[tor-commits] [Git][tpo/applications/tor-browser] Pushed new tag tor-browser-128.1.0esr-14.0-1-build3

2024-08-05 Thread ma1 (@ma1) via tor-commits


ma1 pushed new tag tor-browser-128.1.0esr-14.0-1-build3 at The Tor Project / 
Applications / Tor Browser

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/tree/tor-browser-128.1.0esr-14.0-1-build3
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/firefox-android] Pushed new tag firefox-android-115.2.1-13.5-1-build14

2024-08-05 Thread ma1 (@ma1) via tor-commits


ma1 pushed new tag firefox-android-115.2.1-13.5-1-build14 at The Tor Project / 
Applications / firefox-android

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/firefox-android/-/tree/firefox-android-115.2.1-13.5-1-build14
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser] Pushed new tag tor-browser-128.1.0esr-14.0-1-build2

2024-08-05 Thread ma1 (@ma1) via tor-commits


ma1 pushed new tag tor-browser-128.1.0esr-14.0-1-build2 at The Tor Project / 
Applications / Tor Browser

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/tree/tor-browser-128.1.0esr-14.0-1-build2
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/mullvad-browser] Pushed new tag mullvad-browser-115.14.0esr-13.5-1-build2

2024-08-05 Thread ma1 (@ma1) via tor-commits


ma1 pushed new tag mullvad-browser-115.14.0esr-13.5-1-build2 at The Tor Project 
/ Applications / Mullvad Browser

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/tree/mullvad-browser-115.14.0esr-13.5-1-build2
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/mullvad-browser][mullvad-browser-115.14.0esr-13.5-1] 2 commits: Bug 1899180. If a channel is not nsIPrivateBrowsingChannel and has no load...

2024-08-05 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch mullvad-browser-115.14.0esr-13.5-1 at The Tor Project / 
Applications / Mullvad Browser


Commits:
9d8af849 by Timothy Nikkel at 2024-08-05T10:31:07+02:00
Bug 1899180. If a channel is not nsIPrivateBrowsingChannel and has no load 
context, use the private browsing field from its origin attributes. 
r=necko-reviewers,anti-tracking-reviewers,valentin

If the channel is not a nsIPrivateBrowsingChannel, and it also has no load 
context (eg inside svg images) then we will over write a non-zero 
mPrivateBrowsingId on the OriginAttributes of the channel with 0, making 
NS_UsePrivateBrowsing return false for the channel.

Differential Revision: https://phabricator.services.mozilla.com/D212083

- - - - -
7f222f82 by Jon Coppeard at 2024-08-05T10:31:07+02:00
Bug 1904011 - Ignore finalized scripts when iterating code covarage tables 
r=iain

Differential Revision: https://phabricator.services.mozilla.com/D214799
- - - - -


3 changed files:

- js/src/gc/Zone.cpp
- + js/src/jit-test/tests/debug/bug-1904011.js
- toolkit/components/antitracking/StoragePrincipalHelper.cpp


Changes:

=
js/src/gc/Zone.cpp
=
@@ -918,7 +918,13 @@ void Zone::clearScriptCounts(Realm* realm) {
   // Clear all hasScriptCounts_ flags of BaseScript, in order to release all
   // ScriptCounts entries of the given realm.
   for (auto i = scriptCountsMap->modIter(); !i.done(); i.next()) {
-BaseScript* script = i.get().key();
+const HeapPtr& script = i.get().key();
+if (IsAboutToBeFinalized(script)) {
+  // Dead scripts may be present during incremental GC until script
+  // finalizers have been run.
+  continue;
+}
+
 if (script->realm() != realm) {
   continue;
 }
@@ -939,7 +945,13 @@ void Zone::clearScriptLCov(Realm* realm) {
   }
 
   for (auto i = scriptLCovMap->modIter(); !i.done(); i.next()) {
-BaseScript* script = i.get().key();
+const HeapPtr& script = i.get().key();
+if (IsAboutToBeFinalized(script)) {
+  // Dead scripts may be present during incremental GC until script
+  // finalizers have been run.
+  continue;
+}
+
 if (script->realm() == realm) {
   i.remove();
 }


=
js/src/jit-test/tests/debug/bug-1904011.js
=
@@ -0,0 +1,15 @@
+// |jit-test| --fuzzing-safe; --ion-offthread-compile=off
+gczeal(0);
+
+let g = newGlobal({newCompartment: true});
+let dbg = new Debugger(g);
+
+dbg.collectCoverageInfo = true;
+g.eval("0");
+
+// Start a GC in the debugger's zone and yield after sweeping objects.
+schedulezone(g);
+gczeal(22);
+startgc(100);
+
+dbg.collectCoverageInfo = false;


=
toolkit/components/antitracking/StoragePrincipalHelper.cpp
=
@@ -445,7 +445,7 @@ bool StoragePrincipalHelper::GetOriginAttributes(
   nsCOMPtr loadInfo = aChannel->LoadInfo();
   loadInfo->GetOriginAttributes();
 
-  bool isPrivate = false;
+  bool isPrivate = aAttributes.mPrivateBrowsingId > 0;
   nsCOMPtr pbChannel = do_QueryInterface(aChannel);
   if (pbChannel) {
 nsresult rv = pbChannel->GetIsChannelPrivate();
@@ -454,7 +454,9 @@ bool StoragePrincipalHelper::GetOriginAttributes(
 // Some channels may not implement nsIPrivateBrowsingChannel
 nsCOMPtr loadContext;
 NS_QueryNotificationCallbacks(aChannel, loadContext);
-isPrivate = loadContext && loadContext->UsePrivateBrowsing();
+if (loadContext) {
+  isPrivate = loadContext->UsePrivateBrowsing();
+}
   }
   aAttributes.SyncAttributesWithPrivateBrowsing(isPrivate);
 



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/compare/823e74d97b8245138c096a60f7eb6f8f36e6596e...7f222f827c6344cecc2558ab607343a7341479df

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/compare/823e74d97b8245138c096a60f7eb6f8f36e6596e...7f222f827c6344cecc2558ab607343a7341479df
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser] Pushed new tag base-browser-115.14.0esr-13.5-1-build2

2024-08-05 Thread ma1 (@ma1) via tor-commits


ma1 pushed new tag base-browser-115.14.0esr-13.5-1-build2 at The Tor Project / 
Applications / Tor Browser

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/tree/base-browser-115.14.0esr-13.5-1-build2
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][base-browser-115.14.0esr-13.5-1] 2 commits: Bug 1899180. If a channel is not nsIPrivateBrowsingChannel and has no load...

2024-08-05 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch base-browser-115.14.0esr-13.5-1 at The Tor Project / 
Applications / Tor Browser


Commits:
590ecd43 by Timothy Nikkel at 2024-08-05T10:25:19+02:00
Bug 1899180. If a channel is not nsIPrivateBrowsingChannel and has no load 
context, use the private browsing field from its origin attributes. 
r=necko-reviewers,anti-tracking-reviewers,valentin

If the channel is not a nsIPrivateBrowsingChannel, and it also has no load 
context (eg inside svg images) then we will over write a non-zero 
mPrivateBrowsingId on the OriginAttributes of the channel with 0, making 
NS_UsePrivateBrowsing return false for the channel.

Differential Revision: https://phabricator.services.mozilla.com/D212083

- - - - -
ded2e90d by Jon Coppeard at 2024-08-05T10:25:20+02:00
Bug 1904011 - Ignore finalized scripts when iterating code covarage tables 
r=iain

Differential Revision: https://phabricator.services.mozilla.com/D214799
- - - - -


3 changed files:

- js/src/gc/Zone.cpp
- + js/src/jit-test/tests/debug/bug-1904011.js
- toolkit/components/antitracking/StoragePrincipalHelper.cpp


Changes:

=
js/src/gc/Zone.cpp
=
@@ -918,7 +918,13 @@ void Zone::clearScriptCounts(Realm* realm) {
   // Clear all hasScriptCounts_ flags of BaseScript, in order to release all
   // ScriptCounts entries of the given realm.
   for (auto i = scriptCountsMap->modIter(); !i.done(); i.next()) {
-BaseScript* script = i.get().key();
+const HeapPtr& script = i.get().key();
+if (IsAboutToBeFinalized(script)) {
+  // Dead scripts may be present during incremental GC until script
+  // finalizers have been run.
+  continue;
+}
+
 if (script->realm() != realm) {
   continue;
 }
@@ -939,7 +945,13 @@ void Zone::clearScriptLCov(Realm* realm) {
   }
 
   for (auto i = scriptLCovMap->modIter(); !i.done(); i.next()) {
-BaseScript* script = i.get().key();
+const HeapPtr& script = i.get().key();
+if (IsAboutToBeFinalized(script)) {
+  // Dead scripts may be present during incremental GC until script
+  // finalizers have been run.
+  continue;
+}
+
 if (script->realm() == realm) {
   i.remove();
 }


=
js/src/jit-test/tests/debug/bug-1904011.js
=
@@ -0,0 +1,15 @@
+// |jit-test| --fuzzing-safe; --ion-offthread-compile=off
+gczeal(0);
+
+let g = newGlobal({newCompartment: true});
+let dbg = new Debugger(g);
+
+dbg.collectCoverageInfo = true;
+g.eval("0");
+
+// Start a GC in the debugger's zone and yield after sweeping objects.
+schedulezone(g);
+gczeal(22);
+startgc(100);
+
+dbg.collectCoverageInfo = false;


=
toolkit/components/antitracking/StoragePrincipalHelper.cpp
=
@@ -445,7 +445,7 @@ bool StoragePrincipalHelper::GetOriginAttributes(
   nsCOMPtr loadInfo = aChannel->LoadInfo();
   loadInfo->GetOriginAttributes();
 
-  bool isPrivate = false;
+  bool isPrivate = aAttributes.mPrivateBrowsingId > 0;
   nsCOMPtr pbChannel = do_QueryInterface(aChannel);
   if (pbChannel) {
 nsresult rv = pbChannel->GetIsChannelPrivate();
@@ -454,7 +454,9 @@ bool StoragePrincipalHelper::GetOriginAttributes(
 // Some channels may not implement nsIPrivateBrowsingChannel
 nsCOMPtr loadContext;
 NS_QueryNotificationCallbacks(aChannel, loadContext);
-isPrivate = loadContext && loadContext->UsePrivateBrowsing();
+if (loadContext) {
+  isPrivate = loadContext->UsePrivateBrowsing();
+}
   }
   aAttributes.SyncAttributesWithPrivateBrowsing(isPrivate);
 



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/compare/aa9b979b286396afdb06bebdb62202cfdb838e7f...ded2e90d40561090e0141ff4654bbeb10322f2e3

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/compare/aa9b979b286396afdb06bebdb62202cfdb838e7f...ded2e90d40561090e0141ff4654bbeb10322f2e3
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser] Pushed new tag tor-browser-115.14.0esr-13.5-1-build2

2024-08-05 Thread ma1 (@ma1) via tor-commits


ma1 pushed new tag tor-browser-115.14.0esr-13.5-1-build2 at The Tor Project / 
Applications / Tor Browser

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/tree/tor-browser-115.14.0esr-13.5-1-build2
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][tor-browser-115.14.0esr-13.5-1] 2 commits: Bug 1899180. If a channel is not nsIPrivateBrowsingChannel and has no load...

2024-08-05 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch tor-browser-115.14.0esr-13.5-1 at The Tor Project / 
Applications / Tor Browser


Commits:
76fd6391 by Timothy Nikkel at 2024-08-05T09:53:50+02:00
Bug 1899180. If a channel is not nsIPrivateBrowsingChannel and has no load 
context, use the private browsing field from its origin attributes. 
r=necko-reviewers,anti-tracking-reviewers,valentin

If the channel is not a nsIPrivateBrowsingChannel, and it also has no load 
context (eg inside svg images) then we will over write a non-zero 
mPrivateBrowsingId on the OriginAttributes of the channel with 0, making 
NS_UsePrivateBrowsing return false for the channel.

Differential Revision: https://phabricator.services.mozilla.com/D212083

- - - - -
e2d05e0a by Jon Coppeard at 2024-08-05T09:53:51+02:00
Bug 1904011 - Ignore finalized scripts when iterating code covarage tables 
r=iain

Differential Revision: https://phabricator.services.mozilla.com/D214799
- - - - -


3 changed files:

- js/src/gc/Zone.cpp
- + js/src/jit-test/tests/debug/bug-1904011.js
- toolkit/components/antitracking/StoragePrincipalHelper.cpp


Changes:

=
js/src/gc/Zone.cpp
=
@@ -918,7 +918,13 @@ void Zone::clearScriptCounts(Realm* realm) {
   // Clear all hasScriptCounts_ flags of BaseScript, in order to release all
   // ScriptCounts entries of the given realm.
   for (auto i = scriptCountsMap->modIter(); !i.done(); i.next()) {
-BaseScript* script = i.get().key();
+const HeapPtr& script = i.get().key();
+if (IsAboutToBeFinalized(script)) {
+  // Dead scripts may be present during incremental GC until script
+  // finalizers have been run.
+  continue;
+}
+
 if (script->realm() != realm) {
   continue;
 }
@@ -939,7 +945,13 @@ void Zone::clearScriptLCov(Realm* realm) {
   }
 
   for (auto i = scriptLCovMap->modIter(); !i.done(); i.next()) {
-BaseScript* script = i.get().key();
+const HeapPtr& script = i.get().key();
+if (IsAboutToBeFinalized(script)) {
+  // Dead scripts may be present during incremental GC until script
+  // finalizers have been run.
+  continue;
+}
+
 if (script->realm() == realm) {
   i.remove();
 }


=
js/src/jit-test/tests/debug/bug-1904011.js
=
@@ -0,0 +1,15 @@
+// |jit-test| --fuzzing-safe; --ion-offthread-compile=off
+gczeal(0);
+
+let g = newGlobal({newCompartment: true});
+let dbg = new Debugger(g);
+
+dbg.collectCoverageInfo = true;
+g.eval("0");
+
+// Start a GC in the debugger's zone and yield after sweeping objects.
+schedulezone(g);
+gczeal(22);
+startgc(100);
+
+dbg.collectCoverageInfo = false;


=
toolkit/components/antitracking/StoragePrincipalHelper.cpp
=
@@ -445,7 +445,7 @@ bool StoragePrincipalHelper::GetOriginAttributes(
   nsCOMPtr loadInfo = aChannel->LoadInfo();
   loadInfo->GetOriginAttributes();
 
-  bool isPrivate = false;
+  bool isPrivate = aAttributes.mPrivateBrowsingId > 0;
   nsCOMPtr pbChannel = do_QueryInterface(aChannel);
   if (pbChannel) {
 nsresult rv = pbChannel->GetIsChannelPrivate();
@@ -454,7 +454,9 @@ bool StoragePrincipalHelper::GetOriginAttributes(
 // Some channels may not implement nsIPrivateBrowsingChannel
 nsCOMPtr loadContext;
 NS_QueryNotificationCallbacks(aChannel, loadContext);
-isPrivate = loadContext && loadContext->UsePrivateBrowsing();
+if (loadContext) {
+  isPrivate = loadContext->UsePrivateBrowsing();
+}
   }
   aAttributes.SyncAttributesWithPrivateBrowsing(isPrivate);
 



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/compare/8048130a736211b38047cc740b543980e36348b4...e2d05e0addc1a91b47a80761ab1b1105a52bb4b7

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/compare/8048130a736211b38047cc740b543980e36348b4...e2d05e0addc1a91b47a80761ab1b1105a52bb4b7
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/mullvad-browser][mullvad-browser-115.14.0esr-13.5-1] Bug 42835: Create an actor to filter file data transfers

2024-08-05 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch mullvad-browser-115.14.0esr-13.5-1 at The Tor Project / 
Applications / Mullvad Browser


Commits:
823e74d9 by hackademix at 2024-08-05T09:11:58+02:00
Bug 42835: Create an actor to filter file data transfers

- - - - -


4 changed files:

- + toolkit/actors/FilesFilterChild.sys.mjs
- + toolkit/actors/FilesFilterParent.sys.mjs
- toolkit/actors/moz.build
- toolkit/modules/ActorManagerParent.sys.mjs


Changes:

=
toolkit/actors/FilesFilterChild.sys.mjs
=
@@ -0,0 +1,61 @@
+/* This Source Code Form is subject to the terms of the Mozilla Public
+ * License, v. 2.0. If a copy of the MPL was not distributed with this
+ * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
+
+const lazy = {};
+
+ChromeUtils.defineLazyGetter(lazy, "console", () => {
+  return console.createInstance({
+prefix: "FilesFilter",
+  });
+});
+
+export class FilesFilterChild extends JSWindowActorChild {
+  handleEvent(event) {
+// drop or paste
+const { composedTarget } = event;
+const dt = event.clipboardData || event.dataTransfer;
+
+if (dt.files.length) {
+  if (
+["HTMLInputElement", "HTMLTextAreaElement"].includes(
+  ChromeUtils.getClassName(composedTarget)
+)
+  ) {
+event.preventDefault();
+lazy.console.log(
+  `Preventing path leak on ${event.type} for ${[...dt.files]
+.map(f => f.name)
+.join(", ")}.`
+);
+  }
+  return;
+}
+
+// "Paste Without Formatting" (ctrl+shift+V) in HTML editors coerces files 
into paths
+if (!(event.clipboardData && dt.getData("text"))) {
+  return;
+}
+
+// check wether the clipboard contains a file
+const { clipboard } = Services;
+if (
+  [clipboard.kSelectionClipboard, clipboard.kGlobalClipboard].some(
+clipboardType =>
+  clipboard.isClipboardTypeSupported(clipboardType) &&
+  clipboard.hasDataMatchingFlavors(
+["application/x-moz-file"],
+clipboardType
+  )
+  )
+) {
+  event.preventDefault();
+  event.stopPropagation();
+  lazy.console.log(
+`Preventing path leak on "Paste Without Formatting" for ${dt.getData(
+  "text"
+)}.`
+  );
+}
+  }
+}


=
toolkit/actors/FilesFilterParent.sys.mjs
=
@@ -0,0 +1,7 @@
+/* This Source Code Form is subject to the terms of the Mozilla Public
+ * License, v. 2.0. If a copy of the MPL was not distributed with this
+ * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
+
+export class FilesFilterParent extends JSWindowActorParent {
+  // just a stub for now
+}


=
toolkit/actors/moz.build
=
@@ -55,6 +55,8 @@ FINAL_TARGET_FILES.actors += [
 "DateTimePickerChild.sys.mjs",
 "DateTimePickerParent.sys.mjs",
 "ExtFindChild.sys.mjs",
+"FilesFilterChild.sys.mjs",
+"FilesFilterParent.sys.mjs",
 "FindBarChild.sys.mjs",
 "FindBarParent.sys.mjs",
 "FinderChild.sys.mjs",


=
toolkit/modules/ActorManagerParent.sys.mjs
=
@@ -244,6 +244,22 @@ let JSWINDOWACTORS = {
 allFrames: true,
   },
 
+  FilesFilter: {
+parent: {
+  esModuleURI: "resource://gre/actors/FilesFilterParent.sys.mjs",
+},
+
+child: {
+  esModuleURI: "resource://gre/actors/FilesFilterChild.sys.mjs",
+  events: {
+drop: {},
+paste: { capture: true },
+  },
+},
+
+allFrames: true,
+  },
+
   FindBar: {
 parent: {
   esModuleURI: "resource://gre/actors/FindBarParent.sys.mjs",



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/823e74d97b8245138c096a60f7eb6f8f36e6596e

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/823e74d97b8245138c096a60f7eb6f8f36e6596e
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][base-browser-115.14.0esr-13.5-1] Bug 42835: Create an actor to filter file data transfers

2024-08-05 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch base-browser-115.14.0esr-13.5-1 at The Tor Project / 
Applications / Tor Browser


Commits:
aa9b979b by hackademix at 2024-08-05T09:09:37+02:00
Bug 42835: Create an actor to filter file data transfers

- - - - -


4 changed files:

- + toolkit/actors/FilesFilterChild.sys.mjs
- + toolkit/actors/FilesFilterParent.sys.mjs
- toolkit/actors/moz.build
- toolkit/modules/ActorManagerParent.sys.mjs


Changes:

=
toolkit/actors/FilesFilterChild.sys.mjs
=
@@ -0,0 +1,61 @@
+/* This Source Code Form is subject to the terms of the Mozilla Public
+ * License, v. 2.0. If a copy of the MPL was not distributed with this
+ * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
+
+const lazy = {};
+
+ChromeUtils.defineLazyGetter(lazy, "console", () => {
+  return console.createInstance({
+prefix: "FilesFilter",
+  });
+});
+
+export class FilesFilterChild extends JSWindowActorChild {
+  handleEvent(event) {
+// drop or paste
+const { composedTarget } = event;
+const dt = event.clipboardData || event.dataTransfer;
+
+if (dt.files.length) {
+  if (
+["HTMLInputElement", "HTMLTextAreaElement"].includes(
+  ChromeUtils.getClassName(composedTarget)
+)
+  ) {
+event.preventDefault();
+lazy.console.log(
+  `Preventing path leak on ${event.type} for ${[...dt.files]
+.map(f => f.name)
+.join(", ")}.`
+);
+  }
+  return;
+}
+
+// "Paste Without Formatting" (ctrl+shift+V) in HTML editors coerces files 
into paths
+if (!(event.clipboardData && dt.getData("text"))) {
+  return;
+}
+
+// check wether the clipboard contains a file
+const { clipboard } = Services;
+if (
+  [clipboard.kSelectionClipboard, clipboard.kGlobalClipboard].some(
+clipboardType =>
+  clipboard.isClipboardTypeSupported(clipboardType) &&
+  clipboard.hasDataMatchingFlavors(
+["application/x-moz-file"],
+clipboardType
+  )
+  )
+) {
+  event.preventDefault();
+  event.stopPropagation();
+  lazy.console.log(
+`Preventing path leak on "Paste Without Formatting" for ${dt.getData(
+  "text"
+)}.`
+  );
+}
+  }
+}


=
toolkit/actors/FilesFilterParent.sys.mjs
=
@@ -0,0 +1,7 @@
+/* This Source Code Form is subject to the terms of the Mozilla Public
+ * License, v. 2.0. If a copy of the MPL was not distributed with this
+ * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
+
+export class FilesFilterParent extends JSWindowActorParent {
+  // just a stub for now
+}


=
toolkit/actors/moz.build
=
@@ -55,6 +55,8 @@ FINAL_TARGET_FILES.actors += [
 "DateTimePickerChild.sys.mjs",
 "DateTimePickerParent.sys.mjs",
 "ExtFindChild.sys.mjs",
+"FilesFilterChild.sys.mjs",
+"FilesFilterParent.sys.mjs",
 "FindBarChild.sys.mjs",
 "FindBarParent.sys.mjs",
 "FinderChild.sys.mjs",


=
toolkit/modules/ActorManagerParent.sys.mjs
=
@@ -244,6 +244,22 @@ let JSWINDOWACTORS = {
 allFrames: true,
   },
 
+  FilesFilter: {
+parent: {
+  esModuleURI: "resource://gre/actors/FilesFilterParent.sys.mjs",
+},
+
+child: {
+  esModuleURI: "resource://gre/actors/FilesFilterChild.sys.mjs",
+  events: {
+drop: {},
+paste: { capture: true },
+  },
+},
+
+allFrames: true,
+  },
+
   FindBar: {
 parent: {
   esModuleURI: "resource://gre/actors/FindBarParent.sys.mjs",



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/aa9b979b286396afdb06bebdb62202cfdb838e7f

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/aa9b979b286396afdb06bebdb62202cfdb838e7f
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][tor-browser-115.14.0esr-13.5-1] Bug 42835: Create an actor to filter file data transfers

2024-08-05 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch tor-browser-115.14.0esr-13.5-1 at The Tor Project / 
Applications / Tor Browser


Commits:
8048130a by hackademix at 2024-08-05T09:05:32+02:00
Bug 42835: Create an actor to filter file data transfers

- - - - -


4 changed files:

- + toolkit/actors/FilesFilterChild.sys.mjs
- + toolkit/actors/FilesFilterParent.sys.mjs
- toolkit/actors/moz.build
- toolkit/modules/ActorManagerParent.sys.mjs


Changes:

=
toolkit/actors/FilesFilterChild.sys.mjs
=
@@ -0,0 +1,61 @@
+/* This Source Code Form is subject to the terms of the Mozilla Public
+ * License, v. 2.0. If a copy of the MPL was not distributed with this
+ * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
+
+const lazy = {};
+
+ChromeUtils.defineLazyGetter(lazy, "console", () => {
+  return console.createInstance({
+prefix: "FilesFilter",
+  });
+});
+
+export class FilesFilterChild extends JSWindowActorChild {
+  handleEvent(event) {
+// drop or paste
+const { composedTarget } = event;
+const dt = event.clipboardData || event.dataTransfer;
+
+if (dt.files.length) {
+  if (
+["HTMLInputElement", "HTMLTextAreaElement"].includes(
+  ChromeUtils.getClassName(composedTarget)
+)
+  ) {
+event.preventDefault();
+lazy.console.log(
+  `Preventing path leak on ${event.type} for ${[...dt.files]
+.map(f => f.name)
+.join(", ")}.`
+);
+  }
+  return;
+}
+
+// "Paste Without Formatting" (ctrl+shift+V) in HTML editors coerces files 
into paths
+if (!(event.clipboardData && dt.getData("text"))) {
+  return;
+}
+
+// check wether the clipboard contains a file
+const { clipboard } = Services;
+if (
+  [clipboard.kSelectionClipboard, clipboard.kGlobalClipboard].some(
+clipboardType =>
+  clipboard.isClipboardTypeSupported(clipboardType) &&
+  clipboard.hasDataMatchingFlavors(
+["application/x-moz-file"],
+clipboardType
+  )
+  )
+) {
+  event.preventDefault();
+  event.stopPropagation();
+  lazy.console.log(
+`Preventing path leak on "Paste Without Formatting" for ${dt.getData(
+  "text"
+)}.`
+  );
+}
+  }
+}


=
toolkit/actors/FilesFilterParent.sys.mjs
=
@@ -0,0 +1,7 @@
+/* This Source Code Form is subject to the terms of the Mozilla Public
+ * License, v. 2.0. If a copy of the MPL was not distributed with this
+ * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
+
+export class FilesFilterParent extends JSWindowActorParent {
+  // just a stub for now
+}


=
toolkit/actors/moz.build
=
@@ -55,6 +55,8 @@ FINAL_TARGET_FILES.actors += [
 "DateTimePickerChild.sys.mjs",
 "DateTimePickerParent.sys.mjs",
 "ExtFindChild.sys.mjs",
+"FilesFilterChild.sys.mjs",
+"FilesFilterParent.sys.mjs",
 "FindBarChild.sys.mjs",
 "FindBarParent.sys.mjs",
 "FinderChild.sys.mjs",


=
toolkit/modules/ActorManagerParent.sys.mjs
=
@@ -244,6 +244,22 @@ let JSWINDOWACTORS = {
 allFrames: true,
   },
 
+  FilesFilter: {
+parent: {
+  esModuleURI: "resource://gre/actors/FilesFilterParent.sys.mjs",
+},
+
+child: {
+  esModuleURI: "resource://gre/actors/FilesFilterChild.sys.mjs",
+  events: {
+drop: {},
+paste: { capture: true },
+  },
+},
+
+allFrames: true,
+  },
+
   FindBar: {
 parent: {
   esModuleURI: "resource://gre/actors/FindBarParent.sys.mjs",



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/8048130a736211b38047cc740b543980e36348b4

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/8048130a736211b38047cc740b543980e36348b4
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/mullvad-browser][mullvad-browser-128.1.0esr-14.0-1] Bug 42835: Create an actor to filter file data transfers

2024-08-02 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch mullvad-browser-128.1.0esr-14.0-1 at The Tor Project / 
Applications / Mullvad Browser


Commits:
dccbed9e by hackademix at 2024-08-02T22:26:22+02:00
Bug 42835: Create an actor to filter file data transfers

- - - - -


4 changed files:

- + toolkit/actors/FilesFilterChild.sys.mjs
- + toolkit/actors/FilesFilterParent.sys.mjs
- toolkit/actors/moz.build
- toolkit/modules/ActorManagerParent.sys.mjs


Changes:

=
toolkit/actors/FilesFilterChild.sys.mjs
=
@@ -0,0 +1,61 @@
+/* This Source Code Form is subject to the terms of the Mozilla Public
+ * License, v. 2.0. If a copy of the MPL was not distributed with this
+ * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
+
+const lazy = {};
+
+ChromeUtils.defineLazyGetter(lazy, "console", () => {
+  return console.createInstance({
+prefix: "FilesFilter",
+  });
+});
+
+export class FilesFilterChild extends JSWindowActorChild {
+  handleEvent(event) {
+// drop or paste
+const { composedTarget } = event;
+const dt = event.clipboardData || event.dataTransfer;
+
+if (dt.files.length) {
+  if (
+["HTMLInputElement", "HTMLTextAreaElement"].includes(
+  ChromeUtils.getClassName(composedTarget)
+)
+  ) {
+event.preventDefault();
+lazy.console.log(
+  `Preventing path leak on ${event.type} for ${[...dt.files]
+.map(f => f.name)
+.join(", ")}.`
+);
+  }
+  return;
+}
+
+// "Paste Without Formatting" (ctrl+shift+V) in HTML editors coerces files 
into paths
+if (!(event.clipboardData && dt.getData("text"))) {
+  return;
+}
+
+// check wether the clipboard contains a file
+const { clipboard } = Services;
+if (
+  [clipboard.kSelectionClipboard, clipboard.kGlobalClipboard].some(
+clipboardType =>
+  clipboard.isClipboardTypeSupported(clipboardType) &&
+  clipboard.hasDataMatchingFlavors(
+["application/x-moz-file"],
+clipboardType
+  )
+  )
+) {
+  event.preventDefault();
+  event.stopPropagation();
+  lazy.console.log(
+`Preventing path leak on "Paste Without Formatting" for ${dt.getData(
+  "text"
+)}.`
+  );
+}
+  }
+}


=
toolkit/actors/FilesFilterParent.sys.mjs
=
@@ -0,0 +1,7 @@
+/* This Source Code Form is subject to the terms of the Mozilla Public
+ * License, v. 2.0. If a copy of the MPL was not distributed with this
+ * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
+
+export class FilesFilterParent extends JSWindowActorParent {
+  // just a stub for now
+}


=
toolkit/actors/moz.build
=
@@ -53,6 +53,8 @@ FINAL_TARGET_FILES.actors += [
 "DateTimePickerChild.sys.mjs",
 "DateTimePickerParent.sys.mjs",
 "ExtFindChild.sys.mjs",
+"FilesFilterChild.sys.mjs",
+"FilesFilterParent.sys.mjs",
 "FindBarChild.sys.mjs",
 "FindBarParent.sys.mjs",
 "FinderChild.sys.mjs",


=
toolkit/modules/ActorManagerParent.sys.mjs
=
@@ -285,6 +285,22 @@ let JSWINDOWACTORS = {
 allFrames: true,
   },
 
+  FilesFilter: {
+parent: {
+  esModuleURI: "resource://gre/actors/FilesFilterParent.sys.mjs",
+},
+
+child: {
+  esModuleURI: "resource://gre/actors/FilesFilterChild.sys.mjs",
+  events: {
+drop: {},
+paste: { capture: true },
+  },
+},
+
+allFrames: true,
+  },
+
   FindBar: {
 parent: {
   esModuleURI: "resource://gre/actors/FindBarParent.sys.mjs",



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/dccbed9ead4849df040f9ac3fae871d8a6ac78e2

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/dccbed9ead4849df040f9ac3fae871d8a6ac78e2
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][base-browser-128.1.0esr-14.0-1] Bug 42835: Create an actor to filter file data transfers

2024-08-02 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch base-browser-128.1.0esr-14.0-1 at The Tor Project / 
Applications / Tor Browser


Commits:
ac2dbd4d by hackademix at 2024-08-02T22:23:38+02:00
Bug 42835: Create an actor to filter file data transfers

- - - - -


4 changed files:

- + toolkit/actors/FilesFilterChild.sys.mjs
- + toolkit/actors/FilesFilterParent.sys.mjs
- toolkit/actors/moz.build
- toolkit/modules/ActorManagerParent.sys.mjs


Changes:

=
toolkit/actors/FilesFilterChild.sys.mjs
=
@@ -0,0 +1,61 @@
+/* This Source Code Form is subject to the terms of the Mozilla Public
+ * License, v. 2.0. If a copy of the MPL was not distributed with this
+ * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
+
+const lazy = {};
+
+ChromeUtils.defineLazyGetter(lazy, "console", () => {
+  return console.createInstance({
+prefix: "FilesFilter",
+  });
+});
+
+export class FilesFilterChild extends JSWindowActorChild {
+  handleEvent(event) {
+// drop or paste
+const { composedTarget } = event;
+const dt = event.clipboardData || event.dataTransfer;
+
+if (dt.files.length) {
+  if (
+["HTMLInputElement", "HTMLTextAreaElement"].includes(
+  ChromeUtils.getClassName(composedTarget)
+)
+  ) {
+event.preventDefault();
+lazy.console.log(
+  `Preventing path leak on ${event.type} for ${[...dt.files]
+.map(f => f.name)
+.join(", ")}.`
+);
+  }
+  return;
+}
+
+// "Paste Without Formatting" (ctrl+shift+V) in HTML editors coerces files 
into paths
+if (!(event.clipboardData && dt.getData("text"))) {
+  return;
+}
+
+// check wether the clipboard contains a file
+const { clipboard } = Services;
+if (
+  [clipboard.kSelectionClipboard, clipboard.kGlobalClipboard].some(
+clipboardType =>
+  clipboard.isClipboardTypeSupported(clipboardType) &&
+  clipboard.hasDataMatchingFlavors(
+["application/x-moz-file"],
+clipboardType
+  )
+  )
+) {
+  event.preventDefault();
+  event.stopPropagation();
+  lazy.console.log(
+`Preventing path leak on "Paste Without Formatting" for ${dt.getData(
+  "text"
+)}.`
+  );
+}
+  }
+}


=
toolkit/actors/FilesFilterParent.sys.mjs
=
@@ -0,0 +1,7 @@
+/* This Source Code Form is subject to the terms of the Mozilla Public
+ * License, v. 2.0. If a copy of the MPL was not distributed with this
+ * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
+
+export class FilesFilterParent extends JSWindowActorParent {
+  // just a stub for now
+}


=
toolkit/actors/moz.build
=
@@ -53,6 +53,8 @@ FINAL_TARGET_FILES.actors += [
 "DateTimePickerChild.sys.mjs",
 "DateTimePickerParent.sys.mjs",
 "ExtFindChild.sys.mjs",
+"FilesFilterChild.sys.mjs",
+"FilesFilterParent.sys.mjs",
 "FindBarChild.sys.mjs",
 "FindBarParent.sys.mjs",
 "FinderChild.sys.mjs",


=
toolkit/modules/ActorManagerParent.sys.mjs
=
@@ -285,6 +285,22 @@ let JSWINDOWACTORS = {
 allFrames: true,
   },
 
+  FilesFilter: {
+parent: {
+  esModuleURI: "resource://gre/actors/FilesFilterParent.sys.mjs",
+},
+
+child: {
+  esModuleURI: "resource://gre/actors/FilesFilterChild.sys.mjs",
+  events: {
+drop: {},
+paste: { capture: true },
+  },
+},
+
+allFrames: true,
+  },
+
   FindBar: {
 parent: {
   esModuleURI: "resource://gre/actors/FindBarParent.sys.mjs",



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/ac2dbd4d7664782cd86d4fbaaf47973a94a6f100

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/ac2dbd4d7664782cd86d4fbaaf47973a94a6f100
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][tor-browser-128.1.0esr-14.0-1] Bug 42835: Create an actor to filter file data transfers

2024-08-02 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch tor-browser-128.1.0esr-14.0-1 at The Tor Project / 
Applications / Tor Browser


Commits:
693e125e by hackademix at 2024-08-01T16:28:30+02:00
Bug 42835: Create an actor to filter file data transfers

- - - - -


4 changed files:

- + toolkit/actors/FilesFilterChild.sys.mjs
- + toolkit/actors/FilesFilterParent.sys.mjs
- toolkit/actors/moz.build
- toolkit/modules/ActorManagerParent.sys.mjs


Changes:

=
toolkit/actors/FilesFilterChild.sys.mjs
=
@@ -0,0 +1,61 @@
+/* This Source Code Form is subject to the terms of the Mozilla Public
+ * License, v. 2.0. If a copy of the MPL was not distributed with this
+ * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
+
+const lazy = {};
+
+ChromeUtils.defineLazyGetter(lazy, "console", () => {
+  return console.createInstance({
+prefix: "FilesFilter",
+  });
+});
+
+export class FilesFilterChild extends JSWindowActorChild {
+  handleEvent(event) {
+// drop or paste
+const { composedTarget } = event;
+const dt = event.clipboardData || event.dataTransfer;
+
+if (dt.files.length) {
+  if (
+["HTMLInputElement", "HTMLTextAreaElement"].includes(
+  ChromeUtils.getClassName(composedTarget)
+)
+  ) {
+event.preventDefault();
+lazy.console.log(
+  `Preventing path leak on ${event.type} for ${[...dt.files]
+.map(f => f.name)
+.join(", ")}.`
+);
+  }
+  return;
+}
+
+// "Paste Without Formatting" (ctrl+shift+V) in HTML editors coerces files 
into paths
+if (!(event.clipboardData && dt.getData("text"))) {
+  return;
+}
+
+// check wether the clipboard contains a file
+const { clipboard } = Services;
+if (
+  [clipboard.kSelectionClipboard, clipboard.kGlobalClipboard].some(
+clipboardType =>
+  clipboard.isClipboardTypeSupported(clipboardType) &&
+  clipboard.hasDataMatchingFlavors(
+["application/x-moz-file"],
+clipboardType
+  )
+  )
+) {
+  event.preventDefault();
+  event.stopPropagation();
+  lazy.console.log(
+`Preventing path leak on "Paste Without Formatting" for ${dt.getData(
+  "text"
+)}.`
+  );
+}
+  }
+}


=
toolkit/actors/FilesFilterParent.sys.mjs
=
@@ -0,0 +1,7 @@
+/* This Source Code Form is subject to the terms of the Mozilla Public
+ * License, v. 2.0. If a copy of the MPL was not distributed with this
+ * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
+
+export class FilesFilterParent extends JSWindowActorParent {
+  // just a stub for now
+}


=
toolkit/actors/moz.build
=
@@ -53,6 +53,8 @@ FINAL_TARGET_FILES.actors += [
 "DateTimePickerChild.sys.mjs",
 "DateTimePickerParent.sys.mjs",
 "ExtFindChild.sys.mjs",
+"FilesFilterChild.sys.mjs",
+"FilesFilterParent.sys.mjs",
 "FindBarChild.sys.mjs",
 "FindBarParent.sys.mjs",
 "FinderChild.sys.mjs",


=
toolkit/modules/ActorManagerParent.sys.mjs
=
@@ -285,6 +285,22 @@ let JSWINDOWACTORS = {
 allFrames: true,
   },
 
+  FilesFilter: {
+parent: {
+  esModuleURI: "resource://gre/actors/FilesFilterParent.sys.mjs",
+},
+
+child: {
+  esModuleURI: "resource://gre/actors/FilesFilterChild.sys.mjs",
+  events: {
+drop: {},
+paste: { capture: true },
+  },
+},
+
+allFrames: true,
+  },
+
   FindBar: {
 parent: {
   esModuleURI: "resource://gre/actors/FindBarParent.sys.mjs",



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/693e125ea60ae5a9a46b2ad0f8a92fd9885ce7bb

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/693e125ea60ae5a9a46b2ad0f8a92fd9885ce7bb
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/mullvad-browser][mullvad-browser-128.0esr-14.0-1] fixup! Firefox preference overrides.

2024-07-23 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch mullvad-browser-128.0esr-14.0-1 at The Tor Project / 
Applications / Mullvad Browser


Commits:
b3bdee22 by hackademix at 2024-07-23T12:42:31+02:00
fixup! Firefox preference overrides.

Bug 42687: Disable Privacy-Preserving Attribution.

- - - - -


1 changed file:

- browser/app/profile/001-base-profile.js


Changes:

=
browser/app/profile/001-base-profile.js
=
@@ -230,6 +230,9 @@ pref("privacy.annotate_channels.strict_list.enabled", 
false);
 // Disable the Pocket extension (Bug #18886 and #31602)
 pref("extensions.pocket.enabled", false);
 
+// Disable Privacy-Preserving-Attribution (Bug #42687)
+pref("dom.private-attribution.submission.enabled", false);
+
 // Custom extensions preferences tor-browser#41581
 pref("extensions.hideNoScript", true);
 pref("extensions.hideUnifiedWhenEmpty", true);



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/b3bdee226f5d31b1e1db09062c8f6158f76c9661

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/b3bdee226f5d31b1e1db09062c8f6158f76c9661
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][base-browser-128.0esr-14.0-1] fixup! Firefox preference overrides.

2024-07-23 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch base-browser-128.0esr-14.0-1 at The Tor Project / 
Applications / Tor Browser


Commits:
15ffea8c by hackademix at 2024-07-23T11:43:15+02:00
fixup! Firefox preference overrides.

Bug 42687: Disable Privacy-Preserving Attribution.

- - - - -


1 changed file:

- browser/app/profile/001-base-profile.js


Changes:

=
browser/app/profile/001-base-profile.js
=
@@ -230,6 +230,9 @@ pref("privacy.annotate_channels.strict_list.enabled", 
false);
 // Disable the Pocket extension (Bug #18886 and #31602)
 pref("extensions.pocket.enabled", false);
 
+// Disable Privacy-Preserving-Attribution (Bug #42687)
+pref("dom.private-attribution.submission.enabled", false);
+
 // Custom extensions preferences tor-browser#41581
 pref("extensions.hideNoScript", true);
 pref("extensions.hideUnifiedWhenEmpty", true);



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/15ffea8c6a9a3c265318b1920760008deefbbeba

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/15ffea8c6a9a3c265318b1920760008deefbbeba
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][tor-browser-128.0esr-14.0-1] fixup! Firefox preference overrides.

2024-07-23 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch tor-browser-128.0esr-14.0-1 at The Tor Project / 
Applications / Tor Browser


Commits:
21b3574f by hackademix at 2024-07-23T11:40:05+02:00
fixup! Firefox preference overrides.

Bug 42687: Disable Privacy-Preserving Attribution.

- - - - -


1 changed file:

- browser/app/profile/001-base-profile.js


Changes:

=
browser/app/profile/001-base-profile.js
=
@@ -230,6 +230,9 @@ pref("privacy.annotate_channels.strict_list.enabled", 
false);
 // Disable the Pocket extension (Bug #18886 and #31602)
 pref("extensions.pocket.enabled", false);
 
+// Disable Privacy-Preserving-Attribution (Bug #42687)
+pref("dom.private-attribution.submission.enabled", false);
+
 // Custom extensions preferences tor-browser#41581
 pref("extensions.hideNoScript", true);
 pref("extensions.hideUnifiedWhenEmpty", true);



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/21b3574f9a59b679d8ade24ec39f222b7bb1bbbf

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/21b3574f9a59b679d8ade24ec39f222b7bb1bbbf
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser-build] Pushed new tag mb-13.5.1-build3

2024-07-09 Thread ma1 (@ma1) via tor-commits


ma1 pushed new tag mb-13.5.1-build3 at The Tor Project / Applications / 
tor-browser-build

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/tree/mb-13.5.1-build3
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser-build][maint-13.5] fixup! Bug 41174, 41175: Tor, Mullvad Browser 13.5.1 release preparation

2024-07-09 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch maint-13.5 at The Tor Project / Applications / 
tor-browser-build


Commits:
a237180b by hackademix at 2024-07-10T01:24:32+02:00
fixup! Bug 41174, 41175: Tor, Mullvad Browser 13.5.1 release preparation

Bump tbb to build3 (Fixup for Mullvad Browser backports bustage).

- - - - -


1 changed file:

- rbm.conf


Changes:

=
rbm.conf
=
@@ -74,7 +74,7 @@ buildconf:
 
 var:
   torbrowser_version: '13.5.1'
-  torbrowser_build: 'build2'
+  torbrowser_build: 'build3'
   # This should be the date of when the build is started. For the build
   # to be reproducible, browser_release_date should always be in the past.
   browser_release_date: '2024/07/08 12:00:00'



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/commit/a237180b442d89fe6891a32e9cd696977c8d74f2

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/commit/a237180b442d89fe6891a32e9cd696977c8d74f2
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser-build][maint-13.5] fixup! Bug 41174, 41175: Tor, Mullvad Browser 13.5.1 release preparation

2024-07-09 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch maint-13.5 at The Tor Project / Applications / 
tor-browser-build


Commits:
f02e0dc8 by hackademix at 2024-07-10T01:02:21+02:00
fixup! Bug 41174, 41175: Tor, Mullvad Browser 13.5.1 release preparation

Actually override build number (Fixup for Mullvad Browser backports bustage).

- - - - -


1 changed file:

- projects/firefox/config


Changes:

=
projects/firefox/config
=
@@ -102,8 +102,8 @@ targets:
 
   mullvadbrowser:
 git_url: https://gitlab.torproject.org/tpo/applications/mullvad-browser.git
-browser_build: 3
 var:
+  browser_build: 3
   branding_directory_prefix: 'mb'
   gitlab_project: 
https://gitlab.torproject.org/tpo/applications/mullvad-browser
   updater_url: 'https://cdn.mullvad.net/browser/update_responses/update_1/'



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/commit/f02e0dc85fda9e065372fdd29b13b1d0f67d15af

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/commit/f02e0dc85fda9e065372fdd29b13b1d0f67d15af
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser-build] Pushed new tag tbb-13.5.1-build2

2024-07-09 Thread ma1 (@ma1) via tor-commits


ma1 pushed new tag tbb-13.5.1-build2 at The Tor Project / Applications / 
tor-browser-build

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/tree/tbb-13.5.1-build2
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser] Pushed new tag base-browser-115.13.0esr-13.5-1-build3

2024-07-09 Thread ma1 (@ma1) via tor-commits


ma1 pushed new tag base-browser-115.13.0esr-13.5-1-build3 at The Tor Project / 
Applications / Tor Browser

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/tree/base-browser-115.13.0esr-13.5-1-build3
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][base-browser-115.13.0esr-13.5-1] fixup! Bug 1743329 - Release pointer lock when xul popup is open; r=smaug,pbz

2024-07-09 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch base-browser-115.13.0esr-13.5-1 at The Tor Project / 
Applications / Tor Browser


Commits:
11896db5 by hackademix at 2024-07-09T23:23:54+02:00
fixup! Bug 1743329 - Release pointer lock when xul popup is open; r=smaug,pbz

Bug 42693: Backport security fixes from Firefox 128, base/mullvad browser fixup.

- - - - -


1 changed file:

- dom/ipc/PBrowser.ipdl


Changes:

=
dom/ipc/PBrowser.ipdl
=
@@ -563,6 +563,11 @@ parent:
 async RequestPointerCapture(uint32_t aPointerId) returns (bool aSuccess);
 async ReleasePointerCapture(uint32_t aPointerId);
 
+/**
+ * Child informs the parent that a pointer lock has requested.
+ */
+async RequestPointerLock() returns (nsCString error);
+
 both:
 /**
  * informs that a pointer lock has released.



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/11896db541c90f2877880498daa431c6994eb01a

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/11896db541c90f2877880498daa431c6994eb01a
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/mullvad-browser] Pushed new tag mullvad-browser-115.13.0esr-13.5-1-build3

2024-07-09 Thread ma1 (@ma1) via tor-commits


ma1 pushed new tag mullvad-browser-115.13.0esr-13.5-1-build3 at The Tor Project 
/ Applications / Mullvad Browser

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/tree/mullvad-browser-115.13.0esr-13.5-1-build3
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/mullvad-browser][mullvad-browser-115.13.0esr-13.5-1] fixup! Bug 1743329 - Release pointer lock when xul popup is open; r=smaug,pbz

2024-07-09 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch mullvad-browser-115.13.0esr-13.5-1 at The Tor Project / 
Applications / Mullvad Browser


Commits:
d1fb6919 by hackademix at 2024-07-09T22:49:05+02:00
fixup! Bug 1743329 - Release pointer lock when xul popup is open; r=smaug,pbz

Bug 42693: Backport security fixes from Firefox 128, base/mullvad browser fixup.

- - - - -


1 changed file:

- dom/ipc/PBrowser.ipdl


Changes:

=
dom/ipc/PBrowser.ipdl
=
@@ -563,6 +563,11 @@ parent:
 async RequestPointerCapture(uint32_t aPointerId) returns (bool aSuccess);
 async ReleasePointerCapture(uint32_t aPointerId);
 
+/**
+ * Child informs the parent that a pointer lock has requested.
+ */
+async RequestPointerLock() returns (nsCString error);
+
 both:
 /**
  * informs that a pointer lock has released.



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/d1fb691939e569a88c09d3d573f1890d1f36b1fb

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/d1fb691939e569a88c09d3d573f1890d1f36b1fb
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/firefox-android] Pushed new tag firefox-android-115.2.1-13.5-1-build13

2024-07-09 Thread ma1 (@ma1) via tor-commits


ma1 pushed new tag firefox-android-115.2.1-13.5-1-build13 at The Tor Project / 
Applications / firefox-android

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/firefox-android/-/tree/firefox-android-115.2.1-13.5-1-build13
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser] Pushed new tag base-browser-115.13.0esr-13.5-1-build2

2024-07-09 Thread ma1 (@ma1) via tor-commits


ma1 pushed new tag base-browser-115.13.0esr-13.5-1-build2 at The Tor Project / 
Applications / Tor Browser

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/tree/base-browser-115.13.0esr-13.5-1-build2
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/mullvad-browser] Pushed new tag mullvad-browser-115.13.0esr-13.5-1-build2

2024-07-09 Thread ma1 (@ma1) via tor-commits


ma1 pushed new tag mullvad-browser-115.13.0esr-13.5-1-build2 at The Tor Project 
/ Applications / Mullvad Browser

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/tree/mullvad-browser-115.13.0esr-13.5-1-build2
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser] Pushed new tag tor-browser-115.13.0esr-13.5-1-build2

2024-07-09 Thread ma1 (@ma1) via tor-commits


ma1 pushed new tag tor-browser-115.13.0esr-13.5-1-build2 at The Tor Project / 
Applications / Tor Browser

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/tree/tor-browser-115.13.0esr-13.5-1-build2
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/firefox-android][firefox-android-115.2.1-13.5-1] Bug 1836786 - Improve prompts a=dmeehan - BP, tor-browser#42693

2024-07-09 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch firefox-android-115.2.1-13.5-1 at The Tor Project / 
Applications / firefox-android


Commits:
6271d708 by hackademix at 2024-07-09T14:38:08+02:00
Bug 1836786 - Improve prompts  a=dmeehan - BP, tor-browser#42693

Note (ma1): backporting needed to
update feature-sitepermissions dependency,
relocate the PromptAbuserDetector import,
de-internalize the class and patch its constructor,
because of the refactorings happened in Bug 1903828.

- - - - -


4 changed files:

- android-components/.buildconfig.yml
- 
android-components/components/feature/prompts/src/main/java/mozilla/components/feature/prompts/dialog/PromptAbuserDetector.kt
- android-components/components/feature/sitepermissions/build.gradle
- 
android-components/components/feature/sitepermissions/src/main/java/mozilla/components/feature/sitepermissions/SitePermissionsDialogFragment.kt


Changes:

=
android-components/.buildconfig.yml
=
@@ -1150,6 +1150,7 @@ projects:
 - concept-tabstray
 - concept-toolbar
 - feature-session
+- feature-prompts
 - feature-tabs
 - lib-publicsuffixlist
 - lib-state


=
android-components/components/feature/prompts/src/main/java/mozilla/components/feature/prompts/dialog/PromptAbuserDetector.kt
=
@@ -9,7 +9,7 @@ import java.util.Date
 /**
  * Helper class to identify if a website has shown many dialogs.
  */
-internal class PromptAbuserDetector {
+class PromptAbuserDetector(private val maxSuccessiveDialogSecondsLimit: Int = 
MAX_SUCCESSIVE_DIALOG_SECONDS_LIMIT) {
 
 internal var jsAlertCount = 0
 internal var lastDialogShownAt = Date()
@@ -43,7 +43,7 @@ internal class PromptAbuserDetector {
 } else {
 val now = Date()
 val diffInSeconds = (now.time - lastDialogShownAt.time) / SECOND_MS
-diffInSeconds < MAX_SUCCESSIVE_DIALOG_SECONDS_LIMIT
+diffInSeconds < maxSuccessiveDialogSecondsLimit
 }
 }
 


=
android-components/components/feature/sitepermissions/build.gradle
=
@@ -58,6 +58,7 @@ dependencies {
 implementation project(':concept-engine')
 implementation project(':ui-icons')
 implementation project(':support-ktx')
+implementation project(':feature-prompts')
 implementation project(':feature-tabs')
 
 implementation ComponentsDependencies.kotlin_coroutines


=
android-components/components/feature/sitepermissions/src/main/java/mozilla/components/feature/sitepermissions/SitePermissionsDialogFragment.kt
=
@@ -20,8 +20,10 @@ import android.widget.CheckBox
 import android.widget.ImageView
 import android.widget.LinearLayout.LayoutParams
 import android.widget.TextView
+import androidx.annotation.VisibleForTesting
 import androidx.appcompat.app.AppCompatDialogFragment
 import androidx.core.content.ContextCompat
+import mozilla.components.feature.prompts.dialog.PromptAbuserDetector
 
 internal const val KEY_SESSION_ID = "KEY_SESSION_ID"
 internal const val KEY_TITLE = "KEY_TITLE"
@@ -41,6 +43,9 @@ private const val KEY_PERMISSION_ID = "KEY_PERMISSION_ID"
 
 internal open class SitePermissionsDialogFragment : AppCompatDialogFragment() {
 
+@VisibleForTesting
+internal var promptAbuserDetector =
+PromptAbuserDetector(maxSuccessiveDialogSecondsLimit = 
TIME_SHOWN_OFFSET_SECONDS)
 // Safe Arguments
 
 private val safeArguments get() = requireNotNull(arguments)
@@ -106,6 +111,8 @@ internal open class SitePermissionsDialogFragment : 
AppCompatDialogFragment() {
 }
 }
 
+promptAbuserDetector.updateJSDialogAbusedState()
+
 return sheetDialog
 }
 
@@ -159,8 +166,16 @@ internal open class SitePermissionsDialogFragment : 
AppCompatDialogFragment() {
 val negativeButton = rootView.findViewById(R.id.deny_button)
 
 positiveButton.setOnClickListener {
-feature?.onPositiveButtonPress(permissionRequestId, sessionId, 
userSelectionCheckBox)
-dismiss()
+if (promptAbuserDetector.areDialogsBeingAbused()) {
+promptAbuserDetector.updateJSDialogAbusedState()
+} else {
+feature?.onPositiveButtonPress(
+permissionRequestId,
+sessionId,
+userSelectionCheckBox,
+)
+dismiss()
+}
 }
 
 if (positiveButtonBackgroundColor != DEFAULT_VALUE) {
@@ -255,5 +270,7 @@ internal open class SitePermissionsDialogFragment : 
AppCompatDialogFragment() {
 fragment.arguments = arguments
 return fragment
 }
+
+private const val TIME_SHOWN_OFFSET_SECONDS = 1
 }
 }



View it on GitLab: 

[tor-commits] [Git][tpo/applications/mullvad-browser][mullvad-browser-115.11.0esr-13.0-1] Bug 1828259 - Close XUL popup when entering/exiting fullscreen; r=smaug

2024-06-10 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch mullvad-browser-115.11.0esr-13.0-1 at The Tor Project / 
Applications / Mullvad Browser


Commits:
262d3d99 by Edgar Chen at 2024-06-10T20:24:04+02:00
Bug 1828259 - Close XUL popup when entering/exiting fullscreen; r=smaug

Differential Revision: https://phabricator.services.mozilla.com/D209355
- - - - -


1 changed file:

- xpfe/appshell/AppWindow.cpp


Changes:

=
xpfe/appshell/AppWindow.cpp
=
@@ -3018,6 +3018,9 @@ void AppWindow::FullscreenChanged(bool aInFullscreen) {
 
 void AppWindow::FinishFullscreenChange(bool aInFullscreen) {
   mFullscreenChangeState = FullscreenChangeState::NotChanging;
+  if (nsXULPopupManager* pm = nsXULPopupManager::GetInstance()) {
+pm->Rollup({});
+  }
   if (mDocShell) {
 if (nsCOMPtr ourWindow = mDocShell->GetWindow()) {
   ourWindow->FinishFullscreenChange(aInFullscreen);



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/262d3d99cc1fbc4b3aea211ca6190d432b92e5fd

-- 
This project does not include diff previews in email notifications.
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/262d3d99cc1fbc4b3aea211ca6190d432b92e5fd
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][base-browser-115.11.0esr-13.0-1] Bug 1828259 - Close XUL popup when entering/exiting fullscreen; r=smaug

2024-06-10 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch base-browser-115.11.0esr-13.0-1 at The Tor Project / 
Applications / Tor Browser


Commits:
89e409e8 by Edgar Chen at 2024-06-10T20:20:59+02:00
Bug 1828259 - Close XUL popup when entering/exiting fullscreen; r=smaug

Differential Revision: https://phabricator.services.mozilla.com/D209355
- - - - -


1 changed file:

- xpfe/appshell/AppWindow.cpp


Changes:

=
xpfe/appshell/AppWindow.cpp
=
@@ -3018,6 +3018,9 @@ void AppWindow::FullscreenChanged(bool aInFullscreen) {
 
 void AppWindow::FinishFullscreenChange(bool aInFullscreen) {
   mFullscreenChangeState = FullscreenChangeState::NotChanging;
+  if (nsXULPopupManager* pm = nsXULPopupManager::GetInstance()) {
+pm->Rollup({});
+  }
   if (mDocShell) {
 if (nsCOMPtr ourWindow = mDocShell->GetWindow()) {
   ourWindow->FinishFullscreenChange(aInFullscreen);



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/89e409e83f0b8f3018bf746b2966a9f01309b20b

-- 
This project does not include diff previews in email notifications.
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/89e409e83f0b8f3018bf746b2966a9f01309b20b
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][tor-browser-115.11.0esr-13.0-1] Bug 1828259 - Close XUL popup when entering/exiting fullscreen; r=smaug

2024-06-10 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch tor-browser-115.11.0esr-13.0-1 at The Tor Project / 
Applications / Tor Browser


Commits:
8fc6e0c6 by Edgar Chen at 2024-06-10T20:15:15+02:00
Bug 1828259 - Close XUL popup when entering/exiting fullscreen; r=smaug

Differential Revision: https://phabricator.services.mozilla.com/D209355
- - - - -


1 changed file:

- xpfe/appshell/AppWindow.cpp


Changes:

=
xpfe/appshell/AppWindow.cpp
=
@@ -3018,6 +3018,9 @@ void AppWindow::FullscreenChanged(bool aInFullscreen) {
 
 void AppWindow::FinishFullscreenChange(bool aInFullscreen) {
   mFullscreenChangeState = FullscreenChangeState::NotChanging;
+  if (nsXULPopupManager* pm = nsXULPopupManager::GetInstance()) {
+pm->Rollup({});
+  }
   if (mDocShell) {
 if (nsCOMPtr ourWindow = mDocShell->GetWindow()) {
   ourWindow->FinishFullscreenChange(aInFullscreen);



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/8fc6e0c6dd460d9ce144482c9c0181cec6318cbd

-- 
This project does not include diff previews in email notifications.
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/8fc6e0c6dd460d9ce144482c9c0181cec6318cbd
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/mullvad-browser][mullvad-browser-115.11.0esr-13.5-1] fixup! Bug 41916: Letterboxing preferences UI

2024-06-03 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch mullvad-browser-115.11.0esr-13.5-1 at The Tor Project / 
Applications / Mullvad Browser


Commits:
1b8016ae by hackademix at 2024-06-03T10:09:33+02:00
fixup! Bug 41916: Letterboxing preferences UI

Import gLetterboxingPrefs for the linter.

- - - - -


1 changed file:

- browser/components/preferences/main.js


Changes:

=
browser/components/preferences/main.js
=
@@ -3,6 +3,7 @@
  * You can obtain one at http://mozilla.org/MPL/2.0/. */
 
 /* import-globals-from extensionControlled.js */
+/* import-globals-from letterboxing.js */
 /* import-globals-from preferences.js */
 /* import-globals-from /toolkit/mozapps/preferences/fontbuilder.js */
 /* import-globals-from /browser/base/content/aboutDialog-appUpdater.js */



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/1b8016ae3a8b3b168fb7696cbc1dfdfd029b0928

-- 
This project does not include diff previews in email notifications.
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/1b8016ae3a8b3b168fb7696cbc1dfdfd029b0928
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][base-browser-115.11.0esr-13.5-1] fixup! Bug 41916: Letterboxing preferences UI

2024-06-03 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch base-browser-115.11.0esr-13.5-1 at The Tor Project / 
Applications / Tor Browser


Commits:
9054cfca by hackademix at 2024-06-03T10:07:55+02:00
fixup! Bug 41916: Letterboxing preferences UI

Import gLetterboxingPrefs for the linter.

- - - - -


1 changed file:

- browser/components/preferences/main.js


Changes:

=
browser/components/preferences/main.js
=
@@ -3,6 +3,7 @@
  * You can obtain one at http://mozilla.org/MPL/2.0/. */
 
 /* import-globals-from extensionControlled.js */
+/* import-globals-from letterboxing.js */
 /* import-globals-from preferences.js */
 /* import-globals-from /toolkit/mozapps/preferences/fontbuilder.js */
 /* import-globals-from /browser/base/content/aboutDialog-appUpdater.js */



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/9054cfca3b97324401e39e30ce64adad97f42b5d

-- 
This project does not include diff previews in email notifications.
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/9054cfca3b97324401e39e30ce64adad97f42b5d
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][tor-browser-115.11.0esr-13.5-1] fixup! Bug 41916: Letterboxing preferences UI

2024-06-03 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch tor-browser-115.11.0esr-13.5-1 at The Tor Project / 
Applications / Tor Browser


Commits:
2c413893 by hackademix at 2024-06-03T10:01:17+02:00
fixup! Bug 41916: Letterboxing preferences UI

Import gLetterboxingPrefs for the linter.

- - - - -


1 changed file:

- browser/components/preferences/main.js


Changes:

=
browser/components/preferences/main.js
=
@@ -3,6 +3,7 @@
  * You can obtain one at http://mozilla.org/MPL/2.0/. */
 
 /* import-globals-from extensionControlled.js */
+/* import-globals-from letterboxing.js */
 /* import-globals-from preferences.js */
 /* import-globals-from /toolkit/mozapps/preferences/fontbuilder.js */
 /* import-globals-from /browser/base/content/aboutDialog-appUpdater.js */



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/2c4138938b93d9db1767d27f52aaae892dd3c662

-- 
This project does not include diff previews in email notifications.
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/2c4138938b93d9db1767d27f52aaae892dd3c662
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser-build][main] Bug 41148: Update NoScript license to GPL V3.

2024-05-16 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch main at The Tor Project / Applications / tor-browser-build


Commits:
1dc061f3 by hackademix at 2024-05-16T12:45:58+02:00
Bug 41148: Update NoScript license to GPL V3.

- - - - -


1 changed file:

- projects/browser/Bundle-Data/Docs/Licenses/NoScript.txt


Changes:

=
projects/browser/Bundle-Data/Docs/Licenses/NoScript.txt
=
@@ -1,9 +1,9 @@
 NoScript - a Firefox extension for whitelist driven safe JavaScript execution
-Copyright (C) 2005-2023 Giorgio Maone - https://maone.net
+Copyright (C) 2005-2024 Giorgio Maone - https://maone.net
 
 This program is free software; you can redistribute it and/or modify
 it under the terms of the GNU General Public License as published by
-the Free Software Foundation; either version 2 of the License, or
+the Free Software Foundation; either version 3 of the License, or
 (at your option) any later version.
 
 This program is distributed in the hope that it will be useful,



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/commit/1dc061f398221edfc706b68bcaf94324a6c76ab7

-- 
This project does not include diff previews in email notifications.
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/commit/1dc061f398221edfc706b68bcaf94324a6c76ab7
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/firefox-android][firefox-android-115.2.1-13.5-1] fixup! Disable features and functionality

2024-05-14 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch firefox-android-115.2.1-13.5-1 at The Tor Project / 
Applications / firefox-android


Commits:
6eaa81ce by hackademix at 2024-05-15T07:39:36+02:00
fixup! Disable features and functionality

Bug 42578: Reject Android open in Tor Browser intent

- - - - -


1 changed file:

- 
fenix/app/src/main/java/org/mozilla/fenix/home/intent/HomeDeepLinkIntentProcessor.kt


Changes:

=
fenix/app/src/main/java/org/mozilla/fenix/home/intent/HomeDeepLinkIntentProcessor.kt
=
@@ -90,6 +90,15 @@ class HomeDeepLinkIntentProcessor(
 logger.info("Not opening deep link: $url")
 return
 }
+if (BuildConfig.DEEP_LINK_SCHEME.startsWith("torbrowser")) {
+// tor-browser#42578
+// TODO:
+// Maybe just warn users about linkability but
+// give them the choice to open anyway, once
+// the other deep link related issues are fixed.
+logger.info("Tor Browser rejects open intent deep link: 
$deepLink")
+return
+}
 
 activity.openToBrowserAndLoad(
 url,



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/firefox-android/-/commit/6eaa81ce1a0101fdbaa513d22e946f77cdf910d1

-- 
This project does not include diff previews in email notifications.
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/firefox-android/-/commit/6eaa81ce1a0101fdbaa513d22e946f77cdf910d1
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/firefox-android] Pushed new tag firefox-android-115.2.1-13.0-1-build16

2024-05-10 Thread ma1 (@ma1) via tor-commits


ma1 pushed new tag firefox-android-115.2.1-13.0-1-build16 at The Tor Project / 
Applications / firefox-android

-- 
This project does not include diff previews in email notifications.
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/firefox-android/-/tree/firefox-android-115.2.1-13.0-1-build16
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][tor-browser-115.11.0esr-13.0-1] fixup! Bug 30237: Add v3 onion services client authentication prompt

2024-05-09 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch tor-browser-115.11.0esr-13.0-1 at The Tor Project / 
Applications / Tor Browser


Commits:
e4ed3f35 by hackademix at 2024-05-09T17:49:50+02:00
fixup! Bug 30237: Add v3 onion services client authentication prompt

Bug 42557: Fix regression in Onion Services authentication prompt focus

- - - - -


1 changed file:

- browser/components/onionservices/content/authPrompt.js


Changes:

=
browser/components/onionservices/content/authPrompt.js
=
@@ -81,8 +81,18 @@ const OnionAuthPrompt = (function () {
   );
 },
 
+_autoFocus(event) {
+  event.target.ownerGlobal.focus();
+},
+
 _onPromptShowing(aWarningMessage) {
   let xulDoc = this._browser.ownerDocument;
+
+  // Force back focus: tor-browser#41856
+  (this._popupElem = xulDoc.getElementById(
+"tor-clientauth-notification"
+  ))?.addEventListener("click", this._autoFocus);
+
   let descElem = xulDoc.getElementById("tor-clientauth-notification-desc");
   if (descElem) {
 // Handle replacement of the onion name within the localized
@@ -153,6 +163,7 @@ const OnionAuthPrompt = (function () {
   this._boundOnKeyFieldInput = undefined;
 }
   }
+  this._popupElem?.removeEventListener("click", this._autoFocus);
 },
 
 _onKeyFieldKeyPress(aEvent) {



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/e4ed3f35d87f8351bc5a6aa3fd2263ec06ad5413

-- 
This project does not include diff previews in email notifications.
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/e4ed3f35d87f8351bc5a6aa3fd2263ec06ad5413
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/mullvad-browser][mullvad-browser-115.11.0esr-13.5-1] Bug 42574: Letterboxing, exempt pdf.js.

2024-05-09 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch mullvad-browser-115.11.0esr-13.5-1 at The Tor Project / 
Applications / Mullvad Browser


Commits:
d53848c0 by hackademix at 2024-05-09T10:52:58+02:00
Bug 42574: Letterboxing, exempt pdf.js.

- - - - -


1 changed file:

- toolkit/components/resistfingerprinting/RFPHelper.sys.mjs


Changes:

=
toolkit/components/resistfingerprinting/RFPHelper.sys.mjs
=
@@ -475,6 +475,8 @@ class _RFPHelper {
 return (
   // ... privileged pages
   contentPrincipal.isSystemPrincipal ||
+  // pdf.js
+  contentPrincipal.origin.startsWith("resource://pdf.js") ||
   // ... about: URIs EXCEPT about:blank
   (currentURI.schemeIs("about") && currentURI.filePath !== "blank") ||
   // ... source code



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/d53848c06c860e836bb01f2563f656f84108796e

-- 
This project does not include diff previews in email notifications.
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/d53848c06c860e836bb01f2563f656f84108796e
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][base-browser-115.11.0esr-13.5-1] Bug 42574: Letterboxing, exempt pdf.js.

2024-05-09 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch base-browser-115.11.0esr-13.5-1 at The Tor Project / 
Applications / Tor Browser


Commits:
98625d72 by hackademix at 2024-05-09T10:50:26+02:00
Bug 42574: Letterboxing, exempt pdf.js.

- - - - -


1 changed file:

- toolkit/components/resistfingerprinting/RFPHelper.sys.mjs


Changes:

=
toolkit/components/resistfingerprinting/RFPHelper.sys.mjs
=
@@ -475,6 +475,8 @@ class _RFPHelper {
 return (
   // ... privileged pages
   contentPrincipal.isSystemPrincipal ||
+  // pdf.js
+  contentPrincipal.origin.startsWith("resource://pdf.js") ||
   // ... about: URIs EXCEPT about:blank
   (currentURI.schemeIs("about") && currentURI.filePath !== "blank") ||
   // ... source code



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/98625d720cc300c866462fd414df7d2797b862fc

-- 
This project does not include diff previews in email notifications.
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/98625d720cc300c866462fd414df7d2797b862fc
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][tor-browser-115.11.0esr-13.5-1] Bug 42574: Letterboxing, exempt pdf.js.

2024-05-09 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch tor-browser-115.11.0esr-13.5-1 at The Tor Project / 
Applications / Tor Browser


Commits:
410bb24f by hackademix at 2024-05-08T22:26:45+02:00
Bug 42574: Letterboxing, exempt pdf.js.

- - - - -


1 changed file:

- toolkit/components/resistfingerprinting/RFPHelper.sys.mjs


Changes:

=
toolkit/components/resistfingerprinting/RFPHelper.sys.mjs
=
@@ -475,6 +475,8 @@ class _RFPHelper {
 return (
   // ... privileged pages
   contentPrincipal.isSystemPrincipal ||
+  // pdf.js
+  contentPrincipal.origin.startsWith("resource://pdf.js") ||
   // ... about: URIs EXCEPT about:blank
   (currentURI.schemeIs("about") && currentURI.filePath !== "blank") ||
   // ... source code



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/410bb24f88c40ca4283c86c8c002f4d747500605

-- 
This project does not include diff previews in email notifications.
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/410bb24f88c40ca4283c86c8c002f4d747500605
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][tor-browser-115.11.0esr-13.5-1] fixup! Bug 30237: Add v3 onion services client authentication prompt

2024-05-08 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch tor-browser-115.11.0esr-13.5-1 at The Tor Project / 
Applications / Tor Browser


Commits:
02b5bf73 by hackademix at 2024-05-08T12:48:22+02:00
fixup! Bug 30237: Add v3 onion services client authentication prompt

Bug 42557: Fix regression in Onion Services authentication prompt focus

- - - - -


1 changed file:

- browser/components/onionservices/content/authPrompt.js


Changes:

=
browser/components/onionservices/content/authPrompt.js
=
@@ -356,6 +356,13 @@ var OnionAuthPrompt = {
   this._showWarning(undefined);
 });
 
+// Force back focus on click: tor-browser#41856
+document
+  .getElementById("tor-clientauth-notification")
+  .addEventListener("click", () => {
+window.focus();
+  });
+
 Services.obs.addObserver(this, this._topics.clientAuthMissing);
 Services.obs.addObserver(this, this._topics.clientAuthIncorrect);
   },



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/02b5bf73b39d480db8a8f85530aff89011386c17

-- 
This project does not include diff previews in email notifications.
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/02b5bf73b39d480db8a8f85530aff89011386c17
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/mullvad-browser][mullvad-browser-115.10.0esr-13.5-1] fixup! Bug 40926: Implemented the New Identity feature

2024-04-22 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch mullvad-browser-115.10.0esr-13.5-1 at The Tor Project / 
Applications / Mullvad Browser


Commits:
04899df2 by hackademix at 2024-04-22T18:27:14+02:00
fixup! Bug 40926: Implemented the New Identity feature

Bug 42532: Use the HomePage module for new identity checks.

- - - - -


1 changed file:

- browser/components/newidentity/content/newidentity.js


Changes:

=
browser/components/newidentity/content/newidentity.js
=
@@ -395,15 +395,12 @@ XPCOMUtils.defineLazyGetter(this, "NewIdentityButton", () 
=> {
   return new Promise(resolve => {
 // Open a new window forcing the about:privatebrowsing page 
(tor-browser#41765)
 // unless user explicitly overrides this policy (tor-browser #42236)
-const homePref = "browser.startup.homepage";
 const trustedHomePref = "browser.startup.homepage.new_identity";
-const homeURL = Services.prefs.getStringPref(homePref, "");
-const defaultHomeURL = Services.prefs
-  .getDefaultBranch("")
-  .getStringPref(homePref, "");
+const homeURL = HomePage.get();
+const defaultHomeURL = HomePage.getDefault();
 const isTrustedHome =
   homeURL === defaultHomeURL ||
-  homeURL.startsWith("chrome://") || // about:blank and other built-ins
+  homeURL === "chrome://browser/content/blanktab.html" || // 
about:blank
   homeURL === Services.prefs.getStringPref(trustedHomePref, "");
 const isCustomHome =
   Services.prefs.getIntPref("browser.startup.page") === 1;



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/04899df27a6539200bc71dbce26a05f644cfa07c

-- 
This project does not include diff previews in email notifications.
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/04899df27a6539200bc71dbce26a05f644cfa07c
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][base-browser-115.10.0esr-13.5-1] fixup! Bug 40926: Implemented the New Identity feature

2024-04-22 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch base-browser-115.10.0esr-13.5-1 at The Tor Project / 
Applications / Tor Browser


Commits:
5616a8da by hackademix at 2024-04-22T18:26:36+02:00
fixup! Bug 40926: Implemented the New Identity feature

Bug 42532: Use the HomePage module for new identity checks.

- - - - -


1 changed file:

- browser/components/newidentity/content/newidentity.js


Changes:

=
browser/components/newidentity/content/newidentity.js
=
@@ -395,15 +395,12 @@ XPCOMUtils.defineLazyGetter(this, "NewIdentityButton", () 
=> {
   return new Promise(resolve => {
 // Open a new window forcing the about:privatebrowsing page 
(tor-browser#41765)
 // unless user explicitly overrides this policy (tor-browser #42236)
-const homePref = "browser.startup.homepage";
 const trustedHomePref = "browser.startup.homepage.new_identity";
-const homeURL = Services.prefs.getStringPref(homePref, "");
-const defaultHomeURL = Services.prefs
-  .getDefaultBranch("")
-  .getStringPref(homePref, "");
+const homeURL = HomePage.get();
+const defaultHomeURL = HomePage.getDefault();
 const isTrustedHome =
   homeURL === defaultHomeURL ||
-  homeURL.startsWith("chrome://") || // about:blank and other built-ins
+  homeURL === "chrome://browser/content/blanktab.html" || // 
about:blank
   homeURL === Services.prefs.getStringPref(trustedHomePref, "");
 const isCustomHome =
   Services.prefs.getIntPref("browser.startup.page") === 1;



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/5616a8da37ac9bdac4f0d9df222b1f6fffa537d5

-- 
This project does not include diff previews in email notifications.
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/5616a8da37ac9bdac4f0d9df222b1f6fffa537d5
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][tor-browser-115.10.0esr-13.5-1] fixup! Bug 40926: Implemented the New Identity feature

2024-04-22 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch tor-browser-115.10.0esr-13.5-1 at The Tor Project / 
Applications / Tor Browser


Commits:
d98ff16e by hackademix at 2024-04-22T17:06:04+02:00
fixup! Bug 40926: Implemented the New Identity feature

Bug 42532: Use the HomePage module for new identity checks.

- - - - -


1 changed file:

- browser/components/newidentity/content/newidentity.js


Changes:

=
browser/components/newidentity/content/newidentity.js
=
@@ -395,15 +395,12 @@ XPCOMUtils.defineLazyGetter(this, "NewIdentityButton", () 
=> {
   return new Promise(resolve => {
 // Open a new window forcing the about:privatebrowsing page 
(tor-browser#41765)
 // unless user explicitly overrides this policy (tor-browser #42236)
-const homePref = "browser.startup.homepage";
 const trustedHomePref = "browser.startup.homepage.new_identity";
-const homeURL = Services.prefs.getStringPref(homePref, "");
-const defaultHomeURL = Services.prefs
-  .getDefaultBranch("")
-  .getStringPref(homePref, "");
+const homeURL = HomePage.get();
+const defaultHomeURL = HomePage.getDefault();
 const isTrustedHome =
   homeURL === defaultHomeURL ||
-  homeURL.startsWith("chrome://") || // about:blank and other built-ins
+  homeURL === "chrome://browser/content/blanktab.html" || // 
about:blank
   homeURL === Services.prefs.getStringPref(trustedHomePref, "");
 const isCustomHome =
   Services.prefs.getIntPref("browser.startup.page") === 1;



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/d98ff16e559684f1d4792f2b3b1279f3cd659f51

-- 
This project does not include diff previews in email notifications.
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/d98ff16e559684f1d4792f2b3b1279f3cd659f51
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/mullvad-browser][mullvad-browser-115.10.0esr-13.5-1] fixup! Bug 41631: Prevent weird initial window dimensions caused by subpixel computations

2024-04-16 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch mullvad-browser-115.10.0esr-13.5-1 at The Tor Project / 
Applications / Mullvad Browser


Commits:
a17ec8e0 by hackademix at 2024-04-16T22:18:31+02:00
fixup! Bug 41631: Prevent weird initial window dimensions caused by subpixel 
computations

Bug 42520: Correctly record new initial window size after auto-shrinking

- - - - -


1 changed file:

- toolkit/components/resistfingerprinting/RFPHelper.sys.mjs


Changes:

=
toolkit/components/resistfingerprinting/RFPHelper.sys.mjs
=
@@ -633,9 +633,16 @@ class _RFPHelper {
   lazy.logConsole.error(e);
 }
   }
-  if (needToShrink) {
-win.shrinkToLetterbox();
-this._recordWindowSize(win);
+  if (needToShrink && win.shrinkToLetterbox()) {
+win.addEventListener(
+  "resize",
+  () => {
+// We need to record the "new" initial size in this listener
+// because resized dimensions are not immediately available.
+RFPHelper._recordWindowSize(win);
+  },
+  { once: true }
+);
   }
 });
   },
@@ -741,23 +748,30 @@ class _RFPHelper {
   }
 
   _recordWindowSize(aWindow) {
-aWindow._rfpOriginalSize = {
-  width: aWindow.outerWidth,
-  height: aWindow.outerHeight,
-  containerHeight: aWindow.gBrowser.getBrowserContainer()?.clientHeight,
-};
-log("Recording original window size", aWindow._rfpOriginalSize);
+aWindow.promiseDocumentFlushed(() => {
+  aWindow._rfpOriginalSize = {
+width: aWindow.outerWidth,
+height: aWindow.outerHeight,
+containerHeight: aWindow.gBrowser.getBrowserContainer()?.clientHeight,
+  };
+  log("Recording original window size", aWindow._rfpOriginalSize);
+});
   }
 
   // We will attach this method to each browser window. When called
   // it will instantly resize the window to exactly fit the selected
   // (possibly letterboxed) browser.
+  // Returns true if a window resize will occur, false otherwise.
   shrinkToLetterbox() {
 let { selectedBrowser } = this.gBrowser;
 let stack = selectedBrowser.closest(".browserStack");
 const outer = stack.getBoundingClientRect();
 const inner = selectedBrowser.getBoundingClientRect();
-this.resizeBy(inner.width - outer.width, inner.height - outer.height);
+if (inner.width !== outer.witdh || inner.height !== outer.height) {
+  this.resizeBy(inner.width - outer.width, inner.height - outer.height);
+  return true;
+}
+return false;
   }
 
   _onWindowDoubleClick(e) {



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/a17ec8e069203abfe8d90c6ed7119312097a354d

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/a17ec8e069203abfe8d90c6ed7119312097a354d
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][base-browser-115.10.0esr-13.5-1] fixup! Bug 41631: Prevent weird initial window dimensions caused by subpixel computations

2024-04-16 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch base-browser-115.10.0esr-13.5-1 at The Tor Project / 
Applications / Tor Browser


Commits:
97575530 by hackademix at 2024-04-16T22:17:42+02:00
fixup! Bug 41631: Prevent weird initial window dimensions caused by subpixel 
computations

Bug 42520: Correctly record new initial window size after auto-shrinking

- - - - -


1 changed file:

- toolkit/components/resistfingerprinting/RFPHelper.sys.mjs


Changes:

=
toolkit/components/resistfingerprinting/RFPHelper.sys.mjs
=
@@ -633,9 +633,16 @@ class _RFPHelper {
   lazy.logConsole.error(e);
 }
   }
-  if (needToShrink) {
-win.shrinkToLetterbox();
-this._recordWindowSize(win);
+  if (needToShrink && win.shrinkToLetterbox()) {
+win.addEventListener(
+  "resize",
+  () => {
+// We need to record the "new" initial size in this listener
+// because resized dimensions are not immediately available.
+RFPHelper._recordWindowSize(win);
+  },
+  { once: true }
+);
   }
 });
   },
@@ -741,23 +748,30 @@ class _RFPHelper {
   }
 
   _recordWindowSize(aWindow) {
-aWindow._rfpOriginalSize = {
-  width: aWindow.outerWidth,
-  height: aWindow.outerHeight,
-  containerHeight: aWindow.gBrowser.getBrowserContainer()?.clientHeight,
-};
-log("Recording original window size", aWindow._rfpOriginalSize);
+aWindow.promiseDocumentFlushed(() => {
+  aWindow._rfpOriginalSize = {
+width: aWindow.outerWidth,
+height: aWindow.outerHeight,
+containerHeight: aWindow.gBrowser.getBrowserContainer()?.clientHeight,
+  };
+  log("Recording original window size", aWindow._rfpOriginalSize);
+});
   }
 
   // We will attach this method to each browser window. When called
   // it will instantly resize the window to exactly fit the selected
   // (possibly letterboxed) browser.
+  // Returns true if a window resize will occur, false otherwise.
   shrinkToLetterbox() {
 let { selectedBrowser } = this.gBrowser;
 let stack = selectedBrowser.closest(".browserStack");
 const outer = stack.getBoundingClientRect();
 const inner = selectedBrowser.getBoundingClientRect();
-this.resizeBy(inner.width - outer.width, inner.height - outer.height);
+if (inner.width !== outer.witdh || inner.height !== outer.height) {
+  this.resizeBy(inner.width - outer.width, inner.height - outer.height);
+  return true;
+}
+return false;
   }
 
   _onWindowDoubleClick(e) {



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/9757553093631c9142890b0b35f7b4927d70999b

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/9757553093631c9142890b0b35f7b4927d70999b
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][tor-browser-115.10.0esr-13.5-1] fixup! Bug 41631: Prevent weird initial window dimensions caused by subpixel computations

2024-04-16 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch tor-browser-115.10.0esr-13.5-1 at The Tor Project / 
Applications / Tor Browser


Commits:
334c638e by hackademix at 2024-04-16T17:24:54+02:00
fixup! Bug 41631: Prevent weird initial window dimensions caused by subpixel 
computations

Bug 42520: Correctly record new initial window size after auto-shrinking

- - - - -


1 changed file:

- toolkit/components/resistfingerprinting/RFPHelper.sys.mjs


Changes:

=
toolkit/components/resistfingerprinting/RFPHelper.sys.mjs
=
@@ -633,9 +633,16 @@ class _RFPHelper {
   lazy.logConsole.error(e);
 }
   }
-  if (needToShrink) {
-win.shrinkToLetterbox();
-this._recordWindowSize(win);
+  if (needToShrink && win.shrinkToLetterbox()) {
+win.addEventListener(
+  "resize",
+  () => {
+// We need to record the "new" initial size in this listener
+// because resized dimensions are not immediately available.
+RFPHelper._recordWindowSize(win);
+  },
+  { once: true }
+);
   }
 });
   },
@@ -741,23 +748,30 @@ class _RFPHelper {
   }
 
   _recordWindowSize(aWindow) {
-aWindow._rfpOriginalSize = {
-  width: aWindow.outerWidth,
-  height: aWindow.outerHeight,
-  containerHeight: aWindow.gBrowser.getBrowserContainer()?.clientHeight,
-};
-log("Recording original window size", aWindow._rfpOriginalSize);
+aWindow.promiseDocumentFlushed(() => {
+  aWindow._rfpOriginalSize = {
+width: aWindow.outerWidth,
+height: aWindow.outerHeight,
+containerHeight: aWindow.gBrowser.getBrowserContainer()?.clientHeight,
+  };
+  log("Recording original window size", aWindow._rfpOriginalSize);
+});
   }
 
   // We will attach this method to each browser window. When called
   // it will instantly resize the window to exactly fit the selected
   // (possibly letterboxed) browser.
+  // Returns true if a window resize will occur, false otherwise.
   shrinkToLetterbox() {
 let { selectedBrowser } = this.gBrowser;
 let stack = selectedBrowser.closest(".browserStack");
 const outer = stack.getBoundingClientRect();
 const inner = selectedBrowser.getBoundingClientRect();
-this.resizeBy(inner.width - outer.width, inner.height - outer.height);
+if (inner.width !== outer.witdh || inner.height !== outer.height) {
+  this.resizeBy(inner.width - outer.width, inner.height - outer.height);
+  return true;
+}
+return false;
   }
 
   _onWindowDoubleClick(e) {



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/334c638e5c21a40441674c8ffc1fadbbaff3e67d

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/334c638e5c21a40441674c8ffc1fadbbaff3e67d
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/mullvad-browser][mullvad-browser-115.10.0esr-13.5-1] fixup! Base Browser strings

2024-04-16 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch mullvad-browser-115.10.0esr-13.5-1 at The Tor Project / 
Applications / Mullvad Browser


Commits:
9eaf8f6d by hackademix at 2024-04-16T13:14:32+02:00
fixup! Base Browser strings

MB 288: Standardize capitalization in Letterboxing preferences

- - - - -


1 changed file:

- browser/locales/en-US/browser/base-browser.ftl


Changes:

=
browser/locales/en-US/browser/base-browser.ftl
=
@@ -84,7 +84,7 @@ letterboxing-window-size-header = Window size
 letterboxing-remember-size =
 .label = Reuse last window size when opening a new window
 .accesskey = R
-letterboxing-alignment-header = Content Alignment
+letterboxing-alignment-header = Content alignment
 letterboxing-alignment-description = Choose where you want to align the 
website’s content.
 letterboxing-alignment-top = Top
 letterboxing-alignment-middle = Middle



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/9eaf8f6d1689a9160aa813f71b3226b67aa34ea2

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/9eaf8f6d1689a9160aa813f71b3226b67aa34ea2
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][base-browser-115.10.0esr-13.5-1] fixup! Base Browser strings

2024-04-16 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch base-browser-115.10.0esr-13.5-1 at The Tor Project / 
Applications / Tor Browser


Commits:
e98e00fa by hackademix at 2024-04-16T13:12:56+02:00
fixup! Base Browser strings

MB 288: Standardize capitalization in Letterboxing preferences

- - - - -


1 changed file:

- browser/locales/en-US/browser/base-browser.ftl


Changes:

=
browser/locales/en-US/browser/base-browser.ftl
=
@@ -84,7 +84,7 @@ letterboxing-window-size-header = Window size
 letterboxing-remember-size =
 .label = Reuse last window size when opening a new window
 .accesskey = R
-letterboxing-alignment-header = Content Alignment
+letterboxing-alignment-header = Content alignment
 letterboxing-alignment-description = Choose where you want to align the 
website’s content.
 letterboxing-alignment-top = Top
 letterboxing-alignment-middle = Middle



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/e98e00fa9e255946bc9c2b157b6340f50c9eaa0e

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/e98e00fa9e255946bc9c2b157b6340f50c9eaa0e
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][tor-browser-115.10.0esr-13.5-1] fixup! Base Browser strings

2024-04-16 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch tor-browser-115.10.0esr-13.5-1 at The Tor Project / 
Applications / Tor Browser


Commits:
1f1f3ab2 by hackademix at 2024-04-16T13:09:00+02:00
fixup! Base Browser strings

MB 288: Standardize capitalization in Letterboxing preferences

- - - - -


1 changed file:

- browser/locales/en-US/browser/base-browser.ftl


Changes:

=
browser/locales/en-US/browser/base-browser.ftl
=
@@ -84,7 +84,7 @@ letterboxing-window-size-header = Window size
 letterboxing-remember-size =
 .label = Reuse last window size when opening a new window
 .accesskey = R
-letterboxing-alignment-header = Content Alignment
+letterboxing-alignment-header = Content alignment
 letterboxing-alignment-description = Choose where you want to align the 
website’s content.
 letterboxing-alignment-top = Top
 letterboxing-alignment-middle = Middle



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/1f1f3ab2fe67c4f164f28717782c9dc237e2de18

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/1f1f3ab2fe67c4f164f28717782c9dc237e2de18
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][tor-browser-115.10.0esr-13.5-1] fixup! Bug 41803: Add some developer tools for working on tor-browser.

2024-04-16 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch tor-browser-115.10.0esr-13.5-1 at The Tor Project / 
Applications / Tor Browser


Commits:
bbc4a77b by hackademix at 2024-04-16T13:01:03+02:00
fixup! Bug 41803: Add some developer tools for working on tor-browser.

Bug 42516: Make tb-dev worktree-compatible

- - - - -


1 changed file:

- browser/locales/en-US/browser/base-browser.ftl


Changes:

=
browser/locales/en-US/browser/base-browser.ftl
=
@@ -84,7 +84,7 @@ letterboxing-window-size-header = Window size
 letterboxing-remember-size =
 .label = Reuse last window size when opening a new window
 .accesskey = R
-letterboxing-alignment-header = Content Alignment
+letterboxing-alignment-header = Content alignment
 letterboxing-alignment-description = Choose where you want to align the 
website’s content.
 letterboxing-alignment-top = Top
 letterboxing-alignment-middle = Middle



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/bbc4a77bdade246d170e0f76afb74fcbc4b75a53

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/bbc4a77bdade246d170e0f76afb74fcbc4b75a53
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][tor-browser-115.10.0esr-13.5-1] fixup! Bug 41803: Add some developer tools for working on tor-browser.

2024-04-15 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch tor-browser-115.10.0esr-13.5-1 at The Tor Project / 
Applications / Tor Browser


Commits:
89a5a7fd by hackademix at 2024-04-15T11:52:47+02:00
fixup! Bug 41803: Add some developer tools for working on tor-browser.

Bug 42516: Make tb-dev worktree-compatible

- - - - -


1 changed file:

- tools/torbrowser/tb-dev


Changes:

=
tools/torbrowser/tb-dev
=
@@ -57,10 +57,12 @@ def get_local_root():
 global local_root
 if local_root is None:
 try:
+# Make sure we have a matching remote in this git repository. 
Should raise Exception if we don't.
+get_upstream_name()
 git_root = git_get(["rev-parse", "--show-toplevel"])[0]
-except subprocess.CalledProcessError:
+except Exception:
 git_root = None
-if git_root is None or os.path.basename(git_root) != "tor-browser":
+if git_root is None:
 local_root = ""
 else:
 local_root = git_root



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/89a5a7fd311640a4b50b951bcf8ef1b035aa37bb

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/89a5a7fd311640a4b50b951bcf8ef1b035aa37bb
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/mullvad-browser][mullvad-browser-115.9.0esr-13.5-1] fixup! Bug 40926: Implemented the New Identity feature

2024-04-08 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch mullvad-browser-115.9.0esr-13.5-1 at The Tor Project / 
Applications / Mullvad Browser


Commits:
1c3780c3 by hackademix at 2024-04-08T09:42:42+02:00
fixup! Bug 40926: Implemented the New Identity feature

MB 283: Make new identity homepage check brand-agnostic.

- - - - -


1 changed file:

- browser/components/newidentity/content/newidentity.js


Changes:

=
browser/components/newidentity/content/newidentity.js
=
@@ -398,8 +398,11 @@ XPCOMUtils.defineLazyGetter(this, "NewIdentityButton", () 
=> {
 const homePref = "browser.startup.homepage";
 const trustedHomePref = "browser.startup.homepage.new_identity";
 const homeURL = Services.prefs.getStringPref(homePref, "");
+const defaultHomeURL = Services.prefs
+  .getDefaultBranch("")
+  .getStringPref(homePref, "");
 const isTrustedHome =
-  homeURL === "about:tor" ||
+  homeURL === defaultHomeURL ||
   homeURL.startsWith("chrome://") || // about:blank and other built-ins
   homeURL === Services.prefs.getStringPref(trustedHomePref, "");
 const isCustomHome =



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/1c3780c33bf57714c959e3db3809138f6ee178f3

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/1c3780c33bf57714c959e3db3809138f6ee178f3
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][base-browser-115.9.0esr-13.5-1] fixup! Bug 40926: Implemented the New Identity feature

2024-04-08 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch base-browser-115.9.0esr-13.5-1 at The Tor Project / 
Applications / Tor Browser


Commits:
96048e5a by hackademix at 2024-04-08T09:39:24+02:00
fixup! Bug 40926: Implemented the New Identity feature

MB 283: Make new identity homepage check brand-agnostic.

- - - - -


1 changed file:

- browser/components/newidentity/content/newidentity.js


Changes:

=
browser/components/newidentity/content/newidentity.js
=
@@ -398,8 +398,11 @@ XPCOMUtils.defineLazyGetter(this, "NewIdentityButton", () 
=> {
 const homePref = "browser.startup.homepage";
 const trustedHomePref = "browser.startup.homepage.new_identity";
 const homeURL = Services.prefs.getStringPref(homePref, "");
+const defaultHomeURL = Services.prefs
+  .getDefaultBranch("")
+  .getStringPref(homePref, "");
 const isTrustedHome =
-  homeURL === "about:tor" ||
+  homeURL === defaultHomeURL ||
   homeURL.startsWith("chrome://") || // about:blank and other built-ins
   homeURL === Services.prefs.getStringPref(trustedHomePref, "");
 const isCustomHome =



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/96048e5a606a85de4ce8f913f72c1a0b6aa81a9b

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/96048e5a606a85de4ce8f913f72c1a0b6aa81a9b
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][tor-browser-115.9.0esr-13.5-1] fixup! Bug 40926: Implemented the New Identity feature

2024-04-08 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch tor-browser-115.9.0esr-13.5-1 at The Tor Project / 
Applications / Tor Browser


Commits:
4d7d8276 by hackademix at 2024-04-08T09:31:41+02:00
fixup! Bug 40926: Implemented the New Identity feature

MB 283: Make new identity homepage check brand-agnostic.

- - - - -


1 changed file:

- browser/components/newidentity/content/newidentity.js


Changes:

=
browser/components/newidentity/content/newidentity.js
=
@@ -398,8 +398,11 @@ XPCOMUtils.defineLazyGetter(this, "NewIdentityButton", () 
=> {
 const homePref = "browser.startup.homepage";
 const trustedHomePref = "browser.startup.homepage.new_identity";
 const homeURL = Services.prefs.getStringPref(homePref, "");
+const defaultHomeURL = Services.prefs
+  .getDefaultBranch("")
+  .getStringPref(homePref, "");
 const isTrustedHome =
-  homeURL === "about:tor" ||
+  homeURL === defaultHomeURL ||
   homeURL.startsWith("chrome://") || // about:blank and other built-ins
   homeURL === Services.prefs.getStringPref(trustedHomePref, "");
 const isCustomHome =



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/4d7d82768694b80a2621228cc78c1379958e2733

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/4d7d82768694b80a2621228cc78c1379958e2733
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/mullvad-browser][mullvad-browser-115.9.0esr-13.5-1] Bug 1886852 - Avoid registering unnecessary MessageManager listeners when SHIP is enabled, r=smaug!

2024-03-26 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch mullvad-browser-115.9.0esr-13.5-1 at The Tor Project / 
Applications / Mullvad Browser


Commits:
b6e29f24 by Nika Layzell at 2024-03-26T18:25:59+01:00
Bug 1886852 - Avoid registering unnecessary MessageManager listeners when SHIP 
is enabled, r=smaug!

Differential Revision: https://phabricator.services.mozilla.com/D205377
- - - - -


1 changed file:

- browser/components/sessionstore/SessionStore.sys.mjs


Changes:

=
browser/components/sessionstore/SessionStore.sys.mjs
=
@@ -1422,6 +1422,13 @@ var SessionStoreInternal = {
* and thus enables communication with OOP tabs.
*/
   receiveMessage(aMessage) {
+if (Services.appinfo.sessionHistoryInParent) {
+  throw new Error(
+`received unexpected message '${aMessage.name}' with ` +
+  `sessionHistoryInParent enabled`
+  );
+}
+
 // If we got here, that means we're dealing with a frame message
 // manager message, so the target will be a .
 var browser = aMessage.target;
@@ -1600,14 +1607,14 @@ var SessionStoreInternal = {
 // internal data about the window.
 aWindow.__SSi = this._generateWindowID();
 
-let mm = aWindow.getGroupMessageManager("browsers");
-MESSAGES.forEach(msg => {
-  let listenWhenClosed = CLOSED_MESSAGES.has(msg);
-  mm.addMessageListener(msg, this, listenWhenClosed);
-});
-
-// Load the frame script after registering listeners.
 if (!Services.appinfo.sessionHistoryInParent) {
+  let mm = aWindow.getGroupMessageManager("browsers");
+  MESSAGES.forEach(msg => {
+let listenWhenClosed = CLOSED_MESSAGES.has(msg);
+mm.addMessageListener(msg, this, listenWhenClosed);
+  });
+
+  // Load the frame script after registering listeners.
   mm.loadFrameScript(
 "chrome://browser/content/content-sessionStore.js",
 true,
@@ -2083,8 +2090,10 @@ var SessionStoreInternal = {
 // Cache the window state until it is completely gone.
 DyingWindowCache.set(aWindow, winData);
 
-let mm = aWindow.getGroupMessageManager("browsers");
-MESSAGES.forEach(msg => mm.removeMessageListener(msg, this));
+if (!Services.appinfo.sessionHistoryInParent) {
+  let mm = aWindow.getGroupMessageManager("browsers");
+  MESSAGES.forEach(msg => mm.removeMessageListener(msg, this));
+}
 
 this._saveableClosedWindowData.delete(winData);
 delete aWindow.__SSi;



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/b6e29f242a7c5e1f24d76c01579d4bc93f86b0ad

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/b6e29f242a7c5e1f24d76c01579d4bc93f86b0ad
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][base-browser-115.9.0esr-13.5-1] Bug 1886852 - Avoid registering unnecessary MessageManager listeners when SHIP is enabled, r=smaug!

2024-03-26 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch base-browser-115.9.0esr-13.5-1 at The Tor Project / 
Applications / Tor Browser


Commits:
8e8ac7a1 by Nika Layzell at 2024-03-26T18:23:53+01:00
Bug 1886852 - Avoid registering unnecessary MessageManager listeners when SHIP 
is enabled, r=smaug!

Differential Revision: https://phabricator.services.mozilla.com/D205377
- - - - -


1 changed file:

- browser/components/sessionstore/SessionStore.sys.mjs


Changes:

=
browser/components/sessionstore/SessionStore.sys.mjs
=
@@ -1422,6 +1422,13 @@ var SessionStoreInternal = {
* and thus enables communication with OOP tabs.
*/
   receiveMessage(aMessage) {
+if (Services.appinfo.sessionHistoryInParent) {
+  throw new Error(
+`received unexpected message '${aMessage.name}' with ` +
+  `sessionHistoryInParent enabled`
+  );
+}
+
 // If we got here, that means we're dealing with a frame message
 // manager message, so the target will be a .
 var browser = aMessage.target;
@@ -1600,14 +1607,14 @@ var SessionStoreInternal = {
 // internal data about the window.
 aWindow.__SSi = this._generateWindowID();
 
-let mm = aWindow.getGroupMessageManager("browsers");
-MESSAGES.forEach(msg => {
-  let listenWhenClosed = CLOSED_MESSAGES.has(msg);
-  mm.addMessageListener(msg, this, listenWhenClosed);
-});
-
-// Load the frame script after registering listeners.
 if (!Services.appinfo.sessionHistoryInParent) {
+  let mm = aWindow.getGroupMessageManager("browsers");
+  MESSAGES.forEach(msg => {
+let listenWhenClosed = CLOSED_MESSAGES.has(msg);
+mm.addMessageListener(msg, this, listenWhenClosed);
+  });
+
+  // Load the frame script after registering listeners.
   mm.loadFrameScript(
 "chrome://browser/content/content-sessionStore.js",
 true,
@@ -2083,8 +2090,10 @@ var SessionStoreInternal = {
 // Cache the window state until it is completely gone.
 DyingWindowCache.set(aWindow, winData);
 
-let mm = aWindow.getGroupMessageManager("browsers");
-MESSAGES.forEach(msg => mm.removeMessageListener(msg, this));
+if (!Services.appinfo.sessionHistoryInParent) {
+  let mm = aWindow.getGroupMessageManager("browsers");
+  MESSAGES.forEach(msg => mm.removeMessageListener(msg, this));
+}
 
 this._saveableClosedWindowData.delete(winData);
 delete aWindow.__SSi;



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/8e8ac7a1877e4be2d02e58e513f383b89cc6300d

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/8e8ac7a1877e4be2d02e58e513f383b89cc6300d
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/mullvad-browser] Pushed new tag mullvad-browser-115.9.1esr-13.0-1-build1

2024-03-22 Thread ma1 (@ma1) via tor-commits


ma1 pushed new tag mullvad-browser-115.9.1esr-13.0-1-build1 at The Tor Project 
/ Applications / Mullvad Browser

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/tree/mullvad-browser-115.9.1esr-13.0-1-build1
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/mullvad-browser][mullvad-browser-115.9.1esr-13.0-1] 18 commits: MB 38: Mullvad Browser configuration

2024-03-22 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch mullvad-browser-115.9.1esr-13.0-1 at The Tor Project / 
Applications / Mullvad Browser


Commits:
e27339b2 by Pier Angelo Vendrame at 2024-03-22T13:30:37+01:00
MB 38: Mullvad Browser configuration

- - - - -
890fc86e by Pier Angelo Vendrame at 2024-03-22T13:30:38+01:00
MB 1: Mullvad Browser branding

See also:
mullvad-browser#5: Product name and directory customization
mullvad-browser#12: Create new branding directories and integrate Mullvad 
icons+branding
mullvad-browser#14: Remove Default Built-in bookmarks
mullvad-browser#35: Add custom PDF icons for Windows builds
mullvad-browser#48: Replace Mozilla copyright and legal trademarks in 
mullvadbrowser.exe metadata
mullvad-browser#51: Update trademark string
mullvad-browser#104: Update shipped dll metadata copyright/licensing info
mullvad-browser#107: Add alpha and nightly icons

- - - - -
8457cfe2 by Pier Angelo Vendrame at 2024-03-22T13:30:39+01:00
MB 20: Allow packaged-addons in PBM.

We install a few addons from the distribution directory, but they are
not automatically enabled for PBM mode.
This commit modifies the code that installs them to also add the PBM
permission to the known ones.

- - - - -
9ebfee4d by Pier Angelo Vendrame at 2024-03-22T13:30:40+01:00
MB 63: Customize some about pages for Mullvad Browser

Also:
mullvad-browser#57: Purge unneeded about: pages

- - - - -
c73a54ab by Pier Angelo Vendrame at 2024-03-22T14:07:02+01:00
MB 37: Customization for the about dialog

- - - - -
0643bbdd by Henry Wilkes at 2024-03-22T14:07:03+01:00
MB 39: Add home page about:mullvad-browser

- - - - -
6e0a04f3 by hackademix at 2024-03-22T14:07:05+01:00
MB 97: Remove UI cues to install new extensions.

- - - - -
5d3323fe by hackademix at 2024-03-22T14:07:06+01:00
MB 47: uBlock Origin customization

- - - - -
e6a2e35b by Pier Angelo Vendrame at 2024-03-22T14:07:08+01:00
MB 21: Disable the password manager

This commit disables the about:login page and removes the Login and
Password section of about:preferences.

We do not do anything to the real password manager of Firefox, that is
in toolkit: it contains C++ parts that make it difficult to actually
prevent it from being built..

Finally, we modify the the function that opens about:login to report an
error in the console so that we can quickly get a backtrace to the code
that tries to use it.

- - - - -
58d1dbda by Pier Angelo Vendrame at 2024-03-22T14:07:09+01:00
MB 87: Disable the default browser box on Windows and Linux

Windows and Linux will be distributed only as portable apps at the
beginning, so they should not be settable as default browsers.
We will need to improve the logic once we decide to ship system-wide
installers, too.

- - - - -
a055020f by Pier Angelo Vendrame at 2024-03-22T14:07:10+01:00
MB 112: Updater customization for Mullvad Browser

MB 71: Set the updater base URL to Mullvad domain

- - - - -
233c5e02 by Nicolas Vigier at 2024-03-22T14:07:12+01:00
MB 79: Add Mullvad Browser MAR signing keys

MB 256: Add mullvad-browser nightly mar signing key

- - - - -
f424d0a6 by Pier Angelo Vendrame at 2024-03-22T14:07:14+01:00
MB 34: Hide unsafe and unwanted preferences UI

about:preferences allow to override some of our defaults, that could
be fingeprintable or have some other unwanted consequences.

- - - - -
f0d45502 by Pier Angelo Vendrame at 2024-03-22T14:07:15+01:00
MB 160: Disable the cookie exceptions button

Besides disabling the Delete on close checkbox, disable also the
Manage Exceptions button when always using PBM.

- - - - -
31171acd by hackademix at 2024-03-22T14:07:16+01:00
MB 163: prevent uBlock Origin from being uninstalled/disabled

- - - - -
1f741e74 by Richard Pospesel at 2024-03-22T14:07:17+01:00
MB 188: Customize Gitlab Issue and Merge templates

- - - - -
a86d6ab2 by rui hildt at 2024-03-22T14:07:18+01:00
MB 213: Customize the search engines list

- - - - -
6cd85fb3 by hackademix at 2024-03-22T14:07:19+01:00
MB 214: Enable cross-tab identity leak protection in quiet mode

- - - - -


30 changed files:

- + .gitlab/issue_templates/Rebase Browser - Alpha.md
- + .gitlab/issue_templates/Rebase Browser - Stable.md
- .gitlab/merge_request_templates/default.md
- browser/app/Makefile.in
- browser/app/macbuild/Contents/Info.plist.in
- browser/app/module.ver
- browser/app/firefox.exe.manifest → browser/app/mullvadbrowser.exe.manifest
- + browser/app/profile/000-mullvad-browser.js
- browser/app/profile/001-base-profile.js
- browser/base/content/aboutDialog.xhtml
- browser/base/content/appmenu-viewcache.inc.xhtml
- browser/base/content/browser-menubar.inc
- browser/base/content/browser-places.js
- browser/base/content/browser.js
- browser/base/content/default-bookmarks.html
- browser/base/content/nsContextMenu.js
- browser/base/content/overrides/app-license.html
- browser/base/content/pageinfo/pageInfo.xhtml
- browser/base/content/utilityOverlay.js
- browser/branding/branding-common.mozbuild
- + browser/branding/mb-alpha/VisualElements_150.png
- + 

[tor-commits] [Git][tpo/applications/tor-browser-build][maint-13.0] Bug 41108, 41109: Prepare Tor and Mullvad Browser Stable 13.0.13

2024-03-22 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch maint-13.0 at The Tor Project / Applications / 
tor-browser-build


Commits:
49992f2b by Richard Pospesel at 2024-03-22T13:04:30+00:00
Bug 41108, 41109: Prepare Tor and Mullvad Browser Stable 13.0.13

- - - - -


5 changed files:

- projects/browser/Bundle-Data/Docs-MB/ChangeLog.txt
- projects/browser/Bundle-Data/Docs-TBB/ChangeLog.txt
- projects/firefox/config
- projects/translation/config
- rbm.conf


Changes:

=
projects/browser/Bundle-Data/Docs-MB/ChangeLog.txt
=
@@ -1,3 +1,9 @@
+Mullvad Browser 13.0.13 - March 22 2024
+ * Windows + macOS + Linux
+   * Updated Firefox to 115.9.1esr
+   * Bug 42473: ESR 115.9.1 fixes [tor-browser]
+   * Bug 277: Rebase Mullvad Browser stable onto Firefox 115.9.1esr 
[mullvad-browser]
+
 Mullvad Browser 13.0.12 - March 19 2024
  * All Platforms
* Updated Firefox to 115.9.0esr


=
projects/browser/Bundle-Data/Docs-TBB/ChangeLog.txt
=
@@ -1,3 +1,9 @@
+Tor Browser 13.0.13 - March 22 2024
+ * Windows + macOS + Linux
+   * Updated Firefox to 115.9.1esr
+   * Bug 42473: ESR 115.9.1 fixes [tor-browser]
+   * Bug 42474: Rebase stable browsers on 115.9.1 [tor-browser]
+
 Tor Browser 13.0.12 - March 19 2024
  * All Platforms
* Updated Snowflake to 2.9.2


=
projects/firefox/config
=
@@ -14,13 +14,11 @@ container:
   use_container: 1
 
 var:
-  firefox_platform_version: 115.9.0
+  firefox_platform_version: 115.9.1
   firefox_version: '[% c("var/firefox_platform_version") %]esr'
   browser_series: '13.0'
   browser_branch: '[% c("var/browser_series") %]-1'
-  # update the mullvadbrowser specific override for 115.10.0
-  # torbrowser had an extra firefox build tag
-  browser_build: 3
+  browser_build: 1
   branding_directory_prefix: 'tb'
   copyright_year: '[% exec("git show -s --format=%ci").remove("-.*") %]'
   nightly_updates_publish_dir: '[% c("var/nightly_updates_publish_dir_prefix") 
%]nightly-[% c("var/osname") %]'
@@ -104,7 +102,6 @@ targets:
   mullvadbrowser:
 git_url: https://gitlab.torproject.org/tpo/applications/mullvad-browser.git
 var:
-  browser_build: 2
   branding_directory_prefix: 'mb'
   gitlab_project: 
https://gitlab.torproject.org/tpo/applications/mullvad-browser
   updater_url: 'https://cdn.mullvad.net/browser/update_responses/update_1/'


=
projects/translation/config
=
@@ -12,13 +12,13 @@ compress_tar: 'gz'
 steps:
   base-browser:
 base-browser: '[% INCLUDE build %]'
-git_hash: a4d224e82808529e135259e04fb58fb39b90da2d
+git_hash: 8e04ca3c5f440ed8f16b2069ae9565e4b044ec29
 targets:
   nightly:
 git_hash: 'base-browser'
   tor-browser:
 tor-browser: '[% INCLUDE build %]'
-git_hash: e7aabc54138211e23bc60af1abe492c8bc68ce4b
+git_hash: bf2fac60a6c41aa67b8147f22a638d498ac2dcdd
 targets:
   nightly:
 git_hash: 'tor-browser'
@@ -32,7 +32,7 @@ steps:
 fenix: '[% INCLUDE build %]'
 # We need to bump the commit before releasing but just pointing to a branch
 # might cause too much rebuidling of the Firefox part.
-git_hash: ef6bef5e373108c4e633998b517e4bc8c297770a
+git_hash: c5d462fc3513f23fc74193c7a5c31027fc07672d
 compress_tar: 'zst'
 targets:
   nightly:


=
rbm.conf
=
@@ -73,13 +73,13 @@ buildconf:
   git_signtag_opt: '-s'
 
 var:
-  torbrowser_version: '13.0.12'
-  torbrowser_build: 'build2'
+  torbrowser_version: '13.0.13'
+  torbrowser_build: 'build1'
   torbrowser_incremental_from:
+- '13.0.12'
 - '[% IF c("var/tor-browser") %]13.0.11[% END %]'
 - '13.0.10'
-- '13.0.9'
-- '[% IF c("var/mullvad-browser") %]13.0.7[% END %]'
+- '[% IF c("var/mullvad-browser") %]13.0.9[% END %]'
   updater_enabled: 1
   build_mar: 1
   mar_channel_id: '[% c("var/projectname") %]-torproject-[% c("var/channel") 
%]'



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/commit/49992f2bf9f1c86b0930fdab06d1cfaac63decaf

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/commit/49992f2bf9f1c86b0930fdab06d1cfaac63decaf
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/mullvad-browser] Pushed new tag FIREFOX_115_9_1esr_BUILD1

2024-03-22 Thread ma1 (@ma1) via tor-commits


ma1 pushed new tag FIREFOX_115_9_1esr_BUILD1 at The Tor Project / Applications 
/ Mullvad Browser

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/tree/FIREFOX_115_9_1esr_BUILD1
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/mullvad-browser] Pushed new tag base-browser-115.9.1esr-13.0-1-build1

2024-03-22 Thread ma1 (@ma1) via tor-commits


ma1 pushed new tag base-browser-115.9.1esr-13.0-1-build1 at The Tor Project / 
Applications / Mullvad Browser

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/tree/base-browser-115.9.1esr-13.0-1-build1
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/mullvad-browser] Pushed new branch mullvad-browser-115.9.1esr-13.0-1

2024-03-22 Thread ma1 (@ma1) via tor-commits


ma1 pushed new branch mullvad-browser-115.9.1esr-13.0-1 at The Tor Project / 
Applications / Mullvad Browser

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/tree/mullvad-browser-115.9.1esr-13.0-1
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser] Pushed new tag base-browser-115.9.1esr-13.0-1-build1

2024-03-22 Thread ma1 (@ma1) via tor-commits


ma1 pushed new tag base-browser-115.9.1esr-13.0-1-build1 at The Tor Project / 
Applications / Tor Browser

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/tree/base-browser-115.9.1esr-13.0-1-build1
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser] Pushed new tag tor-browser-115.9.1esr-13.0-1-build1

2024-03-22 Thread ma1 (@ma1) via tor-commits


ma1 pushed new tag tor-browser-115.9.1esr-13.0-1-build1 at The Tor Project / 
Applications / Tor Browser

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/tree/tor-browser-115.9.1esr-13.0-1-build1
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][tor-browser-115.9.0esr-13.5-1] Bug 1886852 - Avoid registering unnecessary MessageManager listeners when SHIP is enabled, r=smaug!

2024-03-22 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch tor-browser-115.9.0esr-13.5-1 at The Tor Project / 
Applications / Tor Browser


Commits:
b7fc915f by Nika Layzell at 2024-03-21T22:41:17+01:00
Bug 1886852 - Avoid registering unnecessary MessageManager listeners when SHIP 
is enabled, r=smaug!

Differential Revision: https://phabricator.services.mozilla.com/D205377
- - - - -


1 changed file:

- browser/components/sessionstore/SessionStore.sys.mjs


Changes:

=
browser/components/sessionstore/SessionStore.sys.mjs
=
@@ -1422,6 +1422,13 @@ var SessionStoreInternal = {
* and thus enables communication with OOP tabs.
*/
   receiveMessage(aMessage) {
+if (Services.appinfo.sessionHistoryInParent) {
+  throw new Error(
+`received unexpected message '${aMessage.name}' with ` +
+  `sessionHistoryInParent enabled`
+  );
+}
+
 // If we got here, that means we're dealing with a frame message
 // manager message, so the target will be a .
 var browser = aMessage.target;
@@ -1600,14 +1607,14 @@ var SessionStoreInternal = {
 // internal data about the window.
 aWindow.__SSi = this._generateWindowID();
 
-let mm = aWindow.getGroupMessageManager("browsers");
-MESSAGES.forEach(msg => {
-  let listenWhenClosed = CLOSED_MESSAGES.has(msg);
-  mm.addMessageListener(msg, this, listenWhenClosed);
-});
-
-// Load the frame script after registering listeners.
 if (!Services.appinfo.sessionHistoryInParent) {
+  let mm = aWindow.getGroupMessageManager("browsers");
+  MESSAGES.forEach(msg => {
+let listenWhenClosed = CLOSED_MESSAGES.has(msg);
+mm.addMessageListener(msg, this, listenWhenClosed);
+  });
+
+  // Load the frame script after registering listeners.
   mm.loadFrameScript(
 "chrome://browser/content/content-sessionStore.js",
 true,
@@ -2083,8 +2090,10 @@ var SessionStoreInternal = {
 // Cache the window state until it is completely gone.
 DyingWindowCache.set(aWindow, winData);
 
-let mm = aWindow.getGroupMessageManager("browsers");
-MESSAGES.forEach(msg => mm.removeMessageListener(msg, this));
+if (!Services.appinfo.sessionHistoryInParent) {
+  let mm = aWindow.getGroupMessageManager("browsers");
+  MESSAGES.forEach(msg => mm.removeMessageListener(msg, this));
+}
 
 this._saveableClosedWindowData.delete(winData);
 delete aWindow.__SSi;



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/b7fc915f3ed100830bd8574a62f9cd653c1ec250

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/b7fc915f3ed100830bd8574a62f9cd653c1ec250
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser] Deleted branch tor-browser-115.9.1esr-13.0.1

2024-03-22 Thread ma1 (@ma1) via tor-commits


ma1 deleted branch tor-browser-115.9.1esr-13.0.1 at The Tor Project / 
Applications / Tor Browser

-- 

You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser] Pushed new branch tor-browser-115.9.1esr-13.0-1

2024-03-22 Thread ma1 (@ma1) via tor-commits


ma1 pushed new branch tor-browser-115.9.1esr-13.0-1 at The Tor Project / 
Applications / Tor Browser

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/tree/tor-browser-115.9.1esr-13.0-1
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser] Pushed new branch tor-browser-115.9.1esr-13.0.1

2024-03-22 Thread ma1 (@ma1) via tor-commits


ma1 pushed new branch tor-browser-115.9.1esr-13.0.1 at The Tor Project / 
Applications / Tor Browser

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/tree/tor-browser-115.9.1esr-13.0.1
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser] Pushed new tag FIREFOX_115_9_1esr_BUILD1

2024-03-22 Thread ma1 (@ma1) via tor-commits


ma1 pushed new tag FIREFOX_115_9_1esr_BUILD1 at The Tor Project / Applications 
/ Tor Browser

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/tree/FIREFOX_115_9_1esr_BUILD1
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser] Pushed new branch base-browser-115.9.1esr-13.0-1

2024-03-22 Thread ma1 (@ma1) via tor-commits


ma1 pushed new branch base-browser-115.9.1esr-13.0-1 at The Tor Project / 
Applications / Tor Browser

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/tree/base-browser-115.9.1esr-13.0-1
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/mullvad-browser][mullvad-browser-115.9.0esr-13.5-1] Bug 42443: Shrink window to match letterboxing size when the emtpy area is clicked.

2024-03-13 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch mullvad-browser-115.9.0esr-13.5-1 at The Tor Project / 
Applications / Mullvad Browser


Commits:
bec1f691 by hackademix at 2024-03-13T20:37:37+01:00
Bug 42443: Shrink window to match letterboxing size when the emtpy area is 
clicked.

- - - - -


1 changed file:

- toolkit/components/resistfingerprinting/RFPHelper.sys.mjs


Changes:

=
toolkit/components/resistfingerprinting/RFPHelper.sys.mjs
=
@@ -750,8 +750,27 @@ class _RFPHelper {
 });
   }
 
+  // We will attach this method to each browser window. When called
+  // it will instantly resize the window to exactly fit the selected
+  // (possibly letterboxed) browser.
+  shrinkToLetterbox() {
+let { selectedBrowser } = this.gBrowser;
+let stack = selectedBrowser.closest(".browserStack");
+const outer = stack.getBoundingClientRect();
+const inner = selectedBrowser.getBoundingClientRect();
+this.resizeBy(inner.width - outer.width, inner.height - outer.height);
+  }
+
+  _onWindowDoubleClick(e) {
+if (e.target.classList.contains("browserStack")) {
+  e.currentTarget.shrinkToLetterbox();
+}
+  }
+
   _attachWindow(aWindow) {
 aWindow.addEventListener("sizemodechange", windowResizeHandler);
+aWindow.shrinkToLetterbox = this.shrinkToLetterbox;
+aWindow.addEventListener("dblclick", this._onWindowDoubleClick);
 aWindow.gBrowser.addTabsProgressListener(this);
 aWindow.addEventListener("TabOpen", this);
 const resizeObserver = (aWindow._rfpResizeObserver =
@@ -783,9 +802,12 @@ class _RFPHelper {
   let browser = tab.linkedBrowser;
   this._resetContentSize(browser);
 }
+aWindow.removeEventListener("dblclick", this._onWindowDoubleClick);
+delete aWindow.shrinkToLetterbox;
 aWindow.removeEventListener("sizemodechange", windowResizeHandler);
   }
 
+
   _handleDOMWindowOpened(win) {
 let self = this;
 



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/bec1f6915db5ce909545dfb1aa5266ab79b97a97

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/bec1f6915db5ce909545dfb1aa5266ab79b97a97
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][base-browser-115.9.0esr-13.5-1] Bug 42443: Shrink window to match letterboxing size when the emtpy area is clicked.

2024-03-13 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch base-browser-115.9.0esr-13.5-1 at The Tor Project / 
Applications / Tor Browser


Commits:
aefa5f37 by hackademix at 2024-03-13T20:35:54+01:00
Bug 42443: Shrink window to match letterboxing size when the emtpy area is 
clicked.

- - - - -


1 changed file:

- toolkit/components/resistfingerprinting/RFPHelper.sys.mjs


Changes:

=
toolkit/components/resistfingerprinting/RFPHelper.sys.mjs
=
@@ -750,8 +750,27 @@ class _RFPHelper {
 });
   }
 
+  // We will attach this method to each browser window. When called
+  // it will instantly resize the window to exactly fit the selected
+  // (possibly letterboxed) browser.
+  shrinkToLetterbox() {
+let { selectedBrowser } = this.gBrowser;
+let stack = selectedBrowser.closest(".browserStack");
+const outer = stack.getBoundingClientRect();
+const inner = selectedBrowser.getBoundingClientRect();
+this.resizeBy(inner.width - outer.width, inner.height - outer.height);
+  }
+
+  _onWindowDoubleClick(e) {
+if (e.target.classList.contains("browserStack")) {
+  e.currentTarget.shrinkToLetterbox();
+}
+  }
+
   _attachWindow(aWindow) {
 aWindow.addEventListener("sizemodechange", windowResizeHandler);
+aWindow.shrinkToLetterbox = this.shrinkToLetterbox;
+aWindow.addEventListener("dblclick", this._onWindowDoubleClick);
 aWindow.gBrowser.addTabsProgressListener(this);
 aWindow.addEventListener("TabOpen", this);
 const resizeObserver = (aWindow._rfpResizeObserver =
@@ -783,9 +802,12 @@ class _RFPHelper {
   let browser = tab.linkedBrowser;
   this._resetContentSize(browser);
 }
+aWindow.removeEventListener("dblclick", this._onWindowDoubleClick);
+delete aWindow.shrinkToLetterbox;
 aWindow.removeEventListener("sizemodechange", windowResizeHandler);
   }
 
+
   _handleDOMWindowOpened(win) {
 let self = this;
 



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/aefa5f37615c1ec1b271b135dd75b7ffc113ddd3

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/aefa5f37615c1ec1b271b135dd75b7ffc113ddd3
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][tor-browser-115.9.0esr-13.5-1] Bug 42443: Shrink window to match letterboxing size when the emtpy area is clicked.

2024-03-13 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch tor-browser-115.9.0esr-13.5-1 at The Tor Project / 
Applications / Tor Browser


Commits:
c99204f2 by hackademix at 2024-03-13T16:39:27+01:00
Bug 42443: Shrink window to match letterboxing size when the emtpy area is 
clicked.

- - - - -


1 changed file:

- toolkit/components/resistfingerprinting/RFPHelper.sys.mjs


Changes:

=
toolkit/components/resistfingerprinting/RFPHelper.sys.mjs
=
@@ -750,8 +750,27 @@ class _RFPHelper {
 });
   }
 
+  // We will attach this method to each browser window. When called
+  // it will instantly resize the window to exactly fit the selected
+  // (possibly letterboxed) browser.
+  shrinkToLetterbox() {
+let { selectedBrowser } = this.gBrowser;
+let stack = selectedBrowser.closest(".browserStack");
+const outer = stack.getBoundingClientRect();
+const inner = selectedBrowser.getBoundingClientRect();
+this.resizeBy(inner.width - outer.width, inner.height - outer.height);
+  }
+
+  _onWindowDoubleClick(e) {
+if (e.target.classList.contains("browserStack")) {
+  e.currentTarget.shrinkToLetterbox();
+}
+  }
+
   _attachWindow(aWindow) {
 aWindow.addEventListener("sizemodechange", windowResizeHandler);
+aWindow.shrinkToLetterbox = this.shrinkToLetterbox;
+aWindow.addEventListener("dblclick", this._onWindowDoubleClick);
 aWindow.gBrowser.addTabsProgressListener(this);
 aWindow.addEventListener("TabOpen", this);
 const resizeObserver = (aWindow._rfpResizeObserver =
@@ -783,9 +802,12 @@ class _RFPHelper {
   let browser = tab.linkedBrowser;
   this._resetContentSize(browser);
 }
+aWindow.removeEventListener("dblclick", this._onWindowDoubleClick);
+delete aWindow.shrinkToLetterbox;
 aWindow.removeEventListener("sizemodechange", windowResizeHandler);
   }
 
+
   _handleDOMWindowOpened(win) {
 let self = this;
 



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/c99204f2656a665e7cc90ac3a1b1760f41e63168

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/c99204f2656a665e7cc90ac3a1b1760f41e63168
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/mullvad-browser][mullvad-browser-115.8.0esr-13.5-1] fixup! Bug 41918: Option to reuse last window size when letterboxing is enabled.

2024-03-06 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch mullvad-browser-115.8.0esr-13.5-1 at The Tor Project / 
Applications / Mullvad Browser


Commits:
6da931f7 by hackademix at 2024-03-06T22:12:22+01:00
fixup! Bug 41918: Option to reuse last window size when letterboxing is enabled.

Fixes typo in RFHelper.sys.mjs (Service - Services).

- - - - -


1 changed file:

- toolkit/components/resistfingerprinting/RFPHelper.sys.mjs


Changes:

=
toolkit/components/resistfingerprinting/RFPHelper.sys.mjs
=
@@ -223,7 +223,7 @@ class _RFPHelper {
   _handlePrefChanged(data) {
 switch (data) {
   case kPrefResistFingerprinting:
-Service.prefs.clearUserPref(kPrefLetterboxingDidForceSize);
+Services.prefs.clearUserPref(kPrefLetterboxingDidForceSize);
 this._handleResistFingerprintingChanged();
 break;
   case kPrefSpoofEnglish:
@@ -231,7 +231,7 @@ class _RFPHelper {
 this._handleSpoofEnglishChanged();
 break;
   case kPrefLetterboxing:
-Service.prefs.clearUserPref(kPrefLetterboxingDidForceSize);
+Services.prefs.clearUserPref(kPrefLetterboxingDidForceSize);
   case kPrefLetterboxingVcenter:
   case kPrefLetterboxingGradient:
 this._handleLetterboxingPrefChanged();



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/6da931f7fb7e664dc662d0df06b5b91242611626

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/6da931f7fb7e664dc662d0df06b5b91242611626
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][base-browser-115.8.0esr-13.5-1] fixup! Bug 41918: Option to reuse last window size when letterboxing is enabled.

2024-03-06 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch base-browser-115.8.0esr-13.5-1 at The Tor Project / 
Applications / Tor Browser


Commits:
1564281f by hackademix at 2024-03-06T22:10:59+01:00
fixup! Bug 41918: Option to reuse last window size when letterboxing is enabled.

Fixes typo in RFHelper.sys.mjs (Service - Services).

- - - - -


1 changed file:

- toolkit/components/resistfingerprinting/RFPHelper.sys.mjs


Changes:

=
toolkit/components/resistfingerprinting/RFPHelper.sys.mjs
=
@@ -223,7 +223,7 @@ class _RFPHelper {
   _handlePrefChanged(data) {
 switch (data) {
   case kPrefResistFingerprinting:
-Service.prefs.clearUserPref(kPrefLetterboxingDidForceSize);
+Services.prefs.clearUserPref(kPrefLetterboxingDidForceSize);
 this._handleResistFingerprintingChanged();
 break;
   case kPrefSpoofEnglish:
@@ -231,7 +231,7 @@ class _RFPHelper {
 this._handleSpoofEnglishChanged();
 break;
   case kPrefLetterboxing:
-Service.prefs.clearUserPref(kPrefLetterboxingDidForceSize);
+Services.prefs.clearUserPref(kPrefLetterboxingDidForceSize);
   case kPrefLetterboxingVcenter:
   case kPrefLetterboxingGradient:
 this._handleLetterboxingPrefChanged();



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/1564281fd5a03cfe772074be9b41c2927513d189

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/1564281fd5a03cfe772074be9b41c2927513d189
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][tor-browser-115.8.0esr-13.5-1] fixup! Bug 41918: Option to reuse last window size when letterboxing is enabled.

2024-03-06 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch tor-browser-115.8.0esr-13.5-1 at The Tor Project / 
Applications / Tor Browser


Commits:
03dbfffc by hackademix at 2024-03-06T22:06:28+01:00
fixup! Bug 41918: Option to reuse last window size when letterboxing is enabled.

Fixes typo in RFHelper.sys.mjs (Service - Services).

- - - - -


1 changed file:

- toolkit/components/resistfingerprinting/RFPHelper.sys.mjs


Changes:

=
toolkit/components/resistfingerprinting/RFPHelper.sys.mjs
=
@@ -223,7 +223,7 @@ class _RFPHelper {
   _handlePrefChanged(data) {
 switch (data) {
   case kPrefResistFingerprinting:
-Service.prefs.clearUserPref(kPrefLetterboxingDidForceSize);
+Services.prefs.clearUserPref(kPrefLetterboxingDidForceSize);
 this._handleResistFingerprintingChanged();
 break;
   case kPrefSpoofEnglish:
@@ -231,7 +231,7 @@ class _RFPHelper {
 this._handleSpoofEnglishChanged();
 break;
   case kPrefLetterboxing:
-Service.prefs.clearUserPref(kPrefLetterboxingDidForceSize);
+Services.prefs.clearUserPref(kPrefLetterboxingDidForceSize);
   case kPrefLetterboxingVcenter:
   case kPrefLetterboxingGradient:
 this._handleLetterboxingPrefChanged();



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/03dbfffc3cdaa9584c49fe61dbfe887d2bcfdb41

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/03dbfffc3cdaa9584c49fe61dbfe887d2bcfdb41
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser-build][main] Bug 41092: Use an uncompressed omni.ja to improve final apk compression.

2024-02-27 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch main at The Tor Project / Applications / tor-browser-build


Commits:
5333cc52 by Giorgio Maone at 2024-02-26T20:26:46+00:00
Bug 41092: Use an uncompressed omni.ja to improve final apk compression.

- - - - -


1 changed file:

- projects/browser/build.android


Changes:

=
projects/browser/build.android
=
@@ -35,10 +35,7 @@ unzip ../omni.ja
 [% END -%]
 [% c('zip', {
 zip_src   => [ '.' ],
-zip_args  => '../assets/omni.ja',
-use_7z=> 1,
-'7z_bin'  => '7zz',
-'7z_opts' => '-mx9',
+zip_args  => '-0 ../assets/omni.ja',
   }) %]
 popd
 



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/commit/5333cc52d7c1e0d8a6d9d252a24757f6f66df814

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/commit/5333cc52d7c1e0d8a6d9d252a24757f6f66df814
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/mullvad-browser][mullvad-browser-115.7.0esr-13.5-1] fixup! Bug 32308: use direct browser sizing for letterboxing.

2024-02-07 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch mullvad-browser-115.7.0esr-13.5-1 at The Tor Project / 
Applications / Mullvad Browser


Commits:
800f6ebf by hackademix at 2024-02-07T18:53:36+01:00
fixup! Bug 32308: use direct browser sizing for letterboxing.

Bug 42389: make the betterboxing gradient actually work.

- - - - -


1 changed file:

- browser/base/content/browser.css


Changes:

=
browser/base/content/browser.css
=
@@ -168,7 +168,6 @@ body {
 
 .letterboxing.letterboxing-gradient .browserContainer {
   background: linear-gradient(283deg, var(--letterboxing-gradient-color1) 0%, 
var(--letterboxing-gradient-color2) 100%), var(--letterboxing-bgcolor);
-  box-shadow: rgba(0, 0, 0, 0.5) 0px -1px 2px;
 }
 
 :root:not([inDOMFullscreen]) .letterboxing 
.browserContainer:not(.responsive-mode)
@@ -231,12 +230,12 @@ body {
   border-top-right-radius: var(--letterboxing-border-top-radius);
   width: var(--letterboxing-width) !important;
   height: var(--letterboxing-height) !important;
+  background: var(--letterboxing-gradient-color2);
 }
 
 :root:not([inDOMFullscreen]) .letterboxing.letterboxing-ready 
.browserContainer:not(.responsive-mode)
   > .browserStack:not(.exclude-letterboxing) {
   place-content: var(--letterboxing-vertical-alignment) center;
-  background: var(--letterboxing-bgcolor);
 }
 
 #toolbar-menubar[autohide="true"] {



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/800f6ebf17fbbc8bacc303bd13828c33f01cecf7

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/800f6ebf17fbbc8bacc303bd13828c33f01cecf7
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][tor-browser-115.7.0esr-13.5-1] fixup! Bug 32308: use direct browser sizing for letterboxing.

2024-02-07 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch tor-browser-115.7.0esr-13.5-1 at The Tor Project / 
Applications / Tor Browser


Commits:
c13c55f4 by hackademix at 2024-02-07T18:42:34+01:00
fixup! Bug 32308: use direct browser sizing for letterboxing.

Bug 42389: make the betterboxing gradient actually work.

- - - - -


1 changed file:

- browser/base/content/browser.css


Changes:

=
browser/base/content/browser.css
=
@@ -168,7 +168,6 @@ body {
 
 .letterboxing.letterboxing-gradient .browserContainer {
   background: linear-gradient(283deg, var(--letterboxing-gradient-color1) 0%, 
var(--letterboxing-gradient-color2) 100%), var(--letterboxing-bgcolor);
-  box-shadow: rgba(0, 0, 0, 0.5) 0px -1px 2px;
 }
 
 :root:not([inDOMFullscreen]) .letterboxing 
.browserContainer:not(.responsive-mode)
@@ -231,12 +230,12 @@ body {
   border-top-right-radius: var(--letterboxing-border-top-radius);
   width: var(--letterboxing-width) !important;
   height: var(--letterboxing-height) !important;
+  background: var(--letterboxing-gradient-color2);
 }
 
 :root:not([inDOMFullscreen]) .letterboxing.letterboxing-ready 
.browserContainer:not(.responsive-mode)
   > .browserStack:not(.exclude-letterboxing) {
   place-content: var(--letterboxing-vertical-alignment) center;
-  background: var(--letterboxing-bgcolor);
 }
 
 #toolbar-menubar[autohide="true"] {



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/c13c55f4af6b80a89fd1256d7659087217da8e43

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/c13c55f4af6b80a89fd1256d7659087217da8e43
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/mullvad-browser][mullvad-browser-115.7.0esr-13.5-1] Bug 1867408 - NSS backport

2024-01-22 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch mullvad-browser-115.7.0esr-13.5-1 at The Tor Project / 
Applications / Mullvad Browser


Commits:
00f5c6d8 by hackademix at 2024-01-22T17:00:26+01:00
Bug 1867408 - NSS backport

- - - - -


1 changed file:

- security/nss/lib/ssl/sslsecur.c


Changes:

=
security/nss/lib/ssl/sslsecur.c
=
@@ -488,7 +488,12 @@ ssl_SendSavedWriteData(sslSocket *ss)
 if (rv < 0) {
 return rv;
 }
-ss->pendingBuf.len -= rv;
+if (rv > ss->pendingBuf.len) {
+PORT_Assert(0); /* This shouldn't happen */
+ss->pendingBuf.len = 0;
+} else {
+ss->pendingBuf.len -= rv;
+}
 if (ss->pendingBuf.len > 0 && rv > 0) {
 /* UGH !! This shifts the whole buffer down by copying it */
 PORT_Memmove(ss->pendingBuf.buf, ss->pendingBuf.buf + rv,



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/00f5c6d87febe04ecaa181a892fcb01ff1f6526d

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/00f5c6d87febe04ecaa181a892fcb01ff1f6526d
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/mullvad-browser][mullvad-browser-115.7.0esr-13.0-1] Bug 1867408 - NSS backport

2024-01-22 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch mullvad-browser-115.7.0esr-13.0-1 at The Tor Project / 
Applications / Mullvad Browser


Commits:
e0af4349 by hackademix at 2024-01-22T16:57:26+01:00
Bug 1867408 - NSS backport

- - - - -


1 changed file:

- security/nss/lib/ssl/sslsecur.c


Changes:

=
security/nss/lib/ssl/sslsecur.c
=
@@ -488,7 +488,12 @@ ssl_SendSavedWriteData(sslSocket *ss)
 if (rv < 0) {
 return rv;
 }
-ss->pendingBuf.len -= rv;
+if (rv > ss->pendingBuf.len) {
+PORT_Assert(0); /* This shouldn't happen */
+ss->pendingBuf.len = 0;
+} else {
+ss->pendingBuf.len -= rv;
+}
 if (ss->pendingBuf.len > 0 && rv > 0) {
 /* UGH !! This shifts the whole buffer down by copying it */
 PORT_Memmove(ss->pendingBuf.buf, ss->pendingBuf.buf + rv,



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/e0af43495ec05b2f0b4a4f035ca4ca6935b54307

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/e0af43495ec05b2f0b4a4f035ca4ca6935b54307
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][base-browser-115.7.0esr-13.5-1] Bug 1867408 - NSS backport

2024-01-22 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch base-browser-115.7.0esr-13.5-1 at The Tor Project / 
Applications / Tor Browser


Commits:
eed2de42 by hackademix at 2024-01-22T16:56:41+01:00
Bug 1867408 - NSS backport

- - - - -


1 changed file:

- security/nss/lib/ssl/sslsecur.c


Changes:

=
security/nss/lib/ssl/sslsecur.c
=
@@ -488,7 +488,12 @@ ssl_SendSavedWriteData(sslSocket *ss)
 if (rv < 0) {
 return rv;
 }
-ss->pendingBuf.len -= rv;
+if (rv > ss->pendingBuf.len) {
+PORT_Assert(0); /* This shouldn't happen */
+ss->pendingBuf.len = 0;
+} else {
+ss->pendingBuf.len -= rv;
+}
 if (ss->pendingBuf.len > 0 && rv > 0) {
 /* UGH !! This shifts the whole buffer down by copying it */
 PORT_Memmove(ss->pendingBuf.buf, ss->pendingBuf.buf + rv,



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/eed2de42dbce5898281b4987eecf29fed0303769

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/eed2de42dbce5898281b4987eecf29fed0303769
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][base-browser-115.7.0esr-13.0-1] Bug 1867408 - NSS backport

2024-01-22 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch base-browser-115.7.0esr-13.0-1 at The Tor Project / 
Applications / Tor Browser


Commits:
6c906dba by hackademix at 2024-01-22T16:46:05+01:00
Bug 1867408 - NSS backport

- - - - -


1 changed file:

- security/nss/lib/ssl/sslsecur.c


Changes:

=
security/nss/lib/ssl/sslsecur.c
=
@@ -488,7 +488,12 @@ ssl_SendSavedWriteData(sslSocket *ss)
 if (rv < 0) {
 return rv;
 }
-ss->pendingBuf.len -= rv;
+if (rv > ss->pendingBuf.len) {
+PORT_Assert(0); /* This shouldn't happen */
+ss->pendingBuf.len = 0;
+} else {
+ss->pendingBuf.len -= rv;
+}
 if (ss->pendingBuf.len > 0 && rv > 0) {
 /* UGH !! This shifts the whole buffer down by copying it */
 PORT_Memmove(ss->pendingBuf.buf, ss->pendingBuf.buf + rv,



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/6c906dba9373f791bf5b3ef99d57d334274dea20

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/6c906dba9373f791bf5b3ef99d57d334274dea20
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][tor-browser-115.7.0esr-13.5-1] Bug 1867408 - NSS backport

2024-01-22 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch tor-browser-115.7.0esr-13.5-1 at The Tor Project / 
Applications / Tor Browser


Commits:
cbeecf99 by hackademix at 2024-01-22T16:29:11+01:00
Bug 1867408 - NSS backport

- - - - -


1 changed file:

- security/nss/lib/ssl/sslsecur.c


Changes:

=
security/nss/lib/ssl/sslsecur.c
=
@@ -488,7 +488,12 @@ ssl_SendSavedWriteData(sslSocket *ss)
 if (rv < 0) {
 return rv;
 }
-ss->pendingBuf.len -= rv;
+if (rv > ss->pendingBuf.len) {
+PORT_Assert(0); /* This shouldn't happen */
+ss->pendingBuf.len = 0;
+} else {
+ss->pendingBuf.len -= rv;
+}
 if (ss->pendingBuf.len > 0 && rv > 0) {
 /* UGH !! This shifts the whole buffer down by copying it */
 PORT_Memmove(ss->pendingBuf.buf, ss->pendingBuf.buf + rv,



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/cbeecf99ee499c4f1d428f105ad86d0f6762f64a

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/cbeecf99ee499c4f1d428f105ad86d0f6762f64a
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/firefox-android][firefox-android-115.2.1-13.0-1] 10 commits: fixup! Bug 1823316 - Use 'Snackbar' themed Dialog to notify on making app full-screen

2024-01-11 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch firefox-android-115.2.1-13.0-1 at The Tor Project / 
Applications / firefox-android


Commits:
753c937e by hackademix at 2024-01-11T16:53:03+01:00
fixup! Bug 1823316 - Use Snackbar themed Dialog to notify on making 
app full-screen

Fix tor-browser#42355 backporting regression.

- - - - -
0cd27910 by t-p-white at 2024-01-11T16:53:04+01:00
Bug 1864549 - Fix for IllegalStateException in full screen notification dialog

- - - - -
a7cafd1b by Alexandru2909 at 2024-01-11T16:53:04+01:00
Bug 1810776 - Move DismissedTabBackground into its own file

- - - - -
e40a62ad by DreVla at 2024-01-11T16:53:05+01:00
Bug 1828493 - Apply purple overlay on list item when in multi-select

When having the list layout for tabs tray and entering multi-select
mode, the selected list items should have a purple non opaque overlay
on the thumbnail, as it was before in the XML implementation.

- - - - -
b4e5ab52 by Alexandru2909 at 2024-01-11T16:53:05+01:00
Bug 1810776 - Add SwipeToDismiss to composed tabs tray

- - - - -
20a18e5b by Noah Bond at 2024-01-11T16:53:05+01:00
Bug 1815579 - Improve performance of image loading in tab items

- - - - -
a07ec0d9 by Noah Bond at 2024-01-11T16:53:06+01:00
Bug 1840896 - Remove `rememberSaveable` since bitmaps are not serializable

- - - - -
a860d4a3 by Noah Bond at 2024-01-11T16:53:06+01:00
Bug 1844967 - Improve performance of tab thumbnail loading in Compose

- - - - -
0481dabe by Matthew Tighe at 2024-01-11T16:53:07+01:00
Bug 1721904 - update thumbnail caching on app open

- - - - -
3400c111 by hackademix at 2024-01-11T16:53:07+01:00
Bug 42191: Temporary StrictMode relaxation to clear the thumbnail cache.

- - - - -


30 changed files:

- 
android-components/components/browser/state/src/main/java/mozilla/components/browser/state/action/BrowserAction.kt
- 
android-components/components/browser/state/src/main/java/mozilla/components/browser/state/reducer/ContentStateReducer.kt
- 
android-components/components/browser/tabstray/src/main/java/mozilla/components/browser/tabstray/TabViewHolder.kt
- 
android-components/components/browser/tabstray/src/test/java/mozilla/components/browser/tabstray/DefaultTabViewHolderTest.kt
- 
android-components/components/browser/thumbnails/src/main/java/mozilla/components/browser/thumbnails/ThumbnailsMiddleware.kt
- 
android-components/components/browser/thumbnails/src/main/java/mozilla/components/browser/thumbnails/storage/ThumbnailStorage.kt
- 
android-components/components/browser/thumbnails/src/main/java/mozilla/components/browser/thumbnails/utils/ThumbnailDiskCache.kt
- 
android-components/components/browser/thumbnails/src/test/java/mozilla/components/browser/thumbnails/ThumbnailsMiddlewareTest.kt
- 
android-components/components/browser/thumbnails/src/test/java/mozilla/components/browser/thumbnails/loader/ThumbnailLoaderTest.kt
- 
android-components/components/browser/thumbnails/src/test/java/mozilla/components/browser/thumbnails/storage/ThumbnailStorageTest.kt
- 
android-components/components/browser/thumbnails/src/test/java/mozilla/components/browser/thumbnails/utils/ThumbnailDiskCacheTest.kt
- 
android-components/components/concept/base/src/main/java/mozilla/components/concept/base/images/ImageRequest.kt
- 
android-components/components/feature/prompts/src/main/java/mozilla/components/feature/prompts/dialog/FullScreenNotificationDialog.kt
- fenix/app/src/main/java/org/mozilla/fenix/browser/BaseBrowserFragment.kt
- fenix/app/src/main/java/org/mozilla/fenix/browser/TabPreview.kt
- fenix/app/src/main/java/org/mozilla/fenix/browser/ToolbarGestureHandler.kt
- + fenix/app/src/main/java/org/mozilla/fenix/compose/SwipeToDismiss.kt
- + fenix/app/src/main/java/org/mozilla/fenix/compose/TabThumbnail.kt
- fenix/app/src/main/java/org/mozilla/fenix/compose/ThumbnailCard.kt
- + fenix/app/src/main/java/org/mozilla/fenix/compose/ThumbnailImage.kt
- fenix/app/src/main/java/org/mozilla/fenix/compose/list/ListItem.kt
- + 
fenix/app/src/main/java/org/mozilla/fenix/compose/tabstray/DismissedTabBackground.kt
- fenix/app/src/main/java/org/mozilla/fenix/compose/tabstray/TabGridItem.kt
- fenix/app/src/main/java/org/mozilla/fenix/compose/tabstray/TabListItem.kt
- fenix/app/src/main/java/org/mozilla/fenix/home/collections/CollectionItem.kt
- 
fenix/app/src/main/java/org/mozilla/fenix/home/recentsyncedtabs/view/RecentSyncedTab.kt
- 
fenix/app/src/main/java/org/mozilla/fenix/home/recentsyncedtabs/view/RecentSyncedTabViewHolder.kt
- 
fenix/app/src/main/java/org/mozilla/fenix/home/recenttabs/view/RecentTabViewHolder.kt
- fenix/app/src/main/java/org/mozilla/fenix/home/recenttabs/view/RecentTabs.kt
- fenix/app/src/main/java/org/mozilla/fenix/tabstray/TabsTray.kt


The diff was not included because it is too large.


View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/firefox-android/-/compare/dadeaa78a62f166eebbeb100f43ab73ba9ba995e...3400c111a643a01594f3a4818fd21e78c6a9c9ed

-- 
View it on GitLab: 

[tor-commits] [Git][tpo/applications/firefox-android][firefox-android-115.2.1-13.5-1] 2 commits: fixup! Bug 1823316 - Use 'Snackbar' themed Dialog to notify on making app full-screen

2024-01-09 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch firefox-android-115.2.1-13.5-1 at The Tor Project / 
Applications / firefox-android


Commits:
a57e5d10 by hackademix at 2024-01-10T08:41:06+01:00
fixup! Bug 1823316 - Use Snackbar themed Dialog to notify on making 
app full-screen

Fix tor-browser#42355 backporting regression.

- - - - -
c1397e81 by t-p-white at 2024-01-10T08:41:06+01:00
Bug 1864549 - Fix for IllegalStateException in full screen notification dialog

- - - - -


2 changed files:

- 
android-components/components/feature/prompts/src/main/java/mozilla/components/feature/prompts/dialog/FullScreenNotificationDialog.kt
- fenix/app/src/main/java/org/mozilla/fenix/browser/BaseBrowserFragment.kt


Changes:

=
android-components/components/feature/prompts/src/main/java/mozilla/components/feature/prompts/dialog/FullScreenNotificationDialog.kt
=
@@ -59,11 +59,12 @@ class FullScreenNotificationDialog(@LayoutRes val layout: 
Int) :
 window.setGravity(Gravity.BOTTOM)
 window.clearFlags(WindowManager.LayoutParams.FLAG_DIM_BEHIND)
 }
+}
 
-lifecycleScope.launch {
-delay(SNACKBAR_DURATION_LONG_MS)
-dismiss()
-}
+// Attempt to automatically dismiss the dialog after the given 
duration.
+lifecycleScope.launch {
+delay(SNACKBAR_DURATION_LONG_MS)
+dialog?.dismiss()
 }
 }
 }


=
fenix/app/src/main/java/org/mozilla/fenix/browser/BaseBrowserFragment.kt
=
@@ -1491,6 +1491,7 @@ abstract class BaseBrowserFragment :
 parentFragmentManager,
 )
 
+activity?.enterToImmersiveMode()
 (view as? SwipeGestureLayout)?.isSwipeEnabled = false
 browserToolbarView.collapse()
 browserToolbarView.view.isVisible = false



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/firefox-android/-/compare/be02ec8601e43571da6c25a504f4633e54fd72e7...c1397e812f0a6cecfc44af411d6b7f222fc99164

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/firefox-android/-/compare/be02ec8601e43571da6c25a504f4633e54fd72e7...c1397e812f0a6cecfc44af411d6b7f222fc99164
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/firefox-android][firefox-android-115.2.1-13.0-1] fixup! Modify add-on support

2024-01-08 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch firefox-android-115.2.1-13.0-1 at The Tor Project / 
Applications / firefox-android


Commits:
cb98e7b2 by hackademix at 2024-01-08T19:54:56+01:00
fixup! Modify add-on support

Bug 42353: Fix NoScript automatic updates.

- - - - -


1 changed file:

- fenix/app/src/main/java/org/mozilla/fenix/components/TorBrowserFeatures.kt


Changes:

=
fenix/app/src/main/java/org/mozilla/fenix/components/TorBrowserFeatures.kt
=
@@ -136,37 +136,37 @@ object TorBrowserFeatures {
 }
 
 /**
- *  If we have not done it yet, enable automatic updates for NoScript 
and force a
+ *  Enable automatic updates for NoScript and, if we've not done it 
yet, force a
  *  one-time immediate update check, in order to upgrade old profiles 
and ensure we've got
  *  the latest stable AMO version available on first startup.
  *  We will do it as soon as the Tor is connected, to prevent early 
addonUpdater activation
  *  causing automatic update checks failures (components.addonUpdater 
being a lazy prop).
  *  The extension, from then on, should behave as if the user had 
installed it manually.
  */
-if (settings.noscriptUpdated == 0) {
-context.components.torController.registerTorListener(object : 
TorEvents {
-override fun onTorConnected() {
-
context.components.torController.unregisterTorListener(this)
-// Enable automatic updates
-
context.components.addonUpdater.registerForFutureUpdates(NOSCRIPT_ID)
-// Force an immediate update check
+context.components.torController.registerTorListener(object : 
TorEvents {
+override fun onTorConnected() {
+context.components.torController.unregisterTorListener(this)
+// Enable automatic updates. This must be done on every 
startup (tor-browser#42353)
+
context.components.addonUpdater.registerForFutureUpdates(NOSCRIPT_ID)
+// Force a one-time immediate update check for older 
installations
+if (settings.noscriptUpdated < 2) {
 context.components.addonUpdater.update(NOSCRIPT_ID)
-settings.noscriptUpdated = 1
+settings.noscriptUpdated = 2
 }
+}
 
-@SuppressWarnings("EmptyFunctionBlock")
-override fun onTorConnecting() {
-}
+@SuppressWarnings("EmptyFunctionBlock")
+override fun onTorConnecting() {
+}
 
-@SuppressWarnings("EmptyFunctionBlock")
-override fun onTorStopped() {
-}
+@SuppressWarnings("EmptyFunctionBlock")
+override fun onTorStopped() {
+}
 
-@SuppressWarnings("EmptyFunctionBlock")
-override fun onTorStatusUpdate(entry: String?, status: 
String?) {
-}
-})
-}
+@SuppressWarnings("EmptyFunctionBlock")
+override fun onTorStatusUpdate(entry: String?, status: String?) {
+}
+})
 }
 
 



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/firefox-android/-/commit/cb98e7b217abdf3c675856a7bbb0386748bfb987

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/firefox-android/-/commit/cb98e7b217abdf3c675856a7bbb0386748bfb987
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/firefox-android][firefox-android-115.2.1-13.5-1] fixup! Modify add-on support

2024-01-02 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch firefox-android-115.2.1-13.5-1 at The Tor Project / 
Applications / firefox-android


Commits:
be02ec86 by hackademix at 2023-12-30T19:51:11+01:00
fixup! Modify add-on support

Bug 42353: Fix NoScript automatic updates.

- - - - -


1 changed file:

- fenix/app/src/main/java/org/mozilla/fenix/components/TorBrowserFeatures.kt


Changes:

=
fenix/app/src/main/java/org/mozilla/fenix/components/TorBrowserFeatures.kt
=
@@ -136,37 +136,37 @@ object TorBrowserFeatures {
 }
 
 /**
- *  If we have not done it yet, enable automatic updates for NoScript 
and force a
+ *  Enable automatic updates for NoScript and, if we've not done it 
yet, force a
  *  one-time immediate update check, in order to upgrade old profiles 
and ensure we've got
  *  the latest stable AMO version available on first startup.
  *  We will do it as soon as the Tor is connected, to prevent early 
addonUpdater activation
  *  causing automatic update checks failures (components.addonUpdater 
being a lazy prop).
  *  The extension, from then on, should behave as if the user had 
installed it manually.
  */
-if (settings.noscriptUpdated == 0) {
-context.components.torController.registerTorListener(object : 
TorEvents {
-override fun onTorConnected() {
-
context.components.torController.unregisterTorListener(this)
-// Enable automatic updates
-
context.components.addonUpdater.registerForFutureUpdates(NOSCRIPT_ID)
-// Force an immediate update check
+context.components.torController.registerTorListener(object : 
TorEvents {
+override fun onTorConnected() {
+context.components.torController.unregisterTorListener(this)
+// Enable automatic updates. This must be done on every 
startup (tor-browser#42353)
+
context.components.addonUpdater.registerForFutureUpdates(NOSCRIPT_ID)
+// Force a one-time immediate update check for older 
installations
+if (settings.noscriptUpdated < 2) {
 context.components.addonUpdater.update(NOSCRIPT_ID)
-settings.noscriptUpdated = 1
+settings.noscriptUpdated = 2
 }
+}
 
-@SuppressWarnings("EmptyFunctionBlock")
-override fun onTorConnecting() {
-}
+@SuppressWarnings("EmptyFunctionBlock")
+override fun onTorConnecting() {
+}
 
-@SuppressWarnings("EmptyFunctionBlock")
-override fun onTorStopped() {
-}
+@SuppressWarnings("EmptyFunctionBlock")
+override fun onTorStopped() {
+}
 
-@SuppressWarnings("EmptyFunctionBlock")
-override fun onTorStatusUpdate(entry: String?, status: 
String?) {
-}
-})
-}
+@SuppressWarnings("EmptyFunctionBlock")
+override fun onTorStatusUpdate(entry: String?, status: String?) {
+}
+})
 }
 
 



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/firefox-android/-/commit/be02ec8601e43571da6c25a504f4633e54fd72e7

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/firefox-android/-/commit/be02ec8601e43571da6c25a504f4633e54fd72e7
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser-build][maint-13.0] Bug 41050: Improve disk leak sanitization on startup.

2023-12-19 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch maint-13.0 at The Tor Project / Applications / 
tor-browser-build


Commits:
8ebeb4d1 by hackademix at 2023-12-19T17:15:07+01:00
Bug 41050: Improve disk leak sanitization on startup.

- - - - -


1 changed file:

- projects/browser/RelativeLink/start-browser


Changes:

=
projects/browser/RelativeLink/start-browser
=
@@ -258,18 +258,32 @@ HOME="${PWD}"
 export HOME
 
 # Prevent disk leaks in $HOME/.local/share (tor-browser#17560)
+function erase_leaky() {
+   local leaky="$1"
+   [ -e "$leaky" ] &&
+   ( srm -r "$leaky" ||
+ wipe -r "$leaky" ||
+ find "$leaky" -type f -exec shred -u {} \; ;
+ rm -rf "$leaky"
+   ) > /dev/null 2>&1
+}
 local_dir="$HOME/.local/"
 share_dir="$local_dir/share"
-if [ -d "$share_dir" ]; then
-( srm -r "$share_dir" ||
-  wipe -r "$share_dir" ||
-  find "$share_dir" -type f -exec shred -u {} \; ;
-  rm -rf "$share_dir"
-) > /dev/null 2>&1
-else
-mkdir -p "$local_dir"
+# We don't want to mess with symlinks, possibly pointing outside the
+# Browser directory (tor-browser-build#41050).
+# We're not using realpath/readlink for consistency with the (possibly
+# outdated) availability assumptions made elsewhere in this script.
+if ! [ -L "$local_dir" -o -L "$share_dir" ]; then
+   if [ -d "$share_dir" ]; then
+   for leaky_path in "gvfs-metadata" "recently-used.xbel"; do
+   erase_leaky "$share_dir/$leaky_path"
+   done
+   else
+   mkdir -p "$local_dir"
+   fi
+   ln -fs /dev/null "$share_dir"
 fi
-ln -fs /dev/null "$share_dir"
+[ -L "$HOME/.cache" ] || erase_leaky "$HOME/.cache/nvidia"
 
 [% IF c("var/tor-browser") -%]
 SYSARCHITECTURE=$(getconf LONG_BIT)



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/commit/8ebeb4d1651dfbd73d96df293e115835ccf7de83

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/commit/8ebeb4d1651dfbd73d96df293e115835ccf7de83
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser-build][main] Bug 41050: Improve disk leak sanitization on startup.

2023-12-19 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch main at The Tor Project / Applications / tor-browser-build


Commits:
5a97ba07 by hackademix at 2023-12-19T10:22:07+01:00
Bug 41050: Improve disk leak sanitization on startup.

- - - - -


1 changed file:

- projects/browser/RelativeLink/start-browser


Changes:

=
projects/browser/RelativeLink/start-browser
=
@@ -258,18 +258,32 @@ HOME="${PWD}"
 export HOME
 
 # Prevent disk leaks in $HOME/.local/share (tor-browser#17560)
+function erase_leaky() {
+   local leaky="$1"
+   [ -e "$leaky" ] &&
+   ( srm -r "$leaky" ||
+ wipe -r "$leaky" ||
+ find "$leaky" -type f -exec shred -u {} \; ;
+ rm -rf "$leaky"
+   ) > /dev/null 2>&1
+}
 local_dir="$HOME/.local/"
 share_dir="$local_dir/share"
-if [ -d "$share_dir" ]; then
-( srm -r "$share_dir" ||
-  wipe -r "$share_dir" ||
-  find "$share_dir" -type f -exec shred -u {} \; ;
-  rm -rf "$share_dir"
-) > /dev/null 2>&1
-else
-mkdir -p "$local_dir"
+# We don't want to mess with symlinks, possibly pointing outside the
+# Browser directory (tor-browser-build#41050).
+# We're not using realpath/readlink for consistency with the (possibly
+# outdated) availability assumptions made elsewhere in this script.
+if ! [ -L "$local_dir" -o -L "$share_dir" ]; then
+   if [ -d "$share_dir" ]; then
+   for leaky_path in "gvfs-metadata" "recently-used.xbel"; do
+   erase_leaky "$share_dir/$leaky_path"
+   done
+   else
+   mkdir -p "$local_dir"
+   fi
+   ln -fs /dev/null "$share_dir"
 fi
-ln -fs /dev/null "$share_dir"
+[ -L "$HOME/.cache" ] || erase_leaky "$HOME/.cache/nvidia"
 
 [% IF c("var/tor-browser") -%]
 SYSARCHITECTURE=$(getconf LONG_BIT)



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/commit/5a97ba07148a176580dd536a65dc7ebba6565775

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/commit/5a97ba07148a176580dd536a65dc7ebba6565775
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/firefox-android] Pushed new tag firefox-android-115.2.1-13.5-1-build3

2023-12-14 Thread ma1 (@ma1) via tor-commits


ma1 pushed new tag firefox-android-115.2.1-13.5-1-build3 at The Tor Project / 
Applications / firefox-android

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/firefox-android/-/tree/firefox-android-115.2.1-13.5-1-build3
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/firefox-android] Pushed new tag firefox-android-115.2.1-13.0-1-build11

2023-12-14 Thread ma1 (@ma1) via tor-commits


ma1 pushed new tag firefox-android-115.2.1-13.0-1-build11 at The Tor Project / 
Applications / firefox-android

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/firefox-android/-/tree/firefox-android-115.2.1-13.0-1-build11
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/mullvad-browser] Pushed new branch mullvad-browser-115.6.0esr-13.0-1

2023-12-12 Thread ma1 (@ma1) via tor-commits


ma1 pushed new branch mullvad-browser-115.6.0esr-13.0-1 at The Tor Project / 
Applications / Mullvad Browser

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/tree/mullvad-browser-115.6.0esr-13.0-1
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser] Pushed new tag tor-browser-115.6.0esr-13.0-1-build1

2023-12-12 Thread ma1 (@ma1) via tor-commits


ma1 pushed new tag tor-browser-115.6.0esr-13.0-1-build1 at The Tor Project / 
Applications / Tor Browser

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/tree/tor-browser-115.6.0esr-13.0-1-build1
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser] Pushed new tag base-browser-115.6.0esr-13.0-1-build1

2023-12-12 Thread ma1 (@ma1) via tor-commits


ma1 pushed new tag base-browser-115.6.0esr-13.0-1-build1 at The Tor Project / 
Applications / Tor Browser

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/tree/base-browser-115.6.0esr-13.0-1-build1
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


  1   2   >