[tor-commits] [Git][tpo/applications/mullvad-browser] Pushed new tag mullvad-browser-115.10.0esr-13.0-1-build1

2024-04-08 Thread Pier Angelo Vendrame (@pierov) via tor-commits


Pier Angelo Vendrame pushed new tag mullvad-browser-115.10.0esr-13.0-1-build1 
at The Tor Project / Applications / Mullvad Browser

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/tree/mullvad-browser-115.10.0esr-13.0-1-build1
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/mullvad-browser][mullvad-browser-115.10.0esr-13.0-1] 20 commits: MB 38: Mullvad Browser configuration

2024-04-08 Thread richard (@richard) via tor-commits


richard pushed to branch mullvad-browser-115.10.0esr-13.0-1 at The Tor Project 
/ Applications / Mullvad Browser


Commits:
ab9a059e by Pier Angelo Vendrame at 2024-04-08T22:24:47+02:00
MB 38: Mullvad Browser configuration

- - - - -
3ea9f651 by Pier Angelo Vendrame at 2024-04-08T22:24:47+02:00
MB 1: Mullvad Browser branding

See also:
mullvad-browser#5: Product name and directory customization
mullvad-browser#12: Create new branding directories and integrate Mullvad 
icons+branding
mullvad-browser#14: Remove Default Built-in bookmarks
mullvad-browser#35: Add custom PDF icons for Windows builds
mullvad-browser#48: Replace Mozilla copyright and legal trademarks in 
mullvadbrowser.exe metadata
mullvad-browser#51: Update trademark string
mullvad-browser#104: Update shipped dll metadata copyright/licensing info
mullvad-browser#107: Add alpha and nightly icons

- - - - -
b2ac6bd8 by Pier Angelo Vendrame at 2024-04-08T22:24:47+02:00
MB 20: Allow packaged-addons in PBM.

We install a few addons from the distribution directory, but they are
not automatically enabled for PBM mode.
This commit modifies the code that installs them to also add the PBM
permission to the known ones.

- - - - -
c5b7f306 by Pier Angelo Vendrame at 2024-04-08T22:24:47+02:00
MB 63: Customize some about pages for Mullvad Browser

Also:
mullvad-browser#57: Purge unneeded about: pages

- - - - -
202a501a by Pier Angelo Vendrame at 2024-04-08T22:24:47+02:00
MB 37: Customization for the about dialog

- - - - -
60db32aa by Henry Wilkes at 2024-04-08T22:24:48+02:00
MB 39: Add home page about:mullvad-browser

- - - - -
1093b116 by Henry Wilkes at 2024-04-08T22:24:48+02:00
fixup! MB 39: Add home page about:mullvad-browser

Bug 271: Show update in about:mullvad-browser

- - - - -
de482aba by hackademix at 2024-04-08T22:24:48+02:00
MB 97: Remove UI cues to install new extensions.

- - - - -
37cdffef by hackademix at 2024-04-08T22:24:48+02:00
MB 47: uBlock Origin customization

- - - - -
246685ff by Pier Angelo Vendrame at 2024-04-08T22:24:49+02:00
MB 21: Disable the password manager

This commit disables the about:login page and removes the Login and
Password section of about:preferences.

We do not do anything to the real password manager of Firefox, that is
in toolkit: it contains C++ parts that make it difficult to actually
prevent it from being built..

Finally, we modify the the function that opens about:login to report an
error in the console so that we can quickly get a backtrace to the code
that tries to use it.

- - - - -
3226e13f by Pier Angelo Vendrame at 2024-04-08T22:24:49+02:00
MB 87: Disable the default browser box on Windows and Linux

Windows and Linux will be distributed only as portable apps at the
beginning, so they should not be settable as default browsers.
We will need to improve the logic once we decide to ship system-wide
installers, too.

- - - - -
e58605be by Pier Angelo Vendrame at 2024-04-08T22:24:49+02:00
MB 112: Updater customization for Mullvad Browser

MB 71: Set the updater base URL to Mullvad domain

- - - - -
f9964a97 by Henry Wilkes at 2024-04-08T22:24:49+02:00
fixup! MB 112: Updater customization for Mullvad Browser

Bug 271: Do not open update override page in a new tab, and show in
about:mullvad-browser instead.

- - - - -
b99eb01d by Nicolas Vigier at 2024-04-08T22:24:49+02:00
MB 79: Add Mullvad Browser MAR signing keys

MB 256: Add mullvad-browser nightly mar signing key

- - - - -
7fdc26ef by Pier Angelo Vendrame at 2024-04-08T22:24:50+02:00
MB 34: Hide unsafe and unwanted preferences UI

about:preferences allow to override some of our defaults, that could
be fingeprintable or have some other unwanted consequences.

- - - - -
b7661568 by Pier Angelo Vendrame at 2024-04-08T22:24:50+02:00
MB 160: Disable the cookie exceptions button

Besides disabling the Delete on close checkbox, disable also the
Manage Exceptions button when always using PBM.

- - - - -
0184e75e by hackademix at 2024-04-08T22:24:50+02:00
MB 163: prevent uBlock Origin from being uninstalled/disabled

- - - - -
7a95efda by Richard Pospesel at 2024-04-08T22:24:50+02:00
MB 188: Customize Gitlab Issue and Merge templates

- - - - -
3b8315c9 by rui hildt at 2024-04-08T22:24:50+02:00
MB 213: Customize the search engines list

- - - - -
430baa35 by hackademix at 2024-04-08T22:24:51+02:00
MB 214: Enable cross-tab identity leak protection in quiet mode

- - - - -


30 changed files:

- + .gitlab/issue_templates/Rebase Browser - Alpha.md
- + .gitlab/issue_templates/Rebase Browser - Stable.md
- .gitlab/merge_request_templates/default.md
- browser/app/Makefile.in
- browser/app/macbuild/Contents/Info.plist.in
- browser/app/module.ver
- browser/app/firefox.exe.manifest → browser/app/mullvadbrowser.exe.manifest
- + browser/app/profile/000-mullvad-browser.js
- browser/app/profile/001-base-profile.js
- browser/base/content/aboutDialog.xhtml
- browser/base/content/appmenu-viewcache.inc.xhtml
- browser/base/content/browser-menubar.inc
- 

[tor-commits] [Git][tpo/applications/tor-browser] Pushed new tag base-browser-115.10.0esr-13.0-1-build1

2024-04-08 Thread Pier Angelo Vendrame (@pierov) via tor-commits


Pier Angelo Vendrame pushed new tag base-browser-115.10.0esr-13.0-1-build1 at 
The Tor Project / Applications / Tor Browser

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/tree/base-browser-115.10.0esr-13.0-1-build1
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser] Pushed new branch base-browser-115.10.0esr-13.0-1

2024-04-08 Thread Pier Angelo Vendrame (@pierov) via tor-commits


Pier Angelo Vendrame pushed new branch base-browser-115.10.0esr-13.0-1 at The 
Tor Project / Applications / Tor Browser

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/tree/base-browser-115.10.0esr-13.0-1
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser] Pushed new tag tor-browser-115.10.0esr-13.0-1-build1

2024-04-08 Thread Pier Angelo Vendrame (@pierov) via tor-commits


Pier Angelo Vendrame pushed new tag tor-browser-115.10.0esr-13.0-1-build1 at 
The Tor Project / Applications / Tor Browser

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/tree/tor-browser-115.10.0esr-13.0-1-build1
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/mullvad-browser] Pushed new branch mullvad-browser-115.10.0esr-13.0-1

2024-04-08 Thread Pier Angelo Vendrame (@pierov) via tor-commits


Pier Angelo Vendrame pushed new branch mullvad-browser-115.10.0esr-13.0-1 at 
The Tor Project / Applications / Mullvad Browser

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/tree/mullvad-browser-115.10.0esr-13.0-1
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/mullvad-browser][mullvad-browser-115.9.0esr-13.5-1] fixup! MB 1: Mullvad Browser branding

2024-04-08 Thread richard (@richard) via tor-commits


richard pushed to branch mullvad-browser-115.9.0esr-13.5-1 at The Tor Project / 
Applications / Mullvad Browser


Commits:
8abd3ea6 by Pier Angelo Vendrame at 2024-04-08T20:15:44+00:00
fixup! MB 1: Mullvad Browser branding

Bug 42490: Write the browser logo SVG also outside of omni.ja.

For Mullvad Browser, we have to add this also to the various moz.build
that are inside each branding directory, because we do not call
FirefoxBranding for them.

- - - - -


3 changed files:

- browser/branding/mb-alpha/moz.build
- browser/branding/mb-nightly/moz.build
- browser/branding/mb-release/moz.build


Changes:

=
browser/branding/mb-alpha/moz.build
=
@@ -23,6 +23,7 @@ if CONFIG['MOZ_WIDGET_TOOLKIT'] == 'windows':
 ]
 elif CONFIG['MOZ_WIDGET_TOOLKIT'] == 'gtk':
 FINAL_TARGET_FILES.chrome.icons.default += [
+'content/about-logo.svg',
 'default128.png',
 'default16.png',
 'default256.png',


=
browser/branding/mb-nightly/moz.build
=
@@ -23,6 +23,7 @@ if CONFIG['MOZ_WIDGET_TOOLKIT'] == 'windows':
 ]
 elif CONFIG['MOZ_WIDGET_TOOLKIT'] == 'gtk':
 FINAL_TARGET_FILES.chrome.icons.default += [
+'content/about-logo.svg',
 'default128.png',
 'default16.png',
 'default256.png',


=
browser/branding/mb-release/moz.build
=
@@ -23,6 +23,7 @@ if CONFIG['MOZ_WIDGET_TOOLKIT'] == 'windows':
 ]
 elif CONFIG['MOZ_WIDGET_TOOLKIT'] == 'gtk':
 FINAL_TARGET_FILES.chrome.icons.default += [
+'content/about-logo.svg',
 'default128.png',
 'default16.png',
 'default256.png',



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/8abd3ea6ab6e40159fc996e707e58c01e3bfaf33

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/8abd3ea6ab6e40159fc996e707e58c01e3bfaf33
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser] Pushed new branch tor-browser-115.10.0esr-13.0-1

2024-04-08 Thread Pier Angelo Vendrame (@pierov) via tor-commits


Pier Angelo Vendrame pushed new branch tor-browser-115.10.0esr-13.0-1 at The 
Tor Project / Applications / Tor Browser

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/tree/tor-browser-115.10.0esr-13.0-1
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser] Pushed new tag FIREFOX_115_10_0esr_BUILD1

2024-04-08 Thread Pier Angelo Vendrame (@pierov) via tor-commits


Pier Angelo Vendrame pushed new tag FIREFOX_115_10_0esr_BUILD1 at The Tor 
Project / Applications / Tor Browser

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/tree/FIREFOX_115_10_0esr_BUILD1
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/mullvad-browser][mullvad-browser-115.9.1esr-13.0-1] fixup! Bug 41369: Improve Firefox language settings for multi-lingual packages

2024-04-08 Thread Pier Angelo Vendrame (@pierov) via tor-commits


Pier Angelo Vendrame pushed to branch mullvad-browser-115.9.1esr-13.0-1 at The 
Tor Project / Applications / Mullvad Browser


Commits:
e3dbf1b5 by Pier Angelo Vendrame at 2024-04-08T17:41:35+02:00
fixup! Bug 41369: Improve Firefox language settings for multi-lingual packages

Bug 42335: Do not localize the order of languages

- - - - -


1 changed file:

- browser/components/preferences/main.js


Changes:

=
browser/components/preferences/main.js
=
@@ -1463,7 +1463,9 @@ var gMainPane = {
 name,
   };
 });
-locales.sort((a, b) => a.code.localeCompare(b.code));
+// tor-browser#42335: Sort language codes independently from the locale,
+// so do not use localeCompare.
+locales.sort((a, b) => a.code > b.code);
 
 let fragment = document.createDocumentFragment();
 for (let { code, name } of locales) {



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/e3dbf1b5469e56a5e08521275205e8024c432eaa

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/e3dbf1b5469e56a5e08521275205e8024c432eaa
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][base-browser-115.9.1esr-13.0-1] fixup! Bug 41369: Improve Firefox language settings for multi-lingual packages

2024-04-08 Thread Pier Angelo Vendrame (@pierov) via tor-commits


Pier Angelo Vendrame pushed to branch base-browser-115.9.1esr-13.0-1 at The Tor 
Project / Applications / Tor Browser


Commits:
bbff47d9 by Pier Angelo Vendrame at 2024-04-08T17:41:07+02:00
fixup! Bug 41369: Improve Firefox language settings for multi-lingual packages

Bug 42335: Do not localize the order of languages

- - - - -


1 changed file:

- browser/components/preferences/main.js


Changes:

=
browser/components/preferences/main.js
=
@@ -1463,7 +1463,9 @@ var gMainPane = {
 name,
   };
 });
-locales.sort((a, b) => a.code.localeCompare(b.code));
+// tor-browser#42335: Sort language codes independently from the locale,
+// so do not use localeCompare.
+locales.sort((a, b) => a.code > b.code);
 
 let fragment = document.createDocumentFragment();
 for (let { code, name } of locales) {



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/bbff47d9a1003c7075ff490dd05e7dca390cd6b6

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/bbff47d9a1003c7075ff490dd05e7dca390cd6b6
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][tor-browser-115.9.1esr-13.0-1] fixup! Bug 41369: Improve Firefox language settings for multi-lingual packages

2024-04-08 Thread Pier Angelo Vendrame (@pierov) via tor-commits


Pier Angelo Vendrame pushed to branch tor-browser-115.9.1esr-13.0-1 at The Tor 
Project / Applications / Tor Browser


Commits:
c584d988 by Pier Angelo Vendrame at 2024-04-08T17:40:45+02:00
fixup! Bug 41369: Improve Firefox language settings for multi-lingual packages

Bug 42335: Do not localize the order of languages

- - - - -


1 changed file:

- browser/components/preferences/main.js


Changes:

=
browser/components/preferences/main.js
=
@@ -1456,7 +1456,9 @@ var gMainPane = {
 name,
   };
 });
-locales.sort((a, b) => a.code.localeCompare(b.code));
+// tor-browser#42335: Sort language codes independently from the locale,
+// so do not use localeCompare.
+locales.sort((a, b) => a.code > b.code);
 
 let fragment = document.createDocumentFragment();
 for (let { code, name } of locales) {



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/c584d9885c773f41cf67c73ca9a83de2d3a5b14e

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/c584d9885c773f41cf67c73ca9a83de2d3a5b14e
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/mullvad-browser][mullvad-browser-115.9.0esr-13.5-1] fixup! Base Browser's .mozconfigs.

2024-04-08 Thread Pier Angelo Vendrame (@pierov) via tor-commits


Pier Angelo Vendrame pushed to branch mullvad-browser-115.9.0esr-13.5-1 at The 
Tor Project / Applications / Mullvad Browser


Commits:
caf40825 by NoisyCoil at 2024-04-08T16:40:48+02:00
fixup! Base Browsers .mozconfigs.

Bug 42501: Move `--disable-eme` to OS- and architecture-specific
mozconfigs.

- - - - -


9 changed files:

- browser/config/mozconfigs/base-browser
- mozconfig-linux-i686
- mozconfig-linux-x86_64
- mozconfig-linux-x86_64-asan
- mozconfig-linux-x86_64-dev
- mozconfig-macos
- mozconfig-macos-dev
- mozconfig-windows-i686
- mozconfig-windows-x86_64


Changes:

=
browser/config/mozconfigs/base-browser
=
@@ -24,8 +24,6 @@ ac_add_options --disable-debug
 
 ac_add_options --disable-crashreporter
 ac_add_options --disable-parental-controls
-# Let's make sure no preference is enabling either Adobe's or Google's CDM.
-ac_add_options --disable-eme
 ac_add_options --enable-proxy-bypass-protection
 # See bugs #30575 and #32418: system policies are harmful either because they
 # could allow proxy bypass, and override a number of other preferences we set


=
mozconfig-linux-i686
=
@@ -10,3 +10,7 @@ ac_add_options --disable-strip
 ac_add_options --disable-install-strip
 
 ac_add_options --enable-default-toolkit=cairo-gtk3
+
+# Let's make sure no preference is enabling either Adobe's or Google's CDM.
+ac_add_options --disable-eme
+


=
mozconfig-linux-x86_64
=
@@ -7,3 +7,7 @@ ac_add_options --disable-strip
 ac_add_options --disable-install-strip
 
 ac_add_options --enable-default-toolkit=cairo-gtk3
+
+# Let's make sure no preference is enabling either Adobe's or Google's CDM.
+ac_add_options --disable-eme
+


=
mozconfig-linux-x86_64-asan
=
@@ -20,3 +20,7 @@ ac_add_options --enable-default-toolkit=cairo-gtk3
 
 ac_add_options --disable-strip
 ac_add_options --disable-install-strip
+
+# Let's make sure no preference is enabling either Adobe's or Google's CDM.
+ac_add_options --disable-eme
+


=
mozconfig-linux-x86_64-dev
=
@@ -17,3 +17,7 @@ ac_add_options --disable-install-strip
 
 ac_add_options --with-base-browser-version=dev-build
 ac_add_options --disable-base-browser-update
+
+# Let's make sure no preference is enabling either Adobe's or Google's CDM.
+ac_add_options --disable-eme
+


=
mozconfig-macos
=
@@ -10,3 +10,7 @@ ac_add_options --disable-update-agent
 
 # For base-browser we do not enable portable mode on macOS.
 ac_add_options --without-relative-data-dir
+
+# Let's make sure no preference is enabling either Adobe's or Google's CDM.
+ac_add_options --disable-eme
+


=
mozconfig-macos-dev
=
@@ -17,3 +17,6 @@ ac_add_options --enable-nss-mar
 # See bug #41131
 ac_add_options --disable-update-agent
 
+# Let's make sure no preference is enabling either Adobe's or Google's CDM.
+ac_add_options --disable-eme
+


=
mozconfig-windows-i686
=
@@ -19,3 +19,7 @@ ac_add_options --disable-update-agent
 # Bug 1782837: Not supported because Mozilla (and therefore also us) build
 # libc++ with LIBCXX_ENABLE_FILESYSTEM disabled.
 ac_add_options --disable-notification-server
+
+# Let's make sure no preference is enabling either Adobe's or Google's CDM.
+ac_add_options --disable-eme
+


=
mozconfig-windows-x86_64
=
@@ -18,3 +18,7 @@ ac_add_options --disable-update-agent
 # Bug 1782837: Not supported because Mozilla (and therefore also us) build
 # libc++ with LIBCXX_ENABLE_FILESYSTEM disabled.
 ac_add_options --disable-notification-server
+
+# Let's make sure no preference is enabling either Adobe's or Google's CDM.
+ac_add_options --disable-eme
+



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/caf4082513c0f802b2224941d091be1377027b26

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/caf4082513c0f802b2224941d091be1377027b26
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][base-browser-115.9.0esr-13.5-1] fixup! Base Browser's .mozconfigs.

2024-04-08 Thread Pier Angelo Vendrame (@pierov) via tor-commits


Pier Angelo Vendrame pushed to branch base-browser-115.9.0esr-13.5-1 at The Tor 
Project / Applications / Tor Browser


Commits:
2c131c74 by NoisyCoil at 2024-04-08T16:34:40+02:00
fixup! Base Browsers .mozconfigs.

Bug 42501: Move `--disable-eme` to OS- and architecture-specific
mozconfigs.

- - - - -


9 changed files:

- browser/config/mozconfigs/base-browser
- mozconfig-linux-i686
- mozconfig-linux-x86_64
- mozconfig-linux-x86_64-asan
- mozconfig-linux-x86_64-dev
- mozconfig-macos
- mozconfig-macos-dev
- mozconfig-windows-i686
- mozconfig-windows-x86_64


Changes:

=
browser/config/mozconfigs/base-browser
=
@@ -29,8 +29,6 @@ ac_add_options --disable-crashreporter
 # Before removing, please notice that WebRTC does not work on mingw (Bug 
1393901)
 ac_add_options --disable-webrtc
 ac_add_options --disable-parental-controls
-# Let's make sure no preference is enabling either Adobe's or Google's CDM.
-ac_add_options --disable-eme
 ac_add_options --enable-proxy-bypass-protection
 # See bugs #30575 and #32418: system policies are harmful either because they
 # could allow proxy bypass, and override a number of other preferences we set


=
mozconfig-linux-i686
=
@@ -10,3 +10,7 @@ ac_add_options --disable-strip
 ac_add_options --disable-install-strip
 
 ac_add_options --enable-default-toolkit=cairo-gtk3
+
+# Let's make sure no preference is enabling either Adobe's or Google's CDM.
+ac_add_options --disable-eme
+


=
mozconfig-linux-x86_64
=
@@ -7,3 +7,7 @@ ac_add_options --disable-strip
 ac_add_options --disable-install-strip
 
 ac_add_options --enable-default-toolkit=cairo-gtk3
+
+# Let's make sure no preference is enabling either Adobe's or Google's CDM.
+ac_add_options --disable-eme
+


=
mozconfig-linux-x86_64-asan
=
@@ -20,3 +20,7 @@ ac_add_options --enable-default-toolkit=cairo-gtk3
 
 ac_add_options --disable-strip
 ac_add_options --disable-install-strip
+
+# Let's make sure no preference is enabling either Adobe's or Google's CDM.
+ac_add_options --disable-eme
+


=
mozconfig-linux-x86_64-dev
=
@@ -16,3 +16,7 @@ ac_add_options --disable-install-strip
 
 ac_add_options --with-base-browser-version=dev-build
 ac_add_options --disable-base-browser-update
+
+# Let's make sure no preference is enabling either Adobe's or Google's CDM.
+ac_add_options --disable-eme
+


=
mozconfig-macos
=
@@ -10,3 +10,7 @@ ac_add_options --disable-update-agent
 
 # For base-browser we do not enable portable mode on macOS.
 ac_add_options --without-relative-data-dir
+
+# Let's make sure no preference is enabling either Adobe's or Google's CDM.
+ac_add_options --disable-eme
+


=
mozconfig-macos-dev
=
@@ -17,3 +17,6 @@ ac_add_options --enable-nss-mar
 # See bug #41131
 ac_add_options --disable-update-agent
 
+# Let's make sure no preference is enabling either Adobe's or Google's CDM.
+ac_add_options --disable-eme
+


=
mozconfig-windows-i686
=
@@ -19,3 +19,7 @@ ac_add_options --disable-update-agent
 # Bug 1782837: Not supported because Mozilla (and therefore also us) build
 # libc++ with LIBCXX_ENABLE_FILESYSTEM disabled.
 ac_add_options --disable-notification-server
+
+# Let's make sure no preference is enabling either Adobe's or Google's CDM.
+ac_add_options --disable-eme
+


=
mozconfig-windows-x86_64
=
@@ -19,3 +19,7 @@ ac_add_options --disable-update-agent
 # Bug 1782837: Not supported because Mozilla (and therefore also us) build
 # libc++ with LIBCXX_ENABLE_FILESYSTEM disabled.
 ac_add_options --disable-notification-server
+
+# Let's make sure no preference is enabling either Adobe's or Google's CDM.
+ac_add_options --disable-eme
+



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/2c131c74e5bdb58adeb798800f6c0ee63c02f883

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/2c131c74e5bdb58adeb798800f6c0ee63c02f883
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][base-browser-115.9.0esr-13.5-1] fixup! Base Browser's .mozconfigs.

2024-04-08 Thread Pier Angelo Vendrame (@pierov) via tor-commits


Pier Angelo Vendrame pushed to branch base-browser-115.9.0esr-13.5-1 at The Tor 
Project / Applications / Tor Browser


Commits:
91bc2eb9 by NoisyCoil at 2024-04-08T16:28:56+02:00
fixup! Base Browsers .mozconfigs.

Bug 42491: Add mozconfig-linux-aarch64.

- - - - -


1 changed file:

- + mozconfig-linux-aarch64


Changes:

=
mozconfig-linux-aarch64
=
@@ -0,0 +1,12 @@
+. $topsrcdir/browser/config/mozconfigs/base-browser
+
+ac_add_options --target=aarch64-unknown-linux-gnu
+
+# Moz switched to lld for all Linux targets in Bug 1839739.
+ac_add_options --enable-linker=lld
+
+ac_add_options --disable-strip
+ac_add_options --disable-install-strip
+
+ac_add_options --enable-default-toolkit=cairo-gtk3
+



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/91bc2eb98e6ab5409172ceee4a69c307c4904afd

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/91bc2eb98e6ab5409172ceee4a69c307c4904afd
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][tor-browser-115.9.0esr-13.5-1] 2 commits: fixup! Base Browser's .mozconfigs.

2024-04-08 Thread Pier Angelo Vendrame (@pierov) via tor-commits


Pier Angelo Vendrame pushed to branch tor-browser-115.9.0esr-13.5-1 at The Tor 
Project / Applications / Tor Browser


Commits:
55a8e45b by NoisyCoil at 2024-04-08T14:22:45+00:00
fixup! Base Browsers .mozconfigs.

Bug 42491: Add mozconfig-linux-aarch64.

- - - - -
27fee80a by NoisyCoil at 2024-04-08T14:22:45+00:00
fixup! TB3: Tor Browsers official .mozconfigs.

- - - - -


1 changed file:

- + mozconfig-linux-aarch64


Changes:

=
mozconfig-linux-aarch64
=
@@ -0,0 +1,12 @@
+. $topsrcdir/browser/config/mozconfigs/tor-browser
+
+ac_add_options --target=aarch64-unknown-linux-gnu
+
+# Moz switched to lld for all Linux targets in Bug 1839739.
+ac_add_options --enable-linker=lld
+
+ac_add_options --disable-strip
+ac_add_options --disable-install-strip
+
+ac_add_options --enable-default-toolkit=cairo-gtk3
+



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/compare/9ed772d18c7d04eec44e6272d31293a7d74a1d19...27fee80ae39ee99235a8a6d9063ac4cf92a1bc28

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/compare/9ed772d18c7d04eec44e6272d31293a7d74a1d19...27fee80ae39ee99235a8a6d9063ac4cf92a1bc28
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/mullvad-browser][mullvad-browser-115.9.0esr-13.5-1] fixup! Base Browser's .mozconfigs.

2024-04-08 Thread Pier Angelo Vendrame (@pierov) via tor-commits


Pier Angelo Vendrame pushed to branch mullvad-browser-115.9.0esr-13.5-1 at The 
Tor Project / Applications / Mullvad Browser


Commits:
c3b548a0 by NoisyCoil at 2024-04-08T13:17:33+00:00
fixup! Base Browsers .mozconfigs.

Bug 279: Add mozconfig-linux-aarch64.

- - - - -


1 changed file:

- + mozconfig-linux-aarch64


Changes:

=
mozconfig-linux-aarch64
=
@@ -0,0 +1,12 @@
+. $topsrcdir/browser/config/mozconfigs/mullvad-browser
+
+ac_add_options --target=aarch64-unknown-linux-gnu
+
+# Moz switched to lld for all Linux targets in Bug 1839739.
+ac_add_options --enable-linker=lld
+
+ac_add_options --disable-strip
+ac_add_options --disable-install-strip
+
+ac_add_options --enable-default-toolkit=cairo-gtk3
+



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/c3b548a0b0834ec012183e13028c6cd83e3a8ff6

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/c3b548a0b0834ec012183e13028c6cd83e3a8ff6
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][tor-browser-115.9.0esr-13.5-1] fixup! Base Browser's .mozconfigs.

2024-04-08 Thread Pier Angelo Vendrame (@pierov) via tor-commits


Pier Angelo Vendrame pushed to branch tor-browser-115.9.0esr-13.5-1 at The Tor 
Project / Applications / Tor Browser


Commits:
9ed772d1 by NoisyCoil at 2024-04-08T13:14:13+00:00
fixup! Base Browsers .mozconfigs.

Bug 42501: Move `--disable-eme` to OS- and architecture-specific
mozconfigs.

- - - - -


9 changed files:

- browser/config/mozconfigs/base-browser
- mozconfig-linux-i686
- mozconfig-linux-x86_64
- mozconfig-linux-x86_64-asan
- mozconfig-linux-x86_64-dev
- mozconfig-macos
- mozconfig-macos-dev
- mozconfig-windows-i686
- mozconfig-windows-x86_64


Changes:

=
browser/config/mozconfigs/base-browser
=
@@ -26,8 +26,6 @@ ac_add_options --disable-crashreporter
 # Before removing, please notice that WebRTC does not work on mingw (Bug 
1393901)
 ac_add_options --disable-webrtc
 ac_add_options --disable-parental-controls
-# Let's make sure no preference is enabling either Adobe's or Google's CDM.
-ac_add_options --disable-eme
 ac_add_options --enable-proxy-bypass-protection
 # See bugs #30575 and #32418: system policies are harmful either because they
 # could allow proxy bypass, and override a number of other preferences we set


=
mozconfig-linux-i686
=
@@ -10,3 +10,7 @@ ac_add_options --disable-strip
 ac_add_options --disable-install-strip
 
 ac_add_options --enable-default-toolkit=cairo-gtk3
+
+# Let's make sure no preference is enabling either Adobe's or Google's CDM.
+ac_add_options --disable-eme
+


=
mozconfig-linux-x86_64
=
@@ -7,3 +7,7 @@ ac_add_options --disable-strip
 ac_add_options --disable-install-strip
 
 ac_add_options --enable-default-toolkit=cairo-gtk3
+
+# Let's make sure no preference is enabling either Adobe's or Google's CDM.
+ac_add_options --disable-eme
+


=
mozconfig-linux-x86_64-asan
=
@@ -20,3 +20,7 @@ ac_add_options --enable-default-toolkit=cairo-gtk3
 
 ac_add_options --disable-strip
 ac_add_options --disable-install-strip
+
+# Let's make sure no preference is enabling either Adobe's or Google's CDM.
+ac_add_options --disable-eme
+


=
mozconfig-linux-x86_64-dev
=
@@ -18,3 +18,7 @@ ac_add_options --disable-install-strip
 
 ac_add_options --with-base-browser-version=dev-build
 ac_add_options --disable-base-browser-update
+
+# Let's make sure no preference is enabling either Adobe's or Google's CDM.
+ac_add_options --disable-eme
+


=
mozconfig-macos
=
@@ -9,3 +9,7 @@ ac_add_options --enable-nss-mar
 ac_add_options --disable-update-agent
 
 ac_add_options --with-relative-data-dir=../TorBrowser-Data/Browser
+
+# Let's make sure no preference is enabling either Adobe's or Google's CDM.
+ac_add_options --disable-eme
+


=
mozconfig-macos-dev
=
@@ -22,3 +22,7 @@ export MOZ_APP_REMOTINGNAME="Tor Browser Dev"
 ac_add_options --with-branding=browser/branding/tb-nightly
 ac_add_options --with-base-browser-version=dev-build
 ac_add_options --disable-base-browser-update
+
+# Let's make sure no preference is enabling either Adobe's or Google's CDM.
+ac_add_options --disable-eme
+


=
mozconfig-windows-i686
=
@@ -19,3 +19,7 @@ ac_add_options --disable-update-agent
 # Bug 1782837: Not supported because Mozilla (and therefore also us) build
 # libc++ with LIBCXX_ENABLE_FILESYSTEM disabled.
 ac_add_options --disable-notification-server
+
+# Let's make sure no preference is enabling either Adobe's or Google's CDM.
+ac_add_options --disable-eme
+


=
mozconfig-windows-x86_64
=
@@ -19,3 +19,7 @@ ac_add_options --disable-update-agent
 # Bug 1782837: Not supported because Mozilla (and therefore also us) build
 # libc++ with LIBCXX_ENABLE_FILESYSTEM disabled.
 ac_add_options --disable-notification-server
+
+# Let's make sure no preference is enabling either Adobe's or Google's CDM.
+ac_add_options --disable-eme
+



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/9ed772d18c7d04eec44e6272d31293a7d74a1d19

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/9ed772d18c7d04eec44e6272d31293a7d74a1d19
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/mullvad-browser][mullvad-browser-115.9.1esr-13.0-1] 3 commits: fixup! Firefox preference overrides.

2024-04-08 Thread Pier Angelo Vendrame (@pierov) via tor-commits


Pier Angelo Vendrame pushed to branch mullvad-browser-115.9.1esr-13.0-1 at The 
Tor Project / Applications / Mullvad Browser


Commits:
aba1e5a0 by Pier Angelo Vendrame at 2024-04-08T12:52:20+02:00
fixup! Firefox preference overrides.

Bug 41676: Set privacy.resistFingerprinting.testing.setTZtoUTC as a
defense-in-depth.

We will have to revert this during the ESR-transition.

- - - - -
81838b89 by Pier Angelo Vendrame at 2024-04-08T12:52:22+02:00
Bug 42428: Make RFP spoof the timezone of document.lastModified.

- - - - -
1b1e94cd by Pier Angelo Vendrame at 2024-04-08T12:52:22+02:00
Bug 42472: Spoof timezone in XSLT.

- - - - -


3 changed files:

- browser/app/profile/001-base-profile.js
- dom/base/Document.cpp
- dom/xslt/xslt/txEXSLTFunctions.cpp


Changes:

=
browser/app/profile/001-base-profile.js
=
@@ -396,6 +396,9 @@ pref("browser.display.use_system_colors", false);
 // Enforce non-native widget theme (true by default, defense in depth).
 // Provides a uniform look and feel across platforms. Added with 
tor-browser#41496.
 pref("widget.non-native-theme.enabled", true);
+// tor-browser#41676: Set the TZ environment variable as a defense-in-depth.
+// TODO: Remove this in ESR-128, as it has been removed in 116 with Bug 
1837582.
+pref("privacy.resistFingerprinting.testing.setTZtoUTC", true);
 
 // tor-browser#41943: lock and revisit after it gets flipped to true in stable 
Firefox
 pref("javascript.options.spectre.disable_for_isolated_content", false, locked);


=
dom/base/Document.cpp
=
@@ -4103,10 +4103,11 @@ void Document::SetDocumentURI(nsIURI* aURI) {
   }
 }
 
-static void GetFormattedTimeString(PRTime aTime,
+static void GetFormattedTimeString(PRTime aTime, bool aUniversal,
nsAString& aFormattedTimeString) {
   PRExplodedTime prtime;
-  PR_ExplodeTime(aTime, PR_LocalTimeParameters, );
+  PR_ExplodeTime(aTime, aUniversal ? PR_GMTParameters : PR_LocalTimeParameters,
+ );
   // "MM/DD/ hh:mm:ss"
   char formatedTime[24];
   if (SprintfLiteral(formatedTime, "%02d/%02d/%04d %02d:%02d:%02d",
@@ -4124,7 +4125,9 @@ void Document::GetLastModified(nsAString& aLastModified) 
const {
   if (!mLastModified.IsEmpty()) {
 aLastModified.Assign(mLastModified);
   } else {
-GetFormattedTimeString(PR_Now(), aLastModified);
+GetFormattedTimeString(PR_Now(),
+   ShouldResistFingerprinting(RFPTarget::Unknown),
+   aLastModified);
   }
 }
 
@@ -11053,7 +11056,8 @@ void Document::RetrieveRelevantHeaders(nsIChannel* 
aChannel) {
 
   mLastModified.Truncate();
   if (modDate != 0) {
-GetFormattedTimeString(modDate, mLastModified);
+GetFormattedTimeString(
+modDate, ShouldResistFingerprinting(RFPTarget::Unknown), 
mLastModified);
   }
 }
 


=
dom/xslt/xslt/txEXSLTFunctions.cpp
=
@@ -591,7 +591,14 @@ nsresult txEXSLTFunctionCall::evaluate(txIEvalContext* 
aContext,
   // http://exslt.org/date/functions/date-time/
 
   PRExplodedTime prtime;
-  PR_ExplodeTime(PR_Now(), PR_LocalTimeParameters, );
+  PR_ExplodeTime(
+  PR_Now(),
+  // We are not allowed to access the Document when evaluating this, so
+  // fall back to the general function.
+  nsContentUtils::ShouldResistFingerprinting(RFPTarget::Unknown)
+  ? PR_GMTParameters
+  : PR_LocalTimeParameters,
+  );
 
   int32_t offset =
   (prtime.tm_params.tp_gmt_offset + prtime.tm_params.tp_dst_offset) /



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/compare/6cd85fb35acc85901d9ae5501a55b117d91a78d3...1b1e94cdbcd211d9a547c8e06bfcd7b92e491b44

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/compare/6cd85fb35acc85901d9ae5501a55b117d91a78d3...1b1e94cdbcd211d9a547c8e06bfcd7b92e491b44
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][base-browser-115.9.1esr-13.0-1] 3 commits: fixup! Firefox preference overrides.

2024-04-08 Thread Pier Angelo Vendrame (@pierov) via tor-commits


Pier Angelo Vendrame pushed to branch base-browser-115.9.1esr-13.0-1 at The Tor 
Project / Applications / Tor Browser


Commits:
5c690113 by Pier Angelo Vendrame at 2024-04-08T12:51:54+02:00
fixup! Firefox preference overrides.

Bug 41676: Set privacy.resistFingerprinting.testing.setTZtoUTC as a
defense-in-depth.

We will have to revert this during the ESR-transition.

- - - - -
d1e8e6ba by Pier Angelo Vendrame at 2024-04-08T12:51:55+02:00
Bug 42428: Make RFP spoof the timezone of document.lastModified.

- - - - -
a975b00f by Pier Angelo Vendrame at 2024-04-08T12:51:56+02:00
Bug 42472: Spoof timezone in XSLT.

- - - - -


3 changed files:

- browser/app/profile/001-base-profile.js
- dom/base/Document.cpp
- dom/xslt/xslt/txEXSLTFunctions.cpp


Changes:

=
browser/app/profile/001-base-profile.js
=
@@ -397,6 +397,9 @@ pref("browser.display.use_system_colors", false);
 // Enforce non-native widget theme (true by default, defense in depth).
 // Provides a uniform look and feel across platforms. Added with 
tor-browser#41496.
 pref("widget.non-native-theme.enabled", true);
+// tor-browser#41676: Set the TZ environment variable as a defense-in-depth.
+// TODO: Remove this in ESR-128, as it has been removed in 116 with Bug 
1837582.
+pref("privacy.resistFingerprinting.testing.setTZtoUTC", true);
 
 // tor-browser#41943: lock and revisit after it gets flipped to true in stable 
Firefox
 pref("javascript.options.spectre.disable_for_isolated_content", false, locked);


=
dom/base/Document.cpp
=
@@ -4103,10 +4103,11 @@ void Document::SetDocumentURI(nsIURI* aURI) {
   }
 }
 
-static void GetFormattedTimeString(PRTime aTime,
+static void GetFormattedTimeString(PRTime aTime, bool aUniversal,
nsAString& aFormattedTimeString) {
   PRExplodedTime prtime;
-  PR_ExplodeTime(aTime, PR_LocalTimeParameters, );
+  PR_ExplodeTime(aTime, aUniversal ? PR_GMTParameters : PR_LocalTimeParameters,
+ );
   // "MM/DD/ hh:mm:ss"
   char formatedTime[24];
   if (SprintfLiteral(formatedTime, "%02d/%02d/%04d %02d:%02d:%02d",
@@ -4124,7 +4125,9 @@ void Document::GetLastModified(nsAString& aLastModified) 
const {
   if (!mLastModified.IsEmpty()) {
 aLastModified.Assign(mLastModified);
   } else {
-GetFormattedTimeString(PR_Now(), aLastModified);
+GetFormattedTimeString(PR_Now(),
+   ShouldResistFingerprinting(RFPTarget::Unknown),
+   aLastModified);
   }
 }
 
@@ -11053,7 +11056,8 @@ void Document::RetrieveRelevantHeaders(nsIChannel* 
aChannel) {
 
   mLastModified.Truncate();
   if (modDate != 0) {
-GetFormattedTimeString(modDate, mLastModified);
+GetFormattedTimeString(
+modDate, ShouldResistFingerprinting(RFPTarget::Unknown), 
mLastModified);
   }
 }
 


=
dom/xslt/xslt/txEXSLTFunctions.cpp
=
@@ -591,7 +591,14 @@ nsresult txEXSLTFunctionCall::evaluate(txIEvalContext* 
aContext,
   // http://exslt.org/date/functions/date-time/
 
   PRExplodedTime prtime;
-  PR_ExplodeTime(PR_Now(), PR_LocalTimeParameters, );
+  PR_ExplodeTime(
+  PR_Now(),
+  // We are not allowed to access the Document when evaluating this, so
+  // fall back to the general function.
+  nsContentUtils::ShouldResistFingerprinting(RFPTarget::Unknown)
+  ? PR_GMTParameters
+  : PR_LocalTimeParameters,
+  );
 
   int32_t offset =
   (prtime.tm_params.tp_gmt_offset + prtime.tm_params.tp_dst_offset) /



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/compare/9cd4e95a9088876697cefbe1c1a76f7f967e5b06...a975b00f0073ebeb120fcf8fc3d939e39cc466e1

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/compare/9cd4e95a9088876697cefbe1c1a76f7f967e5b06...a975b00f0073ebeb120fcf8fc3d939e39cc466e1
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][tor-browser-115.9.1esr-13.0-1] 3 commits: fixup! Firefox preference overrides.

2024-04-08 Thread Pier Angelo Vendrame (@pierov) via tor-commits


Pier Angelo Vendrame pushed to branch tor-browser-115.9.1esr-13.0-1 at The Tor 
Project / Applications / Tor Browser


Commits:
59d59b87 by Pier Angelo Vendrame at 2024-04-08T12:48:52+02:00
fixup! Firefox preference overrides.

Bug 41676: Set privacy.resistFingerprinting.testing.setTZtoUTC as a
defense-in-depth.

We will have to revert this during the ESR-transition.

- - - - -
e29b76ff by Pier Angelo Vendrame at 2024-04-08T12:50:50+02:00
Bug 42428: Make RFP spoof the timezone of document.lastModified.

- - - - -
4b70c6b0 by Pier Angelo Vendrame at 2024-04-08T12:51:14+02:00
Bug 42472: Spoof timezone in XSLT.

- - - - -


3 changed files:

- browser/app/profile/001-base-profile.js
- dom/base/Document.cpp
- dom/xslt/xslt/txEXSLTFunctions.cpp


Changes:

=
browser/app/profile/001-base-profile.js
=
@@ -397,6 +397,9 @@ pref("browser.display.use_system_colors", false);
 // Enforce non-native widget theme (true by default, defense in depth).
 // Provides a uniform look and feel across platforms. Added with 
tor-browser#41496.
 pref("widget.non-native-theme.enabled", true);
+// tor-browser#41676: Set the TZ environment variable as a defense-in-depth.
+// TODO: Remove this in ESR-128, as it has been removed in 116 with Bug 
1837582.
+pref("privacy.resistFingerprinting.testing.setTZtoUTC", true);
 
 // tor-browser#41943: lock and revisit after it gets flipped to true in stable 
Firefox
 pref("javascript.options.spectre.disable_for_isolated_content", false, locked);


=
dom/base/Document.cpp
=
@@ -4104,10 +4104,11 @@ void Document::SetDocumentURI(nsIURI* aURI) {
   }
 }
 
-static void GetFormattedTimeString(PRTime aTime,
+static void GetFormattedTimeString(PRTime aTime, bool aUniversal,
nsAString& aFormattedTimeString) {
   PRExplodedTime prtime;
-  PR_ExplodeTime(aTime, PR_LocalTimeParameters, );
+  PR_ExplodeTime(aTime, aUniversal ? PR_GMTParameters : PR_LocalTimeParameters,
+ );
   // "MM/DD/ hh:mm:ss"
   char formatedTime[24];
   if (SprintfLiteral(formatedTime, "%02d/%02d/%04d %02d:%02d:%02d",
@@ -4125,7 +4126,9 @@ void Document::GetLastModified(nsAString& aLastModified) 
const {
   if (!mLastModified.IsEmpty()) {
 aLastModified.Assign(mLastModified);
   } else {
-GetFormattedTimeString(PR_Now(), aLastModified);
+GetFormattedTimeString(PR_Now(),
+   ShouldResistFingerprinting(RFPTarget::Unknown),
+   aLastModified);
   }
 }
 
@@ -3,7 +6,8 @@ void Document::RetrieveRelevantHeaders(nsIChannel* 
aChannel) {
 
   mLastModified.Truncate();
   if (modDate != 0) {
-GetFormattedTimeString(modDate, mLastModified);
+GetFormattedTimeString(
+modDate, ShouldResistFingerprinting(RFPTarget::Unknown), 
mLastModified);
   }
 }
 


=
dom/xslt/xslt/txEXSLTFunctions.cpp
=
@@ -591,7 +591,14 @@ nsresult txEXSLTFunctionCall::evaluate(txIEvalContext* 
aContext,
   // http://exslt.org/date/functions/date-time/
 
   PRExplodedTime prtime;
-  PR_ExplodeTime(PR_Now(), PR_LocalTimeParameters, );
+  PR_ExplodeTime(
+  PR_Now(),
+  // We are not allowed to access the Document when evaluating this, so
+  // fall back to the general function.
+  nsContentUtils::ShouldResistFingerprinting(RFPTarget::Unknown)
+  ? PR_GMTParameters
+  : PR_LocalTimeParameters,
+  );
 
   int32_t offset =
   (prtime.tm_params.tp_gmt_offset + prtime.tm_params.tp_dst_offset) /



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/compare/e69ef25e035e3fd36772da9e2e38925a6c69c092...4b70c6b02d980a3f6d92975ffb79115d70a8a732

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/compare/e69ef25e035e3fd36772da9e2e38925a6c69c092...4b70c6b02d980a3f6d92975ffb79115d70a8a732
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser-build][maint-13.0] Bug 41110: Avoid Fontconfig warning about "ambiguous path"

2024-04-08 Thread Pier Angelo Vendrame (@pierov) via tor-commits


Pier Angelo Vendrame pushed to branch maint-13.0 at The Tor Project / 
Applications / tor-browser-build


Commits:
f834378b by Rusty Bird at 2024-04-08T12:37:48+02:00
Bug 41110: Avoid Fontconfig warning about ambiguous path

- - - - -


1 changed file:

- projects/browser/Bundle-Data/linux/Data/fontconfig/fonts.conf


Changes:

=
projects/browser/Bundle-Data/linux/Data/fontconfig/fonts.conf
=
@@ -39,7 +39,7 @@ PERFORMANCE OF THIS SOFTWARE.
 
 
 
-   fonts
+   fonts
 
 

[tor-commits] [Git][tpo/applications/mullvad-browser][mullvad-browser-115.9.0esr-13.5-1] fixup! Bug 40926: Implemented the New Identity feature

2024-04-08 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch mullvad-browser-115.9.0esr-13.5-1 at The Tor Project / 
Applications / Mullvad Browser


Commits:
1c3780c3 by hackademix at 2024-04-08T09:42:42+02:00
fixup! Bug 40926: Implemented the New Identity feature

MB 283: Make new identity homepage check brand-agnostic.

- - - - -


1 changed file:

- browser/components/newidentity/content/newidentity.js


Changes:

=
browser/components/newidentity/content/newidentity.js
=
@@ -398,8 +398,11 @@ XPCOMUtils.defineLazyGetter(this, "NewIdentityButton", () 
=> {
 const homePref = "browser.startup.homepage";
 const trustedHomePref = "browser.startup.homepage.new_identity";
 const homeURL = Services.prefs.getStringPref(homePref, "");
+const defaultHomeURL = Services.prefs
+  .getDefaultBranch("")
+  .getStringPref(homePref, "");
 const isTrustedHome =
-  homeURL === "about:tor" ||
+  homeURL === defaultHomeURL ||
   homeURL.startsWith("chrome://") || // about:blank and other built-ins
   homeURL === Services.prefs.getStringPref(trustedHomePref, "");
 const isCustomHome =



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/1c3780c33bf57714c959e3db3809138f6ee178f3

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/1c3780c33bf57714c959e3db3809138f6ee178f3
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/mullvad-browser][mullvad-browser-115.9.0esr-13.5-1] fixup! MB 1: Mullvad Browser branding

2024-04-08 Thread Pier Angelo Vendrame (@pierov) via tor-commits


Pier Angelo Vendrame pushed to branch mullvad-browser-115.9.0esr-13.5-1 at The 
Tor Project / Applications / Mullvad Browser


Commits:
54e1ff1a by Pier Angelo Vendrame at 2024-04-08T09:40:46+02:00
fixup! MB 1: Mullvad Browser branding

Bug 42490: Write the browser logo SVG also outside of omni.ja.

- - - - -


2 changed files:

- browser/branding/branding-common.mozbuild
- browser/installer/package-manifest.in


Changes:

=
browser/branding/branding-common.mozbuild
=
@@ -25,6 +25,7 @@ def FirefoxBranding():
 ]
 elif CONFIG['MOZ_WIDGET_TOOLKIT'] == 'gtk':
 FINAL_TARGET_FILES.chrome.icons.default += [
+'content/about-logo.svg',
 'default128.png',
 'default16.png',
 'default256.png',


=
browser/installer/package-manifest.in
=
@@ -228,6 +228,7 @@
 @RESPATH@/chrome/toolkit@JAREXT@
 @RESPATH@/chrome/toolkit.manifest
 #ifdef MOZ_GTK
+@RESPATH@/browser/chrome/icons/default/about-logo.svg
 @RESPATH@/browser/chrome/icons/default/default16.png
 @RESPATH@/browser/chrome/icons/default/default32.png
 @RESPATH@/browser/chrome/icons/default/default48.png



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/54e1ff1a967ad81187d7724df8627f145a247bce

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/54e1ff1a967ad81187d7724df8627f145a247bce
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][base-browser-115.9.0esr-13.5-1] fixup! Bug 40926: Implemented the New Identity feature

2024-04-08 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch base-browser-115.9.0esr-13.5-1 at The Tor Project / 
Applications / Tor Browser


Commits:
96048e5a by hackademix at 2024-04-08T09:39:24+02:00
fixup! Bug 40926: Implemented the New Identity feature

MB 283: Make new identity homepage check brand-agnostic.

- - - - -


1 changed file:

- browser/components/newidentity/content/newidentity.js


Changes:

=
browser/components/newidentity/content/newidentity.js
=
@@ -398,8 +398,11 @@ XPCOMUtils.defineLazyGetter(this, "NewIdentityButton", () 
=> {
 const homePref = "browser.startup.homepage";
 const trustedHomePref = "browser.startup.homepage.new_identity";
 const homeURL = Services.prefs.getStringPref(homePref, "");
+const defaultHomeURL = Services.prefs
+  .getDefaultBranch("")
+  .getStringPref(homePref, "");
 const isTrustedHome =
-  homeURL === "about:tor" ||
+  homeURL === defaultHomeURL ||
   homeURL.startsWith("chrome://") || // about:blank and other built-ins
   homeURL === Services.prefs.getStringPref(trustedHomePref, "");
 const isCustomHome =



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/96048e5a606a85de4ce8f913f72c1a0b6aa81a9b

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/96048e5a606a85de4ce8f913f72c1a0b6aa81a9b
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][tor-browser-115.9.0esr-13.5-1] fixup! Bug 40926: Implemented the New Identity feature

2024-04-08 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch tor-browser-115.9.0esr-13.5-1 at The Tor Project / 
Applications / Tor Browser


Commits:
4d7d8276 by hackademix at 2024-04-08T09:31:41+02:00
fixup! Bug 40926: Implemented the New Identity feature

MB 283: Make new identity homepage check brand-agnostic.

- - - - -


1 changed file:

- browser/components/newidentity/content/newidentity.js


Changes:

=
browser/components/newidentity/content/newidentity.js
=
@@ -398,8 +398,11 @@ XPCOMUtils.defineLazyGetter(this, "NewIdentityButton", () 
=> {
 const homePref = "browser.startup.homepage";
 const trustedHomePref = "browser.startup.homepage.new_identity";
 const homeURL = Services.prefs.getStringPref(homePref, "");
+const defaultHomeURL = Services.prefs
+  .getDefaultBranch("")
+  .getStringPref(homePref, "");
 const isTrustedHome =
-  homeURL === "about:tor" ||
+  homeURL === defaultHomeURL ||
   homeURL.startsWith("chrome://") || // about:blank and other built-ins
   homeURL === Services.prefs.getStringPref(trustedHomePref, "");
 const isCustomHome =



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/4d7d82768694b80a2621228cc78c1379958e2733

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/4d7d82768694b80a2621228cc78c1379958e2733
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][tor-browser-115.9.0esr-13.5-1] 2 commits: fixup! Bug 2176: Rebrand Firefox to TorBrowser

2024-04-08 Thread Pier Angelo Vendrame (@pierov) via tor-commits


Pier Angelo Vendrame pushed to branch tor-browser-115.9.0esr-13.5-1 at The Tor 
Project / Applications / Tor Browser


Commits:
e0cdf1dc by Pier Angelo Vendrame at 2024-03-28T19:38:41+01:00
fixup! Bug 2176: Rebrand Firefox to TorBrowser

Bug 42490: Write the browser logo SVG also outside of omni.ja.

- - - - -
224492f6 by Pier Angelo Vendrame at 2024-03-28T19:38:42+01:00
fixup! Bug 7494: Create local home page for TBB.

Bug 42490: Write the browser logo SVG also outside of omni.ja.

Update the path to the Tor Browser logo.

- - - - -


4 changed files:

- browser/branding/branding-common.mozbuild
- browser/branding/tb-alpha/content/about-logo.svg
- browser/branding/tb-alpha/content/jar.mn
- − browser/branding/tb-alpha/content/tor-browser-logo.svg


The diff was not included because it is too large.


View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/compare/494af37613c7efd420c5ebda4bfc4f9f1fb99317...224492f63eed610ab4401eae316c727ae9fd4637

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/compare/494af37613c7efd420c5ebda4bfc4f9f1fb99317...224492f63eed610ab4401eae316c727ae9fd4637
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits