[tor-commits] [Git][tpo/applications/mullvad-browser] Pushed new tag mullvad-browser-115.5.0esr-13.0-1-build2

2023-11-20 Thread ma1 (@ma1) via tor-commits


ma1 pushed new tag mullvad-browser-115.5.0esr-13.0-1-build2 at The Tor Project 
/ Applications / Mullvad Browser

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/tree/mullvad-browser-115.5.0esr-13.0-1-build2
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser] Pushed new tag base-browser-115.5.0esr-13.0-1-build2

2023-11-20 Thread ma1 (@ma1) via tor-commits


ma1 pushed new tag base-browser-115.5.0esr-13.0-1-build2 at The Tor Project / 
Applications / Tor Browser

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/tree/base-browser-115.5.0esr-13.0-1-build2
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser] Pushed new tag tor-browser-115.5.0esr-13.0-1-build2

2023-11-20 Thread ma1 (@ma1) via tor-commits


ma1 pushed new tag tor-browser-115.5.0esr-13.0-1-build2 at The Tor Project / 
Applications / Tor Browser

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/tree/tor-browser-115.5.0esr-13.0-1-build2
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][base-browser-115.5.0esr-13.0-1] fixup! Firefox preference overrides.

2023-11-16 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch base-browser-115.5.0esr-13.0-1 at The Tor Project / 
Applications / Tor Browser


Commits:
030db1b1 by hackademix at 2023-11-16T16:14:56+01:00
fixup! Firefox preference overrides.

Bug 42277: Enable storage.sync to fix broken webextensions

- - - - -


1 changed file:

- browser/app/profile/001-base-profile.js


Changes:

=
browser/app/profile/001-base-profile.js
=
@@ -569,8 +569,6 @@ pref("extensions.abuseReport.enabled", false);
 // Therefore, do not allow download of additional language packs. They are not 
a
 // privacy/security threat, we are disabling them for UX reasons. See bug 
41377.
 pref("intl.multilingual.downloadEnabled", false);
-// Disk activity: Disable storage.sync (tor-browser#41424)
-pref("webextensions.storage.sync.enabled", false);
 
 // Enforce certificate pinning, see: https://bugs.torproject.org/16206
 pref("security.cert_pinning.enforcement_level", 2);



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/030db1b1f2801f92bed9fd68700674a14e03289f

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/030db1b1f2801f92bed9fd68700674a14e03289f
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/mullvad-browser][mullvad-browser-115.5.0esr-13.0-1] fixup! Firefox preference overrides.

2023-11-16 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch mullvad-browser-115.5.0esr-13.0-1 at The Tor Project / 
Applications / Mullvad Browser


Commits:
7ce3d34f by hackademix at 2023-11-16T16:13:36+01:00
fixup! Firefox preference overrides.

MB 250: Enable storage.sync to fix broken webextensions

- - - - -


1 changed file:

- browser/app/profile/001-base-profile.js


Changes:

=
browser/app/profile/001-base-profile.js
=
@@ -567,8 +567,6 @@ pref("extensions.abuseReport.enabled", false);
 // Therefore, do not allow download of additional language packs. They are not 
a
 // privacy/security threat, we are disabling them for UX reasons. See bug 
41377.
 pref("intl.multilingual.downloadEnabled", false);
-// Disk activity: Disable storage.sync (tor-browser#41424)
-pref("webextensions.storage.sync.enabled", false);
 
 // Enforce certificate pinning, see: https://bugs.torproject.org/16206
 pref("security.cert_pinning.enforcement_level", 2);



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/7ce3d34f3cac8d776c27a0331b2afb0be2872f70

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/7ce3d34f3cac8d776c27a0331b2afb0be2872f70
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][tor-browser-115.5.0esr-13.0-1] fixup! Firefox preference overrides.

2023-11-16 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch tor-browser-115.5.0esr-13.0-1 at The Tor Project / 
Applications / Tor Browser


Commits:
2c6df91f by hackademix at 2023-11-16T16:09:40+01:00
fixup! Firefox preference overrides.

Bug 42277: Enable storage.sync to fix broken webextensions

- - - - -


1 changed file:

- browser/app/profile/001-base-profile.js


Changes:

=
browser/app/profile/001-base-profile.js
=
@@ -569,8 +569,6 @@ pref("extensions.abuseReport.enabled", false);
 // Therefore, do not allow download of additional language packs. They are not 
a
 // privacy/security threat, we are disabling them for UX reasons. See bug 
41377.
 pref("intl.multilingual.downloadEnabled", false);
-// Disk activity: Disable storage.sync (tor-browser#41424)
-pref("webextensions.storage.sync.enabled", false);
 
 // Enforce certificate pinning, see: https://bugs.torproject.org/16206
 pref("security.cert_pinning.enforcement_level", 2);



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/2c6df91fe933bc263ef8dcba38c04b67da54cf9a

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/2c6df91fe933bc263ef8dcba38c04b67da54cf9a
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][tor-browser-115.4.0esr-13.5-1] fixup! Firefox preference overrides.

2023-11-14 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch tor-browser-115.4.0esr-13.5-1 at The Tor Project / 
Applications / Tor Browser


Commits:
b1ee157e by hackademix at 2023-11-14T16:49:30+01:00
fixup! Firefox preference overrides.

- - - - -


1 changed file:

- browser/app/profile/001-base-profile.js


Changes:

=
browser/app/profile/001-base-profile.js
=
@@ -568,8 +568,6 @@ pref("extensions.abuseReport.enabled", false);
 // Therefore, do not allow download of additional language packs. They are not 
a
 // privacy/security threat, we are disabling them for UX reasons. See bug 
41377.
 pref("intl.multilingual.downloadEnabled", false);
-// Disk activity: Disable storage.sync (tor-browser#41424)
-pref("webextensions.storage.sync.enabled", false);
 
 // Enforce certificate pinning, see: https://bugs.torproject.org/16206
 pref("security.cert_pinning.enforcement_level", 2);



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/b1ee157eca70da94a746750890a40ac8aedc3b5f

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/b1ee157eca70da94a746750890a40ac8aedc3b5f
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][base-browser-115.4.0esr-13.5-1] fixup! Firefox preference overrides.

2023-11-14 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch base-browser-115.4.0esr-13.5-1 at The Tor Project / 
Applications / Tor Browser


Commits:
d2547154 by hackademix at 2023-11-14T16:48:51+01:00
fixup! Firefox preference overrides.

- - - - -


1 changed file:

- browser/app/profile/001-base-profile.js


Changes:

=
browser/app/profile/001-base-profile.js
=
@@ -568,8 +568,6 @@ pref("extensions.abuseReport.enabled", false);
 // Therefore, do not allow download of additional language packs. They are not 
a
 // privacy/security threat, we are disabling them for UX reasons. See bug 
41377.
 pref("intl.multilingual.downloadEnabled", false);
-// Disk activity: Disable storage.sync (tor-browser#41424)
-pref("webextensions.storage.sync.enabled", false);
 
 // Enforce certificate pinning, see: https://bugs.torproject.org/16206
 pref("security.cert_pinning.enforcement_level", 2);



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/d25471547dc13074683a6c295326ed19ab4a239a

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/d25471547dc13074683a6c295326ed19ab4a239a
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/mullvad-browser][mullvad-browser-115.4.0esr-13.5-1] fixup! Firefox preference overrides.

2023-11-14 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch mullvad-browser-115.4.0esr-13.5-1 at The Tor Project / 
Applications / Mullvad Browser


Commits:
c4345c65 by hackademix at 2023-11-14T10:55:14+01:00
fixup! Firefox preference overrides.

- - - - -


1 changed file:

- browser/app/profile/001-base-profile.js


Changes:

=
browser/app/profile/001-base-profile.js
=
@@ -566,8 +566,6 @@ pref("extensions.abuseReport.enabled", false);
 // Therefore, do not allow download of additional language packs. They are not 
a
 // privacy/security threat, we are disabling them for UX reasons. See bug 
41377.
 pref("intl.multilingual.downloadEnabled", false);
-// Disk activity: Disable storage.sync (tor-browser#41424)
-pref("webextensions.storage.sync.enabled", false);
 
 // Enforce certificate pinning, see: https://bugs.torproject.org/16206
 pref("security.cert_pinning.enforcement_level", 2);



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/c4345c650900ab37d477640c37a90c3828e743ee

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/c4345c650900ab37d477640c37a90c3828e743ee
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser-build][main] Bug 17560: prevent disk leaks in $HOME/.local/share.

2023-11-14 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch main at The Tor Project / Applications / tor-browser-build


Commits:
0de02285 by hackademix at 2023-11-14T10:18:11+01:00
Bug 17560: prevent disk leaks in $HOME/.local/share.

- - - - -


2 changed files:

- projects/browser/RelativeLink/start-browser
- projects/browser/gtk3-settings.ini


Changes:

=
projects/browser/RelativeLink/start-browser
=
@@ -257,6 +257,20 @@ fi
 HOME="${PWD}"
 export HOME
 
+# Prevent disk leaks in $HOME/.local/share (tor-browser#17560)
+local_dir="$HOME/.local/"
+share_dir="$local_dir/share"
+if [ -d "$share_dir" ]; then
+( srm -r "$share_dir" ||
+  wipe -r "$share_dir" ||
+  find "$share_dir" -type f -exec shred -u {} \; ;
+  rm -rf "$share_dir"
+) > /dev/null 2>&1
+else
+mkdir -p "$local_dir"
+fi
+ln -fs /dev/null "$share_dir"
+
 [% IF c("var/tor-browser") -%]
 SYSARCHITECTURE=$(getconf LONG_BIT)
 TORARCHITECTURE=$(expr "$(file TorBrowser/Tor/tor)" : '.*ELF \([[:digit:]]*\)')


=
projects/browser/gtk3-settings.ini
=
@@ -1,2 +1,4 @@
 [Settings]
 gtk-primary-button-warps-slider = false
+gtk-recent-files-max-age=0
+gtk-recent-files-limit=0



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/commit/0de02285584259398c8c96688aacb4431897d7a8

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/commit/0de02285584259398c8c96688aacb4431897d7a8
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/mullvad-browser][mullvad-browser-115.4.0esr-13.0-1] Bug 42194: Fix blank net error page on failed DNS resolution with active proxy.

2023-11-08 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch mullvad-browser-115.4.0esr-13.0-1 at The Tor Project / 
Applications / Mullvad Browser


Commits:
23d4e4c4 by hackademix at 2023-11-08T13:45:19+01:00
Bug 42194: Fix blank net error page on failed DNS resolution with active proxy.

- - - - -


1 changed file:

- toolkit/actors/NetErrorChild.sys.mjs


Changes:

=
toolkit/actors/NetErrorChild.sys.mjs
=
@@ -133,12 +133,15 @@ export class NetErrorChild extends RemotePageChild {
 shortDesc.appendChild(span);
   },
 };
-
-Services.uriFixup.checkHost(
-  info.fixedURI,
-  onLookupCompleteListener,
-  this.document.nodePrincipal.originAttributes
-);
+try {
+  Services.uriFixup.checkHost(
+info.fixedURI,
+onLookupCompleteListener,
+this.document.nodePrincipal.originAttributes
+  );
+} catch (e) {
+  // DNS resolution may fail synchronously if forbidden by proxy
+}
   }
 
   // Get the header from the http response of the failed channel. This function



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/23d4e4c459c271d9f0d6346b897f006de68dd3e6

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/23d4e4c459c271d9f0d6346b897f006de68dd3e6
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][base-browser-115.4.0esr-13.0-1] Bug 42194: Fix blank net error page on failed DNS resolution with active proxy.

2023-11-08 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch base-browser-115.4.0esr-13.0-1 at The Tor Project / 
Applications / Tor Browser


Commits:
6f9292eb by hackademix at 2023-11-08T13:44:18+01:00
Bug 42194: Fix blank net error page on failed DNS resolution with active proxy.

- - - - -


1 changed file:

- toolkit/actors/NetErrorChild.sys.mjs


Changes:

=
toolkit/actors/NetErrorChild.sys.mjs
=
@@ -133,12 +133,15 @@ export class NetErrorChild extends RemotePageChild {
 shortDesc.appendChild(span);
   },
 };
-
-Services.uriFixup.checkHost(
-  info.fixedURI,
-  onLookupCompleteListener,
-  this.document.nodePrincipal.originAttributes
-);
+try {
+  Services.uriFixup.checkHost(
+info.fixedURI,
+onLookupCompleteListener,
+this.document.nodePrincipal.originAttributes
+  );
+} catch (e) {
+  // DNS resolution may fail synchronously if forbidden by proxy
+}
   }
 
   // Get the header from the http response of the failed channel. This function



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/6f9292eb84cc2ca0323a7c7cdf0fd4c4f8c21c04

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/6f9292eb84cc2ca0323a7c7cdf0fd4c4f8c21c04
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][tor-browser-115.4.0esr-13.0-1] Bug 42194: Fix blank net error page on failed DNS resolution with active proxy.

2023-11-08 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch tor-browser-115.4.0esr-13.0-1 at The Tor Project / 
Applications / Tor Browser


Commits:
20f764ba by hackademix at 2023-11-08T13:41:58+01:00
Bug 42194: Fix blank net error page on failed DNS resolution with active proxy.

- - - - -


1 changed file:

- toolkit/actors/NetErrorChild.sys.mjs


Changes:

=
toolkit/actors/NetErrorChild.sys.mjs
=
@@ -140,12 +140,15 @@ export class NetErrorChild extends RemotePageChild {
 shortDesc.appendChild(span);
   },
 };
-
-Services.uriFixup.checkHost(
-  info.fixedURI,
-  onLookupCompleteListener,
-  this.document.nodePrincipal.originAttributes
-);
+try {
+  Services.uriFixup.checkHost(
+info.fixedURI,
+onLookupCompleteListener,
+this.document.nodePrincipal.originAttributes
+  );
+} catch (e) {
+  // DNS resolution may fail synchronously if forbidden by proxy
+}
   }
 
   // Get the header from the http response of the failed channel. This function



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/20f764bab4814a0430c00b054815dccef0683bf3

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/20f764bab4814a0430c00b054815dccef0683bf3
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/mullvad-browser][mullvad-browser-115.4.0esr-13.5-1] Bug 42194: Fix blank net error page on failed DNS resolution with active proxy.

2023-11-07 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch mullvad-browser-115.4.0esr-13.5-1 at The Tor Project / 
Applications / Mullvad Browser


Commits:
5cb306c9 by hackademix at 2023-11-07T17:22:34+01:00
Bug 42194: Fix blank net error page on failed DNS resolution with active proxy.

- - - - -


1 changed file:

- toolkit/actors/NetErrorChild.sys.mjs


Changes:

=
toolkit/actors/NetErrorChild.sys.mjs
=
@@ -133,12 +133,15 @@ export class NetErrorChild extends RemotePageChild {
 shortDesc.appendChild(span);
   },
 };
-
-Services.uriFixup.checkHost(
-  info.fixedURI,
-  onLookupCompleteListener,
-  this.document.nodePrincipal.originAttributes
-);
+try {
+  Services.uriFixup.checkHost(
+info.fixedURI,
+onLookupCompleteListener,
+this.document.nodePrincipal.originAttributes
+  );
+} catch (e) {
+  // DNS resolution may fail synchronously if forbidden by proxy
+}
   }
 
   // Get the header from the http response of the failed channel. This function



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/5cb306c903900ad8dde25b57bae052927b95ded3

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/5cb306c903900ad8dde25b57bae052927b95ded3
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][base-browser-115.4.0esr-13.5-1] Bug 42194: Fix blank net error page on failed DNS resolution with active proxy.

2023-11-07 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch base-browser-115.4.0esr-13.5-1 at The Tor Project / 
Applications / Tor Browser


Commits:
c06034d3 by hackademix at 2023-11-07T17:19:49+01:00
Bug 42194: Fix blank net error page on failed DNS resolution with active proxy.

- - - - -


1 changed file:

- toolkit/actors/NetErrorChild.sys.mjs


Changes:

=
toolkit/actors/NetErrorChild.sys.mjs
=
@@ -133,12 +133,15 @@ export class NetErrorChild extends RemotePageChild {
 shortDesc.appendChild(span);
   },
 };
-
-Services.uriFixup.checkHost(
-  info.fixedURI,
-  onLookupCompleteListener,
-  this.document.nodePrincipal.originAttributes
-);
+try {
+  Services.uriFixup.checkHost(
+info.fixedURI,
+onLookupCompleteListener,
+this.document.nodePrincipal.originAttributes
+  );
+} catch (e) {
+  // DNS resolution may fail synchronously if forbidden by proxy
+}
   }
 
   // Get the header from the http response of the failed channel. This function



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/c06034d3b43a8cb1db0b155527901124924355e5

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/c06034d3b43a8cb1db0b155527901124924355e5
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][tor-browser-115.4.0esr-13.5-1] Bug 42194: Fix blank net error page on failed DNS resolution with active proxy.

2023-11-07 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch tor-browser-115.4.0esr-13.5-1 at The Tor Project / 
Applications / Tor Browser


Commits:
aa90395e by hackademix at 2023-11-07T12:56:55+01:00
Bug 42194: Fix blank net error page on failed DNS resolution with active proxy.

- - - - -


1 changed file:

- toolkit/actors/NetErrorChild.sys.mjs


Changes:

=
toolkit/actors/NetErrorChild.sys.mjs
=
@@ -140,12 +140,15 @@ export class NetErrorChild extends RemotePageChild {
 shortDesc.appendChild(span);
   },
 };
-
-Services.uriFixup.checkHost(
-  info.fixedURI,
-  onLookupCompleteListener,
-  this.document.nodePrincipal.originAttributes
-);
+try {
+  Services.uriFixup.checkHost(
+info.fixedURI,
+onLookupCompleteListener,
+this.document.nodePrincipal.originAttributes
+  );
+} catch (e) {
+  // DNS resolution may fail synchronously if forbidden by proxy
+}
   }
 
   // Get the header from the http response of the failed channel. This function



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/aa90395e3ee52897434d71254d0df48c1582befe

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/aa90395e3ee52897434d71254d0df48c1582befe
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][tor-browser-115.4.0esr-13.5-1] fixup! Bug 23247: Communicating security expectations for .onion

2023-11-06 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch tor-browser-115.4.0esr-13.5-1 at The Tor Project / 
Applications / Tor Browser


Commits:
8627f8e1 by cypherpunks1 at 2023-11-06T21:22:17+00:00
fixup! Bug 23247: Communicating security expectations for .onion

Bug 42231: Improve the network monitor patch for http onion resources

- - - - -


2 changed files:

- devtools/client/netmonitor/src/components/SecurityState.js
- devtools/shared/network-observer/NetworkHelper.sys.mjs


Changes:

=
devtools/client/netmonitor/src/components/SecurityState.js
=
@@ -41,7 +41,7 @@ class SecurityState extends Component {
 
 const {
   securityState,
-  urlDetails: { isLocal },
+  urlDetails: { host, isLocal },
 } = item;
 const iconClassList = ["requests-security-state-icon"];
 
@@ -50,7 +50,11 @@ class SecurityState extends Component {
 
 // Locally delivered files such as http://localhost and file:// paths
 // are considered to have been delivered securely.
-if (isLocal) {
+if (
+  isLocal ||
+  (host?.endsWith(".onion") &&
+Services.prefs.getBoolPref("dom.securecontext.allowlist_onions", 
false))
+) {
   realSecurityState = "secure";
 }
 


=
devtools/shared/network-observer/NetworkHelper.sys.mjs
=
@@ -596,9 +596,6 @@ export var NetworkHelper = {
 
 // The request did not contain any security info.
 if (!securityInfo) {
-  if (httpActivity.hostname && httpActivity.hostname.endsWith(".onion")) {
-info.state = "secure";
-  }
   return info;
 }
 
@@ -650,11 +647,7 @@ export var NetworkHelper = {
 // schemes other than https and wss are subject to
 // downgrade/etc at the scheme level and should always be
 // considered insecure
-if (httpActivity.hostname && httpActivity.hostname.endsWith(".onion")) 
{
-  info.state = "secure";
-} else {
-  info.state = "insecure";
-}
+info.state = "insecure";
   } else if (state & wpl.STATE_IS_SECURE) {
 // The connection is secure if the scheme is sufficient
 info.state = "secure";



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/8627f8e1f78a8fc2ce2ba12b3b5314c020f7ca8f

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/8627f8e1f78a8fc2ce2ba12b3b5314c020f7ca8f
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/mullvad-browser] Pushed new tag mullvad-browser-115.4.0esr-13.0-1-build2

2023-10-23 Thread ma1 (@ma1) via tor-commits


ma1 pushed new tag mullvad-browser-115.4.0esr-13.0-1-build2 at The Tor Project 
/ Applications / Mullvad Browser

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/tree/mullvad-browser-115.4.0esr-13.0-1-build2
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser] Pushed new tag base-browser-115.4.0esr-13.0-1-build2

2023-10-23 Thread ma1 (@ma1) via tor-commits


ma1 pushed new tag base-browser-115.4.0esr-13.0-1-build2 at The Tor Project / 
Applications / Tor Browser

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/tree/base-browser-115.4.0esr-13.0-1-build2
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser] Pushed new tag tor-browser-115.4.0esr-13.0-1-build2

2023-10-23 Thread ma1 (@ma1) via tor-commits


ma1 pushed new tag tor-browser-115.4.0esr-13.0-1-build2 at The Tor Project / 
Applications / Tor Browser

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/tree/tor-browser-115.4.0esr-13.0-1-build2
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/mullvad-browser][mullvad-browser-115.4.0esr-13.0-1] fixup! Bug 40926: Implemented the New Identity feature

2023-10-20 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch mullvad-browser-115.4.0esr-13.0-1 at The Tor Project / 
Applications / Mullvad Browser


Commits:
7898b29a by hackademix at 2023-10-20T15:46:41+02:00
fixup! Bug 40926: Implemented the New Identity feature

Bug 42182: avoid reloading any search engine extension.

- - - - -


1 changed file:

- browser/components/newidentity/content/newidentity.js


Changes:

=
browser/components/newidentity/content/newidentity.js
=
@@ -415,10 +415,13 @@ XPCOMUtils.defineLazyGetter(this, "NewIdentityButton", () 
=> {
 async reloadAddons() {
   logger.info("Reloading add-ons to clear their temporary state.");
   // Reload all active extensions except search engines, which would throw.
-  const addons = (
-await AddonManager.getAddonsByTypes(["extension"])
-  ).filter(a => a.isActive && !a.id.endsWith("@search.mozilla.org"));
-  await Promise.all(addons.map(a => a.reload()));
+  const addons = await AddonManager.getAddonsByTypes(["extension"]);
+  const isSearchEngine = async addon =>
+(await (await 
fetch(addon.getResourceURI("manifest.json").spec)).json())
+  ?.chrome_settings_overrides?.search_provider;
+  const reloadIfNeeded = async addon =>
+addon.isActive && !(await isSearchEngine(addon)) && addon.reload();
+  await Promise.all(addons.map(addon => reloadIfNeeded(addon)));
 }
 
 // Broadcast as a hook to clear other data



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/7898b29ae230f55339ce4db8d2e4b60585fc6c3e

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/7898b29ae230f55339ce4db8d2e4b60585fc6c3e
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][base-browser-115.4.0esr-13.0-1] fixup! Bug 40926: Implemented the New Identity feature

2023-10-20 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch base-browser-115.4.0esr-13.0-1 at The Tor Project / 
Applications / Tor Browser


Commits:
a78a919d by hackademix at 2023-10-20T15:45:50+02:00
fixup! Bug 40926: Implemented the New Identity feature

Bug 42182: avoid reloading any search engine extension.

- - - - -


1 changed file:

- browser/components/newidentity/content/newidentity.js


Changes:

=
browser/components/newidentity/content/newidentity.js
=
@@ -415,10 +415,13 @@ XPCOMUtils.defineLazyGetter(this, "NewIdentityButton", () 
=> {
 async reloadAddons() {
   logger.info("Reloading add-ons to clear their temporary state.");
   // Reload all active extensions except search engines, which would throw.
-  const addons = (
-await AddonManager.getAddonsByTypes(["extension"])
-  ).filter(a => a.isActive && !a.id.endsWith("@search.mozilla.org"));
-  await Promise.all(addons.map(a => a.reload()));
+  const addons = await AddonManager.getAddonsByTypes(["extension"]);
+  const isSearchEngine = async addon =>
+(await (await 
fetch(addon.getResourceURI("manifest.json").spec)).json())
+  ?.chrome_settings_overrides?.search_provider;
+  const reloadIfNeeded = async addon =>
+addon.isActive && !(await isSearchEngine(addon)) && addon.reload();
+  await Promise.all(addons.map(addon => reloadIfNeeded(addon)));
 }
 
 // Broadcast as a hook to clear other data



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/a78a919d4618cdcebb306d3c4b705f6d23d35081

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/a78a919d4618cdcebb306d3c4b705f6d23d35081
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][tor-browser-115.4.0esr-13.0-1] fixup! Bug 40926: Implemented the New Identity feature

2023-10-20 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch tor-browser-115.4.0esr-13.0-1 at The Tor Project / 
Applications / Tor Browser


Commits:
46614757 by hackademix at 2023-10-20T15:38:29+02:00
fixup! Bug 40926: Implemented the New Identity feature

Bug 42182: avoid reloading any search engine extension.

- - - - -


1 changed file:

- browser/components/newidentity/content/newidentity.js


Changes:

=
browser/components/newidentity/content/newidentity.js
=
@@ -415,10 +415,13 @@ XPCOMUtils.defineLazyGetter(this, "NewIdentityButton", () 
=> {
 async reloadAddons() {
   logger.info("Reloading add-ons to clear their temporary state.");
   // Reload all active extensions except search engines, which would throw.
-  const addons = (
-await AddonManager.getAddonsByTypes(["extension"])
-  ).filter(a => a.isActive && !a.id.endsWith("@search.mozilla.org"));
-  await Promise.all(addons.map(a => a.reload()));
+  const addons = await AddonManager.getAddonsByTypes(["extension"]);
+  const isSearchEngine = async addon =>
+(await (await 
fetch(addon.getResourceURI("manifest.json").spec)).json())
+  ?.chrome_settings_overrides?.search_provider;
+  const reloadIfNeeded = async addon =>
+addon.isActive && !(await isSearchEngine(addon)) && addon.reload();
+  await Promise.all(addons.map(addon => reloadIfNeeded(addon)));
 }
 
 // Broadcast as a hook to clear other data



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/4661475756853c06739402c3ceca53482c89bcad

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/4661475756853c06739402c3ceca53482c89bcad
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/mullvad-browser][mullvad-browser-115.3.1esr-13.0-1] fixup! Bug 32308: use direct browser sizing for letterboxing. Bug 30556: align...

2023-10-09 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch mullvad-browser-115.3.1esr-13.0-1 at The Tor Project / 
Applications / Mullvad Browser


Commits:
453cd063 by hackademix at 2023-10-09T20:49:46+02:00
fixup! Bug 32308: use direct browser sizing for letterboxing. Bug 30556: align 
letterboxing with 200x100 new win width stepping

Bug 41259: Do not interfere with devtools responsive mode sizing.

- - - - -


2 changed files:

- browser/base/content/browser.css
- toolkit/components/resistfingerprinting/RFPHelper.sys.mjs


Changes:

=
browser/base/content/browser.css
=
@@ -140,7 +140,7 @@ body {
   Never modify the following selector without synchronizing
   LETTERBOX_CSS_SELECTOR in RFPHelper.jsm!
 **/
-.letterboxing .browserStack:not(.exclude-letterboxing) > browser {
+.letterboxing .browserContainer:not(.responsive-mode) > 
.browserStack:not(.exclude-letterboxing) > browser {
   /* width & height to be dynamically set by RFPHelper.jsm */
   outline: 1px solid var(--chrome-content-separator-color);
 }
@@ -149,7 +149,7 @@ body {
   outline: initial;
 }
 
-:root:not([inDOMFullscreen]) .letterboxing.letterboxing-ready 
.browserStack:not(.exclude-letterboxing) {
+:root:not([inDOMFullscreen]) .letterboxing.letterboxing-ready 
.browserContainer:not(.responsive-mode) > 
.browserStack:not(.exclude-letterboxing) {
   place-content: start center;
 }
 


=
toolkit/components/resistfingerprinting/RFPHelper.sys.mjs
=
@@ -437,7 +437,7 @@ class _RFPHelper {
   // preemptively in order to beat race conditions on tab/window creation
   const LETTERBOX_CSS_URL = "chrome://browser/content/browser.css";
   const LETTERBOX_CSS_SELECTOR =
-".letterboxing .browserStack:not(.exclude-letterboxing) > browser";
+".letterboxing .browserContainer:not(.responsive-mode) > 
.browserStack:not(.exclude-letterboxing) > browser";
   for (let ss of document.styleSheets) {
 if (ss.href !== LETTERBOX_CSS_URL) {
   continue;
@@ -557,8 +557,8 @@ class _RFPHelper {
 
 const roundDimensions = (aWidth, aHeight) => {
   const r = (aWidth, aHeight) => ({
-width: `${aWidth}px`,
-height: `${aHeight}px`,
+width: `var(--rdm-width, ${aWidth}px)`,
+height: `var(--rdm-height, ${aHeight}px)`,
   });
 
   let result;



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/453cd0631e0db4c0bbdd511752e3657e031f98cd

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/453cd0631e0db4c0bbdd511752e3657e031f98cd
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][base-browser-115.3.1esr-13.0-1] fixup! Bug 32308: use direct browser sizing for letterboxing. Bug 30556: align...

2023-10-09 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch base-browser-115.3.1esr-13.0-1 at The Tor Project / 
Applications / Tor Browser


Commits:
4ff109fa by hackademix at 2023-10-09T20:47:34+02:00
fixup! Bug 32308: use direct browser sizing for letterboxing. Bug 30556: align 
letterboxing with 200x100 new win width stepping

Bug 41259: Do not interfere with devtools responsive mode sizing.

- - - - -


2 changed files:

- browser/base/content/browser.css
- toolkit/components/resistfingerprinting/RFPHelper.sys.mjs


Changes:

=
browser/base/content/browser.css
=
@@ -140,7 +140,7 @@ body {
   Never modify the following selector without synchronizing
   LETTERBOX_CSS_SELECTOR in RFPHelper.jsm!
 **/
-.letterboxing .browserStack:not(.exclude-letterboxing) > browser {
+.letterboxing .browserContainer:not(.responsive-mode) > 
.browserStack:not(.exclude-letterboxing) > browser {
   /* width & height to be dynamically set by RFPHelper.jsm */
   outline: 1px solid var(--chrome-content-separator-color);
 }
@@ -149,7 +149,7 @@ body {
   outline: initial;
 }
 
-:root:not([inDOMFullscreen]) .letterboxing.letterboxing-ready 
.browserStack:not(.exclude-letterboxing) {
+:root:not([inDOMFullscreen]) .letterboxing.letterboxing-ready 
.browserContainer:not(.responsive-mode) > 
.browserStack:not(.exclude-letterboxing) {
   place-content: start center;
 }
 


=
toolkit/components/resistfingerprinting/RFPHelper.sys.mjs
=
@@ -437,7 +437,7 @@ class _RFPHelper {
   // preemptively in order to beat race conditions on tab/window creation
   const LETTERBOX_CSS_URL = "chrome://browser/content/browser.css";
   const LETTERBOX_CSS_SELECTOR =
-".letterboxing .browserStack:not(.exclude-letterboxing) > browser";
+".letterboxing .browserContainer:not(.responsive-mode) > 
.browserStack:not(.exclude-letterboxing) > browser";
   for (let ss of document.styleSheets) {
 if (ss.href !== LETTERBOX_CSS_URL) {
   continue;
@@ -557,8 +557,8 @@ class _RFPHelper {
 
 const roundDimensions = (aWidth, aHeight) => {
   const r = (aWidth, aHeight) => ({
-width: `${aWidth}px`,
-height: `${aHeight}px`,
+width: `var(--rdm-width, ${aWidth}px)`,
+height: `var(--rdm-height, ${aHeight}px)`,
   });
 
   let result;



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/4ff109faf88bd2e22d800fb719a36e1327f3301b

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/4ff109faf88bd2e22d800fb719a36e1327f3301b
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][tor-browser-115.3.1esr-13.0-1] fixup! Bug 32308: use direct browser sizing for letterboxing. Bug 30556: align...

2023-10-09 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch tor-browser-115.3.1esr-13.0-1 at The Tor Project / 
Applications / Tor Browser


Commits:
10f40c2f by hackademix at 2023-10-09T19:54:52+02:00
fixup! Bug 32308: use direct browser sizing for letterboxing. Bug 30556: align 
letterboxing with 200x100 new win width stepping

Bug 41259: Do not interfere with devtools responsive mode sizing.

- - - - -


2 changed files:

- browser/base/content/browser.css
- toolkit/components/resistfingerprinting/RFPHelper.sys.mjs


Changes:

=
browser/base/content/browser.css
=
@@ -140,7 +140,7 @@ body {
   Never modify the following selector without synchronizing
   LETTERBOX_CSS_SELECTOR in RFPHelper.jsm!
 **/
-.letterboxing .browserStack:not(.exclude-letterboxing) > browser {
+.letterboxing .browserContainer:not(.responsive-mode) > 
.browserStack:not(.exclude-letterboxing) > browser {
   /* width & height to be dynamically set by RFPHelper.jsm */
   outline: 1px solid var(--chrome-content-separator-color);
 }
@@ -149,7 +149,7 @@ body {
   outline: initial;
 }
 
-:root:not([inDOMFullscreen]) .letterboxing.letterboxing-ready 
.browserStack:not(.exclude-letterboxing) {
+:root:not([inDOMFullscreen]) .letterboxing.letterboxing-ready 
.browserContainer:not(.responsive-mode) > 
.browserStack:not(.exclude-letterboxing) {
   place-content: start center;
 }
 


=
toolkit/components/resistfingerprinting/RFPHelper.sys.mjs
=
@@ -437,7 +437,7 @@ class _RFPHelper {
   // preemptively in order to beat race conditions on tab/window creation
   const LETTERBOX_CSS_URL = "chrome://browser/content/browser.css";
   const LETTERBOX_CSS_SELECTOR =
-".letterboxing .browserStack:not(.exclude-letterboxing) > browser";
+".letterboxing .browserContainer:not(.responsive-mode) > 
.browserStack:not(.exclude-letterboxing) > browser";
   for (let ss of document.styleSheets) {
 if (ss.href !== LETTERBOX_CSS_URL) {
   continue;
@@ -557,8 +557,8 @@ class _RFPHelper {
 
 const roundDimensions = (aWidth, aHeight) => {
   const r = (aWidth, aHeight) => ({
-width: `${aWidth}px`,
-height: `${aHeight}px`,
+width: `var(--rdm-width, ${aWidth}px)`,
+height: `var(--rdm-height, ${aHeight}px)`,
   });
 
   let result;



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/10f40c2f2ceb7f2a4eb82c8540d5e01b99be9220

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/10f40c2f2ceb7f2a4eb82c8540d5e01b99be9220
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/mullvad-browser][mullvad-browser-115.3.1esr-13.0-1] fixup! Bug 40926: Implemented the New Identity feature

2023-10-05 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch mullvad-browser-115.3.1esr-13.0-1 at The Tor Project / 
Applications / Mullvad Browser


Commits:
56b44ebf by hackademix at 2023-10-05T19:06:10+02:00
fixup! Bug 40926: Implemented the New Identity feature

Bug 41765: Force about:privatebrowsing in new identity window.

- - - - -


2 changed files:

- browser/base/content/browser.js
- browser/components/newidentity/content/newidentity.js


Changes:

=
browser/base/content/browser.js
=
@@ -4523,7 +4523,7 @@ function OpenBrowserWindow(options) {
   var extraFeatures = "";
   if (options && options.private && PrivateBrowsingUtils.enabled) {
 extraFeatures = ",private";
-if (!PrivateBrowsingUtils.permanentPrivateBrowsing) {
+if (!PrivateBrowsingUtils.permanentPrivateBrowsing || options.private === 
"no-home") {
   // Force the new window to load about:privatebrowsing instead of the 
default home page
   defaultArgs = "about:privatebrowsing";
 }


=
browser/components/newidentity/content/newidentity.js
=
@@ -433,11 +433,8 @@ XPCOMUtils.defineLazyGetter(this, "NewIdentityButton", () 
=> {
 openNewWindow() {
   logger.info("Opening a new window");
   return new Promise(resolve => {
-// Open a new window with the default homepage
-// We could pass {private: true} but we do not because we enforce
-// browser.privatebrowsing.autostart = true.
-// What about users that change settings?
-const win = OpenBrowserWindow();
+// Open a new window forcing the about:privatebrowsing page 
(tor-browser#41765)
+const win = OpenBrowserWindow({private: "no-home"});
 // This mechanism to know when the new window is ready is used by
 // OpenBrowserWindow itself (see its definition in browser.js).
 win.addEventListener("MozAfterPaint", () => resolve(), { once: true });



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/56b44ebf7798edac17111bf6cef1e48c53393125

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/56b44ebf7798edac17111bf6cef1e48c53393125
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][base-browser-115.3.1esr-13.0-1] fixup! Bug 40926: Implemented the New Identity feature

2023-10-05 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch base-browser-115.3.1esr-13.0-1 at The Tor Project / 
Applications / Tor Browser


Commits:
b5574131 by hackademix at 2023-10-05T19:03:10+02:00
fixup! Bug 40926: Implemented the New Identity feature

Bug 41765: Force about:privatebrowsing in new identity window.

- - - - -


2 changed files:

- browser/base/content/browser.js
- browser/components/newidentity/content/newidentity.js


Changes:

=
browser/base/content/browser.js
=
@@ -4521,7 +4521,7 @@ function OpenBrowserWindow(options) {
   var extraFeatures = "";
   if (options && options.private && PrivateBrowsingUtils.enabled) {
 extraFeatures = ",private";
-if (!PrivateBrowsingUtils.permanentPrivateBrowsing) {
+if (!PrivateBrowsingUtils.permanentPrivateBrowsing || options.private === 
"no-home") {
   // Force the new window to load about:privatebrowsing instead of the 
default home page
   defaultArgs = "about:privatebrowsing";
 }


=
browser/components/newidentity/content/newidentity.js
=
@@ -433,11 +433,8 @@ XPCOMUtils.defineLazyGetter(this, "NewIdentityButton", () 
=> {
 openNewWindow() {
   logger.info("Opening a new window");
   return new Promise(resolve => {
-// Open a new window with the default homepage
-// We could pass {private: true} but we do not because we enforce
-// browser.privatebrowsing.autostart = true.
-// What about users that change settings?
-const win = OpenBrowserWindow();
+// Open a new window forcing the about:privatebrowsing page 
(tor-browser#41765)
+const win = OpenBrowserWindow({private: "no-home"});
 // This mechanism to know when the new window is ready is used by
 // OpenBrowserWindow itself (see its definition in browser.js).
 win.addEventListener("MozAfterPaint", () => resolve(), { once: true });



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/b55741315122b13231ad5de610230859b9c83cf9

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/b55741315122b13231ad5de610230859b9c83cf9
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][tor-browser-115.3.1esr-13.0-1] fixup! Bug 40926: Implemented the New Identity feature

2023-10-05 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch tor-browser-115.3.1esr-13.0-1 at The Tor Project / 
Applications / Tor Browser


Commits:
c62d3405 by hackademix at 2023-10-05T17:34:00+02:00
fixup! Bug 40926: Implemented the New Identity feature

Bug 41765: Force about:privatebrowsing in new identity window.

- - - - -


2 changed files:

- browser/base/content/browser.js
- browser/components/newidentity/content/newidentity.js


Changes:

=
browser/base/content/browser.js
=
@@ -4585,7 +4585,7 @@ function OpenBrowserWindow(options) {
   var extraFeatures = "";
   if (options && options.private && PrivateBrowsingUtils.enabled) {
 extraFeatures = ",private";
-if (!PrivateBrowsingUtils.permanentPrivateBrowsing) {
+if (!PrivateBrowsingUtils.permanentPrivateBrowsing || options.private === 
"no-home") {
   // Force the new window to load about:privatebrowsing instead of the 
default home page
   defaultArgs = "about:privatebrowsing";
 }


=
browser/components/newidentity/content/newidentity.js
=
@@ -433,11 +433,8 @@ XPCOMUtils.defineLazyGetter(this, "NewIdentityButton", () 
=> {
 openNewWindow() {
   logger.info("Opening a new window");
   return new Promise(resolve => {
-// Open a new window with the default homepage
-// We could pass {private: true} but we do not because we enforce
-// browser.privatebrowsing.autostart = true.
-// What about users that change settings?
-const win = OpenBrowserWindow();
+// Open a new window forcing the about:privatebrowsing page 
(tor-browser#41765)
+const win = OpenBrowserWindow({private: "no-home"});
 // This mechanism to know when the new window is ready is used by
 // OpenBrowserWindow itself (see its definition in browser.js).
 win.addEventListener("MozAfterPaint", () => resolve(), { once: true });



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/c62d3405d1e74d7d069b720af5bacd4c43415d8c

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/c62d3405d1e74d7d069b720af5bacd4c43415d8c
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][base-browser-115.3.0esr-13.0-1] fixup! Firefox preference overrides.

2023-09-20 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch base-browser-115.3.0esr-13.0-1 at The Tor Project / 
Applications / Tor Browser


Commits:
1c325548 by hackademix at 2023-09-20T19:24:35+02:00
fixup! Firefox preference overrides.

Bug 41945: disable cookie banner automatic dismissal.

- - - - -


1 changed file:

- browser/app/profile/001-base-profile.js


Changes:

=
browser/app/profile/001-base-profile.js
=
@@ -203,6 +203,12 @@ pref("browser.newtabpage.activity-stream.default.sites", 
"");
 pref("browser.newtabpage.activity-stream.feeds.telemetry", false);
 pref("browser.newtabpage.activity-stream.telemetry", false);
 
+// tor-browser#41945 - disable automatic cookie banners dismissal until
+// we're sure it does not causes fingerprinting risks or other issues.
+pref("cookiebanners.service.mode", 0);
+pref("cookiebanners.service.mode.privateBrowsing", 0);
+pref("cookiebanners.ui.desktop.enabled", false);
+
 // tor-browser#40788: disable AS's calls to home.
 // Notice that null is between quotes because it is a JSON string.
 // Keep checked firefox.js to see if new entries are added.



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/1c325548139b586cf097be3b72a5445d67945b3f

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/1c325548139b586cf097be3b72a5445d67945b3f
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][tor-browser-115.3.0esr-13.0-1] fixup! Firefox preference overrides.

2023-09-20 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch tor-browser-115.3.0esr-13.0-1 at The Tor Project / 
Applications / Tor Browser


Commits:
37ddf133 by hackademix at 2023-09-20T17:19:01+00:00
fixup! Firefox preference overrides.

Bug 41945: disable cookie banner automatic dismissal.

- - - - -


1 changed file:

- browser/app/profile/001-base-profile.js


Changes:

=
browser/app/profile/001-base-profile.js
=
@@ -203,6 +203,12 @@ pref("browser.newtabpage.activity-stream.default.sites", 
"");
 pref("browser.newtabpage.activity-stream.feeds.telemetry", false);
 pref("browser.newtabpage.activity-stream.telemetry", false);
 
+// tor-browser#41945 - disable automatic cookie banners dismissal until
+// we're sure it does not causes fingerprinting risks or other issues.
+pref("cookiebanners.service.mode", 0);
+pref("cookiebanners.service.mode.privateBrowsing", 0);
+pref("cookiebanners.ui.desktop.enabled", false);
+
 // tor-browser#40788: disable AS's calls to home.
 // Notice that null is between quotes because it is a JSON string.
 // Keep checked firefox.js to see if new entries are added.



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/37ddf1330f0dfce7473a7077434add6ff4b0db12

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/37ddf1330f0dfce7473a7077434add6ff4b0db12
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][base-browser-115.2.0esr-13.0-1] Bug 42084: Ensure English spoofing works even if preferences are set out of order.

2023-09-12 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch base-browser-115.2.0esr-13.0-1 at The Tor Project / 
Applications / Tor Browser


Commits:
44ffc800 by hackademix at 2023-09-12T11:56:26+02:00
Bug 42084: Ensure English spoofing works even if preferences are set out of 
order.

- - - - -


1 changed file:

- toolkit/components/resistfingerprinting/RFPHelper.sys.mjs


Changes:

=
toolkit/components/resistfingerprinting/RFPHelper.sys.mjs
=
@@ -158,6 +158,9 @@ class _RFPHelper {
 // Add RFP and Letterboxing observers if prefs are enabled
 this._handleResistFingerprintingChanged();
 this._handleLetterboxingPrefChanged();
+
+// Synchronize language preferences if accidentally messed up 
(tor-browser#42084)
+this._handleSpoofEnglishChanged();
   }
 
   uninit() {
@@ -211,6 +214,7 @@ class _RFPHelper {
 this._handleResistFingerprintingChanged();
 break;
   case kPrefSpoofEnglish:
+  case "intl.accept_languages":
 this._handleSpoofEnglishChanged();
 break;
   case kPrefLetterboxing:
@@ -259,6 +263,7 @@ class _RFPHelper {
   }
 
   _handleSpoofEnglishChanged() {
+Services.prefs.removeObserver("intl.accept_languages", this);
 switch (Services.prefs.getIntPref(kPrefSpoofEnglish)) {
   case 0: // will prompt
   // This should only happen when turning privacy.resistFingerprinting off.
@@ -277,6 +282,8 @@ class _RFPHelper {
   case 2: // spoof
 Services.prefs.setCharPref("intl.accept_languages", "en-US, en");
 Services.prefs.setBoolPref("javascript.use_us_english_locale", true);
+// Ensure spoofing works if preferences are set out of order
+Services.prefs.addObserver("intl.accept_languages", this);
 break;
   default:
 break;



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/44ffc800c98607bf7652b1e56f765e925b47f9dd

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/44ffc800c98607bf7652b1e56f765e925b47f9dd
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][base-browser-102.15.0esr-12.5-1] Bug 42084: Ensure spoofing works even if preferences are set out of order.

2023-09-12 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch base-browser-102.15.0esr-12.5-1 at The Tor Project / 
Applications / Tor Browser


Commits:
60d54c03 by hackademix at 2023-09-12T11:15:40+02:00
Bug 42084: Ensure spoofing works even if preferences are set out of order.

- - - - -


1 changed file:

- toolkit/components/resistfingerprinting/RFPHelper.jsm


Changes:

=
toolkit/components/resistfingerprinting/RFPHelper.jsm
=
@@ -163,6 +163,9 @@ class _RFPHelper {
 // Add RFP and Letterboxing observers if prefs are enabled
 this._handleResistFingerprintingChanged();
 this._handleLetterboxingPrefChanged();
+
+// Synchronize language preferences if accidentally messed up 
(tor-browser#42084)
+this._handleSpoofEnglishChanged();
   }
 
   uninit() {
@@ -216,6 +219,7 @@ class _RFPHelper {
 this._handleResistFingerprintingChanged();
 break;
   case kPrefSpoofEnglish:
+  case "intl.accept_languages":
 this._handleSpoofEnglishChanged();
 break;
   case kPrefLetterboxing:
@@ -264,6 +268,7 @@ class _RFPHelper {
   }
 
   _handleSpoofEnglishChanged() {
+Services.prefs.removeObserver("intl.accept_languages", this);
 switch (Services.prefs.getIntPref(kPrefSpoofEnglish)) {
   case 0: // will prompt
   // This should only happen when turning privacy.resistFingerprinting off.
@@ -282,6 +287,8 @@ class _RFPHelper {
   case 2: // spoof
 Services.prefs.setCharPref("intl.accept_languages", "en-US, en");
 Services.prefs.setBoolPref("javascript.use_us_english_locale", true);
+// Ensure spoofing works if preferences are set out of order
+Services.prefs.addObserver("intl.accept_languages", this);
 break;
   default:
 break;



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/60d54c0397f07788859617643d26c9f7db8d05c2

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/60d54c0397f07788859617643d26c9f7db8d05c2
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][tor-browser-102.15.0esr-12.5-1] Bug 42084: Ensure spoofing works even if preferences are set out of order.

2023-09-12 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch tor-browser-102.15.0esr-12.5-1 at The Tor Project / 
Applications / Tor Browser


Commits:
6f9146d0 by hackademix at 2023-09-12T11:11:13+02:00
Bug 42084: Ensure spoofing works even if preferences are set out of order.

- - - - -


1 changed file:

- toolkit/components/resistfingerprinting/RFPHelper.jsm


Changes:

=
toolkit/components/resistfingerprinting/RFPHelper.jsm
=
@@ -163,6 +163,9 @@ class _RFPHelper {
 // Add RFP and Letterboxing observers if prefs are enabled
 this._handleResistFingerprintingChanged();
 this._handleLetterboxingPrefChanged();
+
+// Synchronize language preferences if accidentally messed up 
(tor-browser#42084)
+this._handleSpoofEnglishChanged();
   }
 
   uninit() {
@@ -216,6 +219,7 @@ class _RFPHelper {
 this._handleResistFingerprintingChanged();
 break;
   case kPrefSpoofEnglish:
+  case "intl.accept_languages":
 this._handleSpoofEnglishChanged();
 break;
   case kPrefLetterboxing:
@@ -264,6 +268,7 @@ class _RFPHelper {
   }
 
   _handleSpoofEnglishChanged() {
+Services.prefs.removeObserver("intl.accept_languages", this);
 switch (Services.prefs.getIntPref(kPrefSpoofEnglish)) {
   case 0: // will prompt
   // This should only happen when turning privacy.resistFingerprinting off.
@@ -282,6 +287,8 @@ class _RFPHelper {
   case 2: // spoof
 Services.prefs.setCharPref("intl.accept_languages", "en-US, en");
 Services.prefs.setBoolPref("javascript.use_us_english_locale", true);
+// Ensure spoofing works if preferences are set out of order
+Services.prefs.addObserver("intl.accept_languages", this);
 break;
   default:
 break;



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/6f9146d08cd9a15845cf3444a8a691c06a4e1fe7

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/6f9146d08cd9a15845cf3444a8a691c06a4e1fe7
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][tor-browser-115.2.0esr-13.0-1] Bug 42084: Ensure spoofing works even if preferences are set out of order.

2023-09-12 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch tor-browser-115.2.0esr-13.0-1 at The Tor Project / 
Applications / Tor Browser


Commits:
8cff1681 by hackademix at 2023-09-12T10:37:14+02:00
Bug 42084: Ensure spoofing works even if preferences are set out of order.

- - - - -


1 changed file:

- toolkit/components/resistfingerprinting/RFPHelper.sys.mjs


Changes:

=
toolkit/components/resistfingerprinting/RFPHelper.sys.mjs
=
@@ -158,6 +158,9 @@ class _RFPHelper {
 // Add RFP and Letterboxing observers if prefs are enabled
 this._handleResistFingerprintingChanged();
 this._handleLetterboxingPrefChanged();
+
+// Synchronize language preferences if accidentally messed up 
(tor-browser#42084)
+this._handleSpoofEnglishChanged();
   }
 
   uninit() {
@@ -211,6 +214,7 @@ class _RFPHelper {
 this._handleResistFingerprintingChanged();
 break;
   case kPrefSpoofEnglish:
+  case "intl.accept_languages":
 this._handleSpoofEnglishChanged();
 break;
   case kPrefLetterboxing:
@@ -259,6 +263,7 @@ class _RFPHelper {
   }
 
   _handleSpoofEnglishChanged() {
+Services.prefs.removeObserver("intl.accept_languages", this);
 switch (Services.prefs.getIntPref(kPrefSpoofEnglish)) {
   case 0: // will prompt
   // This should only happen when turning privacy.resistFingerprinting off.
@@ -277,6 +282,8 @@ class _RFPHelper {
   case 2: // spoof
 Services.prefs.setCharPref("intl.accept_languages", "en-US, en");
 Services.prefs.setBoolPref("javascript.use_us_english_locale", true);
+// Ensure spoofing works if preferences are set out of order
+Services.prefs.addObserver("intl.accept_languages", this);
 break;
   default:
 break;



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/8cff1681b5043289085fa21e1a1927c59e5b4c47

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/8cff1681b5043289085fa21e1a1927c59e5b4c47
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][tor-browser-115.2.0esr-13.0-1] fixup! Bug 23247: Communicating security expectations for .onion

2023-09-08 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch tor-browser-115.2.0esr-13.0-1 at The Tor Project / 
Applications / Tor Browser


Commits:
03a24c6d by cypherpunks1 at 2023-09-08T22:06:56+00:00
fixup! Bug 23247: Communicating security expectations for .onion

Bug 41934: Treat unencrypted websocket connections to onion services as secure

- - - - -


1 changed file:

- dom/websocket/WebSocket.cpp


Changes:

=
dom/websocket/WebSocket.cpp
=
@@ -1734,12 +1734,15 @@ nsresult WebSocketImpl::Init(JSContext* aCx, bool 
aIsSecure,
   }
 
   // Don't allow https:// to open ws://
-  if (!mIsServerSide && !mSecure &&
+  if (!mIsServerSide && !mSecure && aIsSecure &&
   !Preferences::GetBool("network.websocket.allowInsecureFromHTTPS",
 false) &&
   !nsMixedContentBlocker::IsPotentiallyTrustworthyLoopbackHost(
   mAsciiHost)) {
-if (aIsSecure) {
+nsCOMPtr uri;
+nsresult rv = NS_NewURI(getter_AddRefs(uri), mURI);
+NS_ENSURE_SUCCESS(rv, rv);
+if (!nsMixedContentBlocker::IsPotentiallyTrustworthyOnion(uri)) {
   return NS_ERROR_DOM_SECURITY_ERR;
 }
   }



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/03a24c6d2d0aefd323223134215fdd7e405cbf87

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/03a24c6d2d0aefd323223134215fdd7e405cbf87
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][base-browser-115.2.0esr-13.0-1] Bug 41881: Don't persist custom network requests on private windows

2023-09-08 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch base-browser-115.2.0esr-13.0-1 at The Tor Project / 
Applications / Tor Browser


Commits:
95b3625a by cypherpunks1 at 2023-09-08T11:45:15+01:00
Bug 41881: Dont persist custom network requests on private windows

- - - - -


1 changed file:

- 
devtools/client/netmonitor/src/components/new-request/HTTPCustomRequestPanel.js


Changes:

=
devtools/client/netmonitor/src/components/new-request/HTTPCustomRequestPanel.js
=
@@ -4,6 +4,11 @@
 
 "use strict";
 
+const lazy = {};
+ChromeUtils.defineESModuleGetters(lazy, {
+  PrivateBrowsingUtils: "resource://gre/modules/PrivateBrowsingUtils.sys.mjs",
+});
+
 const {
   Component,
   createFactory,
@@ -122,10 +127,12 @@ class HTTPCustomRequestPanel extends Component {
 
   async componentDidMount() {
 let { connector, request } = this.props;
-const persistedCustomRequest = await asyncStorage.getItem(
-  "devtools.netmonitor.customRequest"
-);
-request = request || persistedCustomRequest;
+if (!lazy.PrivateBrowsingUtils.isWindowPrivate(window)) {
+  const persistedCustomRequest = await asyncStorage.getItem(
+"devtools.netmonitor.customRequest"
+  );
+  request = request || persistedCustomRequest;
+}
 
 if (!request) {
   this.setState({ _isStateDataReady: true });
@@ -191,7 +198,9 @@ class HTTPCustomRequestPanel extends Component {
   }
 
   componentWillUnmount() {
-asyncStorage.setItem("devtools.netmonitor.customRequest", this.state);
+if (!lazy.PrivateBrowsingUtils.isWindowPrivate(window)) {
+  asyncStorage.setItem("devtools.netmonitor.customRequest", this.state);
+}
   }
 
   handleChangeURL(event) {



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/95b3625a85b67f859adecbb436a4f44e1aec3ee0

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/95b3625a85b67f859adecbb436a4f44e1aec3ee0
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][tor-browser-115.2.0esr-13.0-1] Bug 41881: Don't persist custom network requests on private windows

2023-09-08 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch tor-browser-115.2.0esr-13.0-1 at The Tor Project / 
Applications / Tor Browser


Commits:
d66f99f2 by cypherpunks1 at 2023-09-08T10:16:52+00:00
Bug 41881: Dont persist custom network requests on private windows

- - - - -


1 changed file:

- 
devtools/client/netmonitor/src/components/new-request/HTTPCustomRequestPanel.js


Changes:

=
devtools/client/netmonitor/src/components/new-request/HTTPCustomRequestPanel.js
=
@@ -4,6 +4,11 @@
 
 "use strict";
 
+const lazy = {};
+ChromeUtils.defineESModuleGetters(lazy, {
+  PrivateBrowsingUtils: "resource://gre/modules/PrivateBrowsingUtils.sys.mjs",
+});
+
 const {
   Component,
   createFactory,
@@ -122,10 +127,12 @@ class HTTPCustomRequestPanel extends Component {
 
   async componentDidMount() {
 let { connector, request } = this.props;
-const persistedCustomRequest = await asyncStorage.getItem(
-  "devtools.netmonitor.customRequest"
-);
-request = request || persistedCustomRequest;
+if (!lazy.PrivateBrowsingUtils.isWindowPrivate(window)) {
+  const persistedCustomRequest = await asyncStorage.getItem(
+"devtools.netmonitor.customRequest"
+  );
+  request = request || persistedCustomRequest;
+}
 
 if (!request) {
   this.setState({ _isStateDataReady: true });
@@ -191,7 +198,9 @@ class HTTPCustomRequestPanel extends Component {
   }
 
   componentWillUnmount() {
-asyncStorage.setItem("devtools.netmonitor.customRequest", this.state);
+if (!lazy.PrivateBrowsingUtils.isWindowPrivate(window)) {
+  asyncStorage.setItem("devtools.netmonitor.customRequest", this.state);
+}
   }
 
   handleChangeURL(event) {



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/d66f99f26f2a0b41d5d40bc430a386f48abdae1c

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/d66f99f26f2a0b41d5d40bc430a386f48abdae1c
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser-build] Pushed new tag mb-12.5.3-build1

2023-08-29 Thread ma1 (@ma1) via tor-commits


ma1 pushed new tag mb-12.5.3-build1 at The Tor Project / Applications / 
tor-browser-build

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/tree/mb-12.5.3-build1
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser-build] Pushed new tag tbb-12.5.3-build1

2023-08-29 Thread ma1 (@ma1) via tor-commits


ma1 pushed new tag tbb-12.5.3-build1 at The Tor Project / Applications / 
tor-browser-build

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/tree/tbb-12.5.3-build1
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser-build][maint-12.5] Bug 40740: Do not add -utls-imitate to Snowflake on tor-onion-proxy-library.

2023-08-29 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch maint-12.5 at The Tor Project / Applications / 
tor-browser-build


Commits:
26496b1d by Pier Angelo Vendrame at 2023-08-29T14:13:13+02:00
Bug 40740: Do not add -utls-imitate to Snowflake on tor-onion-proxy-library.

This parameter added with the previous commit prevents Snowflake from
working properly.
So, we prefer to undo the addition (but keep the changes to the ICE
server list).

- - - - -


1 changed file:

- projects/tor-onion-proxy-library/0001-Bug-30318-Add-snowflake-support.patch


Changes:

=
projects/tor-onion-proxy-library/0001-Bug-30318-Add-snowflake-support.patch
=
@@ -71,7 +71,7 @@ index 2405097..bcb6a37 100644
 -buffer.append("ClientTransportPlugin meek_lite,obfs3,obfs4 exec 
").append(clientPath).append('\n');
 +public TorConfigBuilder transportPlugin(String obfsPath, String snowPath) 
{
 +buffer.append("ClientTransportPlugin meek_lite,obfs3,obfs4 exec 
").append(obfsPath).append('\n');
-+buffer.append("ClientTransportPlugin snowflake exec 
").append(snowPath).append(" -url 
https://snowflake-broker.torproject.net.global.prod.fastly.net/ -front 
cdn.sstatic.net -ice 
stun:stun.l.google.com:19302,stun:stun.antisip.com:3478,stun:stun.bluesip.net:3478,stun:stun.dus.net:3478,stun:stun.epygi.com:3478,stun:stun.sonetel.com:3478,stun:stun.uls.co.za:3478,stun:stun.voipgate.com:3478,stun:stun.voys.nl:3478
 -utls-imitate=hellorandomizedalpn\n");
++buffer.append("ClientTransportPlugin snowflake exec 
").append(snowPath).append(" -url 
https://snowflake-broker.torproject.net.global.prod.fastly.net/ -front 
cdn.sstatic.net -ice 
stun:stun.l.google.com:19302,stun:stun.antisip.com:3478,stun:stun.bluesip.net:3478,stun:stun.dus.net:3478,stun:stun.epygi.com:3478,stun:stun.sonetel.com:3478,stun:stun.uls.co.za:3478,stun:stun.voipgate.com:3478,stun:stun.voys.nl:3478\n");
  return this;
  }
  



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/commit/26496b1de3391092085c0d3264974f446b5a1e7f

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/commit/26496b1de3391092085c0d3264974f446b5a1e7f
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser] Pushed new tag base-browser-102.15.0esr-12.5-1-build2

2023-08-28 Thread ma1 (@ma1) via tor-commits


ma1 pushed new tag base-browser-102.15.0esr-12.5-1-build2 at The Tor Project / 
Applications / Tor Browser

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/tree/base-browser-102.15.0esr-12.5-1-build2
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser] Pushed new tag tor-browser-102.15.0esr-12.5-1-build2

2023-08-28 Thread ma1 (@ma1) via tor-commits


ma1 pushed new tag tor-browser-102.15.0esr-12.5-1-build2 at The Tor Project / 
Applications / Tor Browser

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/tree/tor-browser-102.15.0esr-12.5-1-build2
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][base-browser-115.1.0esr-13.0-1] 3 commits: fixup! Bug 40926: Implemented the New Identity feature

2023-08-21 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch base-browser-115.1.0esr-13.0-1 at The Tor Project / 
Applications / Tor Browser


Commits:
29c0222b by hackademix at 2023-08-21T14:48:07+02:00
fixup! Bug 40926: Implemented the New Identity feature

Remove useless and confusing EXPORTED_SYMBOLS usage in ScriptLoader inclusion.

- - - - -
a2098747 by hackademix at 2023-08-21T14:48:08+02:00
fixup! Bug 40926: Implemented the New Identity feature

Remove redundant Closing tabs logging.

- - - - -
0537009f by hackademix at 2023-08-21T14:48:08+02:00
fixup! Bug 40926: Implemented the New Identity feature

Bug 41833: Reload extensions on new identity

- - - - -


1 changed file:

- browser/components/newidentity/content/newidentity.js


Changes:

=
browser/components/newidentity/content/newidentity.js
=
@@ -1,7 +1,5 @@
 "use strict";
 
-var EXPORTED_SYMBOLS = ["NewIdentityButton"];
-
 /* globals CustomizableUI Services gFindBarInitialized gFindBar
OpenBrowserWindow PrivateBrowsingUtils XPCOMUtils
  */
@@ -144,6 +142,7 @@ XPCOMUtils.defineLazyGetter(this, "NewIdentityButton", () 
=> {
   this.clearStorage();
   this.clearPreferencesAndPermissions();
   await this.clearData();
+  await this.reloadAddons();
   this.clearConnections();
   this.clearPrivateSession();
 }
@@ -160,7 +159,6 @@ XPCOMUtils.defineLazyGetter(this, "NewIdentityButton", () 
=> {
 }
 
 closeTabs() {
-  logger.info("Closing tabs");
   if (
 !Services.prefs.getBoolPref("browser.new_identity.close_newnym", true)
   ) {
@@ -414,6 +412,15 @@ XPCOMUtils.defineLazyGetter(this, "NewIdentityButton", () 
=> {
   Services.obs.notifyObservers(null, "last-pb-context-exited");
 }
 
+async reloadAddons() {
+  logger.info("Reloading add-ons to clear their temporary state.");
+  // Reload all active extensions except search engines, which would throw.
+  const addons = (
+await AddonManager.getAddonsByTypes(["extension"])
+  ).filter(a => a.isActive && !a.id.endsWith("@search.mozilla.org"));
+  await Promise.all(addons.map(a => a.reload()));
+}
+
 // Broadcast as a hook to clear other data
 
 broadcast() {



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/compare/64c5d915e37966513a83e7e897e945b091bc3108...0537009f2c5ed7b0fd2e9c54eed84afab3c6368f

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/compare/64c5d915e37966513a83e7e897e945b091bc3108...0537009f2c5ed7b0fd2e9c54eed84afab3c6368f
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser] Deleted branch mullvad-browser-115.1.0esr-13.0-1

2023-08-21 Thread ma1 (@ma1) via tor-commits


ma1 deleted branch mullvad-browser-115.1.0esr-13.0-1 at The Tor Project / 
Applications / Tor Browser

-- 

You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser] Pushed new branch mullvad-browser-115.1.0esr-13.0-1

2023-08-21 Thread ma1 (@ma1) via tor-commits


ma1 pushed new branch mullvad-browser-115.1.0esr-13.0-1 at The Tor Project / 
Applications / Tor Browser

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/tree/mullvad-browser-115.1.0esr-13.0-1
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][base-browser-115.1.0esr-13.0-1] fixup! Bug 40926: Implemented the New Identity feature

2023-08-21 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch base-browser-115.1.0esr-13.0-1 at The Tor Project / 
Applications / Tor Browser


Commits:
64c5d915 by hackademix at 2023-08-21T14:30:10+02:00
fixup! Bug 40926: Implemented the New Identity feature

Bug 41833: Reload extensions on new identity

- - - - -


1 changed file:

- browser/components/newidentity/content/newidentity.js


Changes:

=
browser/components/newidentity/content/newidentity.js
=
@@ -144,6 +144,7 @@ XPCOMUtils.defineLazyGetter(this, "NewIdentityButton", () 
=> {
   this.clearStorage();
   this.clearPreferencesAndPermissions();
   await this.clearData();
+  await this.reloadAddons();
   this.clearConnections();
   this.clearPrivateSession();
 }
@@ -414,6 +415,15 @@ XPCOMUtils.defineLazyGetter(this, "NewIdentityButton", () 
=> {
   Services.obs.notifyObservers(null, "last-pb-context-exited");
 }
 
+async reloadAddons() {
+  logger.info("Reloading add-ons to clear their temporary state.");
+  // Reload all active extensions except search engines, which would throw.
+  const addons = (
+await AddonManager.getAddonsByTypes(["extension"])
+  ).filter(a => a.isActive && !a.id.endsWith("@search.mozilla.org"));
+  await Promise.all(addons.map(a => a.reload()));
+}
+
 // Broadcast as a hook to clear other data
 
 broadcast() {



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/64c5d915e37966513a83e7e897e945b091bc3108

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/64c5d915e37966513a83e7e897e945b091bc3108
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][tor-browser-115.1.0esr-13.0-1] 3 commits: fixup! Bug 40926: Implemented the New Identity feature

2023-08-21 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch tor-browser-115.1.0esr-13.0-1 at The Tor Project / 
Applications / Tor Browser


Commits:
4459daa5 by hackademix at 2023-08-21T11:07:43+02:00
fixup! Bug 40926: Implemented the New Identity feature

Remove useless and confusing EXPORTED_SYMBOLS usage in ScriptLoader inclusion.

- - - - -
b6f6eb79 by hackademix at 2023-08-21T11:07:44+02:00
fixup! Bug 40926: Implemented the New Identity feature

Remove redundant Closing tabs logging.

- - - - -
80c57ed8 by hackademix at 2023-08-21T11:08:16+02:00
fixup! Bug 40926: Implemented the New Identity feature

Bug 41833: Reload extensions on new identity

- - - - -


1 changed file:

- browser/components/newidentity/content/newidentity.js


Changes:

=
browser/components/newidentity/content/newidentity.js
=
@@ -1,7 +1,5 @@
 "use strict";
 
-var EXPORTED_SYMBOLS = ["NewIdentityButton"];
-
 /* globals CustomizableUI Services gFindBarInitialized gFindBar
OpenBrowserWindow PrivateBrowsingUtils XPCOMUtils
  */
@@ -144,6 +142,7 @@ XPCOMUtils.defineLazyGetter(this, "NewIdentityButton", () 
=> {
   this.clearStorage();
   this.clearPreferencesAndPermissions();
   await this.clearData();
+  await this.reloadAddons();
   this.clearConnections();
   this.clearPrivateSession();
 }
@@ -160,7 +159,6 @@ XPCOMUtils.defineLazyGetter(this, "NewIdentityButton", () 
=> {
 }
 
 closeTabs() {
-  logger.info("Closing tabs");
   if (
 !Services.prefs.getBoolPref("browser.new_identity.close_newnym", true)
   ) {
@@ -414,6 +412,15 @@ XPCOMUtils.defineLazyGetter(this, "NewIdentityButton", () 
=> {
   Services.obs.notifyObservers(null, "last-pb-context-exited");
 }
 
+async reloadAddons() {
+  logger.info("Reloading add-ons to clear their temporary state.");
+  // Reload all active extensions except search engines, which would throw.
+  const addons = (
+await AddonManager.getAddonsByTypes(["extension"])
+  ).filter(a => a.isActive && !a.id.endsWith("@search.mozilla.org"));
+  await Promise.all(addons.map(a => a.reload()));
+}
+
 // Broadcast as a hook to clear other data
 
 broadcast() {



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/compare/39d95c675acefa5ff643d055832093b37b2cffd3...80c57ed87e50c7c95b1c8a51bc68250e4410f192

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/compare/39d95c675acefa5ff643d055832093b37b2cffd3...80c57ed87e50c7c95b1c8a51bc68250e4410f192
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][base-browser-115.1.0esr-13.0-1] 2 commits: amend! Bug 32308: use direct browser sizing for letterboxing.

2023-08-08 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch base-browser-115.1.0esr-13.0-1 at The Tor Project / 
Applications / Tor Browser


Commits:
dc2274d0 by hackademix at 2023-08-08T09:18:01+02:00
amend! Bug 32308: use direct browser sizing for letterboxing.

Bug 32308: use direct browser sizing for letterboxing.
Bug 30556: align letterboxing with 200x100 new win width stepping

- - - - -
9ac98dab by hackademix at 2023-08-08T09:18:02+02:00
fixup! Firefox preference overrides.

Bug 33282: Redefine the dimensions of new RFP windows

- - - - -


2 changed files:

- browser/app/profile/001-base-profile.js
- toolkit/components/resistfingerprinting/RFPHelper.sys.mjs


Changes:

=
browser/app/profile/001-base-profile.js
=
@@ -291,6 +291,9 @@ pref("dom.use_components_shim", false);
 pref("privacy.resistFingerprinting.letterboxing", true);
 // tor-browser#41695: how many warnings we show if user closes them without 
restoring the window size
 pref("privacy.resistFingerprinting.resizeWarnings", 3);
+// tor-browser#33282: new windows start at 1400x900 when there's enough screen 
space, otherwise down by 200x100 blocks
+pref("privacy.window.maxInnerWidth", 1400);
+pref("privacy.window.maxInnerHeight", 900);
 // Enforce Network Information API as disabled
 pref("dom.netinfo.enabled", false);
 pref("network.http.referer.defaultPolicy", 2); // Bug 32948: Make referer 
behavior consistent regardless of private browing mode status


=
toolkit/components/resistfingerprinting/RFPHelper.sys.mjs
=
@@ -475,14 +475,14 @@ class _RFPHelper {
   /**
* Given a width or height, rounds it with the proper stepping.
*/
-  steppedSize(aDimension) {
+  steppedSize(aDimension, isWidth = false) {
 let stepping;
 if (aDimension <= 50) {
   return 0;
 } else if (aDimension <= 500) {
   stepping = 50;
 } else if (aDimension <= 1600) {
-  stepping = 100;
+  stepping = isWidth ? 200 : 100;
 } else {
   stepping = 200;
 }
@@ -569,7 +569,7 @@ class _RFPHelper {
   // If the set is empty, we will round the content with the default
   // stepping size.
   if (!this._letterboxingDimensions.length) {
-result = r(this.steppedSize(aWidth), this.steppedSize(aHeight));
+result = r(this.steppedSize(aWidth, true), this.steppedSize(aHeight));
 log(
   `${logPrefix} roundDimensions(${aWidth}, ${aHeight}) = 
${result.width} x ${result.height}`
 );



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/compare/65183e255d3b18a1f237819c32696cd51bf360bc...9ac98dab00b7285c32dcbe3ad1bcac33c44dd507

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/compare/65183e255d3b18a1f237819c32696cd51bf360bc...9ac98dab00b7285c32dcbe3ad1bcac33c44dd507
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][tor-browser-115.1.0esr-13.0-1] fixup! Firefox preference overrides.

2023-08-08 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch tor-browser-115.1.0esr-13.0-1 at The Tor Project / 
Applications / Tor Browser


Commits:
e0e763c0 by hackademix at 2023-08-08T09:11:30+02:00
fixup! Firefox preference overrides.

Bug 33282: Redefine the dimensions of new RFP windows

- - - - -


1 changed file:

- browser/app/profile/001-base-profile.js


Changes:

=
browser/app/profile/001-base-profile.js
=
@@ -291,6 +291,9 @@ pref("dom.use_components_shim", false);
 pref("privacy.resistFingerprinting.letterboxing", true);
 // tor-browser#41695: how many warnings we show if user closes them without 
restoring the window size
 pref("privacy.resistFingerprinting.resizeWarnings", 3);
+// tor-browser#33282: new windows start at 1400x900 when there's enough screen 
space, otherwise down by 200x100 blocks
+pref("privacy.window.maxInnerWidth", 1400);
+pref("privacy.window.maxInnerHeight", 900);
 // Enforce Network Information API as disabled
 pref("dom.netinfo.enabled", false);
 pref("network.http.referer.defaultPolicy", 2); // Bug 32948: Make referer 
behavior consistent regardless of private browing mode status



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/e0e763c05a5b3d62d7ec5383a1d7cbf9dc7f84a6

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/e0e763c05a5b3d62d7ec5383a1d7cbf9dc7f84a6
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][tor-browser-115.1.0esr-13.0-1] amend! Bug 32308: use direct browser sizing for letterboxing.

2023-08-08 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch tor-browser-115.1.0esr-13.0-1 at The Tor Project / 
Applications / Tor Browser


Commits:
63eecb92 by hackademix at 2023-08-08T08:08:43+02:00
amend! Bug 32308: use direct browser sizing for letterboxing.

Bug 32308: use direct browser sizing for letterboxing.
Bug 30556: align letterboxing with 200x100 new win width stepping

- - - - -


1 changed file:

- toolkit/components/resistfingerprinting/RFPHelper.sys.mjs


Changes:

=
toolkit/components/resistfingerprinting/RFPHelper.sys.mjs
=
@@ -475,14 +475,14 @@ class _RFPHelper {
   /**
* Given a width or height, rounds it with the proper stepping.
*/
-  steppedSize(aDimension) {
+  steppedSize(aDimension, isWidth = false) {
 let stepping;
 if (aDimension <= 50) {
   return 0;
 } else if (aDimension <= 500) {
   stepping = 50;
 } else if (aDimension <= 1600) {
-  stepping = 100;
+  stepping = isWidth ? 200 : 100;
 } else {
   stepping = 200;
 }
@@ -569,7 +569,7 @@ class _RFPHelper {
   // If the set is empty, we will round the content with the default
   // stepping size.
   if (!this._letterboxingDimensions.length) {
-result = r(this.steppedSize(aWidth), this.steppedSize(aHeight));
+result = r(this.steppedSize(aWidth, true), this.steppedSize(aHeight));
 log(
   `${logPrefix} roundDimensions(${aWidth}, ${aHeight}) = 
${result.width} x ${result.height}`
 );



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/63eecb9243e5fb0af6fb158e1abd93b8be32

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/63eecb9243e5fb0af6fb158e1abd93b8be32
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser] Pushed new tag base-browser-115.1.0esr-13.0-1-build2

2023-08-01 Thread ma1 (@ma1) via tor-commits


ma1 pushed new tag base-browser-115.1.0esr-13.0-1-build2 at The Tor Project / 
Applications / Tor Browser

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/tree/base-browser-115.1.0esr-13.0-1-build2
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser] Pushed new tag tor-browser-115.1.0esr-13.0-1-build2

2023-08-01 Thread ma1 (@ma1) via tor-commits


ma1 pushed new tag tor-browser-115.1.0esr-13.0-1-build2 at The Tor Project / 
Applications / Tor Browser

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/tree/tor-browser-115.1.0esr-13.0-1-build2
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser] Pushed new tag base-browser-102.14.0esr-12.5-1-build2

2023-07-31 Thread ma1 (@ma1) via tor-commits


ma1 pushed new tag base-browser-102.14.0esr-12.5-1-build2 at The Tor Project / 
Applications / Tor Browser

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/tree/base-browser-102.14.0esr-12.5-1-build2
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser] Pushed new tag tor-browser-102.14.0esr-12.5-1-build2

2023-07-31 Thread ma1 (@ma1) via tor-commits


ma1 pushed new tag tor-browser-102.14.0esr-12.5-1-build2 at The Tor Project / 
Applications / Tor Browser

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/tree/tor-browser-102.14.0esr-12.5-1-build2
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser] Pushed new tag base-browser-102.14.0esr-12.5-1-build1

2023-07-26 Thread ma1 (@ma1) via tor-commits


ma1 pushed new tag base-browser-102.14.0esr-12.5-1-build1 at The Tor Project / 
Applications / Tor Browser

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/tree/base-browser-102.14.0esr-12.5-1-build1
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser] Pushed new tag tor-browser-102.14.0esr-12.5-1-build1

2023-07-26 Thread ma1 (@ma1) via tor-commits


ma1 pushed new tag tor-browser-102.14.0esr-12.5-1-build1 at The Tor Project / 
Applications / Tor Browser

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/tree/tor-browser-102.14.0esr-12.5-1-build1
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser] Pushed new branch tor-browser-102.14.0esr-12.5-1

2023-07-24 Thread ma1 (@ma1) via tor-commits


ma1 pushed new branch tor-browser-102.14.0esr-12.5-1 at The Tor Project / 
Applications / Tor Browser

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/tree/tor-browser-102.14.0esr-12.5-1
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser] Pushed new branch base-browser-102.14.0esr-12.5-1

2023-07-24 Thread ma1 (@ma1) via tor-commits


ma1 pushed new branch base-browser-102.14.0esr-12.5-1 at The Tor Project / 
Applications / Tor Browser

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/tree/base-browser-102.14.0esr-12.5-1
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser-build][main] Fix mullvad-browser incrementals and create a build2

2023-07-24 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch main at The Tor Project / Applications / tor-browser-build


Commits:
a1be4abe by Richard Pospesel at 2023-07-24T17:44:56+00:00
Fix mullvad-browser incrementals and create a build2

- - - - -


1 changed file:

- rbm.conf


Changes:

=
rbm.conf
=
@@ -262,8 +262,9 @@ targets:
   exe_name: mullvadbrowser
   mar_channel_id: '[% c("var/projectname") %]-mullvad-[% c("var/channel") 
%]'
   locales: []
+  torbrowser_build: 'build2'
   torbrowser_incremental_from:
-- 12.5a6
+- 12.5a7
 
   torbrowser-testbuild:
 - testbuild



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/commit/a1be4abee11ef39117eabf60d7060342d4b47b10

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/commit/a1be4abee11ef39117eabf60d7060342d4b47b10
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][tor-browser-115.0esrbase-13.0-1] fixup! Bug 23247: Communicating security expectations for .onion

2023-07-13 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch tor-browser-115.0esrbase-13.0-1 at The Tor Project / 
Applications / Tor Browser


Commits:
82c31751 by cypherpunks1 at 2023-07-12T16:18:15-08:00
fixup! Bug 23247: Communicating security expectations for .onion

Bug 41399: Enable brotli encoding for http onions

- - - - -


1 changed file:

- netwerk/protocol/http/HttpBaseChannel.cpp


Changes:

=
netwerk/protocol/http/HttpBaseChannel.cpp
=
@@ -340,6 +340,7 @@ void HttpBaseChannel::AddClassificationFlags(uint32_t 
aClassificationFlags,
 
 static bool isSecureOrTrustworthyURL(nsIURI* aURI) {
   return aURI->SchemeIs("https") ||
+ nsMixedContentBlocker::IsPotentiallyTrustworthyOnion(aURI) ||
  (StaticPrefs::network_http_encoding_trustworthy_is_https() &&
   nsMixedContentBlocker::IsPotentiallyTrustworthyLoopbackURL(aURI));
 }
@@ -366,7 +367,6 @@ nsresult HttpBaseChannel::Init(nsIURI* aURI, uint32_t aCaps,
   // Construct connection info object
   nsAutoCString host;
   int32_t port = -1;
-  bool isHTTPS = isSecureOrTrustworthyURL(mURI);
 
   nsresult rv = mURI->GetAsciiHost(host);
   if (NS_FAILED(rv)) return rv;
@@ -395,7 +395,7 @@ nsresult HttpBaseChannel::Init(nsIURI* aURI, uint32_t aCaps,
   if (NS_FAILED(rv)) return rv;
 
   rv = gHttpHandler->AddStandardRequestHeaders(
-  , isHTTPS, aContentPolicyType,
+  , isSecureOrTrustworthyURL(mURI), aContentPolicyType,
   nsContentUtils::ShouldResistFingerprinting(this));
   if (NS_FAILED(rv)) return rv;
 



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/82c31751c263ae795bcf5c8df3c947f0576fb2cb

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/82c31751c263ae795bcf5c8df3c947f0576fb2cb
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][base-browser-115.0esrbase-13.0-1] Bug 41092: Add a RemoteSettings JSON dump for query-stripping

2023-07-12 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch base-browser-115.0esrbase-13.0-1 at The Tor Project / 
Applications / Tor Browser


Commits:
0a89389f by cypherpunks1 at 2023-07-13T00:40:56+02:00
Bug 41092: Add a RemoteSettings JSON dump for query-stripping

- - - - -


2 changed files:

- services/settings/static-dumps/main/moz.build
- + services/settings/static-dumps/main/query-stripping.json


Changes:

=
services/settings/static-dumps/main/moz.build
=
@@ -5,6 +5,7 @@
 FINAL_TARGET_FILES.defaults.settings.main += [
 "doh-config.json",
 "doh-providers.json",
+"query-stripping.json",
 ]
 
 if CONFIG["MOZ_BUILD_APP"] == "browser":


=
services/settings/static-dumps/main/query-stripping.json
=
@@ -0,0 +1,44 @@
+{
+  "data": [
+{
+  "schema": 1678379807899,
+  "allowList": [],
+  "stripList": [
+"gclid",
+"dclid",
+"msclkid",
+"_openstat",
+"yclid",
+"wickedid",
+"twclid",
+"_hsenc",
+"__hssc",
+"__hstc",
+"__hsfp",
+"hsctatracking",
+"wbraid",
+"gbraid",
+"ysclid"
+  ],
+  "id": "85078bad-f31e-4d93-bb8a-81088b25d6dd",
+  "last_modified": 1678736907773
+},
+{
+  "schema": 1649695008608,
+  "allowList": [],
+  "stripList": [
+"mc_eid",
+"oly_anon_id",
+"oly_enc_id",
+"__s",
+"vero_id",
+"_hsenc",
+"mkt_tok",
+"fbclid"
+  ],
+  "id": "76495cfc-fac9-4079-9b5f-9ff0784484de",
+  "last_modified": 1649762862679
+}
+  ],
+  "timestamp": 1678736907773
+}



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/0a89389f6524620675ad4623cc6d5aa40ed8d574

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/0a89389f6524620675ad4623cc6d5aa40ed8d574
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][tor-browser-115.0esrbase-13.0-1] 2 commits: fixup! Firefox preference overrides.

2023-07-12 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch tor-browser-115.0esrbase-13.0-1 at The Tor Project / 
Applications / Tor Browser


Commits:
44eff978 by cypherpunks1 at 2023-07-12T14:35:28+00:00
fixup! Firefox preference overrides.

Bug 41092: Enable URL query stripping to protect against cross-site tracking

- - - - -
9740e17d by cypherpunks1 at 2023-07-12T14:35:28+00:00
Bug 41092: Add a RemoteSettings JSON dump for query-stripping

- - - - -


3 changed files:

- browser/app/profile/001-base-profile.js
- services/settings/static-dumps/main/moz.build
- + services/settings/static-dumps/main/query-stripping.json


Changes:

=
browser/app/profile/001-base-profile.js
=
@@ -505,6 +505,11 @@ pref("corroborator.enabled", false);
 // stop using .textContent.
 pref("intl.multilingual.liveReload", false);
 
+// Enable URL query stripping to protect against cross-site tracking 
(tor-browser#41092)
+pref("privacy.query_stripping.enabled", true);
+pref("privacy.query_stripping.enabled.pbmode", true);
+pref("privacy.query_stripping.strip_on_share.enabled", true);
+
 #ifdef XP_WIN
 // prefs to disable jump-list entries in the taskbar on Windows (see bug 
#12885)
 // this pref changes the app's set AUMID to be dependent on the profile path, 
rather than


=
services/settings/static-dumps/main/moz.build
=
@@ -5,6 +5,7 @@
 FINAL_TARGET_FILES.defaults.settings.main += [
 "doh-config.json",
 "doh-providers.json",
+"query-stripping.json",
 ]
 
 if CONFIG["MOZ_BUILD_APP"] == "browser":


=
services/settings/static-dumps/main/query-stripping.json
=
@@ -0,0 +1,44 @@
+{
+  "data": [
+{
+  "schema": 1678379807899,
+  "allowList": [],
+  "stripList": [
+"gclid",
+"dclid",
+"msclkid",
+"_openstat",
+"yclid",
+"wickedid",
+"twclid",
+"_hsenc",
+"__hssc",
+"__hstc",
+"__hsfp",
+"hsctatracking",
+"wbraid",
+"gbraid",
+"ysclid"
+  ],
+  "id": "85078bad-f31e-4d93-bb8a-81088b25d6dd",
+  "last_modified": 1678736907773
+},
+{
+  "schema": 1649695008608,
+  "allowList": [],
+  "stripList": [
+"mc_eid",
+"oly_anon_id",
+"oly_enc_id",
+"__s",
+"vero_id",
+"_hsenc",
+"mkt_tok",
+"fbclid"
+  ],
+  "id": "76495cfc-fac9-4079-9b5f-9ff0784484de",
+  "last_modified": 1649762862679
+}
+  ],
+  "timestamp": 1678736907773
+}



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/compare/5b4fa6e2f9f50a99b9ff8827f15f9845f500cc48...9740e17dde1ca86475575dac0358ffac364a6414

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/compare/5b4fa6e2f9f50a99b9ff8827f15f9845f500cc48...9740e17dde1ca86475575dac0358ffac364a6414
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][base-browser-115.0esrbase-13.0-1] fixup! Bug 41698: Reword the recommendation badges in about:addons

2023-07-11 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch base-browser-115.0esrbase-13.0-1 at The Tor Project / 
Applications / Tor Browser


Commits:
eba10c40 by hackademix at 2023-07-11T16:45:09+02:00
fixup! Bug 41698: Reword the recommendation badges in about:addons

- - - - -


3 changed files:

- toolkit/content/widgets/moz-support-link/moz-support-link.mjs
- toolkit/mozapps/extensions/content/aboutaddons.html
- toolkit/mozapps/extensions/content/aboutaddons.js


Changes:

=
toolkit/content/widgets/moz-support-link/moz-support-link.mjs
=
@@ -52,6 +52,23 @@ export default class MozSupportLink extends 
HTMLAnchorElement {
 this.setAttribute("target", "_blank");
 this.addEventListener("click", this);
 if (!this.getAttribute("data-l10n-id")) {
+  const fixupL10nId = this.getAttribute("data-basebrowser-l10n-fixup");
+  if (fixupL10nId) {
+document.l10n.formatValue(fixupL10nId).then(title => {
+  this.setAttribute("title", title);
+  // NOTE: Mozilla adds identical aria-label and title attributes. 
This is
+  // generally bad practice because this link has no text content, so 
the
+  // title alone will already act as the accessible name.
+  // Normally setting both aria-label and title will lead to the title 
being
+  // used as the accessible description, but since they are identical
+  // the LocalAccessible::Description method will make an exception 
and keep
+  // the description empty.
+  // Since this component is outside of our fork's control, we follow 
the
+  // same practice just in case Mozilla ever adds some text content.
+  this.setAttribute("aria-label", title);
+});
+return;
+  }
   document.l10n.setAttributes(this, "moz-support-link-text");
 }
 document.l10n.translateFragment(this);


=
toolkit/mozapps/extensions/content/aboutaddons.html
=
@@ -359,6 +359,7 @@
 is="moz-support-link"
 support-page="add-on-badges"
 utm-content="promoted-addon-badge"
+
data-basebrowser-l10n-fixup="basebrowser-addon-badge-recommended"
 hidden
   >
   
@@ -376,6 +377,7 @@
 is="moz-support-link"
 support-page="add-on-badges"
 utm-content="promoted-addon-badge"
+data-basebrowser-l10n-fixup="basebrowser-addon-badge-verified"
 hidden
   >
   


=
toolkit/mozapps/extensions/content/aboutaddons.js
=
@@ -4220,29 +4220,6 @@ async function initialize() {
   );
 }
   }
-
-  // At the moment we need to do this, because Weblate still does not support
-  // attributes in Fluent.
-  const [recommended, verified] = await document.l10n.formatValues([
-{ id: "basebrowser-addon-badge-recommended" },
-{ id: "basebrowser-addon-badge-verified" },
-  ]);
-
-  importTemplate("card");
-  _templates.card.content
-.querySelector(".addon-badge-recommended")
-.setAttribute("title", recommended);
-  _templates.card.content
-.querySelector(".addon-badge-verified")
-.setAttribute("title", verified);
-
-  // We also update any template copy that has already been created.
-  for (const badge of document.querySelectorAll(".addon-badge-recommended")) {
-badge.setAttribute("title", recommended);
-  }
-  for (const badge of document.querySelectorAll(".addon-badge-verified")) {
-badge.setAttribute("title", verified);
-  }
 }
 
 window.promiseInitialized = new Promise(resolve => {



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/eba10c40f35483210d8ad8af03aa48dbbcc6076c

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/eba10c40f35483210d8ad8af03aa48dbbcc6076c
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][tor-browser-115.0esrbase-13.0-1] fixup! Bug 41698: Reword the recommendation badges in about:addons

2023-07-11 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch tor-browser-115.0esrbase-13.0-1 at The Tor Project / 
Applications / Tor Browser


Commits:
a884f352 by hackademix at 2023-07-11T15:48:11+02:00
fixup! Bug 41698: Reword the recommendation badges in about:addons

- - - - -


3 changed files:

- toolkit/content/widgets/moz-support-link/moz-support-link.mjs
- toolkit/mozapps/extensions/content/aboutaddons.html
- toolkit/mozapps/extensions/content/aboutaddons.js


Changes:

=
toolkit/content/widgets/moz-support-link/moz-support-link.mjs
=
@@ -52,6 +52,23 @@ export default class MozSupportLink extends 
HTMLAnchorElement {
 this.setAttribute("target", "_blank");
 this.addEventListener("click", this);
 if (!this.getAttribute("data-l10n-id")) {
+  const fixupL10nId = this.getAttribute("data-basebrowser-l10n-fixup");
+  if (fixupL10nId) {
+document.l10n.formatValue(fixupL10nId).then(title => {
+  this.setAttribute("title", title);
+  // NOTE: Mozilla adds identical aria-label and title attributes. 
This is
+  // generally bad practice because this link has no text content, so 
the
+  // title alone will already act as the accessible name.
+  // Normally setting both aria-label and title will lead to the title 
being
+  // used as the accessible description, but since they are identical
+  // the LocalAccessible::Description method will make an exception 
and keep
+  // the description empty.
+  // Since this component is outside of our fork's control, we follow 
the
+  // same practice just in case Mozilla ever adds some text content.
+  this.setAttribute("aria-label", title);
+});
+return;
+  }
   document.l10n.setAttributes(this, "moz-support-link-text");
 }
 document.l10n.translateFragment(this);


=
toolkit/mozapps/extensions/content/aboutaddons.html
=
@@ -359,6 +359,7 @@
 is="moz-support-link"
 support-page="add-on-badges"
 utm-content="promoted-addon-badge"
+
data-basebrowser-l10n-fixup="basebrowser-addon-badge-recommended"
 hidden
   >
   
@@ -376,6 +377,7 @@
 is="moz-support-link"
 support-page="add-on-badges"
 utm-content="promoted-addon-badge"
+data-basebrowser-l10n-fixup="basebrowser-addon-badge-verified"
 hidden
   >
   


=
toolkit/mozapps/extensions/content/aboutaddons.js
=
@@ -4220,29 +4220,6 @@ async function initialize() {
   );
 }
   }
-
-  // At the moment we need to do this, because Weblate still does not support
-  // attributes in Fluent.
-  const [recommended, verified] = await document.l10n.formatValues([
-{ id: "basebrowser-addon-badge-recommended" },
-{ id: "basebrowser-addon-badge-verified" },
-  ]);
-
-  importTemplate("card");
-  _templates.card.content
-.querySelector(".addon-badge-recommended")
-.setAttribute("title", recommended);
-  _templates.card.content
-.querySelector(".addon-badge-verified")
-.setAttribute("title", verified);
-
-  // We also update any template copy that has already been created.
-  for (const badge of document.querySelectorAll(".addon-badge-recommended")) {
-badge.setAttribute("title", recommended);
-  }
-  for (const badge of document.querySelectorAll(".addon-badge-verified")) {
-badge.setAttribute("title", verified);
-  }
 }
 
 window.promiseInitialized = new Promise(resolve => {



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/a884f352ec0a3f43c96765b3a5598bdfacc6f42e

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/a884f352ec0a3f43c96765b3a5598bdfacc6f42e
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][base-browser-115.0esrbase-13.0-1] Bug 41834: Hide "Can't Be Removed - learn more" menu line for uninstallable add-ons

2023-07-06 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch base-browser-115.0esrbase-13.0-1 at The Tor Project / 
Applications / Tor Browser


Commits:
e4fae18a by hackademix at 2023-07-06T15:46:27+02:00
Bug 41834: Hide Cant Be Removed - learn more menu line for 
uninstallable add-ons

- - - - -


1 changed file:

- toolkit/mozapps/extensions/content/aboutaddons.js


Changes:

=
toolkit/mozapps/extensions/content/aboutaddons.js
=
@@ -1492,8 +1492,9 @@ class AddonOptions extends HTMLElement {
   el.disabled = false;
   el.hidden = false;
   document.l10n.setAttributes(el, "remove-addon-button");
-} else if (addon.isBuiltin) {
-  // Likely the built-in themes, can't be removed, that's fine.
+} else if (true || addon.isBuiltin) {
+  // Just hide the uninstall button for any "special" add-on
+  // which can't be removed (tor-browser#41834)
   el.hidden = true;
 } else {
   // Likely sideloaded, mention that it can't be removed with a link.



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/e4fae18afa97556839332320e9a340546a47b392

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/e4fae18afa97556839332320e9a340546a47b392
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][tor-browser-115.0esrbase-13.0-1] Bug 41834: Hide "Can't Be Removed - learn more" menu line for uninstallable add-ons

2023-07-06 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch tor-browser-115.0esrbase-13.0-1 at The Tor Project / 
Applications / Tor Browser


Commits:
b06f6190 by hackademix at 2023-07-06T00:10:24+02:00
Bug 41834: Hide Cant Be Removed - learn more menu line for 
uninstallable add-ons

- - - - -


1 changed file:

- toolkit/mozapps/extensions/content/aboutaddons.js


Changes:

=
toolkit/mozapps/extensions/content/aboutaddons.js
=
@@ -1492,8 +1492,9 @@ class AddonOptions extends HTMLElement {
   el.disabled = false;
   el.hidden = false;
   document.l10n.setAttributes(el, "remove-addon-button");
-} else if (addon.isBuiltin) {
-  // Likely the built-in themes, can't be removed, that's fine.
+} else if (true || addon.isBuiltin) {
+  // Just hide the uninstall button for any "special" add-on
+  // which can't be removed (tor-browser#41834)
   el.hidden = true;
 } else {
   // Likely sideloaded, mention that it can't be removed with a link.



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/b06f61906d0f76ad5fca1ebf410cd4b9cd5e3679

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/b06f61906d0f76ad5fca1ebf410cd4b9cd5e3679
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][tor-browser-102.13.0esr-12.5-1] fixup! Bug 26961: New user onboarding.

2023-06-29 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch tor-browser-102.13.0esr-12.5-1 at The Tor Project / 
Applications / Tor Browser


Commits:
4dcf0094 by hackademix at 2023-06-29T09:41:08+02:00
fixup! Bug 26961: New user onboarding.

- - - - -


1 changed file:

- browser/extensions/onboarding/content/Onboarding.jsm


Changes:

=
browser/extensions/onboarding/content/Onboarding.jsm
=
@@ -909,7 +909,7 @@ class Onboarding {
 }
 
 const kOnionURL = 
"https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/;;  // 
DuckDuckGo
-const kLearnMore = "https://www.torproject.org/releases/tor-browser-12-0/;;
+const kLearnMore = "https://www.torproject.org/releases/tor-browser-12-5/;;
 let handledTourActionClick = false;
 switch (id) {
   case "onboarding-overlay-button-icon":



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/4dcf009406d107a3e5f56e445a2ab7334755d059

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/4dcf009406d107a3e5f56e445a2ab7334755d059
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][tor-browser-102.12.0esr-12.5-1] fixup! Bug 30237: Add v3 onion services client authentication prompt

2023-06-27 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch tor-browser-102.12.0esr-12.5-1 at The Tor Project / 
Applications / Tor Browser


Commits:
4a13c283 by hackademix at 2023-06-27T07:54:52+00:00
fixup! Bug 30237: Add v3 onion services client authentication prompt

- - - - -


1 changed file:

- browser/components/onionservices/content/authPrompt.js


Changes:

=
browser/components/onionservices/content/authPrompt.js
=
@@ -73,8 +73,18 @@ const OnionAuthPrompt = (function() {
   );
 },
 
+_autoFocus(event) {
+  event.target.ownerGlobal.focus();
+},
+
 _onPromptShowing(aWarningMessage) {
   let xulDoc = this._browser.ownerDocument;
+
+  // Force back focus: tor-browser#41856
+  (this._popupElem = xulDoc.getElementById(
+`${OnionAuthUtil.domid.notification}-notification`
+  ))?.addEventListener("click", this._autoFocus);
+
   let descElem = xulDoc.getElementById(OnionAuthUtil.domid.description);
   if (descElem) {
 // Handle replacement of the onion name within the localized
@@ -159,6 +169,9 @@ const OnionAuthPrompt = (function() {
   this._boundOnKeyFieldInput = undefined;
 }
   }
+  if (this._popupElem) {
+this._popupElem.removeEventListener("click", this._autoFocus);
+  }
 },
 
 _onKeyFieldKeyPress(aEvent) {



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/4a13c283b51fdf6f8748ebae9347152c59454c58

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/4a13c283b51fdf6f8748ebae9347152c59454c58
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][tor-browser-102.12.0esr-12.5-1] fixup! Bug 21952: Implement Onion-Location

2023-06-13 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch tor-browser-102.12.0esr-12.5-1 at The Tor Project / 
Applications / Tor Browser


Commits:
5a49e443 by Pier Angelo Vendrame at 2023-06-13T09:08:07+02:00
fixup! Bug 21952: Implement Onion-Location

Bug 41841: Use the new onion-site.svg icon in the onion-location pill

- - - - -


3 changed files:

- browser/components/onionservices/content/onionlocation.css
- − browser/components/onionservices/content/onionlocation.svg
- browser/components/onionservices/jar.mn


Changes:

=
browser/components/onionservices/content/onionlocation.css
=
@@ -1,7 +1,7 @@
 /* Copyright (c) 2020, The Tor Project, Inc. */
 
 #onion-location-button {
-  list-style-image: 
url(chrome://browser/content/onionservices/onionlocation.svg);
+  list-style-image: url(chrome://browser/skin/onion-site.svg);
   -moz-context-properties: fill;
   fill: currentColor;
 }


=
browser/components/onionservices/content/onionlocation.svg deleted
=
@@ -1,3 +0,0 @@
-http://www.w3.org/2000/svg; xmlns:xlink="http://www.w3.org/1999/xlink;>
-  
-
\ No newline at end of file


=
browser/components/onionservices/jar.mn
=
@@ -8,5 +8,4 @@ browser.jar:
 content/browser/onionservices/savedKeysDialog.js   
(content/savedKeysDialog.js)
 content/browser/onionservices/savedKeysDialog.xhtml
(content/savedKeysDialog.xhtml)
 content/browser/onionservices/onionlocationPreferences.js  
(content/onionlocationPreferences.js)
-content/browser/onionservices/onionlocation.svg
(content/onionlocation.svg)
 skin/classic/browser/onionlocation.css 
(content/onionlocation.css)



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/5a49e4435fc1a754ba85bb909b41f92dcd861a6d

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/5a49e4435fc1a754ba85bb909b41f92dcd861a6d
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][tor-browser-102.12.0esr-13.0-1] fixup! Bug 32308: use direct browser sizing for letterboxing.

2023-06-12 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch tor-browser-102.12.0esr-13.0-1 at The Tor Project / 
Applications / Tor Browser


Commits:
a6db7b91 by hackademix at 2023-06-12T10:35:40+02:00
fixup! Bug 32308: use direct browser sizing for letterboxing.

- - - - -


1 changed file:

- toolkit/components/resistfingerprinting/RFPHelper.jsm


Changes:

=
toolkit/components/resistfingerprinting/RFPHelper.jsm
=
@@ -51,7 +51,7 @@ function forEachWindow(callback) {
 
 
 async function windowResizeHandler(aEvent) {
-  if (RFPHelper.letterboxingEnabled) {
+  if (RFPHelper.letterboxingEnabled || !RFPHelper.rfpEnabled) {
 return;
   }
   if (Services.prefs.getIntPref(kPrefResizeWarnings) <= 0) {
@@ -250,7 +250,9 @@ class _RFPHelper {
   }
 
   _handleResistFingerprintingChanged() {
-if (Services.prefs.getBoolPref(kPrefResistFingerprinting)) {
+if (
+  (this.rfpEnabled = Services.prefs.getBoolPref(kPrefResistFingerprinting))
+) {
   this._addRFPObservers();
   Services.ww.registerNotification(this);
   forEachWindow(win => this._attachWindow(win));
@@ -397,7 +399,9 @@ class _RFPHelper {
   kPrefLetterboxing,
   false
 );
-forEachWindow(win => this._updateSizeForTabsInWindow(win));
+if (this.rfpEnabled) {
+  forEachWindow(win => this._updateSizeForTabsInWindow(win));
+}
   }
 
   // The function to parse the dimension set from the pref value. The pref 
value



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/a6db7b91bc2e1e683c09a3ea60055754b1035b78

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/a6db7b91bc2e1e683c09a3ea60055754b1035b78
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][base-browser-102.12.0esr-12.5-1] fixup! Bug 32308: use direct browser sizing for letterboxing.

2023-06-12 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch base-browser-102.12.0esr-12.5-1 at The Tor Project / 
Applications / Tor Browser


Commits:
c8ea1c20 by hackademix at 2023-06-12T10:30:29+02:00
fixup! Bug 32308: use direct browser sizing for letterboxing.

- - - - -


1 changed file:

- toolkit/components/resistfingerprinting/RFPHelper.jsm


Changes:

=
toolkit/components/resistfingerprinting/RFPHelper.jsm
=
@@ -51,7 +51,7 @@ function forEachWindow(callback) {
 
 
 async function windowResizeHandler(aEvent) {
-  if (RFPHelper.letterboxingEnabled) {
+  if (RFPHelper.letterboxingEnabled || !RFPHelper.rfpEnabled) {
 return;
   }
   if (Services.prefs.getIntPref(kPrefResizeWarnings) <= 0) {
@@ -250,7 +250,9 @@ class _RFPHelper {
   }
 
   _handleResistFingerprintingChanged() {
-if (Services.prefs.getBoolPref(kPrefResistFingerprinting)) {
+if (
+  (this.rfpEnabled = Services.prefs.getBoolPref(kPrefResistFingerprinting))
+) {
   this._addRFPObservers();
   Services.ww.registerNotification(this);
   forEachWindow(win => this._attachWindow(win));
@@ -397,7 +399,9 @@ class _RFPHelper {
   kPrefLetterboxing,
   false
 );
-forEachWindow(win => this._updateSizeForTabsInWindow(win));
+if (this.rfpEnabled) {
+  forEachWindow(win => this._updateSizeForTabsInWindow(win));
+}
   }
 
   // The function to parse the dimension set from the pref value. The pref 
value



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/c8ea1c20e48a921ebf534390bc32e99c5fc9d156

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/c8ea1c20e48a921ebf534390bc32e99c5fc9d156
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][tor-browser-102.12.0esr-12.5-1] fixup! Bug 32308: use direct browser sizing for letterboxing.

2023-06-12 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch tor-browser-102.12.0esr-12.5-1 at The Tor Project / 
Applications / Tor Browser


Commits:
1fac685b by hackademix at 2023-06-12T09:22:03+02:00
fixup! Bug 32308: use direct browser sizing for letterboxing.

- - - - -


1 changed file:

- toolkit/components/resistfingerprinting/RFPHelper.jsm


Changes:

=
toolkit/components/resistfingerprinting/RFPHelper.jsm
=
@@ -51,7 +51,7 @@ function forEachWindow(callback) {
 
 
 async function windowResizeHandler(aEvent) {
-  if (RFPHelper.letterboxingEnabled) {
+  if (RFPHelper.letterboxingEnabled || !RFPHelper.rfpEnabled) {
 return;
   }
   if (Services.prefs.getIntPref(kPrefResizeWarnings) <= 0) {
@@ -250,7 +250,9 @@ class _RFPHelper {
   }
 
   _handleResistFingerprintingChanged() {
-if (Services.prefs.getBoolPref(kPrefResistFingerprinting)) {
+if (
+  (this.rfpEnabled = Services.prefs.getBoolPref(kPrefResistFingerprinting))
+) {
   this._addRFPObservers();
   Services.ww.registerNotification(this);
   forEachWindow(win => this._attachWindow(win));
@@ -397,7 +399,9 @@ class _RFPHelper {
   kPrefLetterboxing,
   false
 );
-forEachWindow(win => this._updateSizeForTabsInWindow(win));
+if (this.rfpEnabled) {
+  forEachWindow(win => this._updateSizeForTabsInWindow(win));
+}
   }
 
   // The function to parse the dimension set from the pref value. The pref 
value



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/1fac685b89fc2280dc4a21041aead035ef0af145

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/1fac685b89fc2280dc4a21041aead035ef0af145
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][tor-browser-102.12.0esr-12.5-1] fixup! Add TorStrings module for localization

2023-06-08 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch tor-browser-102.12.0esr-12.5-1 at The Tor Project / 
Applications / Tor Browser


Commits:
2165eb00 by Pier Angelo Vendrame at 2023-06-08T10:47:48+02:00
fixup! Add TorStrings module for localization

Bug 41818: Remove YEC 2022 strings

- - - - -


1 changed file:

- toolkit/torbutton/chrome/locale/en-US/aboutTor.dtd


Changes:

=
toolkit/torbutton/chrome/locale/en-US/aboutTor.dtd
=
@@ -38,22 +38,3 @@
 
 
 
-
-
-
-
-
-
-
-
-
-
-
-
-
-



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/2165eb00af36b03a457bfd87d701f575b3bdb458

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/2165eb00af36b03a457bfd87d701f575b3bdb458
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser-build][main] Bug 40874: Include the commit information in GeckoView

2023-06-08 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch main at The Tor Project / Applications / tor-browser-build


Commits:
f4227713 by Pier Angelo Vendrame at 2023-06-07T19:10:03+02:00
Bug 40874: Include the commit information in GeckoView

Add the commit hash and GitLab URL to the mozconfig to make them appear
in about:buildconfig on Android, too.

- - - - -


2 changed files:

- projects/geckoview/build
- projects/geckoview/config


Changes:

=
projects/geckoview/build
=
@@ -41,7 +41,13 @@ export 
PATH="/var/tmp/dist/rust/bin:/var/tmp/dist/cbindgen:/var/tmp/dist/nasm/bi
 tar -C /var/tmp/build -xf [% project %]-[% c('version') %].tar.gz
 
 cd /var/tmp/build/[% project %]-[% c("version") %]
-ln -s mozconfig-[% c("var/osname") %] .mozconfig
+cat > .mozconfig << 'MOZCONFIG_EOF'
+. $topsrcdir/mozconfig-[% c("var/osname") %]
+
+export MOZ_INCLUDE_SOURCE_INFO=1
+export MOZ_SOURCE_REPO="[% c('var/gitlab_project') %]"
+export MOZ_SOURCE_CHANGESET=[% c("var/git_commit") %]
+MOZCONFIG_EOF
 
 eval $(perl $rootdir/get-moz-build-date [% c("var/copyright_year") %] [% 
c("var/torbrowser_version") %])
 if [ -z $MOZ_BUILD_DATE ]


=
projects/geckoview/config
=
@@ -15,6 +15,8 @@ var:
   browser_branch: 12.5-1
   browser_build: 3
   copyright_year: '[% exec("git show -s --format=%ci").remove("-.*") %]'
+  gitlab_project: https://gitlab.torproject.org/tpo/applications/tor-browser
+  git_commit: '[% exec("git rev-parse HEAD") %]'
   deps:
 - build-essential
 - unzip



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/commit/f422771302caf12d6410d9602b46b511b799bcab

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/commit/f422771302caf12d6410d9602b46b511b799bcab
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][tor-browser-102.12.0esr-12.5-1] fixup! Bug 8324: Prevent DNS proxy bypasses caused by Drag

2023-06-05 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch tor-browser-102.12.0esr-12.5-1 at The Tor Project / 
Applications / Tor Browser


Commits:
423f239c by cypherpunks1 at 2023-06-05T11:07:29-08:00
fixup! Bug 8324: Prevent DNS proxy bypasses caused by DragDrop

Bug 41792: Allow dragging downloads from about:downloads and the download panel

- - - - -


1 changed file:

- toolkit/torbutton/components/dragDropFilter.js


Changes:

=
toolkit/torbutton/components/dragDropFilter.js
=
@@ -142,7 +142,8 @@ DragDropFilter.prototype = {
   for (const type of types) {
 if (
   type !== INTERNAL_FALLBACK &&
-  type !== "text/x-moz-place" // don't touch bookmarks
+  type !== "text/x-moz-place" &&// don't touch bookmarks
+  type !== "application/x-moz-file" // don't touch downloads
 ) {
   aDataTransfer.mozClearDataAt(type, i);
 }



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/423f239c5675d2522093c991831032ea565de55c

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/423f239c5675d2522093c991831032ea565de55c
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser] Pushed new branch tor-browser-102.12.0esr-12.5-1

2023-05-29 Thread ma1 (@ma1) via tor-commits


ma1 pushed new branch tor-browser-102.12.0esr-12.5-1 at The Tor Project / 
Applications / Tor Browser

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/tree/tor-browser-102.12.0esr-12.5-1
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser] Pushed new branch tor-browser-102.12.0esr-12.0-1

2023-05-29 Thread ma1 (@ma1) via tor-commits


ma1 pushed new branch tor-browser-102.12.0esr-12.0-1 at The Tor Project / 
Applications / Tor Browser

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/tree/tor-browser-102.12.0esr-12.0-1
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][tor-browser-102.11.0esr-12.5-1] fixup! Bug 23247: Communicating security expectations for .onion

2023-05-25 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch tor-browser-102.11.0esr-12.5-1 at The Tor Project / 
Applications / Tor Browser


Commits:
dbec6cf6 by cypherpunks1 at 2023-05-24T09:21:07-08:00
fixup! Bug 23247: Communicating security expectations for .onion

Bug 41785: Show http onion resources as secure in network monitor

- - - - -


1 changed file:

- devtools/shared/webconsole/network-helper.js


Changes:

=
devtools/shared/webconsole/network-helper.js
=
@@ -600,6 +600,9 @@ var NetworkHelper = {
 
 // The request did not contain any security info.
 if (!securityInfo) {
+  if (httpActivity.hostname && httpActivity.hostname.endsWith(".onion")) {
+info.state = "secure";
+  }
   return info;
 }
 
@@ -651,7 +654,11 @@ var NetworkHelper = {
 // schemes other than https and wss are subject to
 // downgrade/etc at the scheme level and should always be
 // considered insecure
-info.state = "insecure";
+if (httpActivity.hostname && httpActivity.hostname.endsWith(".onion")) 
{
+  info.state = "secure";
+} else {
+  info.state = "insecure";
+}
   } else if (state & wpl.STATE_IS_SECURE) {
 // The connection is secure if the scheme is sufficient
 info.state = "secure";



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/dbec6cf620a2f5d4a5b9ed162e795978eacea0cc

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/dbec6cf620a2f5d4a5b9ed162e795978eacea0cc
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/fenix][tor-browser-102.2.1-12.5-1] fixup! Modify build system

2023-03-21 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch tor-browser-102.2.1-12.5-1 at The Tor Project / 
Applications / fenix


Commits:
5c26f235 by Pier Angelo Vendrame at 2023-03-21T11:14:21+01:00
fixup! Modify build system

Bug 41684: Android improvements for local dev builds

Added a script to fetch the Tor dependencies from tor-browser-build,
and print the name of the signed apk.

- - - - -


2 changed files:

- + tools/tba-fetch-deps.sh
- tools/tba-sign-devbuilds.sh


Changes:

=
tools/tba-fetch-deps.sh
=
@@ -0,0 +1,22 @@
+#!/bin/bash
+
+cd "$(dirname $(realpath "$0"))/.."
+
+if [ -z "$TOR_BROWSER_BUILD" ]; then
+   TOR_BROWSER_BUILD=../tor-browser-build
+fi
+
+android_service="$(ls -1td 
"$TOR_BROWSER_BUILD/out/tor-android-service/"tor-android-service-* | head -1)"
+if [ -z "$android_service" ]; then
+   echo "Cannot find Tor Android Service artifacts!"
+   exit 1
+fi
+
+onion_proxy_library="$(ls -1td 
"$TOR_BROWSER_BUILD/out/tor-onion-proxy-library/"tor-onion-proxy-library-* | 
head -1)"
+if [ -z "$onion_proxy_library" ]; then
+   echo "Cannot find Tor Onoin Proxy library artifacts!"
+   exit 2
+fi
+
+cp "$android_service"/* app/
+cp "$onion_proxy_library"/* app/


=
tools/tba-sign-devbuilds.sh
=
@@ -38,6 +38,7 @@ sign () {
rm -f "$aligned"
"$zipalign" -p 4 "$apk" "$aligned"
"$apksigner" sign --ks "$key" --in "$aligned" --out "$out" 
--ks-key-alias androidqakey --key-pass pass:android --ks-pass pass:android
+   echo "Signed $out"
 }
 
 for apk in app/build/outputs/apk/release/*-unsigned.apk; do



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/fenix/-/commit/5c26f2353ef1ae1756cfee563db6f06614a76bd4

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/fenix/-/commit/5c26f2353ef1ae1756cfee563db6f06614a76bd4
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


<    1   2