",private"; -if (!PrivateBrowsingUtils.permanentPrivateBrowsing) { +if (!PrivateBrowsingUtils.permanentPrivateBrowsing || options.private === "no-home") { // Force the new window to load about:privatebrowsing instead of the default home page defaultArgs = "about:privatebrowsing"; } = browser/components/newidentity/content/newidentity.js = @@ -433,11 +433,8 @@ XPCOMUtils.defineLazyGetter(this, "NewIdentityButton", () => { openNewWindow() { logger.info("Opening a new window"); return new Promise(resolve => { -// Open a new window with the default homepage -// We could pass {private: true} but we do not because we enforce -// browser.privatebrowsing.autostart = true. -// What about users that change settings? -const win = OpenBrowserWindow(); +// Open a new window forcing the about:privatebrowsing page (tor-browser#41765) +const win = OpenBrowserWindow({private: "no-home"}); // This mechanism to know when the new window is ready is used by // OpenBrowserWindow itself (see its definition in browser.js). win.addEventListener("MozAfterPaint", () => resolve(), { once: true }); View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/c62d3405d1e74d7d069b720af5bacd4c43415d8c -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/c62d3405d1e74d7d069b720af5bacd4c43415d8c You're receiving this email because of your account on gitlab.torproject.org. ___ tor-commits mailing list tor-commits@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits
[tor-commits] [Git][tpo/applications/mullvad-browser][mullvad-browser-115.3.1esr-13.0-1] fixup! Bug 32308: use direct browser sizing for letterboxing. Bug 30556: align...
ma1 pushed to branch mullvad-browser-115.3.1esr-13.0-1 at The Tor Project / Applications / Mullvad Browser Commits: 453cd063 by hackademix at 2023-10-09T20:49:46+02:00 fixup! Bug 32308: use direct browser sizing for letterboxing. Bug 30556: align letterboxing with 200x100 new win width stepping Bug 41259: Do not interfere with devtools responsive mode sizing. - - - - - 2 changed files: - browser/base/content/browser.css - toolkit/components/resistfingerprinting/RFPHelper.sys.mjs Changes: = browser/base/content/browser.css = @@ -140,7 +140,7 @@ body { Never modify the following selector without synchronizing LETTERBOX_CSS_SELECTOR in RFPHelper.jsm! **/ -.letterboxing .browserStack:not(.exclude-letterboxing) > browser { +.letterboxing .browserContainer:not(.responsive-mode) > .browserStack:not(.exclude-letterboxing) > browser { /* width & height to be dynamically set by RFPHelper.jsm */ outline: 1px solid var(--chrome-content-separator-color); } @@ -149,7 +149,7 @@ body { outline: initial; } -:root:not([inDOMFullscreen]) .letterboxing.letterboxing-ready .browserStack:not(.exclude-letterboxing) { +:root:not([inDOMFullscreen]) .letterboxing.letterboxing-ready .browserContainer:not(.responsive-mode) > .browserStack:not(.exclude-letterboxing) { place-content: start center; } = toolkit/components/resistfingerprinting/RFPHelper.sys.mjs = @@ -437,7 +437,7 @@ class _RFPHelper { // preemptively in order to beat race conditions on tab/window creation const LETTERBOX_CSS_URL = "chrome://browser/content/browser.css"; const LETTERBOX_CSS_SELECTOR = -".letterboxing .browserStack:not(.exclude-letterboxing) > browser"; +".letterboxing .browserContainer:not(.responsive-mode) > .browserStack:not(.exclude-letterboxing) > browser"; for (let ss of document.styleSheets) { if (ss.href !== LETTERBOX_CSS_URL) { continue; @@ -557,8 +557,8 @@ class _RFPHelper { const roundDimensions = (aWidth, aHeight) => { const r = (aWidth, aHeight) => ({ -width: `${aWidth}px`, -height: `${aHeight}px`, +width: `var(--rdm-width, ${aWidth}px)`, +height: `var(--rdm-height, ${aHeight}px)`, }); let result; View it on GitLab: https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/453cd0631e0db4c0bbdd511752e3657e031f98cd -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/453cd0631e0db4c0bbdd511752e3657e031f98cd You're receiving this email because of your account on gitlab.torproject.org. ___ tor-commits mailing list tor-commits@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits
[tor-commits] [Git][tpo/applications/tor-browser][base-browser-115.3.1esr-13.0-1] fixup! Bug 32308: use direct browser sizing for letterboxing. Bug 30556: align...
ma1 pushed to branch base-browser-115.3.1esr-13.0-1 at The Tor Project / Applications / Tor Browser Commits: 4ff109fa by hackademix at 2023-10-09T20:47:34+02:00 fixup! Bug 32308: use direct browser sizing for letterboxing. Bug 30556: align letterboxing with 200x100 new win width stepping Bug 41259: Do not interfere with devtools responsive mode sizing. - - - - - 2 changed files: - browser/base/content/browser.css - toolkit/components/resistfingerprinting/RFPHelper.sys.mjs Changes: = browser/base/content/browser.css = @@ -140,7 +140,7 @@ body { Never modify the following selector without synchronizing LETTERBOX_CSS_SELECTOR in RFPHelper.jsm! **/ -.letterboxing .browserStack:not(.exclude-letterboxing) > browser { +.letterboxing .browserContainer:not(.responsive-mode) > .browserStack:not(.exclude-letterboxing) > browser { /* width & height to be dynamically set by RFPHelper.jsm */ outline: 1px solid var(--chrome-content-separator-color); } @@ -149,7 +149,7 @@ body { outline: initial; } -:root:not([inDOMFullscreen]) .letterboxing.letterboxing-ready .browserStack:not(.exclude-letterboxing) { +:root:not([inDOMFullscreen]) .letterboxing.letterboxing-ready .browserContainer:not(.responsive-mode) > .browserStack:not(.exclude-letterboxing) { place-content: start center; } = toolkit/components/resistfingerprinting/RFPHelper.sys.mjs = @@ -437,7 +437,7 @@ class _RFPHelper { // preemptively in order to beat race conditions on tab/window creation const LETTERBOX_CSS_URL = "chrome://browser/content/browser.css"; const LETTERBOX_CSS_SELECTOR = -".letterboxing .browserStack:not(.exclude-letterboxing) > browser"; +".letterboxing .browserContainer:not(.responsive-mode) > .browserStack:not(.exclude-letterboxing) > browser"; for (let ss of document.styleSheets) { if (ss.href !== LETTERBOX_CSS_URL) { continue; @@ -557,8 +557,8 @@ class _RFPHelper { const roundDimensions = (aWidth, aHeight) => { const r = (aWidth, aHeight) => ({ -width: `${aWidth}px`, -height: `${aHeight}px`, +width: `var(--rdm-width, ${aWidth}px)`, +height: `var(--rdm-height, ${aHeight}px)`, }); let result; View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/4ff109faf88bd2e22d800fb719a36e1327f3301b -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/4ff109faf88bd2e22d800fb719a36e1327f3301b You're receiving this email because of your account on gitlab.torproject.org. ___ tor-commits mailing list tor-commits@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits
[tor-commits] [Git][tpo/applications/tor-browser][tor-browser-115.3.1esr-13.0-1] fixup! Bug 32308: use direct browser sizing for letterboxing. Bug 30556: align...
ma1 pushed to branch tor-browser-115.3.1esr-13.0-1 at The Tor Project / Applications / Tor Browser Commits: 10f40c2f by hackademix at 2023-10-09T19:54:52+02:00 fixup! Bug 32308: use direct browser sizing for letterboxing. Bug 30556: align letterboxing with 200x100 new win width stepping Bug 41259: Do not interfere with devtools responsive mode sizing. - - - - - 2 changed files: - browser/base/content/browser.css - toolkit/components/resistfingerprinting/RFPHelper.sys.mjs Changes: = browser/base/content/browser.css = @@ -140,7 +140,7 @@ body { Never modify the following selector without synchronizing LETTERBOX_CSS_SELECTOR in RFPHelper.jsm! **/ -.letterboxing .browserStack:not(.exclude-letterboxing) > browser { +.letterboxing .browserContainer:not(.responsive-mode) > .browserStack:not(.exclude-letterboxing) > browser { /* width & height to be dynamically set by RFPHelper.jsm */ outline: 1px solid var(--chrome-content-separator-color); } @@ -149,7 +149,7 @@ body { outline: initial; } -:root:not([inDOMFullscreen]) .letterboxing.letterboxing-ready .browserStack:not(.exclude-letterboxing) { +:root:not([inDOMFullscreen]) .letterboxing.letterboxing-ready .browserContainer:not(.responsive-mode) > .browserStack:not(.exclude-letterboxing) { place-content: start center; } = toolkit/components/resistfingerprinting/RFPHelper.sys.mjs = @@ -437,7 +437,7 @@ class _RFPHelper { // preemptively in order to beat race conditions on tab/window creation const LETTERBOX_CSS_URL = "chrome://browser/content/browser.css"; const LETTERBOX_CSS_SELECTOR = -".letterboxing .browserStack:not(.exclude-letterboxing) > browser"; +".letterboxing .browserContainer:not(.responsive-mode) > .browserStack:not(.exclude-letterboxing) > browser"; for (let ss of document.styleSheets) { if (ss.href !== LETTERBOX_CSS_URL) { continue; @@ -557,8 +557,8 @@ class _RFPHelper { const roundDimensions = (aWidth, aHeight) => { const r = (aWidth, aHeight) => ({ -width: `${aWidth}px`, -height: `${aHeight}px`, +width: `var(--rdm-width, ${aWidth}px)`, +height: `var(--rdm-height, ${aHeight}px)`, }); let result; View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/10f40c2f2ceb7f2a4eb82c8540d5e01b99be9220 -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/10f40c2f2ceb7f2a4eb82c8540d5e01b99be9220 You're receiving this email because of your account on gitlab.torproject.org. ___ tor-commits mailing list tor-commits@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits
[tor-commits] [Git][tpo/applications/tor-browser][base-browser-115.4.0esr-13.0-1] fixup! Bug 40926: Implemented the New Identity feature
ma1 pushed to branch base-browser-115.4.0esr-13.0-1 at The Tor Project / Applications / Tor Browser Commits: a78a919d by hackademix at 2023-10-20T15:45:50+02:00 fixup! Bug 40926: Implemented the New Identity feature Bug 42182: avoid reloading any search engine extension. - - - - - 1 changed file: - browser/components/newidentity/content/newidentity.js Changes: = browser/components/newidentity/content/newidentity.js = @@ -415,10 +415,13 @@ XPCOMUtils.defineLazyGetter(this, "NewIdentityButton", () => { async reloadAddons() { logger.info("Reloading add-ons to clear their temporary state."); // Reload all active extensions except search engines, which would throw. - const addons = ( -await AddonManager.getAddonsByTypes(["extension"]) - ).filter(a => a.isActive && !a.id.endsWith("@search.mozilla.org")); - await Promise.all(addons.map(a => a.reload())); + const addons = await AddonManager.getAddonsByTypes(["extension"]); + const isSearchEngine = async addon => +(await (await fetch(addon.getResourceURI("manifest.json").spec)).json()) + ?.chrome_settings_overrides?.search_provider; + const reloadIfNeeded = async addon => +addon.isActive && !(await isSearchEngine(addon)) && addon.reload(); + await Promise.all(addons.map(addon => reloadIfNeeded(addon))); } // Broadcast as a hook to clear other data View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/a78a919d4618cdcebb306d3c4b705f6d23d35081 -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/a78a919d4618cdcebb306d3c4b705f6d23d35081 You're receiving this email because of your account on gitlab.torproject.org. ___ tor-commits mailing list tor-commits@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits
[tor-commits] [Git][tpo/applications/tor-browser][tor-browser-115.4.0esr-13.0-1] fixup! Bug 40926: Implemented the New Identity feature
ma1 pushed to branch tor-browser-115.4.0esr-13.0-1 at The Tor Project / Applications / Tor Browser Commits: 46614757 by hackademix at 2023-10-20T15:38:29+02:00 fixup! Bug 40926: Implemented the New Identity feature Bug 42182: avoid reloading any search engine extension. - - - - - 1 changed file: - browser/components/newidentity/content/newidentity.js Changes: = browser/components/newidentity/content/newidentity.js = @@ -415,10 +415,13 @@ XPCOMUtils.defineLazyGetter(this, "NewIdentityButton", () => { async reloadAddons() { logger.info("Reloading add-ons to clear their temporary state."); // Reload all active extensions except search engines, which would throw. - const addons = ( -await AddonManager.getAddonsByTypes(["extension"]) - ).filter(a => a.isActive && !a.id.endsWith("@search.mozilla.org")); - await Promise.all(addons.map(a => a.reload())); + const addons = await AddonManager.getAddonsByTypes(["extension"]); + const isSearchEngine = async addon => +(await (await fetch(addon.getResourceURI("manifest.json").spec)).json()) + ?.chrome_settings_overrides?.search_provider; + const reloadIfNeeded = async addon => +addon.isActive && !(await isSearchEngine(addon)) && addon.reload(); + await Promise.all(addons.map(addon => reloadIfNeeded(addon))); } // Broadcast as a hook to clear other data View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/4661475756853c06739402c3ceca53482c89bcad -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/4661475756853c06739402c3ceca53482c89bcad You're receiving this email because of your account on gitlab.torproject.org. ___ tor-commits mailing list tor-commits@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits
[tor-commits] [Git][tpo/applications/mullvad-browser][mullvad-browser-115.4.0esr-13.0-1] fixup! Bug 40926: Implemented the New Identity feature
ma1 pushed to branch mullvad-browser-115.4.0esr-13.0-1 at The Tor Project / Applications / Mullvad Browser Commits: 7898b29a by hackademix at 2023-10-20T15:46:41+02:00 fixup! Bug 40926: Implemented the New Identity feature Bug 42182: avoid reloading any search engine extension. - - - - - 1 changed file: - browser/components/newidentity/content/newidentity.js Changes: = browser/components/newidentity/content/newidentity.js = @@ -415,10 +415,13 @@ XPCOMUtils.defineLazyGetter(this, "NewIdentityButton", () => { async reloadAddons() { logger.info("Reloading add-ons to clear their temporary state."); // Reload all active extensions except search engines, which would throw. - const addons = ( -await AddonManager.getAddonsByTypes(["extension"]) - ).filter(a => a.isActive && !a.id.endsWith("@search.mozilla.org")); - await Promise.all(addons.map(a => a.reload())); + const addons = await AddonManager.getAddonsByTypes(["extension"]); + const isSearchEngine = async addon => +(await (await fetch(addon.getResourceURI("manifest.json").spec)).json()) + ?.chrome_settings_overrides?.search_provider; + const reloadIfNeeded = async addon => +addon.isActive && !(await isSearchEngine(addon)) && addon.reload(); + await Promise.all(addons.map(addon => reloadIfNeeded(addon))); } // Broadcast as a hook to clear other data View it on GitLab: https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/7898b29ae230f55339ce4db8d2e4b60585fc6c3e -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/7898b29ae230f55339ce4db8d2e4b60585fc6c3e You're receiving this email because of your account on gitlab.torproject.org. ___ tor-commits mailing list tor-commits@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits
[tor-commits] [Git][tpo/applications/tor-browser] Pushed new tag base-browser-115.4.0esr-13.0-1-build2
ma1 pushed new tag base-browser-115.4.0esr-13.0-1-build2 at The Tor Project / Applications / Tor Browser -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/tree/base-browser-115.4.0esr-13.0-1-build2 You're receiving this email because of your account on gitlab.torproject.org. ___ tor-commits mailing list tor-commits@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits
[tor-commits] [Git][tpo/applications/mullvad-browser] Pushed new tag mullvad-browser-115.4.0esr-13.0-1-build2
ma1 pushed new tag mullvad-browser-115.4.0esr-13.0-1-build2 at The Tor Project / Applications / Mullvad Browser -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/tree/mullvad-browser-115.4.0esr-13.0-1-build2 You're receiving this email because of your account on gitlab.torproject.org. ___ tor-commits mailing list tor-commits@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits
[tor-commits] [Git][tpo/applications/tor-browser] Pushed new tag tor-browser-115.4.0esr-13.0-1-build2
ma1 pushed new tag tor-browser-115.4.0esr-13.0-1-build2 at The Tor Project / Applications / Tor Browser -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/tree/tor-browser-115.4.0esr-13.0-1-build2 You're receiving this email because of your account on gitlab.torproject.org. ___ tor-commits mailing list tor-commits@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits
[tor-commits] [Git][tpo/applications/tor-browser][base-browser-115.1.0esr-13.0-1] 3 commits: fixup! Bug 40926: Implemented the New Identity feature
ma1 pushed to branch base-browser-115.1.0esr-13.0-1 at The Tor Project / Applications / Tor Browser Commits: 29c0222b by hackademix at 2023-08-21T14:48:07+02:00 fixup! Bug 40926: Implemented the New Identity feature Remove useless and confusing EXPORTED_SYMBOLS usage in ScriptLoader inclusion. - - - - - a2098747 by hackademix at 2023-08-21T14:48:08+02:00 fixup! Bug 40926: Implemented the New Identity feature Remove redundant Closing tabs logging. - - - - - 0537009f by hackademix at 2023-08-21T14:48:08+02:00 fixup! Bug 40926: Implemented the New Identity feature Bug 41833: Reload extensions on new identity - - - - - 1 changed file: - browser/components/newidentity/content/newidentity.js Changes: = browser/components/newidentity/content/newidentity.js = @@ -1,7 +1,5 @@ "use strict"; -var EXPORTED_SYMBOLS = ["NewIdentityButton"]; - /* globals CustomizableUI Services gFindBarInitialized gFindBar OpenBrowserWindow PrivateBrowsingUtils XPCOMUtils */ @@ -144,6 +142,7 @@ XPCOMUtils.defineLazyGetter(this, "NewIdentityButton", () => { this.clearStorage(); this.clearPreferencesAndPermissions(); await this.clearData(); + await this.reloadAddons(); this.clearConnections(); this.clearPrivateSession(); } @@ -160,7 +159,6 @@ XPCOMUtils.defineLazyGetter(this, "NewIdentityButton", () => { } closeTabs() { - logger.info("Closing tabs"); if ( !Services.prefs.getBoolPref("browser.new_identity.close_newnym", true) ) { @@ -414,6 +412,15 @@ XPCOMUtils.defineLazyGetter(this, "NewIdentityButton", () => { Services.obs.notifyObservers(null, "last-pb-context-exited"); } +async reloadAddons() { + logger.info("Reloading add-ons to clear their temporary state."); + // Reload all active extensions except search engines, which would throw. + const addons = ( +await AddonManager.getAddonsByTypes(["extension"]) + ).filter(a => a.isActive && !a.id.endsWith("@search.mozilla.org")); + await Promise.all(addons.map(a => a.reload())); +} + // Broadcast as a hook to clear other data broadcast() { View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/compare/64c5d915e37966513a83e7e897e945b091bc3108...0537009f2c5ed7b0fd2e9c54eed84afab3c6368f -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/compare/64c5d915e37966513a83e7e897e945b091bc3108...0537009f2c5ed7b0fd2e9c54eed84afab3c6368f You're receiving this email because of your account on gitlab.torproject.org. ___ tor-commits mailing list tor-commits@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits
[tor-commits] [Git][tpo/applications/tor-browser][tor-browser-115.1.0esr-13.0-1] 3 commits: fixup! Bug 40926: Implemented the New Identity feature
ma1 pushed to branch tor-browser-115.1.0esr-13.0-1 at The Tor Project / Applications / Tor Browser Commits: 4459daa5 by hackademix at 2023-08-21T11:07:43+02:00 fixup! Bug 40926: Implemented the New Identity feature Remove useless and confusing EXPORTED_SYMBOLS usage in ScriptLoader inclusion. - - - - - b6f6eb79 by hackademix at 2023-08-21T11:07:44+02:00 fixup! Bug 40926: Implemented the New Identity feature Remove redundant Closing tabs logging. - - - - - 80c57ed8 by hackademix at 2023-08-21T11:08:16+02:00 fixup! Bug 40926: Implemented the New Identity feature Bug 41833: Reload extensions on new identity - - - - - 1 changed file: - browser/components/newidentity/content/newidentity.js Changes: = browser/components/newidentity/content/newidentity.js = @@ -1,7 +1,5 @@ "use strict"; -var EXPORTED_SYMBOLS = ["NewIdentityButton"]; - /* globals CustomizableUI Services gFindBarInitialized gFindBar OpenBrowserWindow PrivateBrowsingUtils XPCOMUtils */ @@ -144,6 +142,7 @@ XPCOMUtils.defineLazyGetter(this, "NewIdentityButton", () => { this.clearStorage(); this.clearPreferencesAndPermissions(); await this.clearData(); + await this.reloadAddons(); this.clearConnections(); this.clearPrivateSession(); } @@ -160,7 +159,6 @@ XPCOMUtils.defineLazyGetter(this, "NewIdentityButton", () => { } closeTabs() { - logger.info("Closing tabs"); if ( !Services.prefs.getBoolPref("browser.new_identity.close_newnym", true) ) { @@ -414,6 +412,15 @@ XPCOMUtils.defineLazyGetter(this, "NewIdentityButton", () => { Services.obs.notifyObservers(null, "last-pb-context-exited"); } +async reloadAddons() { + logger.info("Reloading add-ons to clear their temporary state."); + // Reload all active extensions except search engines, which would throw. + const addons = ( +await AddonManager.getAddonsByTypes(["extension"]) + ).filter(a => a.isActive && !a.id.endsWith("@search.mozilla.org")); + await Promise.all(addons.map(a => a.reload())); +} + // Broadcast as a hook to clear other data broadcast() { View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/compare/39d95c675acefa5ff643d055832093b37b2cffd3...80c57ed87e50c7c95b1c8a51bc68250e4410f192 -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/compare/39d95c675acefa5ff643d055832093b37b2cffd3...80c57ed87e50c7c95b1c8a51bc68250e4410f192 You're receiving this email because of your account on gitlab.torproject.org. ___ tor-commits mailing list tor-commits@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits
[tor-commits] [Git][tpo/applications/tor-browser] Pushed new branch mullvad-browser-115.1.0esr-13.0-1
ma1 pushed new branch mullvad-browser-115.1.0esr-13.0-1 at The Tor Project / Applications / Tor Browser -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/tree/mullvad-browser-115.1.0esr-13.0-1 You're receiving this email because of your account on gitlab.torproject.org. ___ tor-commits mailing list tor-commits@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits
[tor-commits] [Git][tpo/applications/tor-browser][base-browser-115.1.0esr-13.0-1] fixup! Bug 40926: Implemented the New Identity feature
ma1 pushed to branch base-browser-115.1.0esr-13.0-1 at The Tor Project / Applications / Tor Browser Commits: 64c5d915 by hackademix at 2023-08-21T14:30:10+02:00 fixup! Bug 40926: Implemented the New Identity feature Bug 41833: Reload extensions on new identity - - - - - 1 changed file: - browser/components/newidentity/content/newidentity.js Changes: = browser/components/newidentity/content/newidentity.js = @@ -144,6 +144,7 @@ XPCOMUtils.defineLazyGetter(this, "NewIdentityButton", () => { this.clearStorage(); this.clearPreferencesAndPermissions(); await this.clearData(); + await this.reloadAddons(); this.clearConnections(); this.clearPrivateSession(); } @@ -414,6 +415,15 @@ XPCOMUtils.defineLazyGetter(this, "NewIdentityButton", () => { Services.obs.notifyObservers(null, "last-pb-context-exited"); } +async reloadAddons() { + logger.info("Reloading add-ons to clear their temporary state."); + // Reload all active extensions except search engines, which would throw. + const addons = ( +await AddonManager.getAddonsByTypes(["extension"]) + ).filter(a => a.isActive && !a.id.endsWith("@search.mozilla.org")); + await Promise.all(addons.map(a => a.reload())); +} + // Broadcast as a hook to clear other data broadcast() { View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/64c5d915e37966513a83e7e897e945b091bc3108 -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/64c5d915e37966513a83e7e897e945b091bc3108 You're receiving this email because of your account on gitlab.torproject.org. ___ tor-commits mailing list tor-commits@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits
[tor-commits] [Git][tpo/applications/tor-browser] Deleted branch mullvad-browser-115.1.0esr-13.0-1
ma1 deleted branch mullvad-browser-115.1.0esr-13.0-1 at The Tor Project / Applications / Tor Browser -- You're receiving this email because of your account on gitlab.torproject.org. ___ tor-commits mailing list tor-commits@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits
[tor-commits] [Git][tpo/applications/tor-browser] Pushed new tag tor-browser-102.15.0esr-12.5-1-build2
ma1 pushed new tag tor-browser-102.15.0esr-12.5-1-build2 at The Tor Project / Applications / Tor Browser -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/tree/tor-browser-102.15.0esr-12.5-1-build2 You're receiving this email because of your account on gitlab.torproject.org. ___ tor-commits mailing list tor-commits@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits
[tor-commits] [Git][tpo/applications/tor-browser] Pushed new tag base-browser-102.15.0esr-12.5-1-build2
ma1 pushed new tag base-browser-102.15.0esr-12.5-1-build2 at The Tor Project / Applications / Tor Browser -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/tree/base-browser-102.15.0esr-12.5-1-build2 You're receiving this email because of your account on gitlab.torproject.org. ___ tor-commits mailing list tor-commits@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits
[tor-commits] [Git][tpo/applications/tor-browser-build][maint-12.5] Bug 40740: Do not add -utls-imitate to Snowflake on tor-onion-proxy-library.
ma1 pushed to branch maint-12.5 at The Tor Project / Applications / tor-browser-build Commits: 26496b1d by Pier Angelo Vendrame at 2023-08-29T14:13:13+02:00 Bug 40740: Do not add -utls-imitate to Snowflake on tor-onion-proxy-library. This parameter added with the previous commit prevents Snowflake from working properly. So, we prefer to undo the addition (but keep the changes to the ICE server list). - - - - - 1 changed file: - projects/tor-onion-proxy-library/0001-Bug-30318-Add-snowflake-support.patch Changes: = projects/tor-onion-proxy-library/0001-Bug-30318-Add-snowflake-support.patch = @@ -71,7 +71,7 @@ index 2405097..bcb6a37 100644 -buffer.append("ClientTransportPlugin meek_lite,obfs3,obfs4 exec ").append(clientPath).append('\n'); +public TorConfigBuilder transportPlugin(String obfsPath, String snowPath) { +buffer.append("ClientTransportPlugin meek_lite,obfs3,obfs4 exec ").append(obfsPath).append('\n'); -+buffer.append("ClientTransportPlugin snowflake exec ").append(snowPath).append(" -url https://snowflake-broker.torproject.net.global.prod.fastly.net/ -front cdn.sstatic.net -ice stun:stun.l.google.com:19302,stun:stun.antisip.com:3478,stun:stun.bluesip.net:3478,stun:stun.dus.net:3478,stun:stun.epygi.com:3478,stun:stun.sonetel.com:3478,stun:stun.uls.co.za:3478,stun:stun.voipgate.com:3478,stun:stun.voys.nl:3478 -utls-imitate=hellorandomizedalpn\n"); ++buffer.append("ClientTransportPlugin snowflake exec ").append(snowPath).append(" -url https://snowflake-broker.torproject.net.global.prod.fastly.net/ -front cdn.sstatic.net -ice stun:stun.l.google.com:19302,stun:stun.antisip.com:3478,stun:stun.bluesip.net:3478,stun:stun.dus.net:3478,stun:stun.epygi.com:3478,stun:stun.sonetel.com:3478,stun:stun.uls.co.za:3478,stun:stun.voipgate.com:3478,stun:stun.voys.nl:3478\n"); return this; } View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/commit/26496b1de3391092085c0d3264974f446b5a1e7f -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/commit/26496b1de3391092085c0d3264974f446b5a1e7f You're receiving this email because of your account on gitlab.torproject.org. ___ tor-commits mailing list tor-commits@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits
[tor-commits] [Git][tpo/applications/tor-browser][tor-browser-115.4.0esr-13.0-1] Bug 42194: Fix blank net error page on failed DNS resolution with active proxy.
ma1 pushed to branch tor-browser-115.4.0esr-13.0-1 at The Tor Project / Applications / Tor Browser Commits: 20f764ba by hackademix at 2023-11-08T13:41:58+01:00 Bug 42194: Fix blank net error page on failed DNS resolution with active proxy. - - - - - 1 changed file: - toolkit/actors/NetErrorChild.sys.mjs Changes: = toolkit/actors/NetErrorChild.sys.mjs = @@ -140,12 +140,15 @@ export class NetErrorChild extends RemotePageChild { shortDesc.appendChild(span); }, }; - -Services.uriFixup.checkHost( - info.fixedURI, - onLookupCompleteListener, - this.document.nodePrincipal.originAttributes -); +try { + Services.uriFixup.checkHost( +info.fixedURI, +onLookupCompleteListener, +this.document.nodePrincipal.originAttributes + ); +} catch (e) { + // DNS resolution may fail synchronously if forbidden by proxy +} } // Get the header from the http response of the failed channel. This function View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/20f764bab4814a0430c00b054815dccef0683bf3 -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/20f764bab4814a0430c00b054815dccef0683bf3 You're receiving this email because of your account on gitlab.torproject.org. ___ tor-commits mailing list tor-commits@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits
[tor-commits] [Git][tpo/applications/tor-browser][base-browser-115.4.0esr-13.0-1] Bug 42194: Fix blank net error page on failed DNS resolution with active proxy.
ma1 pushed to branch base-browser-115.4.0esr-13.0-1 at The Tor Project / Applications / Tor Browser Commits: 6f9292eb by hackademix at 2023-11-08T13:44:18+01:00 Bug 42194: Fix blank net error page on failed DNS resolution with active proxy. - - - - - 1 changed file: - toolkit/actors/NetErrorChild.sys.mjs Changes: = toolkit/actors/NetErrorChild.sys.mjs = @@ -133,12 +133,15 @@ export class NetErrorChild extends RemotePageChild { shortDesc.appendChild(span); }, }; - -Services.uriFixup.checkHost( - info.fixedURI, - onLookupCompleteListener, - this.document.nodePrincipal.originAttributes -); +try { + Services.uriFixup.checkHost( +info.fixedURI, +onLookupCompleteListener, +this.document.nodePrincipal.originAttributes + ); +} catch (e) { + // DNS resolution may fail synchronously if forbidden by proxy +} } // Get the header from the http response of the failed channel. This function View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/6f9292eb84cc2ca0323a7c7cdf0fd4c4f8c21c04 -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/6f9292eb84cc2ca0323a7c7cdf0fd4c4f8c21c04 You're receiving this email because of your account on gitlab.torproject.org. ___ tor-commits mailing list tor-commits@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits
[tor-commits] [Git][tpo/applications/mullvad-browser][mullvad-browser-115.4.0esr-13.0-1] Bug 42194: Fix blank net error page on failed DNS resolution with active proxy.
ma1 pushed to branch mullvad-browser-115.4.0esr-13.0-1 at The Tor Project / Applications / Mullvad Browser Commits: 23d4e4c4 by hackademix at 2023-11-08T13:45:19+01:00 Bug 42194: Fix blank net error page on failed DNS resolution with active proxy. - - - - - 1 changed file: - toolkit/actors/NetErrorChild.sys.mjs Changes: = toolkit/actors/NetErrorChild.sys.mjs = @@ -133,12 +133,15 @@ export class NetErrorChild extends RemotePageChild { shortDesc.appendChild(span); }, }; - -Services.uriFixup.checkHost( - info.fixedURI, - onLookupCompleteListener, - this.document.nodePrincipal.originAttributes -); +try { + Services.uriFixup.checkHost( +info.fixedURI, +onLookupCompleteListener, +this.document.nodePrincipal.originAttributes + ); +} catch (e) { + // DNS resolution may fail synchronously if forbidden by proxy +} } // Get the header from the http response of the failed channel. This function View it on GitLab: https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/23d4e4c459c271d9f0d6346b897f006de68dd3e6 -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/23d4e4c459c271d9f0d6346b897f006de68dd3e6 You're receiving this email because of your account on gitlab.torproject.org. ___ tor-commits mailing list tor-commits@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits
[tor-commits] [Git][tpo/applications/fenix][tor-browser-102.2.1-12.5-1] fixup! Modify build system
ma1 pushed to branch tor-browser-102.2.1-12.5-1 at The Tor Project / Applications / fenix Commits: 5c26f235 by Pier Angelo Vendrame at 2023-03-21T11:14:21+01:00 fixup! Modify build system Bug 41684: Android improvements for local dev builds Added a script to fetch the Tor dependencies from tor-browser-build, and print the name of the signed apk. - - - - - 2 changed files: - + tools/tba-fetch-deps.sh - tools/tba-sign-devbuilds.sh Changes: = tools/tba-fetch-deps.sh = @@ -0,0 +1,22 @@ +#!/bin/bash + +cd "$(dirname $(realpath "$0"))/.." + +if [ -z "$TOR_BROWSER_BUILD" ]; then + TOR_BROWSER_BUILD=../tor-browser-build +fi + +android_service="$(ls -1td "$TOR_BROWSER_BUILD/out/tor-android-service/"tor-android-service-* | head -1)" +if [ -z "$android_service" ]; then + echo "Cannot find Tor Android Service artifacts!" + exit 1 +fi + +onion_proxy_library="$(ls -1td "$TOR_BROWSER_BUILD/out/tor-onion-proxy-library/"tor-onion-proxy-library-* | head -1)" +if [ -z "$onion_proxy_library" ]; then + echo "Cannot find Tor Onoin Proxy library artifacts!" + exit 2 +fi + +cp "$android_service"/* app/ +cp "$onion_proxy_library"/* app/ = tools/tba-sign-devbuilds.sh = @@ -38,6 +38,7 @@ sign () { rm -f "$aligned" "$zipalign" -p 4 "$apk" "$aligned" "$apksigner" sign --ks "$key" --in "$aligned" --out "$out" --ks-key-alias androidqakey --key-pass pass:android --ks-pass pass:android + echo "Signed $out" } for apk in app/build/outputs/apk/release/*-unsigned.apk; do View it on GitLab: https://gitlab.torproject.org/tpo/applications/fenix/-/commit/5c26f2353ef1ae1756cfee563db6f06614a76bd4 -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/fenix/-/commit/5c26f2353ef1ae1756cfee563db6f06614a76bd4 You're receiving this email because of your account on gitlab.torproject.org. ___ tor-commits mailing list tor-commits@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits
[tor-commits] [Git][tpo/applications/tor-browser][tor-browser-102.12.0esr-12.5-1] fixup! Bug 21952: Implement Onion-Location
ma1 pushed to branch tor-browser-102.12.0esr-12.5-1 at The Tor Project / Applications / Tor Browser Commits: 5a49e443 by Pier Angelo Vendrame at 2023-06-13T09:08:07+02:00 fixup! Bug 21952: Implement Onion-Location Bug 41841: Use the new onion-site.svg icon in the onion-location pill - - - - - 3 changed files: - browser/components/onionservices/content/onionlocation.css - − browser/components/onionservices/content/onionlocation.svg - browser/components/onionservices/jar.mn Changes: = browser/components/onionservices/content/onionlocation.css = @@ -1,7 +1,7 @@ /* Copyright (c) 2020, The Tor Project, Inc. */ #onion-location-button { - list-style-image: url(chrome://browser/content/onionservices/onionlocation.svg); + list-style-image: url(chrome://browser/skin/onion-site.svg); -moz-context-properties: fill; fill: currentColor; } = browser/components/onionservices/content/onionlocation.svg deleted = @@ -1,3 +0,0 @@ -http://www.w3.org/2000/svg; xmlns:xlink="http://www.w3.org/1999/xlink;> - - \ No newline at end of file = browser/components/onionservices/jar.mn = @@ -8,5 +8,4 @@ browser.jar: content/browser/onionservices/savedKeysDialog.js (content/savedKeysDialog.js) content/browser/onionservices/savedKeysDialog.xhtml (content/savedKeysDialog.xhtml) content/browser/onionservices/onionlocationPreferences.js (content/onionlocationPreferences.js) -content/browser/onionservices/onionlocation.svg (content/onionlocation.svg) skin/classic/browser/onionlocation.css (content/onionlocation.css) View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/5a49e4435fc1a754ba85bb909b41f92dcd861a6d -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/5a49e4435fc1a754ba85bb909b41f92dcd861a6d You're receiving this email because of your account on gitlab.torproject.org. ___ tor-commits mailing list tor-commits@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits
[tor-commits] [Git][tpo/applications/tor-browser][tor-browser-115.0esrbase-13.0-1] Bug 41834: Hide "Can't Be Removed - learn more" menu line for uninstallable add-ons
ma1 pushed to branch tor-browser-115.0esrbase-13.0-1 at The Tor Project / Applications / Tor Browser Commits: b06f6190 by hackademix at 2023-07-06T00:10:24+02:00 Bug 41834: Hide Cant Be Removed - learn more menu line for uninstallable add-ons - - - - - 1 changed file: - toolkit/mozapps/extensions/content/aboutaddons.js Changes: = toolkit/mozapps/extensions/content/aboutaddons.js = @@ -1492,8 +1492,9 @@ class AddonOptions extends HTMLElement { el.disabled = false; el.hidden = false; document.l10n.setAttributes(el, "remove-addon-button"); -} else if (addon.isBuiltin) { - // Likely the built-in themes, can't be removed, that's fine. +} else if (true || addon.isBuiltin) { + // Just hide the uninstall button for any "special" add-on + // which can't be removed (tor-browser#41834) el.hidden = true; } else { // Likely sideloaded, mention that it can't be removed with a link. View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/b06f61906d0f76ad5fca1ebf410cd4b9cd5e3679 -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/b06f61906d0f76ad5fca1ebf410cd4b9cd5e3679 You're receiving this email because of your account on gitlab.torproject.org. ___ tor-commits mailing list tor-commits@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits
[tor-commits] [Git][tpo/applications/tor-browser][base-browser-115.0esrbase-13.0-1] Bug 41834: Hide "Can't Be Removed - learn more" menu line for uninstallable add-ons
ma1 pushed to branch base-browser-115.0esrbase-13.0-1 at The Tor Project / Applications / Tor Browser Commits: e4fae18a by hackademix at 2023-07-06T15:46:27+02:00 Bug 41834: Hide Cant Be Removed - learn more menu line for uninstallable add-ons - - - - - 1 changed file: - toolkit/mozapps/extensions/content/aboutaddons.js Changes: = toolkit/mozapps/extensions/content/aboutaddons.js = @@ -1492,8 +1492,9 @@ class AddonOptions extends HTMLElement { el.disabled = false; el.hidden = false; document.l10n.setAttributes(el, "remove-addon-button"); -} else if (addon.isBuiltin) { - // Likely the built-in themes, can't be removed, that's fine. +} else if (true || addon.isBuiltin) { + // Just hide the uninstall button for any "special" add-on + // which can't be removed (tor-browser#41834) el.hidden = true; } else { // Likely sideloaded, mention that it can't be removed with a link. View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/e4fae18afa97556839332320e9a340546a47b392 -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/e4fae18afa97556839332320e9a340546a47b392 You're receiving this email because of your account on gitlab.torproject.org. ___ tor-commits mailing list tor-commits@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits
[tor-commits] [Git][tpo/applications/tor-browser][base-browser-115.0esrbase-13.0-1] Bug 41092: Add a RemoteSettings JSON dump for query-stripping
ma1 pushed to branch base-browser-115.0esrbase-13.0-1 at The Tor Project / Applications / Tor Browser Commits: 0a89389f by cypherpunks1 at 2023-07-13T00:40:56+02:00 Bug 41092: Add a RemoteSettings JSON dump for query-stripping - - - - - 2 changed files: - services/settings/static-dumps/main/moz.build - + services/settings/static-dumps/main/query-stripping.json Changes: = services/settings/static-dumps/main/moz.build = @@ -5,6 +5,7 @@ FINAL_TARGET_FILES.defaults.settings.main += [ "doh-config.json", "doh-providers.json", +"query-stripping.json", ] if CONFIG["MOZ_BUILD_APP"] == "browser": = services/settings/static-dumps/main/query-stripping.json = @@ -0,0 +1,44 @@ +{ + "data": [ +{ + "schema": 1678379807899, + "allowList": [], + "stripList": [ +"gclid", +"dclid", +"msclkid", +"_openstat", +"yclid", +"wickedid", +"twclid", +"_hsenc", +"__hssc", +"__hstc", +"__hsfp", +"hsctatracking", +"wbraid", +"gbraid", +"ysclid" + ], + "id": "85078bad-f31e-4d93-bb8a-81088b25d6dd", + "last_modified": 1678736907773 +}, +{ + "schema": 1649695008608, + "allowList": [], + "stripList": [ +"mc_eid", +"oly_anon_id", +"oly_enc_id", +"__s", +"vero_id", +"_hsenc", +"mkt_tok", +"fbclid" + ], + "id": "76495cfc-fac9-4079-9b5f-9ff0784484de", + "last_modified": 1649762862679 +} + ], + "timestamp": 1678736907773 +} View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/0a89389f6524620675ad4623cc6d5aa40ed8d574 -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/0a89389f6524620675ad4623cc6d5aa40ed8d574 You're receiving this email because of your account on gitlab.torproject.org. ___ tor-commits mailing list tor-commits@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits
[tor-commits] [Git][tpo/applications/tor-browser][tor-browser-115.0esrbase-13.0-1] 2 commits: fixup! Firefox preference overrides.
ma1 pushed to branch tor-browser-115.0esrbase-13.0-1 at The Tor Project / Applications / Tor Browser Commits: 44eff978 by cypherpunks1 at 2023-07-12T14:35:28+00:00 fixup! Firefox preference overrides. Bug 41092: Enable URL query stripping to protect against cross-site tracking - - - - - 9740e17d by cypherpunks1 at 2023-07-12T14:35:28+00:00 Bug 41092: Add a RemoteSettings JSON dump for query-stripping - - - - - 3 changed files: - browser/app/profile/001-base-profile.js - services/settings/static-dumps/main/moz.build - + services/settings/static-dumps/main/query-stripping.json Changes: = browser/app/profile/001-base-profile.js = @@ -505,6 +505,11 @@ pref("corroborator.enabled", false); // stop using .textContent. pref("intl.multilingual.liveReload", false); +// Enable URL query stripping to protect against cross-site tracking (tor-browser#41092) +pref("privacy.query_stripping.enabled", true); +pref("privacy.query_stripping.enabled.pbmode", true); +pref("privacy.query_stripping.strip_on_share.enabled", true); + #ifdef XP_WIN // prefs to disable jump-list entries in the taskbar on Windows (see bug #12885) // this pref changes the app's set AUMID to be dependent on the profile path, rather than = services/settings/static-dumps/main/moz.build = @@ -5,6 +5,7 @@ FINAL_TARGET_FILES.defaults.settings.main += [ "doh-config.json", "doh-providers.json", +"query-stripping.json", ] if CONFIG["MOZ_BUILD_APP"] == "browser": = services/settings/static-dumps/main/query-stripping.json = @@ -0,0 +1,44 @@ +{ + "data": [ +{ + "schema": 1678379807899, + "allowList": [], + "stripList": [ +"gclid", +"dclid", +"msclkid", +"_openstat", +"yclid", +"wickedid", +"twclid", +"_hsenc", +"__hssc", +"__hstc", +"__hsfp", +"hsctatracking", +"wbraid", +"gbraid", +"ysclid" + ], + "id": "85078bad-f31e-4d93-bb8a-81088b25d6dd", + "last_modified": 1678736907773 +}, +{ + "schema": 1649695008608, + "allowList": [], + "stripList": [ +"mc_eid", +"oly_anon_id", +"oly_enc_id", +"__s", +"vero_id", +"_hsenc", +"mkt_tok", +"fbclid" + ], + "id": "76495cfc-fac9-4079-9b5f-9ff0784484de", + "last_modified": 1649762862679 +} + ], + "timestamp": 1678736907773 +} View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/compare/5b4fa6e2f9f50a99b9ff8827f15f9845f500cc48...9740e17dde1ca86475575dac0358ffac364a6414 -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/compare/5b4fa6e2f9f50a99b9ff8827f15f9845f500cc48...9740e17dde1ca86475575dac0358ffac364a6414 You're receiving this email because of your account on gitlab.torproject.org. ___ tor-commits mailing list tor-commits@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits
[tor-commits] [Git][tpo/applications/tor-browser][tor-browser-115.0esrbase-13.0-1] fixup! Bug 23247: Communicating security expectations for .onion
ma1 pushed to branch tor-browser-115.0esrbase-13.0-1 at The Tor Project / Applications / Tor Browser Commits: 82c31751 by cypherpunks1 at 2023-07-12T16:18:15-08:00 fixup! Bug 23247: Communicating security expectations for .onion Bug 41399: Enable brotli encoding for http onions - - - - - 1 changed file: - netwerk/protocol/http/HttpBaseChannel.cpp Changes: = netwerk/protocol/http/HttpBaseChannel.cpp = @@ -340,6 +340,7 @@ void HttpBaseChannel::AddClassificationFlags(uint32_t aClassificationFlags, static bool isSecureOrTrustworthyURL(nsIURI* aURI) { return aURI->SchemeIs("https") || + nsMixedContentBlocker::IsPotentiallyTrustworthyOnion(aURI) || (StaticPrefs::network_http_encoding_trustworthy_is_https() && nsMixedContentBlocker::IsPotentiallyTrustworthyLoopbackURL(aURI)); } @@ -366,7 +367,6 @@ nsresult HttpBaseChannel::Init(nsIURI* aURI, uint32_t aCaps, // Construct connection info object nsAutoCString host; int32_t port = -1; - bool isHTTPS = isSecureOrTrustworthyURL(mURI); nsresult rv = mURI->GetAsciiHost(host); if (NS_FAILED(rv)) return rv; @@ -395,7 +395,7 @@ nsresult HttpBaseChannel::Init(nsIURI* aURI, uint32_t aCaps, if (NS_FAILED(rv)) return rv; rv = gHttpHandler->AddStandardRequestHeaders( - , isHTTPS, aContentPolicyType, + , isSecureOrTrustworthyURL(mURI), aContentPolicyType, nsContentUtils::ShouldResistFingerprinting(this)); if (NS_FAILED(rv)) return rv; View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/82c31751c263ae795bcf5c8df3c947f0576fb2cb -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/82c31751c263ae795bcf5c8df3c947f0576fb2cb You're receiving this email because of your account on gitlab.torproject.org. ___ tor-commits mailing list tor-commits@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits
[tor-commits] [Git][tpo/applications/tor-browser][tor-browser-115.0esrbase-13.0-1] fixup! Bug 41698: Reword the recommendation badges in about:addons
ma1 pushed to branch tor-browser-115.0esrbase-13.0-1 at The Tor Project / Applications / Tor Browser Commits: a884f352 by hackademix at 2023-07-11T15:48:11+02:00 fixup! Bug 41698: Reword the recommendation badges in about:addons - - - - - 3 changed files: - toolkit/content/widgets/moz-support-link/moz-support-link.mjs - toolkit/mozapps/extensions/content/aboutaddons.html - toolkit/mozapps/extensions/content/aboutaddons.js Changes: = toolkit/content/widgets/moz-support-link/moz-support-link.mjs = @@ -52,6 +52,23 @@ export default class MozSupportLink extends HTMLAnchorElement { this.setAttribute("target", "_blank"); this.addEventListener("click", this); if (!this.getAttribute("data-l10n-id")) { + const fixupL10nId = this.getAttribute("data-basebrowser-l10n-fixup"); + if (fixupL10nId) { +document.l10n.formatValue(fixupL10nId).then(title => { + this.setAttribute("title", title); + // NOTE: Mozilla adds identical aria-label and title attributes. This is + // generally bad practice because this link has no text content, so the + // title alone will already act as the accessible name. + // Normally setting both aria-label and title will lead to the title being + // used as the accessible description, but since they are identical + // the LocalAccessible::Description method will make an exception and keep + // the description empty. + // Since this component is outside of our fork's control, we follow the + // same practice just in case Mozilla ever adds some text content. + this.setAttribute("aria-label", title); +}); +return; + } document.l10n.setAttributes(this, "moz-support-link-text"); } document.l10n.translateFragment(this); = toolkit/mozapps/extensions/content/aboutaddons.html = @@ -359,6 +359,7 @@ is="moz-support-link" support-page="add-on-badges" utm-content="promoted-addon-badge" + data-basebrowser-l10n-fixup="basebrowser-addon-badge-recommended" hidden > @@ -376,6 +377,7 @@ is="moz-support-link" support-page="add-on-badges" utm-content="promoted-addon-badge" +data-basebrowser-l10n-fixup="basebrowser-addon-badge-verified" hidden > = toolkit/mozapps/extensions/content/aboutaddons.js = @@ -4220,29 +4220,6 @@ async function initialize() { ); } } - - // At the moment we need to do this, because Weblate still does not support - // attributes in Fluent. - const [recommended, verified] = await document.l10n.formatValues([ -{ id: "basebrowser-addon-badge-recommended" }, -{ id: "basebrowser-addon-badge-verified" }, - ]); - - importTemplate("card"); - _templates.card.content -.querySelector(".addon-badge-recommended") -.setAttribute("title", recommended); - _templates.card.content -.querySelector(".addon-badge-verified") -.setAttribute("title", verified); - - // We also update any template copy that has already been created. - for (const badge of document.querySelectorAll(".addon-badge-recommended")) { -badge.setAttribute("title", recommended); - } - for (const badge of document.querySelectorAll(".addon-badge-verified")) { -badge.setAttribute("title", verified); - } } window.promiseInitialized = new Promise(resolve => { View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/a884f352ec0a3f43c96765b3a5598bdfacc6f42e -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/a884f352ec0a3f43c96765b3a5598bdfacc6f42e You're receiving this email because of your account on gitlab.torproject.org. ___ tor-commits mailing list tor-commits@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits
[tor-commits] [Git][tpo/applications/tor-browser][base-browser-115.0esrbase-13.0-1] fixup! Bug 41698: Reword the recommendation badges in about:addons
ma1 pushed to branch base-browser-115.0esrbase-13.0-1 at The Tor Project / Applications / Tor Browser Commits: eba10c40 by hackademix at 2023-07-11T16:45:09+02:00 fixup! Bug 41698: Reword the recommendation badges in about:addons - - - - - 3 changed files: - toolkit/content/widgets/moz-support-link/moz-support-link.mjs - toolkit/mozapps/extensions/content/aboutaddons.html - toolkit/mozapps/extensions/content/aboutaddons.js Changes: = toolkit/content/widgets/moz-support-link/moz-support-link.mjs = @@ -52,6 +52,23 @@ export default class MozSupportLink extends HTMLAnchorElement { this.setAttribute("target", "_blank"); this.addEventListener("click", this); if (!this.getAttribute("data-l10n-id")) { + const fixupL10nId = this.getAttribute("data-basebrowser-l10n-fixup"); + if (fixupL10nId) { +document.l10n.formatValue(fixupL10nId).then(title => { + this.setAttribute("title", title); + // NOTE: Mozilla adds identical aria-label and title attributes. This is + // generally bad practice because this link has no text content, so the + // title alone will already act as the accessible name. + // Normally setting both aria-label and title will lead to the title being + // used as the accessible description, but since they are identical + // the LocalAccessible::Description method will make an exception and keep + // the description empty. + // Since this component is outside of our fork's control, we follow the + // same practice just in case Mozilla ever adds some text content. + this.setAttribute("aria-label", title); +}); +return; + } document.l10n.setAttributes(this, "moz-support-link-text"); } document.l10n.translateFragment(this); = toolkit/mozapps/extensions/content/aboutaddons.html = @@ -359,6 +359,7 @@ is="moz-support-link" support-page="add-on-badges" utm-content="promoted-addon-badge" + data-basebrowser-l10n-fixup="basebrowser-addon-badge-recommended" hidden > @@ -376,6 +377,7 @@ is="moz-support-link" support-page="add-on-badges" utm-content="promoted-addon-badge" +data-basebrowser-l10n-fixup="basebrowser-addon-badge-verified" hidden > = toolkit/mozapps/extensions/content/aboutaddons.js = @@ -4220,29 +4220,6 @@ async function initialize() { ); } } - - // At the moment we need to do this, because Weblate still does not support - // attributes in Fluent. - const [recommended, verified] = await document.l10n.formatValues([ -{ id: "basebrowser-addon-badge-recommended" }, -{ id: "basebrowser-addon-badge-verified" }, - ]); - - importTemplate("card"); - _templates.card.content -.querySelector(".addon-badge-recommended") -.setAttribute("title", recommended); - _templates.card.content -.querySelector(".addon-badge-verified") -.setAttribute("title", verified); - - // We also update any template copy that has already been created. - for (const badge of document.querySelectorAll(".addon-badge-recommended")) { -badge.setAttribute("title", recommended); - } - for (const badge of document.querySelectorAll(".addon-badge-verified")) { -badge.setAttribute("title", verified); - } } window.promiseInitialized = new Promise(resolve => { View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/eba10c40f35483210d8ad8af03aa48dbbcc6076c -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/eba10c40f35483210d8ad8af03aa48dbbcc6076c You're receiving this email because of your account on gitlab.torproject.org. ___ tor-commits mailing list tor-commits@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits
[tor-commits] [Git][tpo/applications/tor-browser] Pushed new branch tor-browser-102.12.0esr-12.5-1
ma1 pushed new branch tor-browser-102.12.0esr-12.5-1 at The Tor Project / Applications / Tor Browser -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/tree/tor-browser-102.12.0esr-12.5-1 You're receiving this email because of your account on gitlab.torproject.org. ___ tor-commits mailing list tor-commits@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits
[tor-commits] [Git][tpo/applications/tor-browser] Pushed new branch tor-browser-102.12.0esr-12.0-1
ma1 pushed new branch tor-browser-102.12.0esr-12.0-1 at The Tor Project / Applications / Tor Browser -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/tree/tor-browser-102.12.0esr-12.0-1 You're receiving this email because of your account on gitlab.torproject.org. ___ tor-commits mailing list tor-commits@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits
[tor-commits] [Git][tpo/applications/tor-browser][tor-browser-102.11.0esr-12.5-1] fixup! Bug 23247: Communicating security expectations for .onion
ma1 pushed to branch tor-browser-102.11.0esr-12.5-1 at The Tor Project / Applications / Tor Browser Commits: dbec6cf6 by cypherpunks1 at 2023-05-24T09:21:07-08:00 fixup! Bug 23247: Communicating security expectations for .onion Bug 41785: Show http onion resources as secure in network monitor - - - - - 1 changed file: - devtools/shared/webconsole/network-helper.js Changes: = devtools/shared/webconsole/network-helper.js = @@ -600,6 +600,9 @@ var NetworkHelper = { // The request did not contain any security info. if (!securityInfo) { + if (httpActivity.hostname && httpActivity.hostname.endsWith(".onion")) { +info.state = "secure"; + } return info; } @@ -651,7 +654,11 @@ var NetworkHelper = { // schemes other than https and wss are subject to // downgrade/etc at the scheme level and should always be // considered insecure -info.state = "insecure"; +if (httpActivity.hostname && httpActivity.hostname.endsWith(".onion")) { + info.state = "secure"; +} else { + info.state = "insecure"; +} } else if (state & wpl.STATE_IS_SECURE) { // The connection is secure if the scheme is sufficient info.state = "secure"; View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/dbec6cf620a2f5d4a5b9ed162e795978eacea0cc -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/dbec6cf620a2f5d4a5b9ed162e795978eacea0cc You're receiving this email because of your account on gitlab.torproject.org. ___ tor-commits mailing list tor-commits@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits
[tor-commits] [Git][tpo/applications/tor-browser-build][main] Bug 40874: Include the commit information in GeckoView
ma1 pushed to branch main at The Tor Project / Applications / tor-browser-build Commits: f4227713 by Pier Angelo Vendrame at 2023-06-07T19:10:03+02:00 Bug 40874: Include the commit information in GeckoView Add the commit hash and GitLab URL to the mozconfig to make them appear in about:buildconfig on Android, too. - - - - - 2 changed files: - projects/geckoview/build - projects/geckoview/config Changes: = projects/geckoview/build = @@ -41,7 +41,13 @@ export PATH="/var/tmp/dist/rust/bin:/var/tmp/dist/cbindgen:/var/tmp/dist/nasm/bi tar -C /var/tmp/build -xf [% project %]-[% c('version') %].tar.gz cd /var/tmp/build/[% project %]-[% c("version") %] -ln -s mozconfig-[% c("var/osname") %] .mozconfig +cat > .mozconfig << 'MOZCONFIG_EOF' +. $topsrcdir/mozconfig-[% c("var/osname") %] + +export MOZ_INCLUDE_SOURCE_INFO=1 +export MOZ_SOURCE_REPO="[% c('var/gitlab_project') %]" +export MOZ_SOURCE_CHANGESET=[% c("var/git_commit") %] +MOZCONFIG_EOF eval $(perl $rootdir/get-moz-build-date [% c("var/copyright_year") %] [% c("var/torbrowser_version") %]) if [ -z $MOZ_BUILD_DATE ] = projects/geckoview/config = @@ -15,6 +15,8 @@ var: browser_branch: 12.5-1 browser_build: 3 copyright_year: '[% exec("git show -s --format=%ci").remove("-.*") %]' + gitlab_project: https://gitlab.torproject.org/tpo/applications/tor-browser + git_commit: '[% exec("git rev-parse HEAD") %]' deps: - build-essential - unzip View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/commit/f422771302caf12d6410d9602b46b511b799bcab -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/commit/f422771302caf12d6410d9602b46b511b799bcab You're receiving this email because of your account on gitlab.torproject.org. ___ tor-commits mailing list tor-commits@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits
[tor-commits] [Git][tpo/applications/tor-browser][tor-browser-102.12.0esr-12.5-1] fixup! Add TorStrings module for localization
ma1 pushed to branch tor-browser-102.12.0esr-12.5-1 at The Tor Project / Applications / Tor Browser Commits: 2165eb00 by Pier Angelo Vendrame at 2023-06-08T10:47:48+02:00 fixup! Add TorStrings module for localization Bug 41818: Remove YEC 2022 strings - - - - - 1 changed file: - toolkit/torbutton/chrome/locale/en-US/aboutTor.dtd Changes: = toolkit/torbutton/chrome/locale/en-US/aboutTor.dtd = @@ -38,22 +38,3 @@ - - - - - - - - - - - - - - View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/2165eb00af36b03a457bfd87d701f575b3bdb458 -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/2165eb00af36b03a457bfd87d701f575b3bdb458 You're receiving this email because of your account on gitlab.torproject.org. ___ tor-commits mailing list tor-commits@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits
[tor-commits] [Git][tpo/applications/tor-browser][tor-browser-102.12.0esr-12.5-1] fixup! Bug 8324: Prevent DNS proxy bypasses caused by Drag
ma1 pushed to branch tor-browser-102.12.0esr-12.5-1 at The Tor Project / Applications / Tor Browser Commits: 423f239c by cypherpunks1 at 2023-06-05T11:07:29-08:00 fixup! Bug 8324: Prevent DNS proxy bypasses caused by DragDrop Bug 41792: Allow dragging downloads from about:downloads and the download panel - - - - - 1 changed file: - toolkit/torbutton/components/dragDropFilter.js Changes: = toolkit/torbutton/components/dragDropFilter.js = @@ -142,7 +142,8 @@ DragDropFilter.prototype = { for (const type of types) { if ( type !== INTERNAL_FALLBACK && - type !== "text/x-moz-place" // don't touch bookmarks + type !== "text/x-moz-place" &&// don't touch bookmarks + type !== "application/x-moz-file" // don't touch downloads ) { aDataTransfer.mozClearDataAt(type, i); } View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/423f239c5675d2522093c991831032ea565de55c -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/423f239c5675d2522093c991831032ea565de55c You're receiving this email because of your account on gitlab.torproject.org. ___ tor-commits mailing list tor-commits@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits
[tor-commits] [Git][tpo/applications/tor-browser][tor-browser-102.12.0esr-12.5-1] fixup! Bug 32308: use direct browser sizing for letterboxing.
ma1 pushed to branch tor-browser-102.12.0esr-12.5-1 at The Tor Project / Applications / Tor Browser Commits: 1fac685b by hackademix at 2023-06-12T09:22:03+02:00 fixup! Bug 32308: use direct browser sizing for letterboxing. - - - - - 1 changed file: - toolkit/components/resistfingerprinting/RFPHelper.jsm Changes: = toolkit/components/resistfingerprinting/RFPHelper.jsm = @@ -51,7 +51,7 @@ function forEachWindow(callback) { async function windowResizeHandler(aEvent) { - if (RFPHelper.letterboxingEnabled) { + if (RFPHelper.letterboxingEnabled || !RFPHelper.rfpEnabled) { return; } if (Services.prefs.getIntPref(kPrefResizeWarnings) <= 0) { @@ -250,7 +250,9 @@ class _RFPHelper { } _handleResistFingerprintingChanged() { -if (Services.prefs.getBoolPref(kPrefResistFingerprinting)) { +if ( + (this.rfpEnabled = Services.prefs.getBoolPref(kPrefResistFingerprinting)) +) { this._addRFPObservers(); Services.ww.registerNotification(this); forEachWindow(win => this._attachWindow(win)); @@ -397,7 +399,9 @@ class _RFPHelper { kPrefLetterboxing, false ); -forEachWindow(win => this._updateSizeForTabsInWindow(win)); +if (this.rfpEnabled) { + forEachWindow(win => this._updateSizeForTabsInWindow(win)); +} } // The function to parse the dimension set from the pref value. The pref value View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/1fac685b89fc2280dc4a21041aead035ef0af145 -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/1fac685b89fc2280dc4a21041aead035ef0af145 You're receiving this email because of your account on gitlab.torproject.org. ___ tor-commits mailing list tor-commits@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits
[tor-commits] [Git][tpo/applications/tor-browser][base-browser-102.12.0esr-12.5-1] fixup! Bug 32308: use direct browser sizing for letterboxing.
ma1 pushed to branch base-browser-102.12.0esr-12.5-1 at The Tor Project / Applications / Tor Browser Commits: c8ea1c20 by hackademix at 2023-06-12T10:30:29+02:00 fixup! Bug 32308: use direct browser sizing for letterboxing. - - - - - 1 changed file: - toolkit/components/resistfingerprinting/RFPHelper.jsm Changes: = toolkit/components/resistfingerprinting/RFPHelper.jsm = @@ -51,7 +51,7 @@ function forEachWindow(callback) { async function windowResizeHandler(aEvent) { - if (RFPHelper.letterboxingEnabled) { + if (RFPHelper.letterboxingEnabled || !RFPHelper.rfpEnabled) { return; } if (Services.prefs.getIntPref(kPrefResizeWarnings) <= 0) { @@ -250,7 +250,9 @@ class _RFPHelper { } _handleResistFingerprintingChanged() { -if (Services.prefs.getBoolPref(kPrefResistFingerprinting)) { +if ( + (this.rfpEnabled = Services.prefs.getBoolPref(kPrefResistFingerprinting)) +) { this._addRFPObservers(); Services.ww.registerNotification(this); forEachWindow(win => this._attachWindow(win)); @@ -397,7 +399,9 @@ class _RFPHelper { kPrefLetterboxing, false ); -forEachWindow(win => this._updateSizeForTabsInWindow(win)); +if (this.rfpEnabled) { + forEachWindow(win => this._updateSizeForTabsInWindow(win)); +} } // The function to parse the dimension set from the pref value. The pref value View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/c8ea1c20e48a921ebf534390bc32e99c5fc9d156 -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/c8ea1c20e48a921ebf534390bc32e99c5fc9d156 You're receiving this email because of your account on gitlab.torproject.org. ___ tor-commits mailing list tor-commits@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits
[tor-commits] [Git][tpo/applications/tor-browser][tor-browser-102.12.0esr-13.0-1] fixup! Bug 32308: use direct browser sizing for letterboxing.
ma1 pushed to branch tor-browser-102.12.0esr-13.0-1 at The Tor Project / Applications / Tor Browser Commits: a6db7b91 by hackademix at 2023-06-12T10:35:40+02:00 fixup! Bug 32308: use direct browser sizing for letterboxing. - - - - - 1 changed file: - toolkit/components/resistfingerprinting/RFPHelper.jsm Changes: = toolkit/components/resistfingerprinting/RFPHelper.jsm = @@ -51,7 +51,7 @@ function forEachWindow(callback) { async function windowResizeHandler(aEvent) { - if (RFPHelper.letterboxingEnabled) { + if (RFPHelper.letterboxingEnabled || !RFPHelper.rfpEnabled) { return; } if (Services.prefs.getIntPref(kPrefResizeWarnings) <= 0) { @@ -250,7 +250,9 @@ class _RFPHelper { } _handleResistFingerprintingChanged() { -if (Services.prefs.getBoolPref(kPrefResistFingerprinting)) { +if ( + (this.rfpEnabled = Services.prefs.getBoolPref(kPrefResistFingerprinting)) +) { this._addRFPObservers(); Services.ww.registerNotification(this); forEachWindow(win => this._attachWindow(win)); @@ -397,7 +399,9 @@ class _RFPHelper { kPrefLetterboxing, false ); -forEachWindow(win => this._updateSizeForTabsInWindow(win)); +if (this.rfpEnabled) { + forEachWindow(win => this._updateSizeForTabsInWindow(win)); +} } // The function to parse the dimension set from the pref value. The pref value View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/a6db7b91bc2e1e683c09a3ea60055754b1035b78 -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/a6db7b91bc2e1e683c09a3ea60055754b1035b78 You're receiving this email because of your account on gitlab.torproject.org. ___ tor-commits mailing list tor-commits@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits
[tor-commits] [Git][tpo/applications/tor-browser] Pushed new tag base-browser-102.14.0esr-12.5-1-build2
ma1 pushed new tag base-browser-102.14.0esr-12.5-1-build2 at The Tor Project / Applications / Tor Browser -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/tree/base-browser-102.14.0esr-12.5-1-build2 You're receiving this email because of your account on gitlab.torproject.org. ___ tor-commits mailing list tor-commits@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits
[tor-commits] [Git][tpo/applications/tor-browser] Pushed new tag tor-browser-102.14.0esr-12.5-1-build2
ma1 pushed new tag tor-browser-102.14.0esr-12.5-1-build2 at The Tor Project / Applications / Tor Browser -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/tree/tor-browser-102.14.0esr-12.5-1-build2 You're receiving this email because of your account on gitlab.torproject.org. ___ tor-commits mailing list tor-commits@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits
[tor-commits] [Git][tpo/applications/tor-browser] Pushed new tag tor-browser-115.1.0esr-13.0-1-build2
ma1 pushed new tag tor-browser-115.1.0esr-13.0-1-build2 at The Tor Project / Applications / Tor Browser -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/tree/tor-browser-115.1.0esr-13.0-1-build2 You're receiving this email because of your account on gitlab.torproject.org. ___ tor-commits mailing list tor-commits@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits
[tor-commits] [Git][tpo/applications/tor-browser] Pushed new tag base-browser-115.1.0esr-13.0-1-build2
ma1 pushed new tag base-browser-115.1.0esr-13.0-1-build2 at The Tor Project / Applications / Tor Browser -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/tree/base-browser-115.1.0esr-13.0-1-build2 You're receiving this email because of your account on gitlab.torproject.org. ___ tor-commits mailing list tor-commits@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits
[tor-commits] [Git][tpo/applications/tor-browser-build][main] Fix mullvad-browser incrementals and create a build2
ma1 pushed to branch main at The Tor Project / Applications / tor-browser-build Commits: a1be4abe by Richard Pospesel at 2023-07-24T17:44:56+00:00 Fix mullvad-browser incrementals and create a build2 - - - - - 1 changed file: - rbm.conf Changes: = rbm.conf = @@ -262,8 +262,9 @@ targets: exe_name: mullvadbrowser mar_channel_id: '[% c("var/projectname") %]-mullvad-[% c("var/channel") %]' locales: [] + torbrowser_build: 'build2' torbrowser_incremental_from: -- 12.5a6 +- 12.5a7 torbrowser-testbuild: - testbuild View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/commit/a1be4abee11ef39117eabf60d7060342d4b47b10 -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/commit/a1be4abee11ef39117eabf60d7060342d4b47b10 You're receiving this email because of your account on gitlab.torproject.org. ___ tor-commits mailing list tor-commits@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits
[tor-commits] [Git][tpo/applications/tor-browser] Pushed new branch tor-browser-102.14.0esr-12.5-1
ma1 pushed new branch tor-browser-102.14.0esr-12.5-1 at The Tor Project / Applications / Tor Browser -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/tree/tor-browser-102.14.0esr-12.5-1 You're receiving this email because of your account on gitlab.torproject.org. ___ tor-commits mailing list tor-commits@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits
[tor-commits] [Git][tpo/applications/tor-browser] Pushed new branch base-browser-102.14.0esr-12.5-1
ma1 pushed new branch base-browser-102.14.0esr-12.5-1 at The Tor Project / Applications / Tor Browser -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/tree/base-browser-102.14.0esr-12.5-1 You're receiving this email because of your account on gitlab.torproject.org. ___ tor-commits mailing list tor-commits@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits
[tor-commits] [Git][tpo/applications/tor-browser][tor-browser-115.1.0esr-13.0-1] amend! Bug 32308: use direct browser sizing for letterboxing.
ma1 pushed to branch tor-browser-115.1.0esr-13.0-1 at The Tor Project / Applications / Tor Browser Commits: 63eecb92 by hackademix at 2023-08-08T08:08:43+02:00 amend! Bug 32308: use direct browser sizing for letterboxing. Bug 32308: use direct browser sizing for letterboxing. Bug 30556: align letterboxing with 200x100 new win width stepping - - - - - 1 changed file: - toolkit/components/resistfingerprinting/RFPHelper.sys.mjs Changes: = toolkit/components/resistfingerprinting/RFPHelper.sys.mjs = @@ -475,14 +475,14 @@ class _RFPHelper { /** * Given a width or height, rounds it with the proper stepping. */ - steppedSize(aDimension) { + steppedSize(aDimension, isWidth = false) { let stepping; if (aDimension <= 50) { return 0; } else if (aDimension <= 500) { stepping = 50; } else if (aDimension <= 1600) { - stepping = 100; + stepping = isWidth ? 200 : 100; } else { stepping = 200; } @@ -569,7 +569,7 @@ class _RFPHelper { // If the set is empty, we will round the content with the default // stepping size. if (!this._letterboxingDimensions.length) { -result = r(this.steppedSize(aWidth), this.steppedSize(aHeight)); +result = r(this.steppedSize(aWidth, true), this.steppedSize(aHeight)); log( `${logPrefix} roundDimensions(${aWidth}, ${aHeight}) = ${result.width} x ${result.height}` ); View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/63eecb9243e5fb0af6fb158e1abd93b8be32 -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/63eecb9243e5fb0af6fb158e1abd93b8be32 You're receiving this email because of your account on gitlab.torproject.org. ___ tor-commits mailing list tor-commits@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits
[tor-commits] [Git][tpo/applications/tor-browser][tor-browser-115.1.0esr-13.0-1] fixup! Firefox preference overrides.
ma1 pushed to branch tor-browser-115.1.0esr-13.0-1 at The Tor Project / Applications / Tor Browser Commits: e0e763c0 by hackademix at 2023-08-08T09:11:30+02:00 fixup! Firefox preference overrides. Bug 33282: Redefine the dimensions of new RFP windows - - - - - 1 changed file: - browser/app/profile/001-base-profile.js Changes: = browser/app/profile/001-base-profile.js = @@ -291,6 +291,9 @@ pref("dom.use_components_shim", false); pref("privacy.resistFingerprinting.letterboxing", true); // tor-browser#41695: how many warnings we show if user closes them without restoring the window size pref("privacy.resistFingerprinting.resizeWarnings", 3); +// tor-browser#33282: new windows start at 1400x900 when there's enough screen space, otherwise down by 200x100 blocks +pref("privacy.window.maxInnerWidth", 1400); +pref("privacy.window.maxInnerHeight", 900); // Enforce Network Information API as disabled pref("dom.netinfo.enabled", false); pref("network.http.referer.defaultPolicy", 2); // Bug 32948: Make referer behavior consistent regardless of private browing mode status View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/e0e763c05a5b3d62d7ec5383a1d7cbf9dc7f84a6 -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/e0e763c05a5b3d62d7ec5383a1d7cbf9dc7f84a6 You're receiving this email because of your account on gitlab.torproject.org. ___ tor-commits mailing list tor-commits@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits
[tor-commits] [Git][tpo/applications/tor-browser][base-browser-115.1.0esr-13.0-1] 2 commits: amend! Bug 32308: use direct browser sizing for letterboxing.
ma1 pushed to branch base-browser-115.1.0esr-13.0-1 at The Tor Project / Applications / Tor Browser Commits: dc2274d0 by hackademix at 2023-08-08T09:18:01+02:00 amend! Bug 32308: use direct browser sizing for letterboxing. Bug 32308: use direct browser sizing for letterboxing. Bug 30556: align letterboxing with 200x100 new win width stepping - - - - - 9ac98dab by hackademix at 2023-08-08T09:18:02+02:00 fixup! Firefox preference overrides. Bug 33282: Redefine the dimensions of new RFP windows - - - - - 2 changed files: - browser/app/profile/001-base-profile.js - toolkit/components/resistfingerprinting/RFPHelper.sys.mjs Changes: = browser/app/profile/001-base-profile.js = @@ -291,6 +291,9 @@ pref("dom.use_components_shim", false); pref("privacy.resistFingerprinting.letterboxing", true); // tor-browser#41695: how many warnings we show if user closes them without restoring the window size pref("privacy.resistFingerprinting.resizeWarnings", 3); +// tor-browser#33282: new windows start at 1400x900 when there's enough screen space, otherwise down by 200x100 blocks +pref("privacy.window.maxInnerWidth", 1400); +pref("privacy.window.maxInnerHeight", 900); // Enforce Network Information API as disabled pref("dom.netinfo.enabled", false); pref("network.http.referer.defaultPolicy", 2); // Bug 32948: Make referer behavior consistent regardless of private browing mode status = toolkit/components/resistfingerprinting/RFPHelper.sys.mjs = @@ -475,14 +475,14 @@ class _RFPHelper { /** * Given a width or height, rounds it with the proper stepping. */ - steppedSize(aDimension) { + steppedSize(aDimension, isWidth = false) { let stepping; if (aDimension <= 50) { return 0; } else if (aDimension <= 500) { stepping = 50; } else if (aDimension <= 1600) { - stepping = 100; + stepping = isWidth ? 200 : 100; } else { stepping = 200; } @@ -569,7 +569,7 @@ class _RFPHelper { // If the set is empty, we will round the content with the default // stepping size. if (!this._letterboxingDimensions.length) { -result = r(this.steppedSize(aWidth), this.steppedSize(aHeight)); +result = r(this.steppedSize(aWidth, true), this.steppedSize(aHeight)); log( `${logPrefix} roundDimensions(${aWidth}, ${aHeight}) = ${result.width} x ${result.height}` ); View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/compare/65183e255d3b18a1f237819c32696cd51bf360bc...9ac98dab00b7285c32dcbe3ad1bcac33c44dd507 -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/compare/65183e255d3b18a1f237819c32696cd51bf360bc...9ac98dab00b7285c32dcbe3ad1bcac33c44dd507 You're receiving this email because of your account on gitlab.torproject.org. ___ tor-commits mailing list tor-commits@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits
[tor-commits] [Git][tpo/applications/tor-browser] Pushed new tag tor-browser-102.14.0esr-12.5-1-build1
ma1 pushed new tag tor-browser-102.14.0esr-12.5-1-build1 at The Tor Project / Applications / Tor Browser -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/tree/tor-browser-102.14.0esr-12.5-1-build1 You're receiving this email because of your account on gitlab.torproject.org. ___ tor-commits mailing list tor-commits@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits
[tor-commits] [Git][tpo/applications/tor-browser] Pushed new tag base-browser-102.14.0esr-12.5-1-build1
ma1 pushed new tag base-browser-102.14.0esr-12.5-1-build1 at The Tor Project / Applications / Tor Browser -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/tree/base-browser-102.14.0esr-12.5-1-build1 You're receiving this email because of your account on gitlab.torproject.org. ___ tor-commits mailing list tor-commits@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits
[tor-commits] [Git][tpo/applications/tor-browser][tor-browser-102.13.0esr-12.5-1] fixup! Bug 26961: New user onboarding.
ma1 pushed to branch tor-browser-102.13.0esr-12.5-1 at The Tor Project / Applications / Tor Browser Commits: 4dcf0094 by hackademix at 2023-06-29T09:41:08+02:00 fixup! Bug 26961: New user onboarding. - - - - - 1 changed file: - browser/extensions/onboarding/content/Onboarding.jsm Changes: = browser/extensions/onboarding/content/Onboarding.jsm = @@ -909,7 +909,7 @@ class Onboarding { } const kOnionURL = "https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/;; // DuckDuckGo -const kLearnMore = "https://www.torproject.org/releases/tor-browser-12-0/;; +const kLearnMore = "https://www.torproject.org/releases/tor-browser-12-5/;; let handledTourActionClick = false; switch (id) { case "onboarding-overlay-button-icon": View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/4dcf009406d107a3e5f56e445a2ab7334755d059 -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/4dcf009406d107a3e5f56e445a2ab7334755d059 You're receiving this email because of your account on gitlab.torproject.org. ___ tor-commits mailing list tor-commits@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits
[tor-commits] [Git][tpo/applications/tor-browser][tor-browser-102.12.0esr-12.5-1] fixup! Bug 30237: Add v3 onion services client authentication prompt
ma1 pushed to branch tor-browser-102.12.0esr-12.5-1 at The Tor Project / Applications / Tor Browser Commits: 4a13c283 by hackademix at 2023-06-27T07:54:52+00:00 fixup! Bug 30237: Add v3 onion services client authentication prompt - - - - - 1 changed file: - browser/components/onionservices/content/authPrompt.js Changes: = browser/components/onionservices/content/authPrompt.js = @@ -73,8 +73,18 @@ const OnionAuthPrompt = (function() { ); }, +_autoFocus(event) { + event.target.ownerGlobal.focus(); +}, + _onPromptShowing(aWarningMessage) { let xulDoc = this._browser.ownerDocument; + + // Force back focus: tor-browser#41856 + (this._popupElem = xulDoc.getElementById( +`${OnionAuthUtil.domid.notification}-notification` + ))?.addEventListener("click", this._autoFocus); + let descElem = xulDoc.getElementById(OnionAuthUtil.domid.description); if (descElem) { // Handle replacement of the onion name within the localized @@ -159,6 +169,9 @@ const OnionAuthPrompt = (function() { this._boundOnKeyFieldInput = undefined; } } + if (this._popupElem) { +this._popupElem.removeEventListener("click", this._autoFocus); + } }, _onKeyFieldKeyPress(aEvent) { View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/4a13c283b51fdf6f8748ebae9347152c59454c58 -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/4a13c283b51fdf6f8748ebae9347152c59454c58 You're receiving this email because of your account on gitlab.torproject.org. ___ tor-commits mailing list tor-commits@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits
[tor-commits] [Git][tpo/applications/mullvad-browser][mullvad-browser-115.7.0esr-13.5-1] fixup! Bug 32308: use direct browser sizing for letterboxing.
ma1 pushed to branch mullvad-browser-115.7.0esr-13.5-1 at The Tor Project / Applications / Mullvad Browser Commits: 800f6ebf by hackademix at 2024-02-07T18:53:36+01:00 fixup! Bug 32308: use direct browser sizing for letterboxing. Bug 42389: make the betterboxing gradient actually work. - - - - - 1 changed file: - browser/base/content/browser.css Changes: = browser/base/content/browser.css = @@ -168,7 +168,6 @@ body { .letterboxing.letterboxing-gradient .browserContainer { background: linear-gradient(283deg, var(--letterboxing-gradient-color1) 0%, var(--letterboxing-gradient-color2) 100%), var(--letterboxing-bgcolor); - box-shadow: rgba(0, 0, 0, 0.5) 0px -1px 2px; } :root:not([inDOMFullscreen]) .letterboxing .browserContainer:not(.responsive-mode) @@ -231,12 +230,12 @@ body { border-top-right-radius: var(--letterboxing-border-top-radius); width: var(--letterboxing-width) !important; height: var(--letterboxing-height) !important; + background: var(--letterboxing-gradient-color2); } :root:not([inDOMFullscreen]) .letterboxing.letterboxing-ready .browserContainer:not(.responsive-mode) > .browserStack:not(.exclude-letterboxing) { place-content: var(--letterboxing-vertical-alignment) center; - background: var(--letterboxing-bgcolor); } #toolbar-menubar[autohide="true"] { View it on GitLab: https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/800f6ebf17fbbc8bacc303bd13828c33f01cecf7 -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/800f6ebf17fbbc8bacc303bd13828c33f01cecf7 You're receiving this email because of your account on gitlab.torproject.org. ___ tor-commits mailing list tor-commits@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits
[tor-commits] [Git][tpo/applications/tor-browser][tor-browser-115.7.0esr-13.5-1] fixup! Bug 32308: use direct browser sizing for letterboxing.
ma1 pushed to branch tor-browser-115.7.0esr-13.5-1 at The Tor Project / Applications / Tor Browser Commits: c13c55f4 by hackademix at 2024-02-07T18:42:34+01:00 fixup! Bug 32308: use direct browser sizing for letterboxing. Bug 42389: make the betterboxing gradient actually work. - - - - - 1 changed file: - browser/base/content/browser.css Changes: = browser/base/content/browser.css = @@ -168,7 +168,6 @@ body { .letterboxing.letterboxing-gradient .browserContainer { background: linear-gradient(283deg, var(--letterboxing-gradient-color1) 0%, var(--letterboxing-gradient-color2) 100%), var(--letterboxing-bgcolor); - box-shadow: rgba(0, 0, 0, 0.5) 0px -1px 2px; } :root:not([inDOMFullscreen]) .letterboxing .browserContainer:not(.responsive-mode) @@ -231,12 +230,12 @@ body { border-top-right-radius: var(--letterboxing-border-top-radius); width: var(--letterboxing-width) !important; height: var(--letterboxing-height) !important; + background: var(--letterboxing-gradient-color2); } :root:not([inDOMFullscreen]) .letterboxing.letterboxing-ready .browserContainer:not(.responsive-mode) > .browserStack:not(.exclude-letterboxing) { place-content: var(--letterboxing-vertical-alignment) center; - background: var(--letterboxing-bgcolor); } #toolbar-menubar[autohide="true"] { View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/c13c55f4af6b80a89fd1256d7659087217da8e43 -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/c13c55f4af6b80a89fd1256d7659087217da8e43 You're receiving this email because of your account on gitlab.torproject.org. ___ tor-commits mailing list tor-commits@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits
[tor-commits] [Git][tpo/applications/tor-browser-build][main] Bug 41050: Improve disk leak sanitization on startup.
ma1 pushed to branch main at The Tor Project / Applications / tor-browser-build Commits: 5a97ba07 by hackademix at 2023-12-19T10:22:07+01:00 Bug 41050: Improve disk leak sanitization on startup. - - - - - 1 changed file: - projects/browser/RelativeLink/start-browser Changes: = projects/browser/RelativeLink/start-browser = @@ -258,18 +258,32 @@ HOME="${PWD}" export HOME # Prevent disk leaks in $HOME/.local/share (tor-browser#17560) +function erase_leaky() { + local leaky="$1" + [ -e "$leaky" ] && + ( srm -r "$leaky" || + wipe -r "$leaky" || + find "$leaky" -type f -exec shred -u {} \; ; + rm -rf "$leaky" + ) > /dev/null 2>&1 +} local_dir="$HOME/.local/" share_dir="$local_dir/share" -if [ -d "$share_dir" ]; then -( srm -r "$share_dir" || - wipe -r "$share_dir" || - find "$share_dir" -type f -exec shred -u {} \; ; - rm -rf "$share_dir" -) > /dev/null 2>&1 -else -mkdir -p "$local_dir" +# We don't want to mess with symlinks, possibly pointing outside the +# Browser directory (tor-browser-build#41050). +# We're not using realpath/readlink for consistency with the (possibly +# outdated) availability assumptions made elsewhere in this script. +if ! [ -L "$local_dir" -o -L "$share_dir" ]; then + if [ -d "$share_dir" ]; then + for leaky_path in "gvfs-metadata" "recently-used.xbel"; do + erase_leaky "$share_dir/$leaky_path" + done + else + mkdir -p "$local_dir" + fi + ln -fs /dev/null "$share_dir" fi -ln -fs /dev/null "$share_dir" +[ -L "$HOME/.cache" ] || erase_leaky "$HOME/.cache/nvidia" [% IF c("var/tor-browser") -%] SYSARCHITECTURE=$(getconf LONG_BIT) View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/commit/5a97ba07148a176580dd536a65dc7ebba6565775 -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/commit/5a97ba07148a176580dd536a65dc7ebba6565775 You're receiving this email because of your account on gitlab.torproject.org. ___ tor-commits mailing list tor-commits@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits
[tor-commits] [Git][tpo/applications/firefox-android] Pushed new tag firefox-android-115.2.1-13.0-1-build11
ma1 pushed new tag firefox-android-115.2.1-13.0-1-build11 at The Tor Project / Applications / firefox-android -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/firefox-android/-/tree/firefox-android-115.2.1-13.0-1-build11 You're receiving this email because of your account on gitlab.torproject.org. ___ tor-commits mailing list tor-commits@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits
[tor-commits] [Git][tpo/applications/firefox-android] Pushed new tag firefox-android-115.2.1-13.5-1-build3
ma1 pushed new tag firefox-android-115.2.1-13.5-1-build3 at The Tor Project / Applications / firefox-android -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/firefox-android/-/tree/firefox-android-115.2.1-13.5-1-build3 You're receiving this email because of your account on gitlab.torproject.org. ___ tor-commits mailing list tor-commits@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits
[tor-commits] [Git][tpo/applications/tor-browser] Pushed new tag FIREFOX_115_6_0esr_BUILD1
ma1 pushed new tag FIREFOX_115_6_0esr_BUILD1 at The Tor Project / Applications / Tor Browser -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/tree/FIREFOX_115_6_0esr_BUILD1 You're receiving this email because of your account on gitlab.torproject.org. ___ tor-commits mailing list tor-commits@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits
[tor-commits] [Git][tpo/applications/tor-browser] Pushed new branch tor-browser-115.6.0esr-13.0-1
ma1 pushed new branch tor-browser-115.6.0esr-13.0-1 at The Tor Project / Applications / Tor Browser -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/tree/tor-browser-115.6.0esr-13.0-1 You're receiving this email because of your account on gitlab.torproject.org. ___ tor-commits mailing list tor-commits@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits
[tor-commits] [Git][tpo/applications/tor-browser] Pushed new branch base-browser-115.6.0esr-13.0-1
ma1 pushed new branch base-browser-115.6.0esr-13.0-1 at The Tor Project / Applications / Tor Browser -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/tree/base-browser-115.6.0esr-13.0-1 You're receiving this email because of your account on gitlab.torproject.org. ___ tor-commits mailing list tor-commits@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits
[tor-commits] [Git][tpo/applications/tor-browser][base-browser-115.6.0esr-13.0-1] 96 commits: Bug 1819160 - Map Android ids to doc/accessible id pairs. r=Jamie
ma1 pushed to branch base-browser-115.6.0esr-13.0-1 at The Tor Project / Applications / Tor Browser Commits: 7a271e76 by Eitan Isaacson at 2023-12-12T10:11:36+01:00 Bug 1819160 - Map Android ids to doc/accessible id pairs. r=Jamie Differential Revision: https://phabricator.services.mozilla.com/D179737 - - - - - 1aeb8e9a by Pier Angelo Vendrame at 2023-12-12T10:11:38+01:00 Bug 1832523 - Allow using NSS to sign and verify MAR signatures. r=application-update-reviewers,glandium,bytesized Allow using NSS for checking MAR signatures also in platforms where OS-native APIs are used by default, i.e., macOS and Windows. Differential Revision: https://phabricator.services.mozilla.com/D177743 - - - - - b24d9851 by Pier Angelo Vendrame at 2023-12-12T10:11:39+01:00 Bug 1849129: Prevent exceptions caused by extensions from interrupting the SearchService initialization. r=search-reviewers,Standard8 Differential Revision: https://phabricator.services.mozilla.com/D186456 - - - - - 5a91e514 by Emilio Cobos Álvarez at 2023-12-12T10:11:40+01:00 Bug 1853731 - Use html:img for message-bar-icon. r=Gijs,dao,settings-reviewers,desktop-theme-reviewers,sfoster Differential Revision: https://phabricator.services.mozilla.com/D188521 - - - - - 508750c9 by Pier Angelo Vendrame at 2023-12-12T10:11:42+01:00 Bug 1854117 - Sort the DLL blocklist flags. r=mossop,win-reviewers,gstoll Differential Revision: https://phabricator.services.mozilla.com/D188716 - - - - - 77de2fd4 by Eden Chuang at 2023-12-12T10:11:44+01:00 Bug 1738426 - Ignoring status 206 and vary header checking for opaque response in Cache API. r=asuth Differential Revision: https://phabricator.services.mozilla.com/D186431 - - - - - 67aded6b by edgul at 2023-12-12T10:11:45+01:00 Bug 1802057 - Block the following characters from use in the cookie name in the cookie string: 0x3B (semi-colon), 0x3D (equals), and 0x7F (del) r=dveditz,cookie-reviewers Differential Revision: https://phabricator.services.mozilla.com/D182373 - - - - - bbdd1c20 by Kelsey Gilbert at 2023-12-12T10:11:47+01:00 Bug 1819497 - Dont race on static bool for initialization. r=gfx-reviewers,aosmond We could do non-racy static init here (e.g. with a static initializer self-calling-closure), but there doesnt seem to be a strong reason for this. Lets just use a switch and get robustness from -Werror=switch. Differential Revision: https://phabricator.services.mozilla.com/D188054 - - - - - 74375e3e by Mark Banner at 2023-12-12T10:11:48+01:00 Bug 1845752. r=ckerschb Differential Revision: https://phabricator.services.mozilla.com/D186676 - - - - - 781671e6 by Bob Owen at 2023-12-12T10:11:50+01:00 Bug 1850072: Initialize RecordedDrawTargetCreation::mHasExistingData. r=jrmuizel This also specializes ElementStreamFormat for bool. Differential Revision: https://phabricator.services.mozilla.com/D187794 - - - - - b490578e by Malte Juergens at 2023-12-12T10:11:51+01:00 Bug 1850200 - Add delay to HTTPS-Only Continue to HTTPS Site button r=freddyb Differential Revision: https://phabricator.services.mozilla.com/D187887 - - - - - 8c6e9d8b by Andreas Pehrson at 2023-12-12T10:11:52+01:00 Bug 1851803 - Introduce SourceMediaTrack::mDirectDisabledMode. r=karlt Similar to MediaTrack::mDisabledMode, but this is for uses on the SourceMediaTrack producer thread. It is still signaled via a control message from the control thread to maintain order of operations, and is protected by the SourceMediaTrack mutex. Differential Revision: https://phabricator.services.mozilla.com/D187554 - - - - - 08194c97 by Henry Wilkes at 2023-12-12T10:11:54+01:00 Bug 41454: Move focus after calling openPreferences for a sub-category. Temporary fix until mozilla bug 1799153 gets a patch upstream. - - - - - f1e6fccb by hackademix at 2023-12-12T10:11:55+01:00 Bug 42194: Fix blank net error page on failed DNS resolution with active proxy. - - - - - aea0ac32 by Henry Wilkes at 2023-12-12T10:11:57+01:00 Bug 41483: Remove the firefox override for appstrings.properties Remove this patch after upstream bugzilla bug 1790187 - - - - - aa213fc6 by Pier Angelo Vendrame at 2023-12-12T10:11:58+01:00 Bug 41116: Normalize system fonts. System fonts are an enormous fingerprinting vector. Even with font allow lists and with our custom configuration on Linux, which counter metrics measurements, getComputedStyle leaks several details. This patch counters both these kinds of attacks. - - - - - f23d0f24 by Marco Simonelli at 2023-12-12T10:12:00+01:00 Bug 41459: WebRTC fails to build under mingw (Part 1) - properly define NOMINMAX for just MSVC builds - - - - - 04147c9d by Marco Simonelli at 2023-12-12T10:12:02+01:00 Bug 41459: WebRTC fails to build under mingw (Part 2) - fixes required to build third_party/libwebrtc - - - - - bba03917 by Marco Simonelli at 2023-12-12T10:12:03+01:00 Bug 41459: WebRTC fails to build under mingw (Part 3) - fixes required to build third_party/sipcc - - - - - dac39a70 by Marco Simonelli at 2023-12-12T10:12:04+01:00
[tor-commits] [Git][tpo/applications/tor-browser] Pushed new tag tor-browser-115.6.0esr-13.0-1-build1
ma1 pushed new tag tor-browser-115.6.0esr-13.0-1-build1 at The Tor Project / Applications / Tor Browser -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/tree/tor-browser-115.6.0esr-13.0-1-build1 You're receiving this email because of your account on gitlab.torproject.org. ___ tor-commits mailing list tor-commits@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits
[tor-commits] [Git][tpo/applications/tor-browser] Pushed new tag base-browser-115.6.0esr-13.0-1-build1
ma1 pushed new tag base-browser-115.6.0esr-13.0-1-build1 at The Tor Project / Applications / Tor Browser -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/tree/base-browser-115.6.0esr-13.0-1-build1 You're receiving this email because of your account on gitlab.torproject.org. ___ tor-commits mailing list tor-commits@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits
[tor-commits] [Git][tpo/applications/mullvad-browser] Pushed new branch mullvad-browser-115.6.0esr-13.0-1
ma1 pushed new branch mullvad-browser-115.6.0esr-13.0-1 at The Tor Project / Applications / Mullvad Browser -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/tree/mullvad-browser-115.6.0esr-13.0-1 You're receiving this email because of your account on gitlab.torproject.org. ___ tor-commits mailing list tor-commits@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits
[tor-commits] [Git][tpo/applications/tor-browser-build][maint-13.0] Bug 41050: Improve disk leak sanitization on startup.
ma1 pushed to branch maint-13.0 at The Tor Project / Applications / tor-browser-build Commits: 8ebeb4d1 by hackademix at 2023-12-19T17:15:07+01:00 Bug 41050: Improve disk leak sanitization on startup. - - - - - 1 changed file: - projects/browser/RelativeLink/start-browser Changes: = projects/browser/RelativeLink/start-browser = @@ -258,18 +258,32 @@ HOME="${PWD}" export HOME # Prevent disk leaks in $HOME/.local/share (tor-browser#17560) +function erase_leaky() { + local leaky="$1" + [ -e "$leaky" ] && + ( srm -r "$leaky" || + wipe -r "$leaky" || + find "$leaky" -type f -exec shred -u {} \; ; + rm -rf "$leaky" + ) > /dev/null 2>&1 +} local_dir="$HOME/.local/" share_dir="$local_dir/share" -if [ -d "$share_dir" ]; then -( srm -r "$share_dir" || - wipe -r "$share_dir" || - find "$share_dir" -type f -exec shred -u {} \; ; - rm -rf "$share_dir" -) > /dev/null 2>&1 -else -mkdir -p "$local_dir" +# We don't want to mess with symlinks, possibly pointing outside the +# Browser directory (tor-browser-build#41050). +# We're not using realpath/readlink for consistency with the (possibly +# outdated) availability assumptions made elsewhere in this script. +if ! [ -L "$local_dir" -o -L "$share_dir" ]; then + if [ -d "$share_dir" ]; then + for leaky_path in "gvfs-metadata" "recently-used.xbel"; do + erase_leaky "$share_dir/$leaky_path" + done + else + mkdir -p "$local_dir" + fi + ln -fs /dev/null "$share_dir" fi -ln -fs /dev/null "$share_dir" +[ -L "$HOME/.cache" ] || erase_leaky "$HOME/.cache/nvidia" [% IF c("var/tor-browser") -%] SYSARCHITECTURE=$(getconf LONG_BIT) View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/commit/8ebeb4d1651dfbd73d96df293e115835ccf7de83 -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/commit/8ebeb4d1651dfbd73d96df293e115835ccf7de83 You're receiving this email because of your account on gitlab.torproject.org. ___ tor-commits mailing list tor-commits@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits
[tor-commits] [Git][tpo/applications/firefox-android][firefox-android-115.2.1-13.5-1] fixup! Modify add-on support
ma1 pushed to branch firefox-android-115.2.1-13.5-1 at The Tor Project / Applications / firefox-android Commits: be02ec86 by hackademix at 2023-12-30T19:51:11+01:00 fixup! Modify add-on support Bug 42353: Fix NoScript automatic updates. - - - - - 1 changed file: - fenix/app/src/main/java/org/mozilla/fenix/components/TorBrowserFeatures.kt Changes: = fenix/app/src/main/java/org/mozilla/fenix/components/TorBrowserFeatures.kt = @@ -136,37 +136,37 @@ object TorBrowserFeatures { } /** - * If we have not done it yet, enable automatic updates for NoScript and force a + * Enable automatic updates for NoScript and, if we've not done it yet, force a * one-time immediate update check, in order to upgrade old profiles and ensure we've got * the latest stable AMO version available on first startup. * We will do it as soon as the Tor is connected, to prevent early addonUpdater activation * causing automatic update checks failures (components.addonUpdater being a lazy prop). * The extension, from then on, should behave as if the user had installed it manually. */ -if (settings.noscriptUpdated == 0) { -context.components.torController.registerTorListener(object : TorEvents { -override fun onTorConnected() { - context.components.torController.unregisterTorListener(this) -// Enable automatic updates - context.components.addonUpdater.registerForFutureUpdates(NOSCRIPT_ID) -// Force an immediate update check +context.components.torController.registerTorListener(object : TorEvents { +override fun onTorConnected() { +context.components.torController.unregisterTorListener(this) +// Enable automatic updates. This must be done on every startup (tor-browser#42353) + context.components.addonUpdater.registerForFutureUpdates(NOSCRIPT_ID) +// Force a one-time immediate update check for older installations +if (settings.noscriptUpdated < 2) { context.components.addonUpdater.update(NOSCRIPT_ID) -settings.noscriptUpdated = 1 +settings.noscriptUpdated = 2 } +} -@SuppressWarnings("EmptyFunctionBlock") -override fun onTorConnecting() { -} +@SuppressWarnings("EmptyFunctionBlock") +override fun onTorConnecting() { +} -@SuppressWarnings("EmptyFunctionBlock") -override fun onTorStopped() { -} +@SuppressWarnings("EmptyFunctionBlock") +override fun onTorStopped() { +} -@SuppressWarnings("EmptyFunctionBlock") -override fun onTorStatusUpdate(entry: String?, status: String?) { -} -}) -} +@SuppressWarnings("EmptyFunctionBlock") +override fun onTorStatusUpdate(entry: String?, status: String?) { +} +}) } View it on GitLab: https://gitlab.torproject.org/tpo/applications/firefox-android/-/commit/be02ec8601e43571da6c25a504f4633e54fd72e7 -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/firefox-android/-/commit/be02ec8601e43571da6c25a504f4633e54fd72e7 You're receiving this email because of your account on gitlab.torproject.org. ___ tor-commits mailing list tor-commits@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits
[tor-commits] [Git][tpo/applications/firefox-android][firefox-android-115.2.1-13.0-1] fixup! Modify add-on support
ma1 pushed to branch firefox-android-115.2.1-13.0-1 at The Tor Project / Applications / firefox-android Commits: cb98e7b2 by hackademix at 2024-01-08T19:54:56+01:00 fixup! Modify add-on support Bug 42353: Fix NoScript automatic updates. - - - - - 1 changed file: - fenix/app/src/main/java/org/mozilla/fenix/components/TorBrowserFeatures.kt Changes: = fenix/app/src/main/java/org/mozilla/fenix/components/TorBrowserFeatures.kt = @@ -136,37 +136,37 @@ object TorBrowserFeatures { } /** - * If we have not done it yet, enable automatic updates for NoScript and force a + * Enable automatic updates for NoScript and, if we've not done it yet, force a * one-time immediate update check, in order to upgrade old profiles and ensure we've got * the latest stable AMO version available on first startup. * We will do it as soon as the Tor is connected, to prevent early addonUpdater activation * causing automatic update checks failures (components.addonUpdater being a lazy prop). * The extension, from then on, should behave as if the user had installed it manually. */ -if (settings.noscriptUpdated == 0) { -context.components.torController.registerTorListener(object : TorEvents { -override fun onTorConnected() { - context.components.torController.unregisterTorListener(this) -// Enable automatic updates - context.components.addonUpdater.registerForFutureUpdates(NOSCRIPT_ID) -// Force an immediate update check +context.components.torController.registerTorListener(object : TorEvents { +override fun onTorConnected() { +context.components.torController.unregisterTorListener(this) +// Enable automatic updates. This must be done on every startup (tor-browser#42353) + context.components.addonUpdater.registerForFutureUpdates(NOSCRIPT_ID) +// Force a one-time immediate update check for older installations +if (settings.noscriptUpdated < 2) { context.components.addonUpdater.update(NOSCRIPT_ID) -settings.noscriptUpdated = 1 +settings.noscriptUpdated = 2 } +} -@SuppressWarnings("EmptyFunctionBlock") -override fun onTorConnecting() { -} +@SuppressWarnings("EmptyFunctionBlock") +override fun onTorConnecting() { +} -@SuppressWarnings("EmptyFunctionBlock") -override fun onTorStopped() { -} +@SuppressWarnings("EmptyFunctionBlock") +override fun onTorStopped() { +} -@SuppressWarnings("EmptyFunctionBlock") -override fun onTorStatusUpdate(entry: String?, status: String?) { -} -}) -} +@SuppressWarnings("EmptyFunctionBlock") +override fun onTorStatusUpdate(entry: String?, status: String?) { +} +}) } View it on GitLab: https://gitlab.torproject.org/tpo/applications/firefox-android/-/commit/cb98e7b217abdf3c675856a7bbb0386748bfb987 -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/firefox-android/-/commit/cb98e7b217abdf3c675856a7bbb0386748bfb987 You're receiving this email because of your account on gitlab.torproject.org. ___ tor-commits mailing list tor-commits@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits
[tor-commits] [Git][tpo/applications/firefox-android][firefox-android-115.2.1-13.5-1] 2 commits: fixup! Bug 1823316 - Use 'Snackbar' themed Dialog to notify on making app full-screen
ma1 pushed to branch firefox-android-115.2.1-13.5-1 at The Tor Project / Applications / firefox-android Commits: a57e5d10 by hackademix at 2024-01-10T08:41:06+01:00 fixup! Bug 1823316 - Use Snackbar themed Dialog to notify on making app full-screen Fix tor-browser#42355 backporting regression. - - - - - c1397e81 by t-p-white at 2024-01-10T08:41:06+01:00 Bug 1864549 - Fix for IllegalStateException in full screen notification dialog - - - - - 2 changed files: - android-components/components/feature/prompts/src/main/java/mozilla/components/feature/prompts/dialog/FullScreenNotificationDialog.kt - fenix/app/src/main/java/org/mozilla/fenix/browser/BaseBrowserFragment.kt Changes: = android-components/components/feature/prompts/src/main/java/mozilla/components/feature/prompts/dialog/FullScreenNotificationDialog.kt = @@ -59,11 +59,12 @@ class FullScreenNotificationDialog(@LayoutRes val layout: Int) : window.setGravity(Gravity.BOTTOM) window.clearFlags(WindowManager.LayoutParams.FLAG_DIM_BEHIND) } +} -lifecycleScope.launch { -delay(SNACKBAR_DURATION_LONG_MS) -dismiss() -} +// Attempt to automatically dismiss the dialog after the given duration. +lifecycleScope.launch { +delay(SNACKBAR_DURATION_LONG_MS) +dialog?.dismiss() } } } = fenix/app/src/main/java/org/mozilla/fenix/browser/BaseBrowserFragment.kt = @@ -1491,6 +1491,7 @@ abstract class BaseBrowserFragment : parentFragmentManager, ) +activity?.enterToImmersiveMode() (view as? SwipeGestureLayout)?.isSwipeEnabled = false browserToolbarView.collapse() browserToolbarView.view.isVisible = false View it on GitLab: https://gitlab.torproject.org/tpo/applications/firefox-android/-/compare/be02ec8601e43571da6c25a504f4633e54fd72e7...c1397e812f0a6cecfc44af411d6b7f222fc99164 -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/firefox-android/-/compare/be02ec8601e43571da6c25a504f4633e54fd72e7...c1397e812f0a6cecfc44af411d6b7f222fc99164 You're receiving this email because of your account on gitlab.torproject.org. ___ tor-commits mailing list tor-commits@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits
[tor-commits] [Git][tpo/applications/firefox-android][firefox-android-115.2.1-13.0-1] 10 commits: fixup! Bug 1823316 - Use 'Snackbar' themed Dialog to notify on making app full-screen
ma1 pushed to branch firefox-android-115.2.1-13.0-1 at The Tor Project / Applications / firefox-android Commits: 753c937e by hackademix at 2024-01-11T16:53:03+01:00 fixup! Bug 1823316 - Use Snackbar themed Dialog to notify on making app full-screen Fix tor-browser#42355 backporting regression. - - - - - 0cd27910 by t-p-white at 2024-01-11T16:53:04+01:00 Bug 1864549 - Fix for IllegalStateException in full screen notification dialog - - - - - a7cafd1b by Alexandru2909 at 2024-01-11T16:53:04+01:00 Bug 1810776 - Move DismissedTabBackground into its own file - - - - - e40a62ad by DreVla at 2024-01-11T16:53:05+01:00 Bug 1828493 - Apply purple overlay on list item when in multi-select When having the list layout for tabs tray and entering multi-select mode, the selected list items should have a purple non opaque overlay on the thumbnail, as it was before in the XML implementation. - - - - - b4e5ab52 by Alexandru2909 at 2024-01-11T16:53:05+01:00 Bug 1810776 - Add SwipeToDismiss to composed tabs tray - - - - - 20a18e5b by Noah Bond at 2024-01-11T16:53:05+01:00 Bug 1815579 - Improve performance of image loading in tab items - - - - - a07ec0d9 by Noah Bond at 2024-01-11T16:53:06+01:00 Bug 1840896 - Remove `rememberSaveable` since bitmaps are not serializable - - - - - a860d4a3 by Noah Bond at 2024-01-11T16:53:06+01:00 Bug 1844967 - Improve performance of tab thumbnail loading in Compose - - - - - 0481dabe by Matthew Tighe at 2024-01-11T16:53:07+01:00 Bug 1721904 - update thumbnail caching on app open - - - - - 3400c111 by hackademix at 2024-01-11T16:53:07+01:00 Bug 42191: Temporary StrictMode relaxation to clear the thumbnail cache. - - - - - 30 changed files: - android-components/components/browser/state/src/main/java/mozilla/components/browser/state/action/BrowserAction.kt - android-components/components/browser/state/src/main/java/mozilla/components/browser/state/reducer/ContentStateReducer.kt - android-components/components/browser/tabstray/src/main/java/mozilla/components/browser/tabstray/TabViewHolder.kt - android-components/components/browser/tabstray/src/test/java/mozilla/components/browser/tabstray/DefaultTabViewHolderTest.kt - android-components/components/browser/thumbnails/src/main/java/mozilla/components/browser/thumbnails/ThumbnailsMiddleware.kt - android-components/components/browser/thumbnails/src/main/java/mozilla/components/browser/thumbnails/storage/ThumbnailStorage.kt - android-components/components/browser/thumbnails/src/main/java/mozilla/components/browser/thumbnails/utils/ThumbnailDiskCache.kt - android-components/components/browser/thumbnails/src/test/java/mozilla/components/browser/thumbnails/ThumbnailsMiddlewareTest.kt - android-components/components/browser/thumbnails/src/test/java/mozilla/components/browser/thumbnails/loader/ThumbnailLoaderTest.kt - android-components/components/browser/thumbnails/src/test/java/mozilla/components/browser/thumbnails/storage/ThumbnailStorageTest.kt - android-components/components/browser/thumbnails/src/test/java/mozilla/components/browser/thumbnails/utils/ThumbnailDiskCacheTest.kt - android-components/components/concept/base/src/main/java/mozilla/components/concept/base/images/ImageRequest.kt - android-components/components/feature/prompts/src/main/java/mozilla/components/feature/prompts/dialog/FullScreenNotificationDialog.kt - fenix/app/src/main/java/org/mozilla/fenix/browser/BaseBrowserFragment.kt - fenix/app/src/main/java/org/mozilla/fenix/browser/TabPreview.kt - fenix/app/src/main/java/org/mozilla/fenix/browser/ToolbarGestureHandler.kt - + fenix/app/src/main/java/org/mozilla/fenix/compose/SwipeToDismiss.kt - + fenix/app/src/main/java/org/mozilla/fenix/compose/TabThumbnail.kt - fenix/app/src/main/java/org/mozilla/fenix/compose/ThumbnailCard.kt - + fenix/app/src/main/java/org/mozilla/fenix/compose/ThumbnailImage.kt - fenix/app/src/main/java/org/mozilla/fenix/compose/list/ListItem.kt - + fenix/app/src/main/java/org/mozilla/fenix/compose/tabstray/DismissedTabBackground.kt - fenix/app/src/main/java/org/mozilla/fenix/compose/tabstray/TabGridItem.kt - fenix/app/src/main/java/org/mozilla/fenix/compose/tabstray/TabListItem.kt - fenix/app/src/main/java/org/mozilla/fenix/home/collections/CollectionItem.kt - fenix/app/src/main/java/org/mozilla/fenix/home/recentsyncedtabs/view/RecentSyncedTab.kt - fenix/app/src/main/java/org/mozilla/fenix/home/recentsyncedtabs/view/RecentSyncedTabViewHolder.kt - fenix/app/src/main/java/org/mozilla/fenix/home/recenttabs/view/RecentTabViewHolder.kt - fenix/app/src/main/java/org/mozilla/fenix/home/recenttabs/view/RecentTabs.kt - fenix/app/src/main/java/org/mozilla/fenix/tabstray/TabsTray.kt The diff was not included because it is too large. View it on GitLab: https://gitlab.torproject.org/tpo/applications/firefox-android/-/compare/dadeaa78a62f166eebbeb100f43ab73ba9ba995e...3400c111a643a01594f3a4818fd21e78c6a9c9ed -- View it on GitLab:
[tor-commits] [Git][tpo/applications/tor-browser-build][maint-13.0] Bug 17560: prevent disk leaks in $HOME/.local/share.
ma1 pushed to branch maint-13.0 at The Tor Project / Applications / tor-browser-build Commits: eb925334 by hackademix at 2023-11-29T23:53:35+01:00 Bug 17560: prevent disk leaks in $HOME/.local/share. - - - - - 2 changed files: - projects/browser/RelativeLink/start-browser - projects/browser/gtk3-settings.ini Changes: = projects/browser/RelativeLink/start-browser = @@ -257,6 +257,20 @@ fi HOME="${PWD}" export HOME +# Prevent disk leaks in $HOME/.local/share (tor-browser#17560) +local_dir="$HOME/.local/" +share_dir="$local_dir/share" +if [ -d "$share_dir" ]; then +( srm -r "$share_dir" || + wipe -r "$share_dir" || + find "$share_dir" -type f -exec shred -u {} \; ; + rm -rf "$share_dir" +) > /dev/null 2>&1 +else +mkdir -p "$local_dir" +fi +ln -fs /dev/null "$share_dir" + [% IF c("var/tor-browser") -%] SYSARCHITECTURE=$(getconf LONG_BIT) TORARCHITECTURE=$(expr "$(file TorBrowser/Tor/tor)" : '.*ELF \([[:digit:]]*\)') = projects/browser/gtk3-settings.ini = @@ -1,2 +1,4 @@ [Settings] gtk-primary-button-warps-slider = false +gtk-recent-files-max-age=0 +gtk-recent-files-limit=0 View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/commit/eb9253345ef4d18dbd2edec19b4abd331a443fb2 -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/commit/eb9253345ef4d18dbd2edec19b4abd331a443fb2 You're receiving this email because of your account on gitlab.torproject.org. ___ tor-commits mailing list tor-commits@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits
[tor-commits] [Git][tpo/applications/tor-browser-build] Pushed new tag tbb-13.0.6-build1
ma1 pushed new tag tbb-13.0.6-build1 at The Tor Project / Applications / tor-browser-build -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/tree/tbb-13.0.6-build1 You're receiving this email because of your account on gitlab.torproject.org. ___ tor-commits mailing list tor-commits@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits
[tor-commits] [Git][tpo/applications/tor-browser-build] Pushed new tag mb-13.0.6-build1
ma1 pushed new tag mb-13.0.6-build1 at The Tor Project / Applications / tor-browser-build -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/tree/mb-13.0.6-build1 You're receiving this email because of your account on gitlab.torproject.org. ___ tor-commits mailing list tor-commits@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits
[tor-commits] [Git][tpo/applications/tor-browser][tor-browser-115.5.0esr-13.0-1] fixup! Bug 23247: Communicating security expectations for .onion
ma1 pushed to branch tor-browser-115.5.0esr-13.0-1 at The Tor Project / Applications / Tor Browser Commits: 91e057ca by cypherpunks1 at 2023-12-04T13:06:55+01:00 fixup! Bug 23247: Communicating security expectations for .onion Bug 42231: Improve the network monitor patch for http onion resources - - - - - 2 changed files: - devtools/client/netmonitor/src/components/SecurityState.js - devtools/shared/network-observer/NetworkHelper.sys.mjs Changes: = devtools/client/netmonitor/src/components/SecurityState.js = @@ -41,7 +41,7 @@ class SecurityState extends Component { const { securityState, - urlDetails: { isLocal }, + urlDetails: { host, isLocal }, } = item; const iconClassList = ["requests-security-state-icon"]; @@ -50,7 +50,11 @@ class SecurityState extends Component { // Locally delivered files such as http://localhost and file:// paths // are considered to have been delivered securely. -if (isLocal) { +if ( + isLocal || + (host?.endsWith(".onion") && +Services.prefs.getBoolPref("dom.securecontext.allowlist_onions", false)) +) { realSecurityState = "secure"; } = devtools/shared/network-observer/NetworkHelper.sys.mjs = @@ -596,9 +596,6 @@ export var NetworkHelper = { // The request did not contain any security info. if (!securityInfo) { - if (httpActivity.hostname && httpActivity.hostname.endsWith(".onion")) { -info.state = "secure"; - } return info; } @@ -650,11 +647,7 @@ export var NetworkHelper = { // schemes other than https and wss are subject to // downgrade/etc at the scheme level and should always be // considered insecure -if (httpActivity.hostname && httpActivity.hostname.endsWith(".onion")) { - info.state = "secure"; -} else { - info.state = "insecure"; -} +info.state = "insecure"; } else if (state & wpl.STATE_IS_SECURE) { // The connection is secure if the scheme is sufficient info.state = "secure"; View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/91e057ca292b1231023c37c2baf5f23f3729d5ea -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/91e057ca292b1231023c37c2baf5f23f3729d5ea You're receiving this email because of your account on gitlab.torproject.org. ___ tor-commits mailing list tor-commits@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits
[tor-commits] [Git][tpo/applications/tor-browser] Pushed new tag tor-browser-115.5.0esr-13.0-1-build4
ma1 pushed new tag tor-browser-115.5.0esr-13.0-1-build4 at The Tor Project / Applications / Tor Browser -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/tree/tor-browser-115.5.0esr-13.0-1-build4 You're receiving this email because of your account on gitlab.torproject.org. ___ tor-commits mailing list tor-commits@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits
[tor-commits] [Git][tpo/applications/mullvad-browser] Pushed new tag mullvad-browser-115.5.0esr-13.0-1-build3
ma1 pushed new tag mullvad-browser-115.5.0esr-13.0-1-build3 at The Tor Project / Applications / Mullvad Browser -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/tree/mullvad-browser-115.5.0esr-13.0-1-build3 You're receiving this email because of your account on gitlab.torproject.org. ___ tor-commits mailing list tor-commits@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits
[tor-commits] [Git][tpo/applications/tor-browser][tor-browser-115.7.0esr-13.5-1] Bug 1867408 - NSS backport
ma1 pushed to branch tor-browser-115.7.0esr-13.5-1 at The Tor Project / Applications / Tor Browser Commits: cbeecf99 by hackademix at 2024-01-22T16:29:11+01:00 Bug 1867408 - NSS backport - - - - - 1 changed file: - security/nss/lib/ssl/sslsecur.c Changes: = security/nss/lib/ssl/sslsecur.c = @@ -488,7 +488,12 @@ ssl_SendSavedWriteData(sslSocket *ss) if (rv < 0) { return rv; } -ss->pendingBuf.len -= rv; +if (rv > ss->pendingBuf.len) { +PORT_Assert(0); /* This shouldn't happen */ +ss->pendingBuf.len = 0; +} else { +ss->pendingBuf.len -= rv; +} if (ss->pendingBuf.len > 0 && rv > 0) { /* UGH !! This shifts the whole buffer down by copying it */ PORT_Memmove(ss->pendingBuf.buf, ss->pendingBuf.buf + rv, View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/cbeecf99ee499c4f1d428f105ad86d0f6762f64a -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/cbeecf99ee499c4f1d428f105ad86d0f6762f64a You're receiving this email because of your account on gitlab.torproject.org. ___ tor-commits mailing list tor-commits@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits
[tor-commits] [Git][tpo/applications/tor-browser][base-browser-115.7.0esr-13.5-1] Bug 1867408 - NSS backport
ma1 pushed to branch base-browser-115.7.0esr-13.5-1 at The Tor Project / Applications / Tor Browser Commits: eed2de42 by hackademix at 2024-01-22T16:56:41+01:00 Bug 1867408 - NSS backport - - - - - 1 changed file: - security/nss/lib/ssl/sslsecur.c Changes: = security/nss/lib/ssl/sslsecur.c = @@ -488,7 +488,12 @@ ssl_SendSavedWriteData(sslSocket *ss) if (rv < 0) { return rv; } -ss->pendingBuf.len -= rv; +if (rv > ss->pendingBuf.len) { +PORT_Assert(0); /* This shouldn't happen */ +ss->pendingBuf.len = 0; +} else { +ss->pendingBuf.len -= rv; +} if (ss->pendingBuf.len > 0 && rv > 0) { /* UGH !! This shifts the whole buffer down by copying it */ PORT_Memmove(ss->pendingBuf.buf, ss->pendingBuf.buf + rv, View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/eed2de42dbce5898281b4987eecf29fed0303769 -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/eed2de42dbce5898281b4987eecf29fed0303769 You're receiving this email because of your account on gitlab.torproject.org. ___ tor-commits mailing list tor-commits@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits
[tor-commits] [Git][tpo/applications/mullvad-browser][mullvad-browser-115.7.0esr-13.5-1] Bug 1867408 - NSS backport
ma1 pushed to branch mullvad-browser-115.7.0esr-13.5-1 at The Tor Project / Applications / Mullvad Browser Commits: 00f5c6d8 by hackademix at 2024-01-22T17:00:26+01:00 Bug 1867408 - NSS backport - - - - - 1 changed file: - security/nss/lib/ssl/sslsecur.c Changes: = security/nss/lib/ssl/sslsecur.c = @@ -488,7 +488,12 @@ ssl_SendSavedWriteData(sslSocket *ss) if (rv < 0) { return rv; } -ss->pendingBuf.len -= rv; +if (rv > ss->pendingBuf.len) { +PORT_Assert(0); /* This shouldn't happen */ +ss->pendingBuf.len = 0; +} else { +ss->pendingBuf.len -= rv; +} if (ss->pendingBuf.len > 0 && rv > 0) { /* UGH !! This shifts the whole buffer down by copying it */ PORT_Memmove(ss->pendingBuf.buf, ss->pendingBuf.buf + rv, View it on GitLab: https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/00f5c6d87febe04ecaa181a892fcb01ff1f6526d -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/00f5c6d87febe04ecaa181a892fcb01ff1f6526d You're receiving this email because of your account on gitlab.torproject.org. ___ tor-commits mailing list tor-commits@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits
[tor-commits] [Git][tpo/applications/tor-browser][base-browser-115.7.0esr-13.0-1] Bug 1867408 - NSS backport
ma1 pushed to branch base-browser-115.7.0esr-13.0-1 at The Tor Project / Applications / Tor Browser Commits: 6c906dba by hackademix at 2024-01-22T16:46:05+01:00 Bug 1867408 - NSS backport - - - - - 1 changed file: - security/nss/lib/ssl/sslsecur.c Changes: = security/nss/lib/ssl/sslsecur.c = @@ -488,7 +488,12 @@ ssl_SendSavedWriteData(sslSocket *ss) if (rv < 0) { return rv; } -ss->pendingBuf.len -= rv; +if (rv > ss->pendingBuf.len) { +PORT_Assert(0); /* This shouldn't happen */ +ss->pendingBuf.len = 0; +} else { +ss->pendingBuf.len -= rv; +} if (ss->pendingBuf.len > 0 && rv > 0) { /* UGH !! This shifts the whole buffer down by copying it */ PORT_Memmove(ss->pendingBuf.buf, ss->pendingBuf.buf + rv, View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/6c906dba9373f791bf5b3ef99d57d334274dea20 -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/6c906dba9373f791bf5b3ef99d57d334274dea20 You're receiving this email because of your account on gitlab.torproject.org. ___ tor-commits mailing list tor-commits@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits
[tor-commits] [Git][tpo/applications/mullvad-browser][mullvad-browser-115.7.0esr-13.0-1] Bug 1867408 - NSS backport
ma1 pushed to branch mullvad-browser-115.7.0esr-13.0-1 at The Tor Project / Applications / Mullvad Browser Commits: e0af4349 by hackademix at 2024-01-22T16:57:26+01:00 Bug 1867408 - NSS backport - - - - - 1 changed file: - security/nss/lib/ssl/sslsecur.c Changes: = security/nss/lib/ssl/sslsecur.c = @@ -488,7 +488,12 @@ ssl_SendSavedWriteData(sslSocket *ss) if (rv < 0) { return rv; } -ss->pendingBuf.len -= rv; +if (rv > ss->pendingBuf.len) { +PORT_Assert(0); /* This shouldn't happen */ +ss->pendingBuf.len = 0; +} else { +ss->pendingBuf.len -= rv; +} if (ss->pendingBuf.len > 0 && rv > 0) { /* UGH !! This shifts the whole buffer down by copying it */ PORT_Memmove(ss->pendingBuf.buf, ss->pendingBuf.buf + rv, View it on GitLab: https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/e0af43495ec05b2f0b4a4f035ca4ca6935b54307 -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/e0af43495ec05b2f0b4a4f035ca4ca6935b54307 You're receiving this email because of your account on gitlab.torproject.org. ___ tor-commits mailing list tor-commits@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits
[tor-commits] [Git][tpo/applications/tor-browser] Pushed new tag tor-browser-115.5.0esr-13.0-1-build2
ma1 pushed new tag tor-browser-115.5.0esr-13.0-1-build2 at The Tor Project / Applications / Tor Browser -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/tree/tor-browser-115.5.0esr-13.0-1-build2 You're receiving this email because of your account on gitlab.torproject.org. ___ tor-commits mailing list tor-commits@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits
[tor-commits] [Git][tpo/applications/tor-browser] Pushed new tag base-browser-115.5.0esr-13.0-1-build2
ma1 pushed new tag base-browser-115.5.0esr-13.0-1-build2 at The Tor Project / Applications / Tor Browser -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/tree/base-browser-115.5.0esr-13.0-1-build2 You're receiving this email because of your account on gitlab.torproject.org. ___ tor-commits mailing list tor-commits@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits