[tor-commits] [Git][tpo/applications/tor-browser][tor-browser-115.2.0esr-13.0-1] Bug 42084: Ensure spoofing works even if preferences are set out of order.

2023-09-12 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch tor-browser-115.2.0esr-13.0-1 at The Tor Project / 
Applications / Tor Browser


Commits:
8cff1681 by hackademix at 2023-09-12T10:37:14+02:00
Bug 42084: Ensure spoofing works even if preferences are set out of order.

- - - - -


1 changed file:

- toolkit/components/resistfingerprinting/RFPHelper.sys.mjs


Changes:

=
toolkit/components/resistfingerprinting/RFPHelper.sys.mjs
=
@@ -158,6 +158,9 @@ class _RFPHelper {
 // Add RFP and Letterboxing observers if prefs are enabled
 this._handleResistFingerprintingChanged();
 this._handleLetterboxingPrefChanged();
+
+// Synchronize language preferences if accidentally messed up 
(tor-browser#42084)
+this._handleSpoofEnglishChanged();
   }
 
   uninit() {
@@ -211,6 +214,7 @@ class _RFPHelper {
 this._handleResistFingerprintingChanged();
 break;
   case kPrefSpoofEnglish:
+  case "intl.accept_languages":
 this._handleSpoofEnglishChanged();
 break;
   case kPrefLetterboxing:
@@ -259,6 +263,7 @@ class _RFPHelper {
   }
 
   _handleSpoofEnglishChanged() {
+Services.prefs.removeObserver("intl.accept_languages", this);
 switch (Services.prefs.getIntPref(kPrefSpoofEnglish)) {
   case 0: // will prompt
   // This should only happen when turning privacy.resistFingerprinting off.
@@ -277,6 +282,8 @@ class _RFPHelper {
   case 2: // spoof
 Services.prefs.setCharPref("intl.accept_languages", "en-US, en");
 Services.prefs.setBoolPref("javascript.use_us_english_locale", true);
+// Ensure spoofing works if preferences are set out of order
+Services.prefs.addObserver("intl.accept_languages", this);
 break;
   default:
 break;



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/8cff1681b5043289085fa21e1a1927c59e5b4c47

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/8cff1681b5043289085fa21e1a1927c59e5b4c47
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][base-browser-102.15.0esr-12.5-1] Bug 42084: Ensure spoofing works even if preferences are set out of order.

2023-09-12 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch base-browser-102.15.0esr-12.5-1 at The Tor Project / 
Applications / Tor Browser


Commits:
60d54c03 by hackademix at 2023-09-12T11:15:40+02:00
Bug 42084: Ensure spoofing works even if preferences are set out of order.

- - - - -


1 changed file:

- toolkit/components/resistfingerprinting/RFPHelper.jsm


Changes:

=
toolkit/components/resistfingerprinting/RFPHelper.jsm
=
@@ -163,6 +163,9 @@ class _RFPHelper {
 // Add RFP and Letterboxing observers if prefs are enabled
 this._handleResistFingerprintingChanged();
 this._handleLetterboxingPrefChanged();
+
+// Synchronize language preferences if accidentally messed up 
(tor-browser#42084)
+this._handleSpoofEnglishChanged();
   }
 
   uninit() {
@@ -216,6 +219,7 @@ class _RFPHelper {
 this._handleResistFingerprintingChanged();
 break;
   case kPrefSpoofEnglish:
+  case "intl.accept_languages":
 this._handleSpoofEnglishChanged();
 break;
   case kPrefLetterboxing:
@@ -264,6 +268,7 @@ class _RFPHelper {
   }
 
   _handleSpoofEnglishChanged() {
+Services.prefs.removeObserver("intl.accept_languages", this);
 switch (Services.prefs.getIntPref(kPrefSpoofEnglish)) {
   case 0: // will prompt
   // This should only happen when turning privacy.resistFingerprinting off.
@@ -282,6 +287,8 @@ class _RFPHelper {
   case 2: // spoof
 Services.prefs.setCharPref("intl.accept_languages", "en-US, en");
 Services.prefs.setBoolPref("javascript.use_us_english_locale", true);
+// Ensure spoofing works if preferences are set out of order
+Services.prefs.addObserver("intl.accept_languages", this);
 break;
   default:
 break;



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/60d54c0397f07788859617643d26c9f7db8d05c2

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/60d54c0397f07788859617643d26c9f7db8d05c2
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][tor-browser-102.15.0esr-12.5-1] Bug 42084: Ensure spoofing works even if preferences are set out of order.

2023-09-12 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch tor-browser-102.15.0esr-12.5-1 at The Tor Project / 
Applications / Tor Browser


Commits:
6f9146d0 by hackademix at 2023-09-12T11:11:13+02:00
Bug 42084: Ensure spoofing works even if preferences are set out of order.

- - - - -


1 changed file:

- toolkit/components/resistfingerprinting/RFPHelper.jsm


Changes:

=
toolkit/components/resistfingerprinting/RFPHelper.jsm
=
@@ -163,6 +163,9 @@ class _RFPHelper {
 // Add RFP and Letterboxing observers if prefs are enabled
 this._handleResistFingerprintingChanged();
 this._handleLetterboxingPrefChanged();
+
+// Synchronize language preferences if accidentally messed up 
(tor-browser#42084)
+this._handleSpoofEnglishChanged();
   }
 
   uninit() {
@@ -216,6 +219,7 @@ class _RFPHelper {
 this._handleResistFingerprintingChanged();
 break;
   case kPrefSpoofEnglish:
+  case "intl.accept_languages":
 this._handleSpoofEnglishChanged();
 break;
   case kPrefLetterboxing:
@@ -264,6 +268,7 @@ class _RFPHelper {
   }
 
   _handleSpoofEnglishChanged() {
+Services.prefs.removeObserver("intl.accept_languages", this);
 switch (Services.prefs.getIntPref(kPrefSpoofEnglish)) {
   case 0: // will prompt
   // This should only happen when turning privacy.resistFingerprinting off.
@@ -282,6 +287,8 @@ class _RFPHelper {
   case 2: // spoof
 Services.prefs.setCharPref("intl.accept_languages", "en-US, en");
 Services.prefs.setBoolPref("javascript.use_us_english_locale", true);
+// Ensure spoofing works if preferences are set out of order
+Services.prefs.addObserver("intl.accept_languages", this);
 break;
   default:
 break;



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/6f9146d08cd9a15845cf3444a8a691c06a4e1fe7

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/6f9146d08cd9a15845cf3444a8a691c06a4e1fe7
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][base-browser-115.2.0esr-13.0-1] Bug 42084: Ensure English spoofing works even if preferences are set out of order.

2023-09-12 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch base-browser-115.2.0esr-13.0-1 at The Tor Project / 
Applications / Tor Browser


Commits:
44ffc800 by hackademix at 2023-09-12T11:56:26+02:00
Bug 42084: Ensure English spoofing works even if preferences are set out of 
order.

- - - - -


1 changed file:

- toolkit/components/resistfingerprinting/RFPHelper.sys.mjs


Changes:

=
toolkit/components/resistfingerprinting/RFPHelper.sys.mjs
=
@@ -158,6 +158,9 @@ class _RFPHelper {
 // Add RFP and Letterboxing observers if prefs are enabled
 this._handleResistFingerprintingChanged();
 this._handleLetterboxingPrefChanged();
+
+// Synchronize language preferences if accidentally messed up 
(tor-browser#42084)
+this._handleSpoofEnglishChanged();
   }
 
   uninit() {
@@ -211,6 +214,7 @@ class _RFPHelper {
 this._handleResistFingerprintingChanged();
 break;
   case kPrefSpoofEnglish:
+  case "intl.accept_languages":
 this._handleSpoofEnglishChanged();
 break;
   case kPrefLetterboxing:
@@ -259,6 +263,7 @@ class _RFPHelper {
   }
 
   _handleSpoofEnglishChanged() {
+Services.prefs.removeObserver("intl.accept_languages", this);
 switch (Services.prefs.getIntPref(kPrefSpoofEnglish)) {
   case 0: // will prompt
   // This should only happen when turning privacy.resistFingerprinting off.
@@ -277,6 +282,8 @@ class _RFPHelper {
   case 2: // spoof
 Services.prefs.setCharPref("intl.accept_languages", "en-US, en");
 Services.prefs.setBoolPref("javascript.use_us_english_locale", true);
+// Ensure spoofing works if preferences are set out of order
+Services.prefs.addObserver("intl.accept_languages", this);
 break;
   default:
 break;



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/44ffc800c98607bf7652b1e56f765e925b47f9dd

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/44ffc800c98607bf7652b1e56f765e925b47f9dd
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][tor-browser-115.2.0esr-13.0-1] fixup! Bug 23247: Communicating security expectations for .onion

2023-09-08 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch tor-browser-115.2.0esr-13.0-1 at The Tor Project / 
Applications / Tor Browser


Commits:
03a24c6d by cypherpunks1 at 2023-09-08T22:06:56+00:00
fixup! Bug 23247: Communicating security expectations for .onion

Bug 41934: Treat unencrypted websocket connections to onion services as secure

- - - - -


1 changed file:

- dom/websocket/WebSocket.cpp


Changes:

=
dom/websocket/WebSocket.cpp
=
@@ -1734,12 +1734,15 @@ nsresult WebSocketImpl::Init(JSContext* aCx, bool 
aIsSecure,
   }
 
   // Don't allow https:// to open ws://
-  if (!mIsServerSide && !mSecure &&
+  if (!mIsServerSide && !mSecure && aIsSecure &&
   !Preferences::GetBool("network.websocket.allowInsecureFromHTTPS",
 false) &&
   !nsMixedContentBlocker::IsPotentiallyTrustworthyLoopbackHost(
   mAsciiHost)) {
-if (aIsSecure) {
+nsCOMPtr uri;
+nsresult rv = NS_NewURI(getter_AddRefs(uri), mURI);
+NS_ENSURE_SUCCESS(rv, rv);
+if (!nsMixedContentBlocker::IsPotentiallyTrustworthyOnion(uri)) {
   return NS_ERROR_DOM_SECURITY_ERR;
 }
   }



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/03a24c6d2d0aefd323223134215fdd7e405cbf87

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/03a24c6d2d0aefd323223134215fdd7e405cbf87
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser-build] Pushed new tag mb-12.5.3-build1

2023-08-29 Thread ma1 (@ma1) via tor-commits


ma1 pushed new tag mb-12.5.3-build1 at The Tor Project / Applications / 
tor-browser-build

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/tree/mb-12.5.3-build1
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser-build] Pushed new tag tbb-12.5.3-build1

2023-08-29 Thread ma1 (@ma1) via tor-commits


ma1 pushed new tag tbb-12.5.3-build1 at The Tor Project / Applications / 
tor-browser-build

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/tree/tbb-12.5.3-build1
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][base-browser-115.2.0esr-13.0-1] Bug 41881: Don't persist custom network requests on private windows

2023-09-08 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch base-browser-115.2.0esr-13.0-1 at The Tor Project / 
Applications / Tor Browser


Commits:
95b3625a by cypherpunks1 at 2023-09-08T11:45:15+01:00
Bug 41881: Dont persist custom network requests on private windows

- - - - -


1 changed file:

- 
devtools/client/netmonitor/src/components/new-request/HTTPCustomRequestPanel.js


Changes:

=
devtools/client/netmonitor/src/components/new-request/HTTPCustomRequestPanel.js
=
@@ -4,6 +4,11 @@
 
 "use strict";
 
+const lazy = {};
+ChromeUtils.defineESModuleGetters(lazy, {
+  PrivateBrowsingUtils: "resource://gre/modules/PrivateBrowsingUtils.sys.mjs",
+});
+
 const {
   Component,
   createFactory,
@@ -122,10 +127,12 @@ class HTTPCustomRequestPanel extends Component {
 
   async componentDidMount() {
 let { connector, request } = this.props;
-const persistedCustomRequest = await asyncStorage.getItem(
-  "devtools.netmonitor.customRequest"
-);
-request = request || persistedCustomRequest;
+if (!lazy.PrivateBrowsingUtils.isWindowPrivate(window)) {
+  const persistedCustomRequest = await asyncStorage.getItem(
+"devtools.netmonitor.customRequest"
+  );
+  request = request || persistedCustomRequest;
+}
 
 if (!request) {
   this.setState({ _isStateDataReady: true });
@@ -191,7 +198,9 @@ class HTTPCustomRequestPanel extends Component {
   }
 
   componentWillUnmount() {
-asyncStorage.setItem("devtools.netmonitor.customRequest", this.state);
+if (!lazy.PrivateBrowsingUtils.isWindowPrivate(window)) {
+  asyncStorage.setItem("devtools.netmonitor.customRequest", this.state);
+}
   }
 
   handleChangeURL(event) {



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/95b3625a85b67f859adecbb436a4f44e1aec3ee0

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/95b3625a85b67f859adecbb436a4f44e1aec3ee0
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][tor-browser-115.2.0esr-13.0-1] Bug 41881: Don't persist custom network requests on private windows

2023-09-08 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch tor-browser-115.2.0esr-13.0-1 at The Tor Project / 
Applications / Tor Browser


Commits:
d66f99f2 by cypherpunks1 at 2023-09-08T10:16:52+00:00
Bug 41881: Dont persist custom network requests on private windows

- - - - -


1 changed file:

- 
devtools/client/netmonitor/src/components/new-request/HTTPCustomRequestPanel.js


Changes:

=
devtools/client/netmonitor/src/components/new-request/HTTPCustomRequestPanel.js
=
@@ -4,6 +4,11 @@
 
 "use strict";
 
+const lazy = {};
+ChromeUtils.defineESModuleGetters(lazy, {
+  PrivateBrowsingUtils: "resource://gre/modules/PrivateBrowsingUtils.sys.mjs",
+});
+
 const {
   Component,
   createFactory,
@@ -122,10 +127,12 @@ class HTTPCustomRequestPanel extends Component {
 
   async componentDidMount() {
 let { connector, request } = this.props;
-const persistedCustomRequest = await asyncStorage.getItem(
-  "devtools.netmonitor.customRequest"
-);
-request = request || persistedCustomRequest;
+if (!lazy.PrivateBrowsingUtils.isWindowPrivate(window)) {
+  const persistedCustomRequest = await asyncStorage.getItem(
+"devtools.netmonitor.customRequest"
+  );
+  request = request || persistedCustomRequest;
+}
 
 if (!request) {
   this.setState({ _isStateDataReady: true });
@@ -191,7 +198,9 @@ class HTTPCustomRequestPanel extends Component {
   }
 
   componentWillUnmount() {
-asyncStorage.setItem("devtools.netmonitor.customRequest", this.state);
+if (!lazy.PrivateBrowsingUtils.isWindowPrivate(window)) {
+  asyncStorage.setItem("devtools.netmonitor.customRequest", this.state);
+}
   }
 
   handleChangeURL(event) {



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/d66f99f26f2a0b41d5d40bc430a386f48abdae1c

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/d66f99f26f2a0b41d5d40bc430a386f48abdae1c
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][tor-browser-115.4.0esr-13.5-1] Bug 42194: Fix blank net error page on failed DNS resolution with active proxy.

2023-11-07 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch tor-browser-115.4.0esr-13.5-1 at The Tor Project / 
Applications / Tor Browser


Commits:
aa90395e by hackademix at 2023-11-07T12:56:55+01:00
Bug 42194: Fix blank net error page on failed DNS resolution with active proxy.

- - - - -


1 changed file:

- toolkit/actors/NetErrorChild.sys.mjs


Changes:

=
toolkit/actors/NetErrorChild.sys.mjs
=
@@ -140,12 +140,15 @@ export class NetErrorChild extends RemotePageChild {
 shortDesc.appendChild(span);
   },
 };
-
-Services.uriFixup.checkHost(
-  info.fixedURI,
-  onLookupCompleteListener,
-  this.document.nodePrincipal.originAttributes
-);
+try {
+  Services.uriFixup.checkHost(
+info.fixedURI,
+onLookupCompleteListener,
+this.document.nodePrincipal.originAttributes
+  );
+} catch (e) {
+  // DNS resolution may fail synchronously if forbidden by proxy
+}
   }
 
   // Get the header from the http response of the failed channel. This function



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/aa90395e3ee52897434d71254d0df48c1582befe

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/aa90395e3ee52897434d71254d0df48c1582befe
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][base-browser-115.4.0esr-13.5-1] Bug 42194: Fix blank net error page on failed DNS resolution with active proxy.

2023-11-07 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch base-browser-115.4.0esr-13.5-1 at The Tor Project / 
Applications / Tor Browser


Commits:
c06034d3 by hackademix at 2023-11-07T17:19:49+01:00
Bug 42194: Fix blank net error page on failed DNS resolution with active proxy.

- - - - -


1 changed file:

- toolkit/actors/NetErrorChild.sys.mjs


Changes:

=
toolkit/actors/NetErrorChild.sys.mjs
=
@@ -133,12 +133,15 @@ export class NetErrorChild extends RemotePageChild {
 shortDesc.appendChild(span);
   },
 };
-
-Services.uriFixup.checkHost(
-  info.fixedURI,
-  onLookupCompleteListener,
-  this.document.nodePrincipal.originAttributes
-);
+try {
+  Services.uriFixup.checkHost(
+info.fixedURI,
+onLookupCompleteListener,
+this.document.nodePrincipal.originAttributes
+  );
+} catch (e) {
+  // DNS resolution may fail synchronously if forbidden by proxy
+}
   }
 
   // Get the header from the http response of the failed channel. This function



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/c06034d3b43a8cb1db0b155527901124924355e5

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/c06034d3b43a8cb1db0b155527901124924355e5
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/mullvad-browser][mullvad-browser-115.4.0esr-13.5-1] Bug 42194: Fix blank net error page on failed DNS resolution with active proxy.

2023-11-07 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch mullvad-browser-115.4.0esr-13.5-1 at The Tor Project / 
Applications / Mullvad Browser


Commits:
5cb306c9 by hackademix at 2023-11-07T17:22:34+01:00
Bug 42194: Fix blank net error page on failed DNS resolution with active proxy.

- - - - -


1 changed file:

- toolkit/actors/NetErrorChild.sys.mjs


Changes:

=
toolkit/actors/NetErrorChild.sys.mjs
=
@@ -133,12 +133,15 @@ export class NetErrorChild extends RemotePageChild {
 shortDesc.appendChild(span);
   },
 };
-
-Services.uriFixup.checkHost(
-  info.fixedURI,
-  onLookupCompleteListener,
-  this.document.nodePrincipal.originAttributes
-);
+try {
+  Services.uriFixup.checkHost(
+info.fixedURI,
+onLookupCompleteListener,
+this.document.nodePrincipal.originAttributes
+  );
+} catch (e) {
+  // DNS resolution may fail synchronously if forbidden by proxy
+}
   }
 
   // Get the header from the http response of the failed channel. This function



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/5cb306c903900ad8dde25b57bae052927b95ded3

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/5cb306c903900ad8dde25b57bae052927b95ded3
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][tor-browser-115.4.0esr-13.5-1] fixup! Bug 23247: Communicating security expectations for .onion

2023-11-06 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch tor-browser-115.4.0esr-13.5-1 at The Tor Project / 
Applications / Tor Browser


Commits:
8627f8e1 by cypherpunks1 at 2023-11-06T21:22:17+00:00
fixup! Bug 23247: Communicating security expectations for .onion

Bug 42231: Improve the network monitor patch for http onion resources

- - - - -


2 changed files:

- devtools/client/netmonitor/src/components/SecurityState.js
- devtools/shared/network-observer/NetworkHelper.sys.mjs


Changes:

=
devtools/client/netmonitor/src/components/SecurityState.js
=
@@ -41,7 +41,7 @@ class SecurityState extends Component {
 
 const {
   securityState,
-  urlDetails: { isLocal },
+  urlDetails: { host, isLocal },
 } = item;
 const iconClassList = ["requests-security-state-icon"];
 
@@ -50,7 +50,11 @@ class SecurityState extends Component {
 
 // Locally delivered files such as http://localhost and file:// paths
 // are considered to have been delivered securely.
-if (isLocal) {
+if (
+  isLocal ||
+  (host?.endsWith(".onion") &&
+Services.prefs.getBoolPref("dom.securecontext.allowlist_onions", 
false))
+) {
   realSecurityState = "secure";
 }
 


=
devtools/shared/network-observer/NetworkHelper.sys.mjs
=
@@ -596,9 +596,6 @@ export var NetworkHelper = {
 
 // The request did not contain any security info.
 if (!securityInfo) {
-  if (httpActivity.hostname && httpActivity.hostname.endsWith(".onion")) {
-info.state = "secure";
-  }
   return info;
 }
 
@@ -650,11 +647,7 @@ export var NetworkHelper = {
 // schemes other than https and wss are subject to
 // downgrade/etc at the scheme level and should always be
 // considered insecure
-if (httpActivity.hostname && httpActivity.hostname.endsWith(".onion")) 
{
-  info.state = "secure";
-} else {
-  info.state = "insecure";
-}
+info.state = "insecure";
   } else if (state & wpl.STATE_IS_SECURE) {
 // The connection is secure if the scheme is sufficient
 info.state = "secure";



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/8627f8e1f78a8fc2ce2ba12b3b5314c020f7ca8f

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/8627f8e1f78a8fc2ce2ba12b3b5314c020f7ca8f
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][tor-browser-115.3.0esr-13.0-1] fixup! Firefox preference overrides.

2023-09-20 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch tor-browser-115.3.0esr-13.0-1 at The Tor Project / 
Applications / Tor Browser


Commits:
37ddf133 by hackademix at 2023-09-20T17:19:01+00:00
fixup! Firefox preference overrides.

Bug 41945: disable cookie banner automatic dismissal.

- - - - -


1 changed file:

- browser/app/profile/001-base-profile.js


Changes:

=
browser/app/profile/001-base-profile.js
=
@@ -203,6 +203,12 @@ pref("browser.newtabpage.activity-stream.default.sites", 
"");
 pref("browser.newtabpage.activity-stream.feeds.telemetry", false);
 pref("browser.newtabpage.activity-stream.telemetry", false);
 
+// tor-browser#41945 - disable automatic cookie banners dismissal until
+// we're sure it does not causes fingerprinting risks or other issues.
+pref("cookiebanners.service.mode", 0);
+pref("cookiebanners.service.mode.privateBrowsing", 0);
+pref("cookiebanners.ui.desktop.enabled", false);
+
 // tor-browser#40788: disable AS's calls to home.
 // Notice that null is between quotes because it is a JSON string.
 // Keep checked firefox.js to see if new entries are added.



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/37ddf1330f0dfce7473a7077434add6ff4b0db12

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/37ddf1330f0dfce7473a7077434add6ff4b0db12
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][base-browser-115.3.0esr-13.0-1] fixup! Firefox preference overrides.

2023-09-20 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch base-browser-115.3.0esr-13.0-1 at The Tor Project / 
Applications / Tor Browser


Commits:
1c325548 by hackademix at 2023-09-20T19:24:35+02:00
fixup! Firefox preference overrides.

Bug 41945: disable cookie banner automatic dismissal.

- - - - -


1 changed file:

- browser/app/profile/001-base-profile.js


Changes:

=
browser/app/profile/001-base-profile.js
=
@@ -203,6 +203,12 @@ pref("browser.newtabpage.activity-stream.default.sites", 
"");
 pref("browser.newtabpage.activity-stream.feeds.telemetry", false);
 pref("browser.newtabpage.activity-stream.telemetry", false);
 
+// tor-browser#41945 - disable automatic cookie banners dismissal until
+// we're sure it does not causes fingerprinting risks or other issues.
+pref("cookiebanners.service.mode", 0);
+pref("cookiebanners.service.mode.privateBrowsing", 0);
+pref("cookiebanners.ui.desktop.enabled", false);
+
 // tor-browser#40788: disable AS's calls to home.
 // Notice that null is between quotes because it is a JSON string.
 // Keep checked firefox.js to see if new entries are added.



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/1c325548139b586cf097be3b72a5445d67945b3f

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/1c325548139b586cf097be3b72a5445d67945b3f
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/mullvad-browser][mullvad-browser-115.3.1esr-13.0-1] fixup! Bug 40926: Implemented the New Identity feature

2023-10-05 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch mullvad-browser-115.3.1esr-13.0-1 at The Tor Project / 
Applications / Mullvad Browser


Commits:
56b44ebf by hackademix at 2023-10-05T19:06:10+02:00
fixup! Bug 40926: Implemented the New Identity feature

Bug 41765: Force about:privatebrowsing in new identity window.

- - - - -


2 changed files:

- browser/base/content/browser.js
- browser/components/newidentity/content/newidentity.js


Changes:

=
browser/base/content/browser.js
=
@@ -4523,7 +4523,7 @@ function OpenBrowserWindow(options) {
   var extraFeatures = "";
   if (options && options.private && PrivateBrowsingUtils.enabled) {
 extraFeatures = ",private";
-if (!PrivateBrowsingUtils.permanentPrivateBrowsing) {
+if (!PrivateBrowsingUtils.permanentPrivateBrowsing || options.private === 
"no-home") {
   // Force the new window to load about:privatebrowsing instead of the 
default home page
   defaultArgs = "about:privatebrowsing";
 }


=
browser/components/newidentity/content/newidentity.js
=
@@ -433,11 +433,8 @@ XPCOMUtils.defineLazyGetter(this, "NewIdentityButton", () 
=> {
 openNewWindow() {
   logger.info("Opening a new window");
   return new Promise(resolve => {
-// Open a new window with the default homepage
-// We could pass {private: true} but we do not because we enforce
-// browser.privatebrowsing.autostart = true.
-// What about users that change settings?
-const win = OpenBrowserWindow();
+// Open a new window forcing the about:privatebrowsing page 
(tor-browser#41765)
+const win = OpenBrowserWindow({private: "no-home"});
 // This mechanism to know when the new window is ready is used by
 // OpenBrowserWindow itself (see its definition in browser.js).
 win.addEventListener("MozAfterPaint", () => resolve(), { once: true });



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/56b44ebf7798edac17111bf6cef1e48c53393125

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/56b44ebf7798edac17111bf6cef1e48c53393125
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][base-browser-115.3.1esr-13.0-1] fixup! Bug 40926: Implemented the New Identity feature

2023-10-05 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch base-browser-115.3.1esr-13.0-1 at The Tor Project / 
Applications / Tor Browser


Commits:
b5574131 by hackademix at 2023-10-05T19:03:10+02:00
fixup! Bug 40926: Implemented the New Identity feature

Bug 41765: Force about:privatebrowsing in new identity window.

- - - - -


2 changed files:

- browser/base/content/browser.js
- browser/components/newidentity/content/newidentity.js


Changes:

=
browser/base/content/browser.js
=
@@ -4521,7 +4521,7 @@ function OpenBrowserWindow(options) {
   var extraFeatures = "";
   if (options && options.private && PrivateBrowsingUtils.enabled) {
 extraFeatures = ",private";
-if (!PrivateBrowsingUtils.permanentPrivateBrowsing) {
+if (!PrivateBrowsingUtils.permanentPrivateBrowsing || options.private === 
"no-home") {
   // Force the new window to load about:privatebrowsing instead of the 
default home page
   defaultArgs = "about:privatebrowsing";
 }


=
browser/components/newidentity/content/newidentity.js
=
@@ -433,11 +433,8 @@ XPCOMUtils.defineLazyGetter(this, "NewIdentityButton", () 
=> {
 openNewWindow() {
   logger.info("Opening a new window");
   return new Promise(resolve => {
-// Open a new window with the default homepage
-// We could pass {private: true} but we do not because we enforce
-// browser.privatebrowsing.autostart = true.
-// What about users that change settings?
-const win = OpenBrowserWindow();
+// Open a new window forcing the about:privatebrowsing page 
(tor-browser#41765)
+const win = OpenBrowserWindow({private: "no-home"});
 // This mechanism to know when the new window is ready is used by
 // OpenBrowserWindow itself (see its definition in browser.js).
 win.addEventListener("MozAfterPaint", () => resolve(), { once: true });



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/b55741315122b13231ad5de610230859b9c83cf9

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/b55741315122b13231ad5de610230859b9c83cf9
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][tor-browser-115.3.1esr-13.0-1] fixup! Bug 40926: Implemented the New Identity feature

2023-10-05 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch tor-browser-115.3.1esr-13.0-1 at The Tor Project / 
Applications / Tor Browser


Commits:
c62d3405 by hackademix at 2023-10-05T17:34:00+02:00
fixup! Bug 40926: Implemented the New Identity feature

Bug 41765: Force about:privatebrowsing in new identity window.

- - - - -


2 changed files:

- browser/base/content/browser.js
- browser/components/newidentity/content/newidentity.js


Changes:

=
browser/base/content/browser.js
=
@@ -4585,7 +4585,7 @@ function OpenBrowserWindow(options) {
   var extraFeatures = "";
   if (options && options.private && PrivateBrowsingUtils.enabled) {
 extraFeatures = ",private";
-if (!PrivateBrowsingUtils.permanentPrivateBrowsing) {
+if (!PrivateBrowsingUtils.permanentPrivateBrowsing || options.private === 
"no-home") {
   // Force the new window to load about:privatebrowsing instead of the 
default home page
   defaultArgs = "about:privatebrowsing";
 }


=
browser/components/newidentity/content/newidentity.js
=
@@ -433,11 +433,8 @@ XPCOMUtils.defineLazyGetter(this, "NewIdentityButton", () 
=> {
 openNewWindow() {
   logger.info("Opening a new window");
   return new Promise(resolve => {
-// Open a new window with the default homepage
-// We could pass {private: true} but we do not because we enforce
-// browser.privatebrowsing.autostart = true.
-// What about users that change settings?
-const win = OpenBrowserWindow();
+// Open a new window forcing the about:privatebrowsing page 
(tor-browser#41765)
+const win = OpenBrowserWindow({private: "no-home"});
 // This mechanism to know when the new window is ready is used by
 // OpenBrowserWindow itself (see its definition in browser.js).
 win.addEventListener("MozAfterPaint", () => resolve(), { once: true });



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/c62d3405d1e74d7d069b720af5bacd4c43415d8c

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/c62d3405d1e74d7d069b720af5bacd4c43415d8c
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/mullvad-browser][mullvad-browser-115.3.1esr-13.0-1] fixup! Bug 32308: use direct browser sizing for letterboxing. Bug 30556: align...

2023-10-09 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch mullvad-browser-115.3.1esr-13.0-1 at The Tor Project / 
Applications / Mullvad Browser


Commits:
453cd063 by hackademix at 2023-10-09T20:49:46+02:00
fixup! Bug 32308: use direct browser sizing for letterboxing. Bug 30556: align 
letterboxing with 200x100 new win width stepping

Bug 41259: Do not interfere with devtools responsive mode sizing.

- - - - -


2 changed files:

- browser/base/content/browser.css
- toolkit/components/resistfingerprinting/RFPHelper.sys.mjs


Changes:

=
browser/base/content/browser.css
=
@@ -140,7 +140,7 @@ body {
   Never modify the following selector without synchronizing
   LETTERBOX_CSS_SELECTOR in RFPHelper.jsm!
 **/
-.letterboxing .browserStack:not(.exclude-letterboxing) > browser {
+.letterboxing .browserContainer:not(.responsive-mode) > 
.browserStack:not(.exclude-letterboxing) > browser {
   /* width & height to be dynamically set by RFPHelper.jsm */
   outline: 1px solid var(--chrome-content-separator-color);
 }
@@ -149,7 +149,7 @@ body {
   outline: initial;
 }
 
-:root:not([inDOMFullscreen]) .letterboxing.letterboxing-ready 
.browserStack:not(.exclude-letterboxing) {
+:root:not([inDOMFullscreen]) .letterboxing.letterboxing-ready 
.browserContainer:not(.responsive-mode) > 
.browserStack:not(.exclude-letterboxing) {
   place-content: start center;
 }
 


=
toolkit/components/resistfingerprinting/RFPHelper.sys.mjs
=
@@ -437,7 +437,7 @@ class _RFPHelper {
   // preemptively in order to beat race conditions on tab/window creation
   const LETTERBOX_CSS_URL = "chrome://browser/content/browser.css";
   const LETTERBOX_CSS_SELECTOR =
-".letterboxing .browserStack:not(.exclude-letterboxing) > browser";
+".letterboxing .browserContainer:not(.responsive-mode) > 
.browserStack:not(.exclude-letterboxing) > browser";
   for (let ss of document.styleSheets) {
 if (ss.href !== LETTERBOX_CSS_URL) {
   continue;
@@ -557,8 +557,8 @@ class _RFPHelper {
 
 const roundDimensions = (aWidth, aHeight) => {
   const r = (aWidth, aHeight) => ({
-width: `${aWidth}px`,
-height: `${aHeight}px`,
+width: `var(--rdm-width, ${aWidth}px)`,
+height: `var(--rdm-height, ${aHeight}px)`,
   });
 
   let result;



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/453cd0631e0db4c0bbdd511752e3657e031f98cd

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/453cd0631e0db4c0bbdd511752e3657e031f98cd
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][base-browser-115.3.1esr-13.0-1] fixup! Bug 32308: use direct browser sizing for letterboxing. Bug 30556: align...

2023-10-09 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch base-browser-115.3.1esr-13.0-1 at The Tor Project / 
Applications / Tor Browser


Commits:
4ff109fa by hackademix at 2023-10-09T20:47:34+02:00
fixup! Bug 32308: use direct browser sizing for letterboxing. Bug 30556: align 
letterboxing with 200x100 new win width stepping

Bug 41259: Do not interfere with devtools responsive mode sizing.

- - - - -


2 changed files:

- browser/base/content/browser.css
- toolkit/components/resistfingerprinting/RFPHelper.sys.mjs


Changes:

=
browser/base/content/browser.css
=
@@ -140,7 +140,7 @@ body {
   Never modify the following selector without synchronizing
   LETTERBOX_CSS_SELECTOR in RFPHelper.jsm!
 **/
-.letterboxing .browserStack:not(.exclude-letterboxing) > browser {
+.letterboxing .browserContainer:not(.responsive-mode) > 
.browserStack:not(.exclude-letterboxing) > browser {
   /* width & height to be dynamically set by RFPHelper.jsm */
   outline: 1px solid var(--chrome-content-separator-color);
 }
@@ -149,7 +149,7 @@ body {
   outline: initial;
 }
 
-:root:not([inDOMFullscreen]) .letterboxing.letterboxing-ready 
.browserStack:not(.exclude-letterboxing) {
+:root:not([inDOMFullscreen]) .letterboxing.letterboxing-ready 
.browserContainer:not(.responsive-mode) > 
.browserStack:not(.exclude-letterboxing) {
   place-content: start center;
 }
 


=
toolkit/components/resistfingerprinting/RFPHelper.sys.mjs
=
@@ -437,7 +437,7 @@ class _RFPHelper {
   // preemptively in order to beat race conditions on tab/window creation
   const LETTERBOX_CSS_URL = "chrome://browser/content/browser.css";
   const LETTERBOX_CSS_SELECTOR =
-".letterboxing .browserStack:not(.exclude-letterboxing) > browser";
+".letterboxing .browserContainer:not(.responsive-mode) > 
.browserStack:not(.exclude-letterboxing) > browser";
   for (let ss of document.styleSheets) {
 if (ss.href !== LETTERBOX_CSS_URL) {
   continue;
@@ -557,8 +557,8 @@ class _RFPHelper {
 
 const roundDimensions = (aWidth, aHeight) => {
   const r = (aWidth, aHeight) => ({
-width: `${aWidth}px`,
-height: `${aHeight}px`,
+width: `var(--rdm-width, ${aWidth}px)`,
+height: `var(--rdm-height, ${aHeight}px)`,
   });
 
   let result;



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/4ff109faf88bd2e22d800fb719a36e1327f3301b

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/4ff109faf88bd2e22d800fb719a36e1327f3301b
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][tor-browser-115.3.1esr-13.0-1] fixup! Bug 32308: use direct browser sizing for letterboxing. Bug 30556: align...

2023-10-09 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch tor-browser-115.3.1esr-13.0-1 at The Tor Project / 
Applications / Tor Browser


Commits:
10f40c2f by hackademix at 2023-10-09T19:54:52+02:00
fixup! Bug 32308: use direct browser sizing for letterboxing. Bug 30556: align 
letterboxing with 200x100 new win width stepping

Bug 41259: Do not interfere with devtools responsive mode sizing.

- - - - -


2 changed files:

- browser/base/content/browser.css
- toolkit/components/resistfingerprinting/RFPHelper.sys.mjs


Changes:

=
browser/base/content/browser.css
=
@@ -140,7 +140,7 @@ body {
   Never modify the following selector without synchronizing
   LETTERBOX_CSS_SELECTOR in RFPHelper.jsm!
 **/
-.letterboxing .browserStack:not(.exclude-letterboxing) > browser {
+.letterboxing .browserContainer:not(.responsive-mode) > 
.browserStack:not(.exclude-letterboxing) > browser {
   /* width & height to be dynamically set by RFPHelper.jsm */
   outline: 1px solid var(--chrome-content-separator-color);
 }
@@ -149,7 +149,7 @@ body {
   outline: initial;
 }
 
-:root:not([inDOMFullscreen]) .letterboxing.letterboxing-ready 
.browserStack:not(.exclude-letterboxing) {
+:root:not([inDOMFullscreen]) .letterboxing.letterboxing-ready 
.browserContainer:not(.responsive-mode) > 
.browserStack:not(.exclude-letterboxing) {
   place-content: start center;
 }
 


=
toolkit/components/resistfingerprinting/RFPHelper.sys.mjs
=
@@ -437,7 +437,7 @@ class _RFPHelper {
   // preemptively in order to beat race conditions on tab/window creation
   const LETTERBOX_CSS_URL = "chrome://browser/content/browser.css";
   const LETTERBOX_CSS_SELECTOR =
-".letterboxing .browserStack:not(.exclude-letterboxing) > browser";
+".letterboxing .browserContainer:not(.responsive-mode) > 
.browserStack:not(.exclude-letterboxing) > browser";
   for (let ss of document.styleSheets) {
 if (ss.href !== LETTERBOX_CSS_URL) {
   continue;
@@ -557,8 +557,8 @@ class _RFPHelper {
 
 const roundDimensions = (aWidth, aHeight) => {
   const r = (aWidth, aHeight) => ({
-width: `${aWidth}px`,
-height: `${aHeight}px`,
+width: `var(--rdm-width, ${aWidth}px)`,
+height: `var(--rdm-height, ${aHeight}px)`,
   });
 
   let result;



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/10f40c2f2ceb7f2a4eb82c8540d5e01b99be9220

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/10f40c2f2ceb7f2a4eb82c8540d5e01b99be9220
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][base-browser-115.4.0esr-13.0-1] fixup! Bug 40926: Implemented the New Identity feature

2023-10-20 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch base-browser-115.4.0esr-13.0-1 at The Tor Project / 
Applications / Tor Browser


Commits:
a78a919d by hackademix at 2023-10-20T15:45:50+02:00
fixup! Bug 40926: Implemented the New Identity feature

Bug 42182: avoid reloading any search engine extension.

- - - - -


1 changed file:

- browser/components/newidentity/content/newidentity.js


Changes:

=
browser/components/newidentity/content/newidentity.js
=
@@ -415,10 +415,13 @@ XPCOMUtils.defineLazyGetter(this, "NewIdentityButton", () 
=> {
 async reloadAddons() {
   logger.info("Reloading add-ons to clear their temporary state.");
   // Reload all active extensions except search engines, which would throw.
-  const addons = (
-await AddonManager.getAddonsByTypes(["extension"])
-  ).filter(a => a.isActive && !a.id.endsWith("@search.mozilla.org"));
-  await Promise.all(addons.map(a => a.reload()));
+  const addons = await AddonManager.getAddonsByTypes(["extension"]);
+  const isSearchEngine = async addon =>
+(await (await 
fetch(addon.getResourceURI("manifest.json").spec)).json())
+  ?.chrome_settings_overrides?.search_provider;
+  const reloadIfNeeded = async addon =>
+addon.isActive && !(await isSearchEngine(addon)) && addon.reload();
+  await Promise.all(addons.map(addon => reloadIfNeeded(addon)));
 }
 
 // Broadcast as a hook to clear other data



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/a78a919d4618cdcebb306d3c4b705f6d23d35081

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/a78a919d4618cdcebb306d3c4b705f6d23d35081
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][tor-browser-115.4.0esr-13.0-1] fixup! Bug 40926: Implemented the New Identity feature

2023-10-20 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch tor-browser-115.4.0esr-13.0-1 at The Tor Project / 
Applications / Tor Browser


Commits:
46614757 by hackademix at 2023-10-20T15:38:29+02:00
fixup! Bug 40926: Implemented the New Identity feature

Bug 42182: avoid reloading any search engine extension.

- - - - -


1 changed file:

- browser/components/newidentity/content/newidentity.js


Changes:

=
browser/components/newidentity/content/newidentity.js
=
@@ -415,10 +415,13 @@ XPCOMUtils.defineLazyGetter(this, "NewIdentityButton", () 
=> {
 async reloadAddons() {
   logger.info("Reloading add-ons to clear their temporary state.");
   // Reload all active extensions except search engines, which would throw.
-  const addons = (
-await AddonManager.getAddonsByTypes(["extension"])
-  ).filter(a => a.isActive && !a.id.endsWith("@search.mozilla.org"));
-  await Promise.all(addons.map(a => a.reload()));
+  const addons = await AddonManager.getAddonsByTypes(["extension"]);
+  const isSearchEngine = async addon =>
+(await (await 
fetch(addon.getResourceURI("manifest.json").spec)).json())
+  ?.chrome_settings_overrides?.search_provider;
+  const reloadIfNeeded = async addon =>
+addon.isActive && !(await isSearchEngine(addon)) && addon.reload();
+  await Promise.all(addons.map(addon => reloadIfNeeded(addon)));
 }
 
 // Broadcast as a hook to clear other data



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/4661475756853c06739402c3ceca53482c89bcad

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/4661475756853c06739402c3ceca53482c89bcad
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/mullvad-browser][mullvad-browser-115.4.0esr-13.0-1] fixup! Bug 40926: Implemented the New Identity feature

2023-10-20 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch mullvad-browser-115.4.0esr-13.0-1 at The Tor Project / 
Applications / Mullvad Browser


Commits:
7898b29a by hackademix at 2023-10-20T15:46:41+02:00
fixup! Bug 40926: Implemented the New Identity feature

Bug 42182: avoid reloading any search engine extension.

- - - - -


1 changed file:

- browser/components/newidentity/content/newidentity.js


Changes:

=
browser/components/newidentity/content/newidentity.js
=
@@ -415,10 +415,13 @@ XPCOMUtils.defineLazyGetter(this, "NewIdentityButton", () 
=> {
 async reloadAddons() {
   logger.info("Reloading add-ons to clear their temporary state.");
   // Reload all active extensions except search engines, which would throw.
-  const addons = (
-await AddonManager.getAddonsByTypes(["extension"])
-  ).filter(a => a.isActive && !a.id.endsWith("@search.mozilla.org"));
-  await Promise.all(addons.map(a => a.reload()));
+  const addons = await AddonManager.getAddonsByTypes(["extension"]);
+  const isSearchEngine = async addon =>
+(await (await 
fetch(addon.getResourceURI("manifest.json").spec)).json())
+  ?.chrome_settings_overrides?.search_provider;
+  const reloadIfNeeded = async addon =>
+addon.isActive && !(await isSearchEngine(addon)) && addon.reload();
+  await Promise.all(addons.map(addon => reloadIfNeeded(addon)));
 }
 
 // Broadcast as a hook to clear other data



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/7898b29ae230f55339ce4db8d2e4b60585fc6c3e

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/7898b29ae230f55339ce4db8d2e4b60585fc6c3e
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser] Pushed new tag base-browser-115.4.0esr-13.0-1-build2

2023-10-23 Thread ma1 (@ma1) via tor-commits


ma1 pushed new tag base-browser-115.4.0esr-13.0-1-build2 at The Tor Project / 
Applications / Tor Browser

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/tree/base-browser-115.4.0esr-13.0-1-build2
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/mullvad-browser] Pushed new tag mullvad-browser-115.4.0esr-13.0-1-build2

2023-10-23 Thread ma1 (@ma1) via tor-commits


ma1 pushed new tag mullvad-browser-115.4.0esr-13.0-1-build2 at The Tor Project 
/ Applications / Mullvad Browser

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/tree/mullvad-browser-115.4.0esr-13.0-1-build2
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser] Pushed new tag tor-browser-115.4.0esr-13.0-1-build2

2023-10-23 Thread ma1 (@ma1) via tor-commits


ma1 pushed new tag tor-browser-115.4.0esr-13.0-1-build2 at The Tor Project / 
Applications / Tor Browser

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/tree/tor-browser-115.4.0esr-13.0-1-build2
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][base-browser-115.1.0esr-13.0-1] 3 commits: fixup! Bug 40926: Implemented the New Identity feature

2023-08-21 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch base-browser-115.1.0esr-13.0-1 at The Tor Project / 
Applications / Tor Browser


Commits:
29c0222b by hackademix at 2023-08-21T14:48:07+02:00
fixup! Bug 40926: Implemented the New Identity feature

Remove useless and confusing EXPORTED_SYMBOLS usage in ScriptLoader inclusion.

- - - - -
a2098747 by hackademix at 2023-08-21T14:48:08+02:00
fixup! Bug 40926: Implemented the New Identity feature

Remove redundant Closing tabs logging.

- - - - -
0537009f by hackademix at 2023-08-21T14:48:08+02:00
fixup! Bug 40926: Implemented the New Identity feature

Bug 41833: Reload extensions on new identity

- - - - -


1 changed file:

- browser/components/newidentity/content/newidentity.js


Changes:

=
browser/components/newidentity/content/newidentity.js
=
@@ -1,7 +1,5 @@
 "use strict";
 
-var EXPORTED_SYMBOLS = ["NewIdentityButton"];
-
 /* globals CustomizableUI Services gFindBarInitialized gFindBar
OpenBrowserWindow PrivateBrowsingUtils XPCOMUtils
  */
@@ -144,6 +142,7 @@ XPCOMUtils.defineLazyGetter(this, "NewIdentityButton", () 
=> {
   this.clearStorage();
   this.clearPreferencesAndPermissions();
   await this.clearData();
+  await this.reloadAddons();
   this.clearConnections();
   this.clearPrivateSession();
 }
@@ -160,7 +159,6 @@ XPCOMUtils.defineLazyGetter(this, "NewIdentityButton", () 
=> {
 }
 
 closeTabs() {
-  logger.info("Closing tabs");
   if (
 !Services.prefs.getBoolPref("browser.new_identity.close_newnym", true)
   ) {
@@ -414,6 +412,15 @@ XPCOMUtils.defineLazyGetter(this, "NewIdentityButton", () 
=> {
   Services.obs.notifyObservers(null, "last-pb-context-exited");
 }
 
+async reloadAddons() {
+  logger.info("Reloading add-ons to clear their temporary state.");
+  // Reload all active extensions except search engines, which would throw.
+  const addons = (
+await AddonManager.getAddonsByTypes(["extension"])
+  ).filter(a => a.isActive && !a.id.endsWith("@search.mozilla.org"));
+  await Promise.all(addons.map(a => a.reload()));
+}
+
 // Broadcast as a hook to clear other data
 
 broadcast() {



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/compare/64c5d915e37966513a83e7e897e945b091bc3108...0537009f2c5ed7b0fd2e9c54eed84afab3c6368f

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/compare/64c5d915e37966513a83e7e897e945b091bc3108...0537009f2c5ed7b0fd2e9c54eed84afab3c6368f
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][tor-browser-115.1.0esr-13.0-1] 3 commits: fixup! Bug 40926: Implemented the New Identity feature

2023-08-21 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch tor-browser-115.1.0esr-13.0-1 at The Tor Project / 
Applications / Tor Browser


Commits:
4459daa5 by hackademix at 2023-08-21T11:07:43+02:00
fixup! Bug 40926: Implemented the New Identity feature

Remove useless and confusing EXPORTED_SYMBOLS usage in ScriptLoader inclusion.

- - - - -
b6f6eb79 by hackademix at 2023-08-21T11:07:44+02:00
fixup! Bug 40926: Implemented the New Identity feature

Remove redundant Closing tabs logging.

- - - - -
80c57ed8 by hackademix at 2023-08-21T11:08:16+02:00
fixup! Bug 40926: Implemented the New Identity feature

Bug 41833: Reload extensions on new identity

- - - - -


1 changed file:

- browser/components/newidentity/content/newidentity.js


Changes:

=
browser/components/newidentity/content/newidentity.js
=
@@ -1,7 +1,5 @@
 "use strict";
 
-var EXPORTED_SYMBOLS = ["NewIdentityButton"];
-
 /* globals CustomizableUI Services gFindBarInitialized gFindBar
OpenBrowserWindow PrivateBrowsingUtils XPCOMUtils
  */
@@ -144,6 +142,7 @@ XPCOMUtils.defineLazyGetter(this, "NewIdentityButton", () 
=> {
   this.clearStorage();
   this.clearPreferencesAndPermissions();
   await this.clearData();
+  await this.reloadAddons();
   this.clearConnections();
   this.clearPrivateSession();
 }
@@ -160,7 +159,6 @@ XPCOMUtils.defineLazyGetter(this, "NewIdentityButton", () 
=> {
 }
 
 closeTabs() {
-  logger.info("Closing tabs");
   if (
 !Services.prefs.getBoolPref("browser.new_identity.close_newnym", true)
   ) {
@@ -414,6 +412,15 @@ XPCOMUtils.defineLazyGetter(this, "NewIdentityButton", () 
=> {
   Services.obs.notifyObservers(null, "last-pb-context-exited");
 }
 
+async reloadAddons() {
+  logger.info("Reloading add-ons to clear their temporary state.");
+  // Reload all active extensions except search engines, which would throw.
+  const addons = (
+await AddonManager.getAddonsByTypes(["extension"])
+  ).filter(a => a.isActive && !a.id.endsWith("@search.mozilla.org"));
+  await Promise.all(addons.map(a => a.reload()));
+}
+
 // Broadcast as a hook to clear other data
 
 broadcast() {



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/compare/39d95c675acefa5ff643d055832093b37b2cffd3...80c57ed87e50c7c95b1c8a51bc68250e4410f192

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/compare/39d95c675acefa5ff643d055832093b37b2cffd3...80c57ed87e50c7c95b1c8a51bc68250e4410f192
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser] Pushed new branch mullvad-browser-115.1.0esr-13.0-1

2023-08-21 Thread ma1 (@ma1) via tor-commits


ma1 pushed new branch mullvad-browser-115.1.0esr-13.0-1 at The Tor Project / 
Applications / Tor Browser

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/tree/mullvad-browser-115.1.0esr-13.0-1
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][base-browser-115.1.0esr-13.0-1] fixup! Bug 40926: Implemented the New Identity feature

2023-08-21 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch base-browser-115.1.0esr-13.0-1 at The Tor Project / 
Applications / Tor Browser


Commits:
64c5d915 by hackademix at 2023-08-21T14:30:10+02:00
fixup! Bug 40926: Implemented the New Identity feature

Bug 41833: Reload extensions on new identity

- - - - -


1 changed file:

- browser/components/newidentity/content/newidentity.js


Changes:

=
browser/components/newidentity/content/newidentity.js
=
@@ -144,6 +144,7 @@ XPCOMUtils.defineLazyGetter(this, "NewIdentityButton", () 
=> {
   this.clearStorage();
   this.clearPreferencesAndPermissions();
   await this.clearData();
+  await this.reloadAddons();
   this.clearConnections();
   this.clearPrivateSession();
 }
@@ -414,6 +415,15 @@ XPCOMUtils.defineLazyGetter(this, "NewIdentityButton", () 
=> {
   Services.obs.notifyObservers(null, "last-pb-context-exited");
 }
 
+async reloadAddons() {
+  logger.info("Reloading add-ons to clear their temporary state.");
+  // Reload all active extensions except search engines, which would throw.
+  const addons = (
+await AddonManager.getAddonsByTypes(["extension"])
+  ).filter(a => a.isActive && !a.id.endsWith("@search.mozilla.org"));
+  await Promise.all(addons.map(a => a.reload()));
+}
+
 // Broadcast as a hook to clear other data
 
 broadcast() {



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/64c5d915e37966513a83e7e897e945b091bc3108

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/64c5d915e37966513a83e7e897e945b091bc3108
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser] Deleted branch mullvad-browser-115.1.0esr-13.0-1

2023-08-21 Thread ma1 (@ma1) via tor-commits


ma1 deleted branch mullvad-browser-115.1.0esr-13.0-1 at The Tor Project / 
Applications / Tor Browser

-- 

You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser] Pushed new tag tor-browser-102.15.0esr-12.5-1-build2

2023-08-28 Thread ma1 (@ma1) via tor-commits


ma1 pushed new tag tor-browser-102.15.0esr-12.5-1-build2 at The Tor Project / 
Applications / Tor Browser

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/tree/tor-browser-102.15.0esr-12.5-1-build2
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser] Pushed new tag base-browser-102.15.0esr-12.5-1-build2

2023-08-28 Thread ma1 (@ma1) via tor-commits


ma1 pushed new tag base-browser-102.15.0esr-12.5-1-build2 at The Tor Project / 
Applications / Tor Browser

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/tree/base-browser-102.15.0esr-12.5-1-build2
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser-build][maint-12.5] Bug 40740: Do not add -utls-imitate to Snowflake on tor-onion-proxy-library.

2023-08-29 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch maint-12.5 at The Tor Project / Applications / 
tor-browser-build


Commits:
26496b1d by Pier Angelo Vendrame at 2023-08-29T14:13:13+02:00
Bug 40740: Do not add -utls-imitate to Snowflake on tor-onion-proxy-library.

This parameter added with the previous commit prevents Snowflake from
working properly.
So, we prefer to undo the addition (but keep the changes to the ICE
server list).

- - - - -


1 changed file:

- projects/tor-onion-proxy-library/0001-Bug-30318-Add-snowflake-support.patch


Changes:

=
projects/tor-onion-proxy-library/0001-Bug-30318-Add-snowflake-support.patch
=
@@ -71,7 +71,7 @@ index 2405097..bcb6a37 100644
 -buffer.append("ClientTransportPlugin meek_lite,obfs3,obfs4 exec 
").append(clientPath).append('\n');
 +public TorConfigBuilder transportPlugin(String obfsPath, String snowPath) 
{
 +buffer.append("ClientTransportPlugin meek_lite,obfs3,obfs4 exec 
").append(obfsPath).append('\n');
-+buffer.append("ClientTransportPlugin snowflake exec 
").append(snowPath).append(" -url 
https://snowflake-broker.torproject.net.global.prod.fastly.net/ -front 
cdn.sstatic.net -ice 
stun:stun.l.google.com:19302,stun:stun.antisip.com:3478,stun:stun.bluesip.net:3478,stun:stun.dus.net:3478,stun:stun.epygi.com:3478,stun:stun.sonetel.com:3478,stun:stun.uls.co.za:3478,stun:stun.voipgate.com:3478,stun:stun.voys.nl:3478
 -utls-imitate=hellorandomizedalpn\n");
++buffer.append("ClientTransportPlugin snowflake exec 
").append(snowPath).append(" -url 
https://snowflake-broker.torproject.net.global.prod.fastly.net/ -front 
cdn.sstatic.net -ice 
stun:stun.l.google.com:19302,stun:stun.antisip.com:3478,stun:stun.bluesip.net:3478,stun:stun.dus.net:3478,stun:stun.epygi.com:3478,stun:stun.sonetel.com:3478,stun:stun.uls.co.za:3478,stun:stun.voipgate.com:3478,stun:stun.voys.nl:3478\n");
  return this;
  }
  



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/commit/26496b1de3391092085c0d3264974f446b5a1e7f

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/commit/26496b1de3391092085c0d3264974f446b5a1e7f
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][tor-browser-115.4.0esr-13.0-1] Bug 42194: Fix blank net error page on failed DNS resolution with active proxy.

2023-11-08 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch tor-browser-115.4.0esr-13.0-1 at The Tor Project / 
Applications / Tor Browser


Commits:
20f764ba by hackademix at 2023-11-08T13:41:58+01:00
Bug 42194: Fix blank net error page on failed DNS resolution with active proxy.

- - - - -


1 changed file:

- toolkit/actors/NetErrorChild.sys.mjs


Changes:

=
toolkit/actors/NetErrorChild.sys.mjs
=
@@ -140,12 +140,15 @@ export class NetErrorChild extends RemotePageChild {
 shortDesc.appendChild(span);
   },
 };
-
-Services.uriFixup.checkHost(
-  info.fixedURI,
-  onLookupCompleteListener,
-  this.document.nodePrincipal.originAttributes
-);
+try {
+  Services.uriFixup.checkHost(
+info.fixedURI,
+onLookupCompleteListener,
+this.document.nodePrincipal.originAttributes
+  );
+} catch (e) {
+  // DNS resolution may fail synchronously if forbidden by proxy
+}
   }
 
   // Get the header from the http response of the failed channel. This function



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/20f764bab4814a0430c00b054815dccef0683bf3

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/20f764bab4814a0430c00b054815dccef0683bf3
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][base-browser-115.4.0esr-13.0-1] Bug 42194: Fix blank net error page on failed DNS resolution with active proxy.

2023-11-08 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch base-browser-115.4.0esr-13.0-1 at The Tor Project / 
Applications / Tor Browser


Commits:
6f9292eb by hackademix at 2023-11-08T13:44:18+01:00
Bug 42194: Fix blank net error page on failed DNS resolution with active proxy.

- - - - -


1 changed file:

- toolkit/actors/NetErrorChild.sys.mjs


Changes:

=
toolkit/actors/NetErrorChild.sys.mjs
=
@@ -133,12 +133,15 @@ export class NetErrorChild extends RemotePageChild {
 shortDesc.appendChild(span);
   },
 };
-
-Services.uriFixup.checkHost(
-  info.fixedURI,
-  onLookupCompleteListener,
-  this.document.nodePrincipal.originAttributes
-);
+try {
+  Services.uriFixup.checkHost(
+info.fixedURI,
+onLookupCompleteListener,
+this.document.nodePrincipal.originAttributes
+  );
+} catch (e) {
+  // DNS resolution may fail synchronously if forbidden by proxy
+}
   }
 
   // Get the header from the http response of the failed channel. This function



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/6f9292eb84cc2ca0323a7c7cdf0fd4c4f8c21c04

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/6f9292eb84cc2ca0323a7c7cdf0fd4c4f8c21c04
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/mullvad-browser][mullvad-browser-115.4.0esr-13.0-1] Bug 42194: Fix blank net error page on failed DNS resolution with active proxy.

2023-11-08 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch mullvad-browser-115.4.0esr-13.0-1 at The Tor Project / 
Applications / Mullvad Browser


Commits:
23d4e4c4 by hackademix at 2023-11-08T13:45:19+01:00
Bug 42194: Fix blank net error page on failed DNS resolution with active proxy.

- - - - -


1 changed file:

- toolkit/actors/NetErrorChild.sys.mjs


Changes:

=
toolkit/actors/NetErrorChild.sys.mjs
=
@@ -133,12 +133,15 @@ export class NetErrorChild extends RemotePageChild {
 shortDesc.appendChild(span);
   },
 };
-
-Services.uriFixup.checkHost(
-  info.fixedURI,
-  onLookupCompleteListener,
-  this.document.nodePrincipal.originAttributes
-);
+try {
+  Services.uriFixup.checkHost(
+info.fixedURI,
+onLookupCompleteListener,
+this.document.nodePrincipal.originAttributes
+  );
+} catch (e) {
+  // DNS resolution may fail synchronously if forbidden by proxy
+}
   }
 
   // Get the header from the http response of the failed channel. This function



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/23d4e4c459c271d9f0d6346b897f006de68dd3e6

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/23d4e4c459c271d9f0d6346b897f006de68dd3e6
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/fenix][tor-browser-102.2.1-12.5-1] fixup! Modify build system

2023-03-21 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch tor-browser-102.2.1-12.5-1 at The Tor Project / 
Applications / fenix


Commits:
5c26f235 by Pier Angelo Vendrame at 2023-03-21T11:14:21+01:00
fixup! Modify build system

Bug 41684: Android improvements for local dev builds

Added a script to fetch the Tor dependencies from tor-browser-build,
and print the name of the signed apk.

- - - - -


2 changed files:

- + tools/tba-fetch-deps.sh
- tools/tba-sign-devbuilds.sh


Changes:

=
tools/tba-fetch-deps.sh
=
@@ -0,0 +1,22 @@
+#!/bin/bash
+
+cd "$(dirname $(realpath "$0"))/.."
+
+if [ -z "$TOR_BROWSER_BUILD" ]; then
+   TOR_BROWSER_BUILD=../tor-browser-build
+fi
+
+android_service="$(ls -1td 
"$TOR_BROWSER_BUILD/out/tor-android-service/"tor-android-service-* | head -1)"
+if [ -z "$android_service" ]; then
+   echo "Cannot find Tor Android Service artifacts!"
+   exit 1
+fi
+
+onion_proxy_library="$(ls -1td 
"$TOR_BROWSER_BUILD/out/tor-onion-proxy-library/"tor-onion-proxy-library-* | 
head -1)"
+if [ -z "$onion_proxy_library" ]; then
+   echo "Cannot find Tor Onoin Proxy library artifacts!"
+   exit 2
+fi
+
+cp "$android_service"/* app/
+cp "$onion_proxy_library"/* app/


=
tools/tba-sign-devbuilds.sh
=
@@ -38,6 +38,7 @@ sign () {
rm -f "$aligned"
"$zipalign" -p 4 "$apk" "$aligned"
"$apksigner" sign --ks "$key" --in "$aligned" --out "$out" 
--ks-key-alias androidqakey --key-pass pass:android --ks-pass pass:android
+   echo "Signed $out"
 }
 
 for apk in app/build/outputs/apk/release/*-unsigned.apk; do



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/fenix/-/commit/5c26f2353ef1ae1756cfee563db6f06614a76bd4

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/fenix/-/commit/5c26f2353ef1ae1756cfee563db6f06614a76bd4
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][tor-browser-102.12.0esr-12.5-1] fixup! Bug 21952: Implement Onion-Location

2023-06-13 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch tor-browser-102.12.0esr-12.5-1 at The Tor Project / 
Applications / Tor Browser


Commits:
5a49e443 by Pier Angelo Vendrame at 2023-06-13T09:08:07+02:00
fixup! Bug 21952: Implement Onion-Location

Bug 41841: Use the new onion-site.svg icon in the onion-location pill

- - - - -


3 changed files:

- browser/components/onionservices/content/onionlocation.css
- − browser/components/onionservices/content/onionlocation.svg
- browser/components/onionservices/jar.mn


Changes:

=
browser/components/onionservices/content/onionlocation.css
=
@@ -1,7 +1,7 @@
 /* Copyright (c) 2020, The Tor Project, Inc. */
 
 #onion-location-button {
-  list-style-image: 
url(chrome://browser/content/onionservices/onionlocation.svg);
+  list-style-image: url(chrome://browser/skin/onion-site.svg);
   -moz-context-properties: fill;
   fill: currentColor;
 }


=
browser/components/onionservices/content/onionlocation.svg deleted
=
@@ -1,3 +0,0 @@
-http://www.w3.org/2000/svg; xmlns:xlink="http://www.w3.org/1999/xlink;>
-  
-
\ No newline at end of file


=
browser/components/onionservices/jar.mn
=
@@ -8,5 +8,4 @@ browser.jar:
 content/browser/onionservices/savedKeysDialog.js   
(content/savedKeysDialog.js)
 content/browser/onionservices/savedKeysDialog.xhtml
(content/savedKeysDialog.xhtml)
 content/browser/onionservices/onionlocationPreferences.js  
(content/onionlocationPreferences.js)
-content/browser/onionservices/onionlocation.svg
(content/onionlocation.svg)
 skin/classic/browser/onionlocation.css 
(content/onionlocation.css)



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/5a49e4435fc1a754ba85bb909b41f92dcd861a6d

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/5a49e4435fc1a754ba85bb909b41f92dcd861a6d
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][tor-browser-115.0esrbase-13.0-1] Bug 41834: Hide "Can't Be Removed - learn more" menu line for uninstallable add-ons

2023-07-06 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch tor-browser-115.0esrbase-13.0-1 at The Tor Project / 
Applications / Tor Browser


Commits:
b06f6190 by hackademix at 2023-07-06T00:10:24+02:00
Bug 41834: Hide Cant Be Removed - learn more menu line for 
uninstallable add-ons

- - - - -


1 changed file:

- toolkit/mozapps/extensions/content/aboutaddons.js


Changes:

=
toolkit/mozapps/extensions/content/aboutaddons.js
=
@@ -1492,8 +1492,9 @@ class AddonOptions extends HTMLElement {
   el.disabled = false;
   el.hidden = false;
   document.l10n.setAttributes(el, "remove-addon-button");
-} else if (addon.isBuiltin) {
-  // Likely the built-in themes, can't be removed, that's fine.
+} else if (true || addon.isBuiltin) {
+  // Just hide the uninstall button for any "special" add-on
+  // which can't be removed (tor-browser#41834)
   el.hidden = true;
 } else {
   // Likely sideloaded, mention that it can't be removed with a link.



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/b06f61906d0f76ad5fca1ebf410cd4b9cd5e3679

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/b06f61906d0f76ad5fca1ebf410cd4b9cd5e3679
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][base-browser-115.0esrbase-13.0-1] Bug 41834: Hide "Can't Be Removed - learn more" menu line for uninstallable add-ons

2023-07-06 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch base-browser-115.0esrbase-13.0-1 at The Tor Project / 
Applications / Tor Browser


Commits:
e4fae18a by hackademix at 2023-07-06T15:46:27+02:00
Bug 41834: Hide Cant Be Removed - learn more menu line for 
uninstallable add-ons

- - - - -


1 changed file:

- toolkit/mozapps/extensions/content/aboutaddons.js


Changes:

=
toolkit/mozapps/extensions/content/aboutaddons.js
=
@@ -1492,8 +1492,9 @@ class AddonOptions extends HTMLElement {
   el.disabled = false;
   el.hidden = false;
   document.l10n.setAttributes(el, "remove-addon-button");
-} else if (addon.isBuiltin) {
-  // Likely the built-in themes, can't be removed, that's fine.
+} else if (true || addon.isBuiltin) {
+  // Just hide the uninstall button for any "special" add-on
+  // which can't be removed (tor-browser#41834)
   el.hidden = true;
 } else {
   // Likely sideloaded, mention that it can't be removed with a link.



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/e4fae18afa97556839332320e9a340546a47b392

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/e4fae18afa97556839332320e9a340546a47b392
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][base-browser-115.0esrbase-13.0-1] Bug 41092: Add a RemoteSettings JSON dump for query-stripping

2023-07-12 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch base-browser-115.0esrbase-13.0-1 at The Tor Project / 
Applications / Tor Browser


Commits:
0a89389f by cypherpunks1 at 2023-07-13T00:40:56+02:00
Bug 41092: Add a RemoteSettings JSON dump for query-stripping

- - - - -


2 changed files:

- services/settings/static-dumps/main/moz.build
- + services/settings/static-dumps/main/query-stripping.json


Changes:

=
services/settings/static-dumps/main/moz.build
=
@@ -5,6 +5,7 @@
 FINAL_TARGET_FILES.defaults.settings.main += [
 "doh-config.json",
 "doh-providers.json",
+"query-stripping.json",
 ]
 
 if CONFIG["MOZ_BUILD_APP"] == "browser":


=
services/settings/static-dumps/main/query-stripping.json
=
@@ -0,0 +1,44 @@
+{
+  "data": [
+{
+  "schema": 1678379807899,
+  "allowList": [],
+  "stripList": [
+"gclid",
+"dclid",
+"msclkid",
+"_openstat",
+"yclid",
+"wickedid",
+"twclid",
+"_hsenc",
+"__hssc",
+"__hstc",
+"__hsfp",
+"hsctatracking",
+"wbraid",
+"gbraid",
+"ysclid"
+  ],
+  "id": "85078bad-f31e-4d93-bb8a-81088b25d6dd",
+  "last_modified": 1678736907773
+},
+{
+  "schema": 1649695008608,
+  "allowList": [],
+  "stripList": [
+"mc_eid",
+"oly_anon_id",
+"oly_enc_id",
+"__s",
+"vero_id",
+"_hsenc",
+"mkt_tok",
+"fbclid"
+  ],
+  "id": "76495cfc-fac9-4079-9b5f-9ff0784484de",
+  "last_modified": 1649762862679
+}
+  ],
+  "timestamp": 1678736907773
+}



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/0a89389f6524620675ad4623cc6d5aa40ed8d574

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/0a89389f6524620675ad4623cc6d5aa40ed8d574
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][tor-browser-115.0esrbase-13.0-1] 2 commits: fixup! Firefox preference overrides.

2023-07-12 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch tor-browser-115.0esrbase-13.0-1 at The Tor Project / 
Applications / Tor Browser


Commits:
44eff978 by cypherpunks1 at 2023-07-12T14:35:28+00:00
fixup! Firefox preference overrides.

Bug 41092: Enable URL query stripping to protect against cross-site tracking

- - - - -
9740e17d by cypherpunks1 at 2023-07-12T14:35:28+00:00
Bug 41092: Add a RemoteSettings JSON dump for query-stripping

- - - - -


3 changed files:

- browser/app/profile/001-base-profile.js
- services/settings/static-dumps/main/moz.build
- + services/settings/static-dumps/main/query-stripping.json


Changes:

=
browser/app/profile/001-base-profile.js
=
@@ -505,6 +505,11 @@ pref("corroborator.enabled", false);
 // stop using .textContent.
 pref("intl.multilingual.liveReload", false);
 
+// Enable URL query stripping to protect against cross-site tracking 
(tor-browser#41092)
+pref("privacy.query_stripping.enabled", true);
+pref("privacy.query_stripping.enabled.pbmode", true);
+pref("privacy.query_stripping.strip_on_share.enabled", true);
+
 #ifdef XP_WIN
 // prefs to disable jump-list entries in the taskbar on Windows (see bug 
#12885)
 // this pref changes the app's set AUMID to be dependent on the profile path, 
rather than


=
services/settings/static-dumps/main/moz.build
=
@@ -5,6 +5,7 @@
 FINAL_TARGET_FILES.defaults.settings.main += [
 "doh-config.json",
 "doh-providers.json",
+"query-stripping.json",
 ]
 
 if CONFIG["MOZ_BUILD_APP"] == "browser":


=
services/settings/static-dumps/main/query-stripping.json
=
@@ -0,0 +1,44 @@
+{
+  "data": [
+{
+  "schema": 1678379807899,
+  "allowList": [],
+  "stripList": [
+"gclid",
+"dclid",
+"msclkid",
+"_openstat",
+"yclid",
+"wickedid",
+"twclid",
+"_hsenc",
+"__hssc",
+"__hstc",
+"__hsfp",
+"hsctatracking",
+"wbraid",
+"gbraid",
+"ysclid"
+  ],
+  "id": "85078bad-f31e-4d93-bb8a-81088b25d6dd",
+  "last_modified": 1678736907773
+},
+{
+  "schema": 1649695008608,
+  "allowList": [],
+  "stripList": [
+"mc_eid",
+"oly_anon_id",
+"oly_enc_id",
+"__s",
+"vero_id",
+"_hsenc",
+"mkt_tok",
+"fbclid"
+  ],
+  "id": "76495cfc-fac9-4079-9b5f-9ff0784484de",
+  "last_modified": 1649762862679
+}
+  ],
+  "timestamp": 1678736907773
+}



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/compare/5b4fa6e2f9f50a99b9ff8827f15f9845f500cc48...9740e17dde1ca86475575dac0358ffac364a6414

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/compare/5b4fa6e2f9f50a99b9ff8827f15f9845f500cc48...9740e17dde1ca86475575dac0358ffac364a6414
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][tor-browser-115.0esrbase-13.0-1] fixup! Bug 23247: Communicating security expectations for .onion

2023-07-13 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch tor-browser-115.0esrbase-13.0-1 at The Tor Project / 
Applications / Tor Browser


Commits:
82c31751 by cypherpunks1 at 2023-07-12T16:18:15-08:00
fixup! Bug 23247: Communicating security expectations for .onion

Bug 41399: Enable brotli encoding for http onions

- - - - -


1 changed file:

- netwerk/protocol/http/HttpBaseChannel.cpp


Changes:

=
netwerk/protocol/http/HttpBaseChannel.cpp
=
@@ -340,6 +340,7 @@ void HttpBaseChannel::AddClassificationFlags(uint32_t 
aClassificationFlags,
 
 static bool isSecureOrTrustworthyURL(nsIURI* aURI) {
   return aURI->SchemeIs("https") ||
+ nsMixedContentBlocker::IsPotentiallyTrustworthyOnion(aURI) ||
  (StaticPrefs::network_http_encoding_trustworthy_is_https() &&
   nsMixedContentBlocker::IsPotentiallyTrustworthyLoopbackURL(aURI));
 }
@@ -366,7 +367,6 @@ nsresult HttpBaseChannel::Init(nsIURI* aURI, uint32_t aCaps,
   // Construct connection info object
   nsAutoCString host;
   int32_t port = -1;
-  bool isHTTPS = isSecureOrTrustworthyURL(mURI);
 
   nsresult rv = mURI->GetAsciiHost(host);
   if (NS_FAILED(rv)) return rv;
@@ -395,7 +395,7 @@ nsresult HttpBaseChannel::Init(nsIURI* aURI, uint32_t aCaps,
   if (NS_FAILED(rv)) return rv;
 
   rv = gHttpHandler->AddStandardRequestHeaders(
-  , isHTTPS, aContentPolicyType,
+  , isSecureOrTrustworthyURL(mURI), aContentPolicyType,
   nsContentUtils::ShouldResistFingerprinting(this));
   if (NS_FAILED(rv)) return rv;
 



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/82c31751c263ae795bcf5c8df3c947f0576fb2cb

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/82c31751c263ae795bcf5c8df3c947f0576fb2cb
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][tor-browser-115.0esrbase-13.0-1] fixup! Bug 41698: Reword the recommendation badges in about:addons

2023-07-11 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch tor-browser-115.0esrbase-13.0-1 at The Tor Project / 
Applications / Tor Browser


Commits:
a884f352 by hackademix at 2023-07-11T15:48:11+02:00
fixup! Bug 41698: Reword the recommendation badges in about:addons

- - - - -


3 changed files:

- toolkit/content/widgets/moz-support-link/moz-support-link.mjs
- toolkit/mozapps/extensions/content/aboutaddons.html
- toolkit/mozapps/extensions/content/aboutaddons.js


Changes:

=
toolkit/content/widgets/moz-support-link/moz-support-link.mjs
=
@@ -52,6 +52,23 @@ export default class MozSupportLink extends 
HTMLAnchorElement {
 this.setAttribute("target", "_blank");
 this.addEventListener("click", this);
 if (!this.getAttribute("data-l10n-id")) {
+  const fixupL10nId = this.getAttribute("data-basebrowser-l10n-fixup");
+  if (fixupL10nId) {
+document.l10n.formatValue(fixupL10nId).then(title => {
+  this.setAttribute("title", title);
+  // NOTE: Mozilla adds identical aria-label and title attributes. 
This is
+  // generally bad practice because this link has no text content, so 
the
+  // title alone will already act as the accessible name.
+  // Normally setting both aria-label and title will lead to the title 
being
+  // used as the accessible description, but since they are identical
+  // the LocalAccessible::Description method will make an exception 
and keep
+  // the description empty.
+  // Since this component is outside of our fork's control, we follow 
the
+  // same practice just in case Mozilla ever adds some text content.
+  this.setAttribute("aria-label", title);
+});
+return;
+  }
   document.l10n.setAttributes(this, "moz-support-link-text");
 }
 document.l10n.translateFragment(this);


=
toolkit/mozapps/extensions/content/aboutaddons.html
=
@@ -359,6 +359,7 @@
 is="moz-support-link"
 support-page="add-on-badges"
 utm-content="promoted-addon-badge"
+
data-basebrowser-l10n-fixup="basebrowser-addon-badge-recommended"
 hidden
   >
   
@@ -376,6 +377,7 @@
 is="moz-support-link"
 support-page="add-on-badges"
 utm-content="promoted-addon-badge"
+data-basebrowser-l10n-fixup="basebrowser-addon-badge-verified"
 hidden
   >
   


=
toolkit/mozapps/extensions/content/aboutaddons.js
=
@@ -4220,29 +4220,6 @@ async function initialize() {
   );
 }
   }
-
-  // At the moment we need to do this, because Weblate still does not support
-  // attributes in Fluent.
-  const [recommended, verified] = await document.l10n.formatValues([
-{ id: "basebrowser-addon-badge-recommended" },
-{ id: "basebrowser-addon-badge-verified" },
-  ]);
-
-  importTemplate("card");
-  _templates.card.content
-.querySelector(".addon-badge-recommended")
-.setAttribute("title", recommended);
-  _templates.card.content
-.querySelector(".addon-badge-verified")
-.setAttribute("title", verified);
-
-  // We also update any template copy that has already been created.
-  for (const badge of document.querySelectorAll(".addon-badge-recommended")) {
-badge.setAttribute("title", recommended);
-  }
-  for (const badge of document.querySelectorAll(".addon-badge-verified")) {
-badge.setAttribute("title", verified);
-  }
 }
 
 window.promiseInitialized = new Promise(resolve => {



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/a884f352ec0a3f43c96765b3a5598bdfacc6f42e

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/a884f352ec0a3f43c96765b3a5598bdfacc6f42e
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][base-browser-115.0esrbase-13.0-1] fixup! Bug 41698: Reword the recommendation badges in about:addons

2023-07-11 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch base-browser-115.0esrbase-13.0-1 at The Tor Project / 
Applications / Tor Browser


Commits:
eba10c40 by hackademix at 2023-07-11T16:45:09+02:00
fixup! Bug 41698: Reword the recommendation badges in about:addons

- - - - -


3 changed files:

- toolkit/content/widgets/moz-support-link/moz-support-link.mjs
- toolkit/mozapps/extensions/content/aboutaddons.html
- toolkit/mozapps/extensions/content/aboutaddons.js


Changes:

=
toolkit/content/widgets/moz-support-link/moz-support-link.mjs
=
@@ -52,6 +52,23 @@ export default class MozSupportLink extends 
HTMLAnchorElement {
 this.setAttribute("target", "_blank");
 this.addEventListener("click", this);
 if (!this.getAttribute("data-l10n-id")) {
+  const fixupL10nId = this.getAttribute("data-basebrowser-l10n-fixup");
+  if (fixupL10nId) {
+document.l10n.formatValue(fixupL10nId).then(title => {
+  this.setAttribute("title", title);
+  // NOTE: Mozilla adds identical aria-label and title attributes. 
This is
+  // generally bad practice because this link has no text content, so 
the
+  // title alone will already act as the accessible name.
+  // Normally setting both aria-label and title will lead to the title 
being
+  // used as the accessible description, but since they are identical
+  // the LocalAccessible::Description method will make an exception 
and keep
+  // the description empty.
+  // Since this component is outside of our fork's control, we follow 
the
+  // same practice just in case Mozilla ever adds some text content.
+  this.setAttribute("aria-label", title);
+});
+return;
+  }
   document.l10n.setAttributes(this, "moz-support-link-text");
 }
 document.l10n.translateFragment(this);


=
toolkit/mozapps/extensions/content/aboutaddons.html
=
@@ -359,6 +359,7 @@
 is="moz-support-link"
 support-page="add-on-badges"
 utm-content="promoted-addon-badge"
+
data-basebrowser-l10n-fixup="basebrowser-addon-badge-recommended"
 hidden
   >
   
@@ -376,6 +377,7 @@
 is="moz-support-link"
 support-page="add-on-badges"
 utm-content="promoted-addon-badge"
+data-basebrowser-l10n-fixup="basebrowser-addon-badge-verified"
 hidden
   >
   


=
toolkit/mozapps/extensions/content/aboutaddons.js
=
@@ -4220,29 +4220,6 @@ async function initialize() {
   );
 }
   }
-
-  // At the moment we need to do this, because Weblate still does not support
-  // attributes in Fluent.
-  const [recommended, verified] = await document.l10n.formatValues([
-{ id: "basebrowser-addon-badge-recommended" },
-{ id: "basebrowser-addon-badge-verified" },
-  ]);
-
-  importTemplate("card");
-  _templates.card.content
-.querySelector(".addon-badge-recommended")
-.setAttribute("title", recommended);
-  _templates.card.content
-.querySelector(".addon-badge-verified")
-.setAttribute("title", verified);
-
-  // We also update any template copy that has already been created.
-  for (const badge of document.querySelectorAll(".addon-badge-recommended")) {
-badge.setAttribute("title", recommended);
-  }
-  for (const badge of document.querySelectorAll(".addon-badge-verified")) {
-badge.setAttribute("title", verified);
-  }
 }
 
 window.promiseInitialized = new Promise(resolve => {



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/eba10c40f35483210d8ad8af03aa48dbbcc6076c

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/eba10c40f35483210d8ad8af03aa48dbbcc6076c
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser] Pushed new branch tor-browser-102.12.0esr-12.5-1

2023-05-29 Thread ma1 (@ma1) via tor-commits


ma1 pushed new branch tor-browser-102.12.0esr-12.5-1 at The Tor Project / 
Applications / Tor Browser

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/tree/tor-browser-102.12.0esr-12.5-1
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser] Pushed new branch tor-browser-102.12.0esr-12.0-1

2023-05-29 Thread ma1 (@ma1) via tor-commits


ma1 pushed new branch tor-browser-102.12.0esr-12.0-1 at The Tor Project / 
Applications / Tor Browser

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/tree/tor-browser-102.12.0esr-12.0-1
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][tor-browser-102.11.0esr-12.5-1] fixup! Bug 23247: Communicating security expectations for .onion

2023-05-25 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch tor-browser-102.11.0esr-12.5-1 at The Tor Project / 
Applications / Tor Browser


Commits:
dbec6cf6 by cypherpunks1 at 2023-05-24T09:21:07-08:00
fixup! Bug 23247: Communicating security expectations for .onion

Bug 41785: Show http onion resources as secure in network monitor

- - - - -


1 changed file:

- devtools/shared/webconsole/network-helper.js


Changes:

=
devtools/shared/webconsole/network-helper.js
=
@@ -600,6 +600,9 @@ var NetworkHelper = {
 
 // The request did not contain any security info.
 if (!securityInfo) {
+  if (httpActivity.hostname && httpActivity.hostname.endsWith(".onion")) {
+info.state = "secure";
+  }
   return info;
 }
 
@@ -651,7 +654,11 @@ var NetworkHelper = {
 // schemes other than https and wss are subject to
 // downgrade/etc at the scheme level and should always be
 // considered insecure
-info.state = "insecure";
+if (httpActivity.hostname && httpActivity.hostname.endsWith(".onion")) 
{
+  info.state = "secure";
+} else {
+  info.state = "insecure";
+}
   } else if (state & wpl.STATE_IS_SECURE) {
 // The connection is secure if the scheme is sufficient
 info.state = "secure";



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/dbec6cf620a2f5d4a5b9ed162e795978eacea0cc

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/dbec6cf620a2f5d4a5b9ed162e795978eacea0cc
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser-build][main] Bug 40874: Include the commit information in GeckoView

2023-06-08 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch main at The Tor Project / Applications / tor-browser-build


Commits:
f4227713 by Pier Angelo Vendrame at 2023-06-07T19:10:03+02:00
Bug 40874: Include the commit information in GeckoView

Add the commit hash and GitLab URL to the mozconfig to make them appear
in about:buildconfig on Android, too.

- - - - -


2 changed files:

- projects/geckoview/build
- projects/geckoview/config


Changes:

=
projects/geckoview/build
=
@@ -41,7 +41,13 @@ export 
PATH="/var/tmp/dist/rust/bin:/var/tmp/dist/cbindgen:/var/tmp/dist/nasm/bi
 tar -C /var/tmp/build -xf [% project %]-[% c('version') %].tar.gz
 
 cd /var/tmp/build/[% project %]-[% c("version") %]
-ln -s mozconfig-[% c("var/osname") %] .mozconfig
+cat > .mozconfig << 'MOZCONFIG_EOF'
+. $topsrcdir/mozconfig-[% c("var/osname") %]
+
+export MOZ_INCLUDE_SOURCE_INFO=1
+export MOZ_SOURCE_REPO="[% c('var/gitlab_project') %]"
+export MOZ_SOURCE_CHANGESET=[% c("var/git_commit") %]
+MOZCONFIG_EOF
 
 eval $(perl $rootdir/get-moz-build-date [% c("var/copyright_year") %] [% 
c("var/torbrowser_version") %])
 if [ -z $MOZ_BUILD_DATE ]


=
projects/geckoview/config
=
@@ -15,6 +15,8 @@ var:
   browser_branch: 12.5-1
   browser_build: 3
   copyright_year: '[% exec("git show -s --format=%ci").remove("-.*") %]'
+  gitlab_project: https://gitlab.torproject.org/tpo/applications/tor-browser
+  git_commit: '[% exec("git rev-parse HEAD") %]'
   deps:
 - build-essential
 - unzip



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/commit/f422771302caf12d6410d9602b46b511b799bcab

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/commit/f422771302caf12d6410d9602b46b511b799bcab
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][tor-browser-102.12.0esr-12.5-1] fixup! Add TorStrings module for localization

2023-06-08 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch tor-browser-102.12.0esr-12.5-1 at The Tor Project / 
Applications / Tor Browser


Commits:
2165eb00 by Pier Angelo Vendrame at 2023-06-08T10:47:48+02:00
fixup! Add TorStrings module for localization

Bug 41818: Remove YEC 2022 strings

- - - - -


1 changed file:

- toolkit/torbutton/chrome/locale/en-US/aboutTor.dtd


Changes:

=
toolkit/torbutton/chrome/locale/en-US/aboutTor.dtd
=
@@ -38,22 +38,3 @@
 
 
 
-
-
-
-
-
-
-
-
-
-
-
-
-
-



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/2165eb00af36b03a457bfd87d701f575b3bdb458

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/2165eb00af36b03a457bfd87d701f575b3bdb458
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][tor-browser-102.12.0esr-12.5-1] fixup! Bug 8324: Prevent DNS proxy bypasses caused by Drag

2023-06-05 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch tor-browser-102.12.0esr-12.5-1 at The Tor Project / 
Applications / Tor Browser


Commits:
423f239c by cypherpunks1 at 2023-06-05T11:07:29-08:00
fixup! Bug 8324: Prevent DNS proxy bypasses caused by DragDrop

Bug 41792: Allow dragging downloads from about:downloads and the download panel

- - - - -


1 changed file:

- toolkit/torbutton/components/dragDropFilter.js


Changes:

=
toolkit/torbutton/components/dragDropFilter.js
=
@@ -142,7 +142,8 @@ DragDropFilter.prototype = {
   for (const type of types) {
 if (
   type !== INTERNAL_FALLBACK &&
-  type !== "text/x-moz-place" // don't touch bookmarks
+  type !== "text/x-moz-place" &&// don't touch bookmarks
+  type !== "application/x-moz-file" // don't touch downloads
 ) {
   aDataTransfer.mozClearDataAt(type, i);
 }



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/423f239c5675d2522093c991831032ea565de55c

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/423f239c5675d2522093c991831032ea565de55c
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][tor-browser-102.12.0esr-12.5-1] fixup! Bug 32308: use direct browser sizing for letterboxing.

2023-06-12 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch tor-browser-102.12.0esr-12.5-1 at The Tor Project / 
Applications / Tor Browser


Commits:
1fac685b by hackademix at 2023-06-12T09:22:03+02:00
fixup! Bug 32308: use direct browser sizing for letterboxing.

- - - - -


1 changed file:

- toolkit/components/resistfingerprinting/RFPHelper.jsm


Changes:

=
toolkit/components/resistfingerprinting/RFPHelper.jsm
=
@@ -51,7 +51,7 @@ function forEachWindow(callback) {
 
 
 async function windowResizeHandler(aEvent) {
-  if (RFPHelper.letterboxingEnabled) {
+  if (RFPHelper.letterboxingEnabled || !RFPHelper.rfpEnabled) {
 return;
   }
   if (Services.prefs.getIntPref(kPrefResizeWarnings) <= 0) {
@@ -250,7 +250,9 @@ class _RFPHelper {
   }
 
   _handleResistFingerprintingChanged() {
-if (Services.prefs.getBoolPref(kPrefResistFingerprinting)) {
+if (
+  (this.rfpEnabled = Services.prefs.getBoolPref(kPrefResistFingerprinting))
+) {
   this._addRFPObservers();
   Services.ww.registerNotification(this);
   forEachWindow(win => this._attachWindow(win));
@@ -397,7 +399,9 @@ class _RFPHelper {
   kPrefLetterboxing,
   false
 );
-forEachWindow(win => this._updateSizeForTabsInWindow(win));
+if (this.rfpEnabled) {
+  forEachWindow(win => this._updateSizeForTabsInWindow(win));
+}
   }
 
   // The function to parse the dimension set from the pref value. The pref 
value



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/1fac685b89fc2280dc4a21041aead035ef0af145

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/1fac685b89fc2280dc4a21041aead035ef0af145
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][base-browser-102.12.0esr-12.5-1] fixup! Bug 32308: use direct browser sizing for letterboxing.

2023-06-12 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch base-browser-102.12.0esr-12.5-1 at The Tor Project / 
Applications / Tor Browser


Commits:
c8ea1c20 by hackademix at 2023-06-12T10:30:29+02:00
fixup! Bug 32308: use direct browser sizing for letterboxing.

- - - - -


1 changed file:

- toolkit/components/resistfingerprinting/RFPHelper.jsm


Changes:

=
toolkit/components/resistfingerprinting/RFPHelper.jsm
=
@@ -51,7 +51,7 @@ function forEachWindow(callback) {
 
 
 async function windowResizeHandler(aEvent) {
-  if (RFPHelper.letterboxingEnabled) {
+  if (RFPHelper.letterboxingEnabled || !RFPHelper.rfpEnabled) {
 return;
   }
   if (Services.prefs.getIntPref(kPrefResizeWarnings) <= 0) {
@@ -250,7 +250,9 @@ class _RFPHelper {
   }
 
   _handleResistFingerprintingChanged() {
-if (Services.prefs.getBoolPref(kPrefResistFingerprinting)) {
+if (
+  (this.rfpEnabled = Services.prefs.getBoolPref(kPrefResistFingerprinting))
+) {
   this._addRFPObservers();
   Services.ww.registerNotification(this);
   forEachWindow(win => this._attachWindow(win));
@@ -397,7 +399,9 @@ class _RFPHelper {
   kPrefLetterboxing,
   false
 );
-forEachWindow(win => this._updateSizeForTabsInWindow(win));
+if (this.rfpEnabled) {
+  forEachWindow(win => this._updateSizeForTabsInWindow(win));
+}
   }
 
   // The function to parse the dimension set from the pref value. The pref 
value



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/c8ea1c20e48a921ebf534390bc32e99c5fc9d156

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/c8ea1c20e48a921ebf534390bc32e99c5fc9d156
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][tor-browser-102.12.0esr-13.0-1] fixup! Bug 32308: use direct browser sizing for letterboxing.

2023-06-12 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch tor-browser-102.12.0esr-13.0-1 at The Tor Project / 
Applications / Tor Browser


Commits:
a6db7b91 by hackademix at 2023-06-12T10:35:40+02:00
fixup! Bug 32308: use direct browser sizing for letterboxing.

- - - - -


1 changed file:

- toolkit/components/resistfingerprinting/RFPHelper.jsm


Changes:

=
toolkit/components/resistfingerprinting/RFPHelper.jsm
=
@@ -51,7 +51,7 @@ function forEachWindow(callback) {
 
 
 async function windowResizeHandler(aEvent) {
-  if (RFPHelper.letterboxingEnabled) {
+  if (RFPHelper.letterboxingEnabled || !RFPHelper.rfpEnabled) {
 return;
   }
   if (Services.prefs.getIntPref(kPrefResizeWarnings) <= 0) {
@@ -250,7 +250,9 @@ class _RFPHelper {
   }
 
   _handleResistFingerprintingChanged() {
-if (Services.prefs.getBoolPref(kPrefResistFingerprinting)) {
+if (
+  (this.rfpEnabled = Services.prefs.getBoolPref(kPrefResistFingerprinting))
+) {
   this._addRFPObservers();
   Services.ww.registerNotification(this);
   forEachWindow(win => this._attachWindow(win));
@@ -397,7 +399,9 @@ class _RFPHelper {
   kPrefLetterboxing,
   false
 );
-forEachWindow(win => this._updateSizeForTabsInWindow(win));
+if (this.rfpEnabled) {
+  forEachWindow(win => this._updateSizeForTabsInWindow(win));
+}
   }
 
   // The function to parse the dimension set from the pref value. The pref 
value



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/a6db7b91bc2e1e683c09a3ea60055754b1035b78

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/a6db7b91bc2e1e683c09a3ea60055754b1035b78
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser] Pushed new tag base-browser-102.14.0esr-12.5-1-build2

2023-07-31 Thread ma1 (@ma1) via tor-commits


ma1 pushed new tag base-browser-102.14.0esr-12.5-1-build2 at The Tor Project / 
Applications / Tor Browser

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/tree/base-browser-102.14.0esr-12.5-1-build2
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser] Pushed new tag tor-browser-102.14.0esr-12.5-1-build2

2023-07-31 Thread ma1 (@ma1) via tor-commits


ma1 pushed new tag tor-browser-102.14.0esr-12.5-1-build2 at The Tor Project / 
Applications / Tor Browser

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/tree/tor-browser-102.14.0esr-12.5-1-build2
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser] Pushed new tag tor-browser-115.1.0esr-13.0-1-build2

2023-08-01 Thread ma1 (@ma1) via tor-commits


ma1 pushed new tag tor-browser-115.1.0esr-13.0-1-build2 at The Tor Project / 
Applications / Tor Browser

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/tree/tor-browser-115.1.0esr-13.0-1-build2
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser] Pushed new tag base-browser-115.1.0esr-13.0-1-build2

2023-08-01 Thread ma1 (@ma1) via tor-commits


ma1 pushed new tag base-browser-115.1.0esr-13.0-1-build2 at The Tor Project / 
Applications / Tor Browser

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/tree/base-browser-115.1.0esr-13.0-1-build2
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser-build][main] Fix mullvad-browser incrementals and create a build2

2023-07-24 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch main at The Tor Project / Applications / tor-browser-build


Commits:
a1be4abe by Richard Pospesel at 2023-07-24T17:44:56+00:00
Fix mullvad-browser incrementals and create a build2

- - - - -


1 changed file:

- rbm.conf


Changes:

=
rbm.conf
=
@@ -262,8 +262,9 @@ targets:
   exe_name: mullvadbrowser
   mar_channel_id: '[% c("var/projectname") %]-mullvad-[% c("var/channel") 
%]'
   locales: []
+  torbrowser_build: 'build2'
   torbrowser_incremental_from:
-- 12.5a6
+- 12.5a7
 
   torbrowser-testbuild:
 - testbuild



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/commit/a1be4abee11ef39117eabf60d7060342d4b47b10

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/commit/a1be4abee11ef39117eabf60d7060342d4b47b10
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser] Pushed new branch tor-browser-102.14.0esr-12.5-1

2023-07-24 Thread ma1 (@ma1) via tor-commits


ma1 pushed new branch tor-browser-102.14.0esr-12.5-1 at The Tor Project / 
Applications / Tor Browser

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/tree/tor-browser-102.14.0esr-12.5-1
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser] Pushed new branch base-browser-102.14.0esr-12.5-1

2023-07-24 Thread ma1 (@ma1) via tor-commits


ma1 pushed new branch base-browser-102.14.0esr-12.5-1 at The Tor Project / 
Applications / Tor Browser

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/tree/base-browser-102.14.0esr-12.5-1
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][tor-browser-115.1.0esr-13.0-1] amend! Bug 32308: use direct browser sizing for letterboxing.

2023-08-08 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch tor-browser-115.1.0esr-13.0-1 at The Tor Project / 
Applications / Tor Browser


Commits:
63eecb92 by hackademix at 2023-08-08T08:08:43+02:00
amend! Bug 32308: use direct browser sizing for letterboxing.

Bug 32308: use direct browser sizing for letterboxing.
Bug 30556: align letterboxing with 200x100 new win width stepping

- - - - -


1 changed file:

- toolkit/components/resistfingerprinting/RFPHelper.sys.mjs


Changes:

=
toolkit/components/resistfingerprinting/RFPHelper.sys.mjs
=
@@ -475,14 +475,14 @@ class _RFPHelper {
   /**
* Given a width or height, rounds it with the proper stepping.
*/
-  steppedSize(aDimension) {
+  steppedSize(aDimension, isWidth = false) {
 let stepping;
 if (aDimension <= 50) {
   return 0;
 } else if (aDimension <= 500) {
   stepping = 50;
 } else if (aDimension <= 1600) {
-  stepping = 100;
+  stepping = isWidth ? 200 : 100;
 } else {
   stepping = 200;
 }
@@ -569,7 +569,7 @@ class _RFPHelper {
   // If the set is empty, we will round the content with the default
   // stepping size.
   if (!this._letterboxingDimensions.length) {
-result = r(this.steppedSize(aWidth), this.steppedSize(aHeight));
+result = r(this.steppedSize(aWidth, true), this.steppedSize(aHeight));
 log(
   `${logPrefix} roundDimensions(${aWidth}, ${aHeight}) = 
${result.width} x ${result.height}`
 );



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/63eecb9243e5fb0af6fb158e1abd93b8be32

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/63eecb9243e5fb0af6fb158e1abd93b8be32
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][tor-browser-115.1.0esr-13.0-1] fixup! Firefox preference overrides.

2023-08-08 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch tor-browser-115.1.0esr-13.0-1 at The Tor Project / 
Applications / Tor Browser


Commits:
e0e763c0 by hackademix at 2023-08-08T09:11:30+02:00
fixup! Firefox preference overrides.

Bug 33282: Redefine the dimensions of new RFP windows

- - - - -


1 changed file:

- browser/app/profile/001-base-profile.js


Changes:

=
browser/app/profile/001-base-profile.js
=
@@ -291,6 +291,9 @@ pref("dom.use_components_shim", false);
 pref("privacy.resistFingerprinting.letterboxing", true);
 // tor-browser#41695: how many warnings we show if user closes them without 
restoring the window size
 pref("privacy.resistFingerprinting.resizeWarnings", 3);
+// tor-browser#33282: new windows start at 1400x900 when there's enough screen 
space, otherwise down by 200x100 blocks
+pref("privacy.window.maxInnerWidth", 1400);
+pref("privacy.window.maxInnerHeight", 900);
 // Enforce Network Information API as disabled
 pref("dom.netinfo.enabled", false);
 pref("network.http.referer.defaultPolicy", 2); // Bug 32948: Make referer 
behavior consistent regardless of private browing mode status



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/e0e763c05a5b3d62d7ec5383a1d7cbf9dc7f84a6

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/e0e763c05a5b3d62d7ec5383a1d7cbf9dc7f84a6
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][base-browser-115.1.0esr-13.0-1] 2 commits: amend! Bug 32308: use direct browser sizing for letterboxing.

2023-08-08 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch base-browser-115.1.0esr-13.0-1 at The Tor Project / 
Applications / Tor Browser


Commits:
dc2274d0 by hackademix at 2023-08-08T09:18:01+02:00
amend! Bug 32308: use direct browser sizing for letterboxing.

Bug 32308: use direct browser sizing for letterboxing.
Bug 30556: align letterboxing with 200x100 new win width stepping

- - - - -
9ac98dab by hackademix at 2023-08-08T09:18:02+02:00
fixup! Firefox preference overrides.

Bug 33282: Redefine the dimensions of new RFP windows

- - - - -


2 changed files:

- browser/app/profile/001-base-profile.js
- toolkit/components/resistfingerprinting/RFPHelper.sys.mjs


Changes:

=
browser/app/profile/001-base-profile.js
=
@@ -291,6 +291,9 @@ pref("dom.use_components_shim", false);
 pref("privacy.resistFingerprinting.letterboxing", true);
 // tor-browser#41695: how many warnings we show if user closes them without 
restoring the window size
 pref("privacy.resistFingerprinting.resizeWarnings", 3);
+// tor-browser#33282: new windows start at 1400x900 when there's enough screen 
space, otherwise down by 200x100 blocks
+pref("privacy.window.maxInnerWidth", 1400);
+pref("privacy.window.maxInnerHeight", 900);
 // Enforce Network Information API as disabled
 pref("dom.netinfo.enabled", false);
 pref("network.http.referer.defaultPolicy", 2); // Bug 32948: Make referer 
behavior consistent regardless of private browing mode status


=
toolkit/components/resistfingerprinting/RFPHelper.sys.mjs
=
@@ -475,14 +475,14 @@ class _RFPHelper {
   /**
* Given a width or height, rounds it with the proper stepping.
*/
-  steppedSize(aDimension) {
+  steppedSize(aDimension, isWidth = false) {
 let stepping;
 if (aDimension <= 50) {
   return 0;
 } else if (aDimension <= 500) {
   stepping = 50;
 } else if (aDimension <= 1600) {
-  stepping = 100;
+  stepping = isWidth ? 200 : 100;
 } else {
   stepping = 200;
 }
@@ -569,7 +569,7 @@ class _RFPHelper {
   // If the set is empty, we will round the content with the default
   // stepping size.
   if (!this._letterboxingDimensions.length) {
-result = r(this.steppedSize(aWidth), this.steppedSize(aHeight));
+result = r(this.steppedSize(aWidth, true), this.steppedSize(aHeight));
 log(
   `${logPrefix} roundDimensions(${aWidth}, ${aHeight}) = 
${result.width} x ${result.height}`
 );



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/compare/65183e255d3b18a1f237819c32696cd51bf360bc...9ac98dab00b7285c32dcbe3ad1bcac33c44dd507

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/compare/65183e255d3b18a1f237819c32696cd51bf360bc...9ac98dab00b7285c32dcbe3ad1bcac33c44dd507
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser] Pushed new tag tor-browser-102.14.0esr-12.5-1-build1

2023-07-26 Thread ma1 (@ma1) via tor-commits


ma1 pushed new tag tor-browser-102.14.0esr-12.5-1-build1 at The Tor Project / 
Applications / Tor Browser

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/tree/tor-browser-102.14.0esr-12.5-1-build1
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser] Pushed new tag base-browser-102.14.0esr-12.5-1-build1

2023-07-26 Thread ma1 (@ma1) via tor-commits


ma1 pushed new tag base-browser-102.14.0esr-12.5-1-build1 at The Tor Project / 
Applications / Tor Browser

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/tree/base-browser-102.14.0esr-12.5-1-build1
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][tor-browser-102.13.0esr-12.5-1] fixup! Bug 26961: New user onboarding.

2023-06-29 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch tor-browser-102.13.0esr-12.5-1 at The Tor Project / 
Applications / Tor Browser


Commits:
4dcf0094 by hackademix at 2023-06-29T09:41:08+02:00
fixup! Bug 26961: New user onboarding.

- - - - -


1 changed file:

- browser/extensions/onboarding/content/Onboarding.jsm


Changes:

=
browser/extensions/onboarding/content/Onboarding.jsm
=
@@ -909,7 +909,7 @@ class Onboarding {
 }
 
 const kOnionURL = 
"https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/;;  // 
DuckDuckGo
-const kLearnMore = "https://www.torproject.org/releases/tor-browser-12-0/;;
+const kLearnMore = "https://www.torproject.org/releases/tor-browser-12-5/;;
 let handledTourActionClick = false;
 switch (id) {
   case "onboarding-overlay-button-icon":



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/4dcf009406d107a3e5f56e445a2ab7334755d059

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/4dcf009406d107a3e5f56e445a2ab7334755d059
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][tor-browser-102.12.0esr-12.5-1] fixup! Bug 30237: Add v3 onion services client authentication prompt

2023-06-27 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch tor-browser-102.12.0esr-12.5-1 at The Tor Project / 
Applications / Tor Browser


Commits:
4a13c283 by hackademix at 2023-06-27T07:54:52+00:00
fixup! Bug 30237: Add v3 onion services client authentication prompt

- - - - -


1 changed file:

- browser/components/onionservices/content/authPrompt.js


Changes:

=
browser/components/onionservices/content/authPrompt.js
=
@@ -73,8 +73,18 @@ const OnionAuthPrompt = (function() {
   );
 },
 
+_autoFocus(event) {
+  event.target.ownerGlobal.focus();
+},
+
 _onPromptShowing(aWarningMessage) {
   let xulDoc = this._browser.ownerDocument;
+
+  // Force back focus: tor-browser#41856
+  (this._popupElem = xulDoc.getElementById(
+`${OnionAuthUtil.domid.notification}-notification`
+  ))?.addEventListener("click", this._autoFocus);
+
   let descElem = xulDoc.getElementById(OnionAuthUtil.domid.description);
   if (descElem) {
 // Handle replacement of the onion name within the localized
@@ -159,6 +169,9 @@ const OnionAuthPrompt = (function() {
   this._boundOnKeyFieldInput = undefined;
 }
   }
+  if (this._popupElem) {
+this._popupElem.removeEventListener("click", this._autoFocus);
+  }
 },
 
 _onKeyFieldKeyPress(aEvent) {



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/4a13c283b51fdf6f8748ebae9347152c59454c58

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/4a13c283b51fdf6f8748ebae9347152c59454c58
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/mullvad-browser][mullvad-browser-115.7.0esr-13.5-1] fixup! Bug 32308: use direct browser sizing for letterboxing.

2024-02-07 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch mullvad-browser-115.7.0esr-13.5-1 at The Tor Project / 
Applications / Mullvad Browser


Commits:
800f6ebf by hackademix at 2024-02-07T18:53:36+01:00
fixup! Bug 32308: use direct browser sizing for letterboxing.

Bug 42389: make the betterboxing gradient actually work.

- - - - -


1 changed file:

- browser/base/content/browser.css


Changes:

=
browser/base/content/browser.css
=
@@ -168,7 +168,6 @@ body {
 
 .letterboxing.letterboxing-gradient .browserContainer {
   background: linear-gradient(283deg, var(--letterboxing-gradient-color1) 0%, 
var(--letterboxing-gradient-color2) 100%), var(--letterboxing-bgcolor);
-  box-shadow: rgba(0, 0, 0, 0.5) 0px -1px 2px;
 }
 
 :root:not([inDOMFullscreen]) .letterboxing 
.browserContainer:not(.responsive-mode)
@@ -231,12 +230,12 @@ body {
   border-top-right-radius: var(--letterboxing-border-top-radius);
   width: var(--letterboxing-width) !important;
   height: var(--letterboxing-height) !important;
+  background: var(--letterboxing-gradient-color2);
 }
 
 :root:not([inDOMFullscreen]) .letterboxing.letterboxing-ready 
.browserContainer:not(.responsive-mode)
   > .browserStack:not(.exclude-letterboxing) {
   place-content: var(--letterboxing-vertical-alignment) center;
-  background: var(--letterboxing-bgcolor);
 }
 
 #toolbar-menubar[autohide="true"] {



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/800f6ebf17fbbc8bacc303bd13828c33f01cecf7

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/800f6ebf17fbbc8bacc303bd13828c33f01cecf7
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][tor-browser-115.7.0esr-13.5-1] fixup! Bug 32308: use direct browser sizing for letterboxing.

2024-02-07 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch tor-browser-115.7.0esr-13.5-1 at The Tor Project / 
Applications / Tor Browser


Commits:
c13c55f4 by hackademix at 2024-02-07T18:42:34+01:00
fixup! Bug 32308: use direct browser sizing for letterboxing.

Bug 42389: make the betterboxing gradient actually work.

- - - - -


1 changed file:

- browser/base/content/browser.css


Changes:

=
browser/base/content/browser.css
=
@@ -168,7 +168,6 @@ body {
 
 .letterboxing.letterboxing-gradient .browserContainer {
   background: linear-gradient(283deg, var(--letterboxing-gradient-color1) 0%, 
var(--letterboxing-gradient-color2) 100%), var(--letterboxing-bgcolor);
-  box-shadow: rgba(0, 0, 0, 0.5) 0px -1px 2px;
 }
 
 :root:not([inDOMFullscreen]) .letterboxing 
.browserContainer:not(.responsive-mode)
@@ -231,12 +230,12 @@ body {
   border-top-right-radius: var(--letterboxing-border-top-radius);
   width: var(--letterboxing-width) !important;
   height: var(--letterboxing-height) !important;
+  background: var(--letterboxing-gradient-color2);
 }
 
 :root:not([inDOMFullscreen]) .letterboxing.letterboxing-ready 
.browserContainer:not(.responsive-mode)
   > .browserStack:not(.exclude-letterboxing) {
   place-content: var(--letterboxing-vertical-alignment) center;
-  background: var(--letterboxing-bgcolor);
 }
 
 #toolbar-menubar[autohide="true"] {



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/c13c55f4af6b80a89fd1256d7659087217da8e43

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/c13c55f4af6b80a89fd1256d7659087217da8e43
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser-build][main] Bug 41050: Improve disk leak sanitization on startup.

2023-12-19 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch main at The Tor Project / Applications / tor-browser-build


Commits:
5a97ba07 by hackademix at 2023-12-19T10:22:07+01:00
Bug 41050: Improve disk leak sanitization on startup.

- - - - -


1 changed file:

- projects/browser/RelativeLink/start-browser


Changes:

=
projects/browser/RelativeLink/start-browser
=
@@ -258,18 +258,32 @@ HOME="${PWD}"
 export HOME
 
 # Prevent disk leaks in $HOME/.local/share (tor-browser#17560)
+function erase_leaky() {
+   local leaky="$1"
+   [ -e "$leaky" ] &&
+   ( srm -r "$leaky" ||
+ wipe -r "$leaky" ||
+ find "$leaky" -type f -exec shred -u {} \; ;
+ rm -rf "$leaky"
+   ) > /dev/null 2>&1
+}
 local_dir="$HOME/.local/"
 share_dir="$local_dir/share"
-if [ -d "$share_dir" ]; then
-( srm -r "$share_dir" ||
-  wipe -r "$share_dir" ||
-  find "$share_dir" -type f -exec shred -u {} \; ;
-  rm -rf "$share_dir"
-) > /dev/null 2>&1
-else
-mkdir -p "$local_dir"
+# We don't want to mess with symlinks, possibly pointing outside the
+# Browser directory (tor-browser-build#41050).
+# We're not using realpath/readlink for consistency with the (possibly
+# outdated) availability assumptions made elsewhere in this script.
+if ! [ -L "$local_dir" -o -L "$share_dir" ]; then
+   if [ -d "$share_dir" ]; then
+   for leaky_path in "gvfs-metadata" "recently-used.xbel"; do
+   erase_leaky "$share_dir/$leaky_path"
+   done
+   else
+   mkdir -p "$local_dir"
+   fi
+   ln -fs /dev/null "$share_dir"
 fi
-ln -fs /dev/null "$share_dir"
+[ -L "$HOME/.cache" ] || erase_leaky "$HOME/.cache/nvidia"
 
 [% IF c("var/tor-browser") -%]
 SYSARCHITECTURE=$(getconf LONG_BIT)



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/commit/5a97ba07148a176580dd536a65dc7ebba6565775

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/commit/5a97ba07148a176580dd536a65dc7ebba6565775
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/firefox-android] Pushed new tag firefox-android-115.2.1-13.0-1-build11

2023-12-14 Thread ma1 (@ma1) via tor-commits


ma1 pushed new tag firefox-android-115.2.1-13.0-1-build11 at The Tor Project / 
Applications / firefox-android

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/firefox-android/-/tree/firefox-android-115.2.1-13.0-1-build11
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/firefox-android] Pushed new tag firefox-android-115.2.1-13.5-1-build3

2023-12-14 Thread ma1 (@ma1) via tor-commits


ma1 pushed new tag firefox-android-115.2.1-13.5-1-build3 at The Tor Project / 
Applications / firefox-android

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/firefox-android/-/tree/firefox-android-115.2.1-13.5-1-build3
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser] Pushed new tag FIREFOX_115_6_0esr_BUILD1

2023-12-12 Thread ma1 (@ma1) via tor-commits


ma1 pushed new tag FIREFOX_115_6_0esr_BUILD1 at The Tor Project / Applications 
/ Tor Browser

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/tree/FIREFOX_115_6_0esr_BUILD1
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser] Pushed new branch tor-browser-115.6.0esr-13.0-1

2023-12-12 Thread ma1 (@ma1) via tor-commits


ma1 pushed new branch tor-browser-115.6.0esr-13.0-1 at The Tor Project / 
Applications / Tor Browser

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/tree/tor-browser-115.6.0esr-13.0-1
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser] Pushed new branch base-browser-115.6.0esr-13.0-1

2023-12-12 Thread ma1 (@ma1) via tor-commits


ma1 pushed new branch base-browser-115.6.0esr-13.0-1 at The Tor Project / 
Applications / Tor Browser

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/tree/base-browser-115.6.0esr-13.0-1
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][base-browser-115.6.0esr-13.0-1] 96 commits: Bug 1819160 - Map Android ids to doc/accessible id pairs. r=Jamie

2023-12-12 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch base-browser-115.6.0esr-13.0-1 at The Tor Project / 
Applications / Tor Browser


Commits:
7a271e76 by Eitan Isaacson at 2023-12-12T10:11:36+01:00
Bug 1819160 - Map Android ids to doc/accessible id pairs. r=Jamie

Differential Revision: https://phabricator.services.mozilla.com/D179737
- - - - -
1aeb8e9a by Pier Angelo Vendrame at 2023-12-12T10:11:38+01:00
Bug 1832523 - Allow using NSS to sign and verify MAR signatures. 
r=application-update-reviewers,glandium,bytesized

Allow using NSS for checking MAR signatures also in platforms where
OS-native APIs are used by default, i.e., macOS and Windows.

Differential Revision: https://phabricator.services.mozilla.com/D177743
- - - - -
b24d9851 by Pier Angelo Vendrame at 2023-12-12T10:11:39+01:00
Bug 1849129: Prevent exceptions caused by extensions from interrupting the 
SearchService initialization. r=search-reviewers,Standard8

Differential Revision: https://phabricator.services.mozilla.com/D186456
- - - - -
5a91e514 by Emilio Cobos Álvarez at 2023-12-12T10:11:40+01:00
Bug 1853731 - Use html:img for message-bar-icon. 
r=Gijs,dao,settings-reviewers,desktop-theme-reviewers,sfoster

Differential Revision: https://phabricator.services.mozilla.com/D188521
- - - - -
508750c9 by Pier Angelo Vendrame at 2023-12-12T10:11:42+01:00
Bug 1854117 - Sort the DLL blocklist flags. r=mossop,win-reviewers,gstoll

Differential Revision: https://phabricator.services.mozilla.com/D188716
- - - - -
77de2fd4 by Eden Chuang at 2023-12-12T10:11:44+01:00
Bug 1738426 - Ignoring status 206 and vary header checking for opaque response 
in Cache API. r=asuth

Differential Revision: https://phabricator.services.mozilla.com/D186431
- - - - -
67aded6b by edgul at 2023-12-12T10:11:45+01:00
Bug 1802057 - Block the following characters from use in the cookie name in the 
cookie string: 0x3B (semi-colon), 0x3D (equals), and 0x7F (del) 
r=dveditz,cookie-reviewers

Differential Revision: https://phabricator.services.mozilla.com/D182373

- - - - -
bbdd1c20 by Kelsey Gilbert at 2023-12-12T10:11:47+01:00
Bug 1819497 - Dont race on static bool for initialization. 
r=gfx-reviewers,aosmond

We could do non-racy static init here (e.g. with a static initializer
self-calling-closure), but there doesnt seem to be a strong reason for
this. Lets just use a switch and get robustness from -Werror=switch.

Differential Revision: https://phabricator.services.mozilla.com/D188054
- - - - -
74375e3e by Mark Banner at 2023-12-12T10:11:48+01:00
Bug 1845752. r=ckerschb

Differential Revision: https://phabricator.services.mozilla.com/D186676
- - - - -
781671e6 by Bob Owen at 2023-12-12T10:11:50+01:00
Bug 1850072: Initialize RecordedDrawTargetCreation::mHasExistingData. r=jrmuizel

This also specializes ElementStreamFormat for bool.

Differential Revision: https://phabricator.services.mozilla.com/D187794
- - - - -
b490578e by Malte Juergens at 2023-12-12T10:11:51+01:00
Bug 1850200 - Add delay to HTTPS-Only Continue to HTTPS Site button 
r=freddyb

Differential Revision: https://phabricator.services.mozilla.com/D187887
- - - - -
8c6e9d8b by Andreas Pehrson at 2023-12-12T10:11:52+01:00
Bug 1851803 - Introduce SourceMediaTrack::mDirectDisabledMode. r=karlt

Similar to MediaTrack::mDisabledMode, but this is for uses on the
SourceMediaTrack producer thread. It is still signaled via a control message
from the control thread to maintain order of operations, and is protected by the
SourceMediaTrack mutex.

Differential Revision: https://phabricator.services.mozilla.com/D187554
- - - - -
08194c97 by Henry Wilkes at 2023-12-12T10:11:54+01:00
Bug 41454: Move focus after calling openPreferences for a sub-category.

Temporary fix until mozilla bug 1799153 gets a patch upstream.

- - - - -
f1e6fccb by hackademix at 2023-12-12T10:11:55+01:00
Bug 42194: Fix blank net error page on failed DNS resolution with active proxy.

- - - - -
aea0ac32 by Henry Wilkes at 2023-12-12T10:11:57+01:00
Bug 41483: Remove the firefox override for appstrings.properties

Remove this patch after upstream bugzilla bug 1790187

- - - - -
aa213fc6 by Pier Angelo Vendrame at 2023-12-12T10:11:58+01:00
Bug 41116: Normalize system fonts.

System fonts are an enormous fingerprinting vector.
Even with font allow lists and with our custom configuration on Linux,
which counter metrics measurements, getComputedStyle leaks several
details.
This patch counters both these kinds of attacks.

- - - - -
f23d0f24 by Marco Simonelli at 2023-12-12T10:12:00+01:00
Bug 41459: WebRTC fails to build under mingw (Part 1)

- properly define NOMINMAX for just MSVC builds

- - - - -
04147c9d by Marco Simonelli at 2023-12-12T10:12:02+01:00
Bug 41459: WebRTC fails to build under mingw (Part 2)

- fixes required to build third_party/libwebrtc

- - - - -
bba03917 by Marco Simonelli at 2023-12-12T10:12:03+01:00
Bug 41459: WebRTC fails to build under mingw (Part 3)

- fixes required to build third_party/sipcc

- - - - -
dac39a70 by Marco Simonelli at 2023-12-12T10:12:04+01:00

[tor-commits] [Git][tpo/applications/tor-browser] Pushed new tag tor-browser-115.6.0esr-13.0-1-build1

2023-12-12 Thread ma1 (@ma1) via tor-commits


ma1 pushed new tag tor-browser-115.6.0esr-13.0-1-build1 at The Tor Project / 
Applications / Tor Browser

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/tree/tor-browser-115.6.0esr-13.0-1-build1
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser] Pushed new tag base-browser-115.6.0esr-13.0-1-build1

2023-12-12 Thread ma1 (@ma1) via tor-commits


ma1 pushed new tag base-browser-115.6.0esr-13.0-1-build1 at The Tor Project / 
Applications / Tor Browser

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/tree/base-browser-115.6.0esr-13.0-1-build1
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/mullvad-browser] Pushed new branch mullvad-browser-115.6.0esr-13.0-1

2023-12-12 Thread ma1 (@ma1) via tor-commits


ma1 pushed new branch mullvad-browser-115.6.0esr-13.0-1 at The Tor Project / 
Applications / Mullvad Browser

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/tree/mullvad-browser-115.6.0esr-13.0-1
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser-build][maint-13.0] Bug 41050: Improve disk leak sanitization on startup.

2023-12-19 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch maint-13.0 at The Tor Project / Applications / 
tor-browser-build


Commits:
8ebeb4d1 by hackademix at 2023-12-19T17:15:07+01:00
Bug 41050: Improve disk leak sanitization on startup.

- - - - -


1 changed file:

- projects/browser/RelativeLink/start-browser


Changes:

=
projects/browser/RelativeLink/start-browser
=
@@ -258,18 +258,32 @@ HOME="${PWD}"
 export HOME
 
 # Prevent disk leaks in $HOME/.local/share (tor-browser#17560)
+function erase_leaky() {
+   local leaky="$1"
+   [ -e "$leaky" ] &&
+   ( srm -r "$leaky" ||
+ wipe -r "$leaky" ||
+ find "$leaky" -type f -exec shred -u {} \; ;
+ rm -rf "$leaky"
+   ) > /dev/null 2>&1
+}
 local_dir="$HOME/.local/"
 share_dir="$local_dir/share"
-if [ -d "$share_dir" ]; then
-( srm -r "$share_dir" ||
-  wipe -r "$share_dir" ||
-  find "$share_dir" -type f -exec shred -u {} \; ;
-  rm -rf "$share_dir"
-) > /dev/null 2>&1
-else
-mkdir -p "$local_dir"
+# We don't want to mess with symlinks, possibly pointing outside the
+# Browser directory (tor-browser-build#41050).
+# We're not using realpath/readlink for consistency with the (possibly
+# outdated) availability assumptions made elsewhere in this script.
+if ! [ -L "$local_dir" -o -L "$share_dir" ]; then
+   if [ -d "$share_dir" ]; then
+   for leaky_path in "gvfs-metadata" "recently-used.xbel"; do
+   erase_leaky "$share_dir/$leaky_path"
+   done
+   else
+   mkdir -p "$local_dir"
+   fi
+   ln -fs /dev/null "$share_dir"
 fi
-ln -fs /dev/null "$share_dir"
+[ -L "$HOME/.cache" ] || erase_leaky "$HOME/.cache/nvidia"
 
 [% IF c("var/tor-browser") -%]
 SYSARCHITECTURE=$(getconf LONG_BIT)



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/commit/8ebeb4d1651dfbd73d96df293e115835ccf7de83

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/commit/8ebeb4d1651dfbd73d96df293e115835ccf7de83
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/firefox-android][firefox-android-115.2.1-13.5-1] fixup! Modify add-on support

2024-01-02 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch firefox-android-115.2.1-13.5-1 at The Tor Project / 
Applications / firefox-android


Commits:
be02ec86 by hackademix at 2023-12-30T19:51:11+01:00
fixup! Modify add-on support

Bug 42353: Fix NoScript automatic updates.

- - - - -


1 changed file:

- fenix/app/src/main/java/org/mozilla/fenix/components/TorBrowserFeatures.kt


Changes:

=
fenix/app/src/main/java/org/mozilla/fenix/components/TorBrowserFeatures.kt
=
@@ -136,37 +136,37 @@ object TorBrowserFeatures {
 }
 
 /**
- *  If we have not done it yet, enable automatic updates for NoScript 
and force a
+ *  Enable automatic updates for NoScript and, if we've not done it 
yet, force a
  *  one-time immediate update check, in order to upgrade old profiles 
and ensure we've got
  *  the latest stable AMO version available on first startup.
  *  We will do it as soon as the Tor is connected, to prevent early 
addonUpdater activation
  *  causing automatic update checks failures (components.addonUpdater 
being a lazy prop).
  *  The extension, from then on, should behave as if the user had 
installed it manually.
  */
-if (settings.noscriptUpdated == 0) {
-context.components.torController.registerTorListener(object : 
TorEvents {
-override fun onTorConnected() {
-
context.components.torController.unregisterTorListener(this)
-// Enable automatic updates
-
context.components.addonUpdater.registerForFutureUpdates(NOSCRIPT_ID)
-// Force an immediate update check
+context.components.torController.registerTorListener(object : 
TorEvents {
+override fun onTorConnected() {
+context.components.torController.unregisterTorListener(this)
+// Enable automatic updates. This must be done on every 
startup (tor-browser#42353)
+
context.components.addonUpdater.registerForFutureUpdates(NOSCRIPT_ID)
+// Force a one-time immediate update check for older 
installations
+if (settings.noscriptUpdated < 2) {
 context.components.addonUpdater.update(NOSCRIPT_ID)
-settings.noscriptUpdated = 1
+settings.noscriptUpdated = 2
 }
+}
 
-@SuppressWarnings("EmptyFunctionBlock")
-override fun onTorConnecting() {
-}
+@SuppressWarnings("EmptyFunctionBlock")
+override fun onTorConnecting() {
+}
 
-@SuppressWarnings("EmptyFunctionBlock")
-override fun onTorStopped() {
-}
+@SuppressWarnings("EmptyFunctionBlock")
+override fun onTorStopped() {
+}
 
-@SuppressWarnings("EmptyFunctionBlock")
-override fun onTorStatusUpdate(entry: String?, status: 
String?) {
-}
-})
-}
+@SuppressWarnings("EmptyFunctionBlock")
+override fun onTorStatusUpdate(entry: String?, status: String?) {
+}
+})
 }
 
 



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/firefox-android/-/commit/be02ec8601e43571da6c25a504f4633e54fd72e7

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/firefox-android/-/commit/be02ec8601e43571da6c25a504f4633e54fd72e7
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/firefox-android][firefox-android-115.2.1-13.0-1] fixup! Modify add-on support

2024-01-08 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch firefox-android-115.2.1-13.0-1 at The Tor Project / 
Applications / firefox-android


Commits:
cb98e7b2 by hackademix at 2024-01-08T19:54:56+01:00
fixup! Modify add-on support

Bug 42353: Fix NoScript automatic updates.

- - - - -


1 changed file:

- fenix/app/src/main/java/org/mozilla/fenix/components/TorBrowserFeatures.kt


Changes:

=
fenix/app/src/main/java/org/mozilla/fenix/components/TorBrowserFeatures.kt
=
@@ -136,37 +136,37 @@ object TorBrowserFeatures {
 }
 
 /**
- *  If we have not done it yet, enable automatic updates for NoScript 
and force a
+ *  Enable automatic updates for NoScript and, if we've not done it 
yet, force a
  *  one-time immediate update check, in order to upgrade old profiles 
and ensure we've got
  *  the latest stable AMO version available on first startup.
  *  We will do it as soon as the Tor is connected, to prevent early 
addonUpdater activation
  *  causing automatic update checks failures (components.addonUpdater 
being a lazy prop).
  *  The extension, from then on, should behave as if the user had 
installed it manually.
  */
-if (settings.noscriptUpdated == 0) {
-context.components.torController.registerTorListener(object : 
TorEvents {
-override fun onTorConnected() {
-
context.components.torController.unregisterTorListener(this)
-// Enable automatic updates
-
context.components.addonUpdater.registerForFutureUpdates(NOSCRIPT_ID)
-// Force an immediate update check
+context.components.torController.registerTorListener(object : 
TorEvents {
+override fun onTorConnected() {
+context.components.torController.unregisterTorListener(this)
+// Enable automatic updates. This must be done on every 
startup (tor-browser#42353)
+
context.components.addonUpdater.registerForFutureUpdates(NOSCRIPT_ID)
+// Force a one-time immediate update check for older 
installations
+if (settings.noscriptUpdated < 2) {
 context.components.addonUpdater.update(NOSCRIPT_ID)
-settings.noscriptUpdated = 1
+settings.noscriptUpdated = 2
 }
+}
 
-@SuppressWarnings("EmptyFunctionBlock")
-override fun onTorConnecting() {
-}
+@SuppressWarnings("EmptyFunctionBlock")
+override fun onTorConnecting() {
+}
 
-@SuppressWarnings("EmptyFunctionBlock")
-override fun onTorStopped() {
-}
+@SuppressWarnings("EmptyFunctionBlock")
+override fun onTorStopped() {
+}
 
-@SuppressWarnings("EmptyFunctionBlock")
-override fun onTorStatusUpdate(entry: String?, status: 
String?) {
-}
-})
-}
+@SuppressWarnings("EmptyFunctionBlock")
+override fun onTorStatusUpdate(entry: String?, status: String?) {
+}
+})
 }
 
 



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/firefox-android/-/commit/cb98e7b217abdf3c675856a7bbb0386748bfb987

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/firefox-android/-/commit/cb98e7b217abdf3c675856a7bbb0386748bfb987
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/firefox-android][firefox-android-115.2.1-13.5-1] 2 commits: fixup! Bug 1823316 - Use 'Snackbar' themed Dialog to notify on making app full-screen

2024-01-09 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch firefox-android-115.2.1-13.5-1 at The Tor Project / 
Applications / firefox-android


Commits:
a57e5d10 by hackademix at 2024-01-10T08:41:06+01:00
fixup! Bug 1823316 - Use Snackbar themed Dialog to notify on making 
app full-screen

Fix tor-browser#42355 backporting regression.

- - - - -
c1397e81 by t-p-white at 2024-01-10T08:41:06+01:00
Bug 1864549 - Fix for IllegalStateException in full screen notification dialog

- - - - -


2 changed files:

- 
android-components/components/feature/prompts/src/main/java/mozilla/components/feature/prompts/dialog/FullScreenNotificationDialog.kt
- fenix/app/src/main/java/org/mozilla/fenix/browser/BaseBrowserFragment.kt


Changes:

=
android-components/components/feature/prompts/src/main/java/mozilla/components/feature/prompts/dialog/FullScreenNotificationDialog.kt
=
@@ -59,11 +59,12 @@ class FullScreenNotificationDialog(@LayoutRes val layout: 
Int) :
 window.setGravity(Gravity.BOTTOM)
 window.clearFlags(WindowManager.LayoutParams.FLAG_DIM_BEHIND)
 }
+}
 
-lifecycleScope.launch {
-delay(SNACKBAR_DURATION_LONG_MS)
-dismiss()
-}
+// Attempt to automatically dismiss the dialog after the given 
duration.
+lifecycleScope.launch {
+delay(SNACKBAR_DURATION_LONG_MS)
+dialog?.dismiss()
 }
 }
 }


=
fenix/app/src/main/java/org/mozilla/fenix/browser/BaseBrowserFragment.kt
=
@@ -1491,6 +1491,7 @@ abstract class BaseBrowserFragment :
 parentFragmentManager,
 )
 
+activity?.enterToImmersiveMode()
 (view as? SwipeGestureLayout)?.isSwipeEnabled = false
 browserToolbarView.collapse()
 browserToolbarView.view.isVisible = false



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/firefox-android/-/compare/be02ec8601e43571da6c25a504f4633e54fd72e7...c1397e812f0a6cecfc44af411d6b7f222fc99164

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/firefox-android/-/compare/be02ec8601e43571da6c25a504f4633e54fd72e7...c1397e812f0a6cecfc44af411d6b7f222fc99164
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/firefox-android][firefox-android-115.2.1-13.0-1] 10 commits: fixup! Bug 1823316 - Use 'Snackbar' themed Dialog to notify on making app full-screen

2024-01-11 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch firefox-android-115.2.1-13.0-1 at The Tor Project / 
Applications / firefox-android


Commits:
753c937e by hackademix at 2024-01-11T16:53:03+01:00
fixup! Bug 1823316 - Use Snackbar themed Dialog to notify on making 
app full-screen

Fix tor-browser#42355 backporting regression.

- - - - -
0cd27910 by t-p-white at 2024-01-11T16:53:04+01:00
Bug 1864549 - Fix for IllegalStateException in full screen notification dialog

- - - - -
a7cafd1b by Alexandru2909 at 2024-01-11T16:53:04+01:00
Bug 1810776 - Move DismissedTabBackground into its own file

- - - - -
e40a62ad by DreVla at 2024-01-11T16:53:05+01:00
Bug 1828493 - Apply purple overlay on list item when in multi-select

When having the list layout for tabs tray and entering multi-select
mode, the selected list items should have a purple non opaque overlay
on the thumbnail, as it was before in the XML implementation.

- - - - -
b4e5ab52 by Alexandru2909 at 2024-01-11T16:53:05+01:00
Bug 1810776 - Add SwipeToDismiss to composed tabs tray

- - - - -
20a18e5b by Noah Bond at 2024-01-11T16:53:05+01:00
Bug 1815579 - Improve performance of image loading in tab items

- - - - -
a07ec0d9 by Noah Bond at 2024-01-11T16:53:06+01:00
Bug 1840896 - Remove `rememberSaveable` since bitmaps are not serializable

- - - - -
a860d4a3 by Noah Bond at 2024-01-11T16:53:06+01:00
Bug 1844967 - Improve performance of tab thumbnail loading in Compose

- - - - -
0481dabe by Matthew Tighe at 2024-01-11T16:53:07+01:00
Bug 1721904 - update thumbnail caching on app open

- - - - -
3400c111 by hackademix at 2024-01-11T16:53:07+01:00
Bug 42191: Temporary StrictMode relaxation to clear the thumbnail cache.

- - - - -


30 changed files:

- 
android-components/components/browser/state/src/main/java/mozilla/components/browser/state/action/BrowserAction.kt
- 
android-components/components/browser/state/src/main/java/mozilla/components/browser/state/reducer/ContentStateReducer.kt
- 
android-components/components/browser/tabstray/src/main/java/mozilla/components/browser/tabstray/TabViewHolder.kt
- 
android-components/components/browser/tabstray/src/test/java/mozilla/components/browser/tabstray/DefaultTabViewHolderTest.kt
- 
android-components/components/browser/thumbnails/src/main/java/mozilla/components/browser/thumbnails/ThumbnailsMiddleware.kt
- 
android-components/components/browser/thumbnails/src/main/java/mozilla/components/browser/thumbnails/storage/ThumbnailStorage.kt
- 
android-components/components/browser/thumbnails/src/main/java/mozilla/components/browser/thumbnails/utils/ThumbnailDiskCache.kt
- 
android-components/components/browser/thumbnails/src/test/java/mozilla/components/browser/thumbnails/ThumbnailsMiddlewareTest.kt
- 
android-components/components/browser/thumbnails/src/test/java/mozilla/components/browser/thumbnails/loader/ThumbnailLoaderTest.kt
- 
android-components/components/browser/thumbnails/src/test/java/mozilla/components/browser/thumbnails/storage/ThumbnailStorageTest.kt
- 
android-components/components/browser/thumbnails/src/test/java/mozilla/components/browser/thumbnails/utils/ThumbnailDiskCacheTest.kt
- 
android-components/components/concept/base/src/main/java/mozilla/components/concept/base/images/ImageRequest.kt
- 
android-components/components/feature/prompts/src/main/java/mozilla/components/feature/prompts/dialog/FullScreenNotificationDialog.kt
- fenix/app/src/main/java/org/mozilla/fenix/browser/BaseBrowserFragment.kt
- fenix/app/src/main/java/org/mozilla/fenix/browser/TabPreview.kt
- fenix/app/src/main/java/org/mozilla/fenix/browser/ToolbarGestureHandler.kt
- + fenix/app/src/main/java/org/mozilla/fenix/compose/SwipeToDismiss.kt
- + fenix/app/src/main/java/org/mozilla/fenix/compose/TabThumbnail.kt
- fenix/app/src/main/java/org/mozilla/fenix/compose/ThumbnailCard.kt
- + fenix/app/src/main/java/org/mozilla/fenix/compose/ThumbnailImage.kt
- fenix/app/src/main/java/org/mozilla/fenix/compose/list/ListItem.kt
- + 
fenix/app/src/main/java/org/mozilla/fenix/compose/tabstray/DismissedTabBackground.kt
- fenix/app/src/main/java/org/mozilla/fenix/compose/tabstray/TabGridItem.kt
- fenix/app/src/main/java/org/mozilla/fenix/compose/tabstray/TabListItem.kt
- fenix/app/src/main/java/org/mozilla/fenix/home/collections/CollectionItem.kt
- 
fenix/app/src/main/java/org/mozilla/fenix/home/recentsyncedtabs/view/RecentSyncedTab.kt
- 
fenix/app/src/main/java/org/mozilla/fenix/home/recentsyncedtabs/view/RecentSyncedTabViewHolder.kt
- 
fenix/app/src/main/java/org/mozilla/fenix/home/recenttabs/view/RecentTabViewHolder.kt
- fenix/app/src/main/java/org/mozilla/fenix/home/recenttabs/view/RecentTabs.kt
- fenix/app/src/main/java/org/mozilla/fenix/tabstray/TabsTray.kt


The diff was not included because it is too large.


View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/firefox-android/-/compare/dadeaa78a62f166eebbeb100f43ab73ba9ba995e...3400c111a643a01594f3a4818fd21e78c6a9c9ed

-- 
View it on GitLab: 

[tor-commits] [Git][tpo/applications/tor-browser-build][maint-13.0] Bug 17560: prevent disk leaks in $HOME/.local/share.

2023-11-29 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch maint-13.0 at The Tor Project / Applications / 
tor-browser-build


Commits:
eb925334 by hackademix at 2023-11-29T23:53:35+01:00
Bug 17560: prevent disk leaks in $HOME/.local/share.

- - - - -


2 changed files:

- projects/browser/RelativeLink/start-browser
- projects/browser/gtk3-settings.ini


Changes:

=
projects/browser/RelativeLink/start-browser
=
@@ -257,6 +257,20 @@ fi
 HOME="${PWD}"
 export HOME
 
+# Prevent disk leaks in $HOME/.local/share (tor-browser#17560)
+local_dir="$HOME/.local/"
+share_dir="$local_dir/share"
+if [ -d "$share_dir" ]; then
+( srm -r "$share_dir" ||
+  wipe -r "$share_dir" ||
+  find "$share_dir" -type f -exec shred -u {} \; ;
+  rm -rf "$share_dir"
+) > /dev/null 2>&1
+else
+mkdir -p "$local_dir"
+fi
+ln -fs /dev/null "$share_dir"
+
 [% IF c("var/tor-browser") -%]
 SYSARCHITECTURE=$(getconf LONG_BIT)
 TORARCHITECTURE=$(expr "$(file TorBrowser/Tor/tor)" : '.*ELF \([[:digit:]]*\)')


=
projects/browser/gtk3-settings.ini
=
@@ -1,2 +1,4 @@
 [Settings]
 gtk-primary-button-warps-slider = false
+gtk-recent-files-max-age=0
+gtk-recent-files-limit=0



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/commit/eb9253345ef4d18dbd2edec19b4abd331a443fb2

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/commit/eb9253345ef4d18dbd2edec19b4abd331a443fb2
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser-build] Pushed new tag tbb-13.0.6-build1

2023-12-04 Thread ma1 (@ma1) via tor-commits


ma1 pushed new tag tbb-13.0.6-build1 at The Tor Project / Applications / 
tor-browser-build

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/tree/tbb-13.0.6-build1
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser-build] Pushed new tag mb-13.0.6-build1

2023-12-04 Thread ma1 (@ma1) via tor-commits


ma1 pushed new tag mb-13.0.6-build1 at The Tor Project / Applications / 
tor-browser-build

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/tree/mb-13.0.6-build1
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][tor-browser-115.5.0esr-13.0-1] fixup! Bug 23247: Communicating security expectations for .onion

2023-12-04 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch tor-browser-115.5.0esr-13.0-1 at The Tor Project / 
Applications / Tor Browser


Commits:
91e057ca by cypherpunks1 at 2023-12-04T13:06:55+01:00
fixup! Bug 23247: Communicating security expectations for .onion

Bug 42231: Improve the network monitor patch for http onion resources

- - - - -


2 changed files:

- devtools/client/netmonitor/src/components/SecurityState.js
- devtools/shared/network-observer/NetworkHelper.sys.mjs


Changes:

=
devtools/client/netmonitor/src/components/SecurityState.js
=
@@ -41,7 +41,7 @@ class SecurityState extends Component {
 
 const {
   securityState,
-  urlDetails: { isLocal },
+  urlDetails: { host, isLocal },
 } = item;
 const iconClassList = ["requests-security-state-icon"];
 
@@ -50,7 +50,11 @@ class SecurityState extends Component {
 
 // Locally delivered files such as http://localhost and file:// paths
 // are considered to have been delivered securely.
-if (isLocal) {
+if (
+  isLocal ||
+  (host?.endsWith(".onion") &&
+Services.prefs.getBoolPref("dom.securecontext.allowlist_onions", 
false))
+) {
   realSecurityState = "secure";
 }
 


=
devtools/shared/network-observer/NetworkHelper.sys.mjs
=
@@ -596,9 +596,6 @@ export var NetworkHelper = {
 
 // The request did not contain any security info.
 if (!securityInfo) {
-  if (httpActivity.hostname && httpActivity.hostname.endsWith(".onion")) {
-info.state = "secure";
-  }
   return info;
 }
 
@@ -650,11 +647,7 @@ export var NetworkHelper = {
 // schemes other than https and wss are subject to
 // downgrade/etc at the scheme level and should always be
 // considered insecure
-if (httpActivity.hostname && httpActivity.hostname.endsWith(".onion")) 
{
-  info.state = "secure";
-} else {
-  info.state = "insecure";
-}
+info.state = "insecure";
   } else if (state & wpl.STATE_IS_SECURE) {
 // The connection is secure if the scheme is sufficient
 info.state = "secure";



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/91e057ca292b1231023c37c2baf5f23f3729d5ea

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/91e057ca292b1231023c37c2baf5f23f3729d5ea
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser] Pushed new tag tor-browser-115.5.0esr-13.0-1-build4

2023-12-04 Thread ma1 (@ma1) via tor-commits


ma1 pushed new tag tor-browser-115.5.0esr-13.0-1-build4 at The Tor Project / 
Applications / Tor Browser

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/tree/tor-browser-115.5.0esr-13.0-1-build4
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/mullvad-browser] Pushed new tag mullvad-browser-115.5.0esr-13.0-1-build3

2023-12-04 Thread ma1 (@ma1) via tor-commits


ma1 pushed new tag mullvad-browser-115.5.0esr-13.0-1-build3 at The Tor Project 
/ Applications / Mullvad Browser

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/tree/mullvad-browser-115.5.0esr-13.0-1-build3
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][tor-browser-115.7.0esr-13.5-1] Bug 1867408 - NSS backport

2024-01-22 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch tor-browser-115.7.0esr-13.5-1 at The Tor Project / 
Applications / Tor Browser


Commits:
cbeecf99 by hackademix at 2024-01-22T16:29:11+01:00
Bug 1867408 - NSS backport

- - - - -


1 changed file:

- security/nss/lib/ssl/sslsecur.c


Changes:

=
security/nss/lib/ssl/sslsecur.c
=
@@ -488,7 +488,12 @@ ssl_SendSavedWriteData(sslSocket *ss)
 if (rv < 0) {
 return rv;
 }
-ss->pendingBuf.len -= rv;
+if (rv > ss->pendingBuf.len) {
+PORT_Assert(0); /* This shouldn't happen */
+ss->pendingBuf.len = 0;
+} else {
+ss->pendingBuf.len -= rv;
+}
 if (ss->pendingBuf.len > 0 && rv > 0) {
 /* UGH !! This shifts the whole buffer down by copying it */
 PORT_Memmove(ss->pendingBuf.buf, ss->pendingBuf.buf + rv,



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/cbeecf99ee499c4f1d428f105ad86d0f6762f64a

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/cbeecf99ee499c4f1d428f105ad86d0f6762f64a
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][base-browser-115.7.0esr-13.5-1] Bug 1867408 - NSS backport

2024-01-22 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch base-browser-115.7.0esr-13.5-1 at The Tor Project / 
Applications / Tor Browser


Commits:
eed2de42 by hackademix at 2024-01-22T16:56:41+01:00
Bug 1867408 - NSS backport

- - - - -


1 changed file:

- security/nss/lib/ssl/sslsecur.c


Changes:

=
security/nss/lib/ssl/sslsecur.c
=
@@ -488,7 +488,12 @@ ssl_SendSavedWriteData(sslSocket *ss)
 if (rv < 0) {
 return rv;
 }
-ss->pendingBuf.len -= rv;
+if (rv > ss->pendingBuf.len) {
+PORT_Assert(0); /* This shouldn't happen */
+ss->pendingBuf.len = 0;
+} else {
+ss->pendingBuf.len -= rv;
+}
 if (ss->pendingBuf.len > 0 && rv > 0) {
 /* UGH !! This shifts the whole buffer down by copying it */
 PORT_Memmove(ss->pendingBuf.buf, ss->pendingBuf.buf + rv,



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/eed2de42dbce5898281b4987eecf29fed0303769

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/eed2de42dbce5898281b4987eecf29fed0303769
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/mullvad-browser][mullvad-browser-115.7.0esr-13.5-1] Bug 1867408 - NSS backport

2024-01-22 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch mullvad-browser-115.7.0esr-13.5-1 at The Tor Project / 
Applications / Mullvad Browser


Commits:
00f5c6d8 by hackademix at 2024-01-22T17:00:26+01:00
Bug 1867408 - NSS backport

- - - - -


1 changed file:

- security/nss/lib/ssl/sslsecur.c


Changes:

=
security/nss/lib/ssl/sslsecur.c
=
@@ -488,7 +488,12 @@ ssl_SendSavedWriteData(sslSocket *ss)
 if (rv < 0) {
 return rv;
 }
-ss->pendingBuf.len -= rv;
+if (rv > ss->pendingBuf.len) {
+PORT_Assert(0); /* This shouldn't happen */
+ss->pendingBuf.len = 0;
+} else {
+ss->pendingBuf.len -= rv;
+}
 if (ss->pendingBuf.len > 0 && rv > 0) {
 /* UGH !! This shifts the whole buffer down by copying it */
 PORT_Memmove(ss->pendingBuf.buf, ss->pendingBuf.buf + rv,



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/00f5c6d87febe04ecaa181a892fcb01ff1f6526d

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/00f5c6d87febe04ecaa181a892fcb01ff1f6526d
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][base-browser-115.7.0esr-13.0-1] Bug 1867408 - NSS backport

2024-01-22 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch base-browser-115.7.0esr-13.0-1 at The Tor Project / 
Applications / Tor Browser


Commits:
6c906dba by hackademix at 2024-01-22T16:46:05+01:00
Bug 1867408 - NSS backport

- - - - -


1 changed file:

- security/nss/lib/ssl/sslsecur.c


Changes:

=
security/nss/lib/ssl/sslsecur.c
=
@@ -488,7 +488,12 @@ ssl_SendSavedWriteData(sslSocket *ss)
 if (rv < 0) {
 return rv;
 }
-ss->pendingBuf.len -= rv;
+if (rv > ss->pendingBuf.len) {
+PORT_Assert(0); /* This shouldn't happen */
+ss->pendingBuf.len = 0;
+} else {
+ss->pendingBuf.len -= rv;
+}
 if (ss->pendingBuf.len > 0 && rv > 0) {
 /* UGH !! This shifts the whole buffer down by copying it */
 PORT_Memmove(ss->pendingBuf.buf, ss->pendingBuf.buf + rv,



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/6c906dba9373f791bf5b3ef99d57d334274dea20

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/6c906dba9373f791bf5b3ef99d57d334274dea20
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/mullvad-browser][mullvad-browser-115.7.0esr-13.0-1] Bug 1867408 - NSS backport

2024-01-22 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch mullvad-browser-115.7.0esr-13.0-1 at The Tor Project / 
Applications / Mullvad Browser


Commits:
e0af4349 by hackademix at 2024-01-22T16:57:26+01:00
Bug 1867408 - NSS backport

- - - - -


1 changed file:

- security/nss/lib/ssl/sslsecur.c


Changes:

=
security/nss/lib/ssl/sslsecur.c
=
@@ -488,7 +488,12 @@ ssl_SendSavedWriteData(sslSocket *ss)
 if (rv < 0) {
 return rv;
 }
-ss->pendingBuf.len -= rv;
+if (rv > ss->pendingBuf.len) {
+PORT_Assert(0); /* This shouldn't happen */
+ss->pendingBuf.len = 0;
+} else {
+ss->pendingBuf.len -= rv;
+}
 if (ss->pendingBuf.len > 0 && rv > 0) {
 /* UGH !! This shifts the whole buffer down by copying it */
 PORT_Memmove(ss->pendingBuf.buf, ss->pendingBuf.buf + rv,



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/e0af43495ec05b2f0b4a4f035ca4ca6935b54307

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/e0af43495ec05b2f0b4a4f035ca4ca6935b54307
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser] Pushed new tag tor-browser-115.5.0esr-13.0-1-build2

2023-11-20 Thread ma1 (@ma1) via tor-commits


ma1 pushed new tag tor-browser-115.5.0esr-13.0-1-build2 at The Tor Project / 
Applications / Tor Browser

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/tree/tor-browser-115.5.0esr-13.0-1-build2
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser] Pushed new tag base-browser-115.5.0esr-13.0-1-build2

2023-11-20 Thread ma1 (@ma1) via tor-commits


ma1 pushed new tag base-browser-115.5.0esr-13.0-1-build2 at The Tor Project / 
Applications / Tor Browser

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/tree/base-browser-115.5.0esr-13.0-1-build2
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


  1   2   >