[tor-commits] [Git][tpo/applications/tor-browser-update-responses][main] release: new version, 13.0.14

2024-04-15 Thread richard (@richard) via tor-commits


richard pushed to branch main at The Tor Project / Applications / Tor Browser 
update responses


Commits:
56c533bf by Richard Pospesel at 2024-04-16T01:43:32+00:00
release: new version, 13.0.14

- - - - -


30 changed files:

- update_3/release/.htaccess
- − update_3/release/13.0.10-13.0.13-linux-i686-ALL.xml
- − update_3/release/13.0.10-13.0.13-linux-x86_64-ALL.xml
- − update_3/release/13.0.10-13.0.13-macos-ALL.xml
- − update_3/release/13.0.10-13.0.13-windows-i686-ALL.xml
- − update_3/release/13.0.10-13.0.13-windows-x86_64-ALL.xml
- − update_3/release/13.0.11-13.0.13-linux-i686-ALL.xml
- − update_3/release/13.0.11-13.0.13-linux-x86_64-ALL.xml
- − update_3/release/13.0.11-13.0.13-macos-ALL.xml
- − update_3/release/13.0.11-13.0.13-windows-i686-ALL.xml
- − update_3/release/13.0.11-13.0.13-windows-x86_64-ALL.xml
- + update_3/release/13.0.11-13.0.14-linux-i686-ALL.xml
- + update_3/release/13.0.11-13.0.14-linux-x86_64-ALL.xml
- + update_3/release/13.0.11-13.0.14-macos-ALL.xml
- + update_3/release/13.0.11-13.0.14-windows-i686-ALL.xml
- + update_3/release/13.0.11-13.0.14-windows-x86_64-ALL.xml
- − update_3/release/13.0.12-13.0.13-linux-i686-ALL.xml
- − update_3/release/13.0.12-13.0.13-linux-x86_64-ALL.xml
- − update_3/release/13.0.12-13.0.13-macos-ALL.xml
- − update_3/release/13.0.12-13.0.13-windows-i686-ALL.xml
- − update_3/release/13.0.12-13.0.13-windows-x86_64-ALL.xml
- + update_3/release/13.0.12-13.0.14-linux-i686-ALL.xml
- + update_3/release/13.0.12-13.0.14-linux-x86_64-ALL.xml
- + update_3/release/13.0.12-13.0.14-macos-ALL.xml
- + update_3/release/13.0.12-13.0.14-windows-i686-ALL.xml
- + update_3/release/13.0.12-13.0.14-windows-x86_64-ALL.xml
- + update_3/release/13.0.13-13.0.14-linux-i686-ALL.xml
- + update_3/release/13.0.13-13.0.14-linux-x86_64-ALL.xml
- + update_3/release/13.0.13-13.0.14-macos-ALL.xml
- + update_3/release/13.0.13-13.0.14-windows-i686-ALL.xml


The diff was not included because it is too large.


View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser-update-responses/-/commit/56c533bfdbdec419754f5ebb643270b8225061d5

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser-update-responses/-/commit/56c533bfdbdec419754f5ebb643270b8225061d5
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser-build] Pushed new tag tbb-13.0.14-build1

2024-04-15 Thread Pier Angelo Vendrame (@pierov) via tor-commits


Pier Angelo Vendrame pushed new tag tbb-13.0.14-build1 at The Tor Project / 
Applications / tor-browser-build

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/tree/tbb-13.0.14-build1
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser-build][maint-13.0] Bug 41099: Prepare Tor Browser Stable 13.0.14 (updated)

2024-04-15 Thread Pier Angelo Vendrame (@pierov) via tor-commits


Pier Angelo Vendrame pushed to branch maint-13.0 at The Tor Project / 
Applications / tor-browser-build


Commits:
a57006e3 by Pier Angelo Vendrame at 2024-04-15T18:44:40+02:00
Bug 41099: Prepare Tor Browser Stable 13.0.14 (updated)

Include the fix to #40992/#41122 and updated the changelogs.

- - - - -


2 changed files:

- projects/browser/Bundle-Data/Docs-TBB/ChangeLog.txt
- rbm.conf


Changes:

=
projects/browser/Bundle-Data/Docs-TBB/ChangeLog.txt
=
@@ -4,20 +4,25 @@ Tor Browser 13.0.14 - April 16 2024
* Bug 41676: Set privacy.resistFingerprinting.testing.setTZtoUTC as a 
defense-in-depth [tor-browser]
* Bug 42335: Do not localize the order of locales for app lang [tor-browser]
* Bug 42428: Timezone offset leak via document.lastModified [tor-browser]
-   * Bug 42472: Timezone May leak from XSLT Date function [tor-browser]
+   * Bug 42472: Timezone may leak from XSLT Date function [tor-browser]
* Bug 42508: Rebase Tor Browser stable onto 115.10.0esr [tor-browser]
  * Windows + macOS + Linux
* Updated Firefox to 115.10.0esr
+   * Bug 42172: browser.startup.homepage and TOR_DEFAULT_HOMEPAGE are ignored 
for the new window opened by New Identity [tor-browser]
* Bug 42236: Let users decide whether to load their home page on new 
identity. [tor-browser]
* Bug 42468: App languages not sorted correctly in stable [tor-browser]
- * Android
-   * Updated GeckoView to 115.10.0esr
  * Linux
* Bug 41110: Avoid Fontconfig warning about "ambiguous path" 
[tor-browser-build]
+ * Android
+   * Updated GeckoView to 115.10.0esr
+   * Bug 42509: Backport Android security fixes from Firefox 125 [tor-browser]
  * Build System
* All Platforms
  * Updated Go to 1.21.8
  * Bug 41107: Update 
download-unsigned-sha256sums-gpg-signatures-from-people-tpo for new type of URL 
[tor-browser-build]
+ * Bug 41122: Add release date to rbm.conf [tor-browser-build]
+   * Android
+ * Bug 40992: Updated torbrowser_version number is not enough to change 
firefox-android versionCode number [tor-browser-build]
 
 Tor Browser 13.5a6 - March 28 2024
  * All Platforms


=
rbm.conf
=
@@ -80,7 +80,7 @@ var:
 - '13.0.12'
 - '[% IF c("var/tor-browser") %]13.0.11[% END %]'
 - '[% IF c("var/mullvad-browser") %]13.0.10[% END %]'
-  browser_release_date: '2024/03/28 01:02:03'
+  browser_release_date: '2024/04/16 15:00:00'
   browser_release_date_timestamp: '[% USE date; 
date.format(c("var/browser_release_date"), "%s") %]'
   updater_enabled: 1
   build_mar: 1



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/commit/a57006e3aa9d986697e2da349f279e2dfab3580e

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/commit/a57006e3aa9d986697e2da349f279e2dfab3580e
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][tor-browser-115.10.0esr-13.5-1] fixup! Bug 31286: Implementation of bridge, proxy, and firewall settings in...

2024-04-15 Thread richard (@richard) via tor-commits


richard pushed to branch tor-browser-115.10.0esr-13.5-1 at The Tor Project / 
Applications / Tor Browser


Commits:
a5b9b03b by Henry Wilkes at 2024-04-15T17:15:04+00:00
fixup! Bug 31286: Implementation of bridge, proxy, and firewall settings in 
about:preferences#connection

Bug 42496: Fix the refresh captcha buttons command.

- - - - -


2 changed files:

- browser/components/torpreferences/content/requestBridgeDialog.js
- browser/components/torpreferences/content/requestBridgeDialog.xhtml


Changes:

=
browser/components/torpreferences/content/requestBridgeDialog.js
=
@@ -71,6 +71,9 @@ const gRequestBridgeDialog = {
   selectors.refreshCaptchaButton
 );
 this._captchaRefreshButton.disabled = true;
+this._captchaRefreshButton.addEventListener("command", () => {
+  this.onRefreshCaptcha();
+});
 
 this._incorrectCaptchaHbox = this._dialog.querySelector(
   selectors.incorrectCaptchaHbox


=
browser/components/torpreferences/content/requestBridgeDialog.xhtml
=
@@ -31,7 +31,6 @@
   
 
 



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/a5b9b03b01162f4b5dc5c52d7b3301238778af88

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/a5b9b03b01162f4b5dc5c52d7b3301238778af88
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/mullvad-browser][mullvad-browser-115.10.0esr-13.5-1] fixup! MB 188: Customize Gitlab Issue and Merge templates

2024-04-15 Thread richard (@richard) via tor-commits


richard pushed to branch mullvad-browser-115.10.0esr-13.5-1 at The Tor Project 
/ Applications / Mullvad Browser


Commits:
1d3f7ac2 by Richard Pospesel at 2024-04-15T17:13:12+00:00
fixup! MB 188: Customize Gitlab Issue and Merge templates

emergency security issue for mullvad browser

- - - - -


1 changed file:

- .gitlab/issue_templates/Emergency Security Issue.md


Changes:

=
.gitlab/issue_templates/Emergency Security Issue.md
=
@@ -18,9 +18,7 @@
 ### Type of Issue: What are we dealing with?
 
 - [ ] Security (sandbox escape, remote code execution, etc)
-- [ ] Proxy Bypass (traffic contents becoming MITM'able)
-- [ ] De-Anonymization (otherwise identifying which website a user is visiting)
-- [ ] Cross-Site Linkability (correlating sessions across circuits and 
websites)
+- [ ] Cross-Site Linkability (correlating sessions across websites)
 - [ ] Disk Leak (persisting session information to disk)
 - [ ] Other (please explain)
 
@@ -36,16 +34,11 @@
   - [ ] **richard** : signing, release
   - [ ] **thorin** : fingerprinting
 - [ ] Other Engineering Teams
-  - [ ] Networking (**ahf**, **dgoulet**)
-  - [ ] Anti-Censorship (**meskio**, **cohosh**)
   - [ ] UX (**donuts**)
   - [ ] TPA (**anarcat**, **lavamind**)
 - [ ] External Tor Partners
-  - [ ] Mozilla
-  - [ ] Mullvad
-  - [ ] Brave
-  - [ ] Guardian Project (Orbot, Onion Browser)
-  - [ ] Tails
+  - [ ] Mozilla (**tjr**)
+  - [ ] Mullvad (**ruihildt**)
   - [ ] Other (please list)
 
 ### Urgency: When do we need to act?
@@ -72,6 +65,7 @@ Sometimes fixes have side-effects: users lose their data, 
roadmaps need to be ad
 
 - [ ] Start an initial email thread with the following people:
   - [ ] **bella**
+  - [ ] **ruihildt**, **supp...@mullvadvpn.net**
   - [ ] Relevant Applications Developers
   - [ ] **(Optional)** **micah**
 - if there are considerations or asks outside the Applications Team
@@ -84,6 +78,7 @@ Sometimes fixes have side-effects: users lose their data, 
roadmaps need to be ad
 /cc @ma1
 /cc @micah
 /cc @richard
+/cc @ruihildt
 
 /confidential
 



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/1d3f7ac2979163e0a99e9baf09679758d0c02572

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/1d3f7ac2979163e0a99e9baf09679758d0c02572
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser-build][main] Bug 41122: Update stable release prep templates

2024-04-15 Thread boklm (@boklm) via tor-commits


boklm pushed to branch main at The Tor Project / Applications / 
tor-browser-build


Commits:
8d829699 by Nicolas Vigier at 2024-04-15T17:44:25+02:00
Bug 41122: Update stable release prep templates

The patch for #41122 was backported to `maint-13.0`, so we need to
update the stable release prep gitlab issue templates.

- - - - -


2 changed files:

- .gitlab/issue_templates/Release Prep - Mullvad Browser Stable.md
- .gitlab/issue_templates/Release Prep - Tor Browser Stable.md


Changes:

=
.gitlab/issue_templates/Release Prep - Mullvad Browser Stable.md
=
@@ -39,6 +39,7 @@ Mullvad Browser Stable lives in the various 
`maint-$(MULLVAD_BROWSER_MAJOR).$(MU
 - [ ] Update `rbm.conf`
   - [ ] `var/torbrowser_version` : update to next version
   - [ ] `var/torbrowser_build` : update to `$(MULLVAD_BROWSER_BUILD_N)`
+  - [ ] `var/browser_release_date` : update to build date
   - [ ] `var/torbrowser_incremental_from` : update to previous Desktop version
 - **NOTE**: We try to build incrementals for the previous 3 desktop 
versions except in the case of a watershed update
 - **IMPORTANT**: Really *actually* make sure this is the previous Desktop 
version or else the `make mullvadbrowser-incrementals-*` step will fail


=
.gitlab/issue_templates/Release Prep - Tor Browser Stable.md
=
@@ -38,6 +38,7 @@ Tor Browser Stable lives in the various 
`maint-$(TOR_BROWSER_MAJOR).$(TOR_BROWSE
 - [ ] Update `rbm.conf`
   - [ ] `var/torbrowser_version` : update to next version
   - [ ] `var/torbrowser_build` : update to `$(TOR_BROWSER_BUILD_N)`
+  - [ ] `var/browser_release_date` : update to build date
   - [ ] ***(Desktop Only)***`var/torbrowser_incremental_from` : update to 
previous Desktop version
 - **NOTE**: We try to build incrementals for the previous 3 desktop 
versions except in the case of a watershed update
 - **IMPORTANT**: Really *actually* make sure this is the previous Desktop 
version or else the `make torbrowser-incrementals-*` step will fail



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/commit/8d829699c822c84a81980f7504a6b425106fece8

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/commit/8d829699c822c84a81980f7504a6b425106fece8
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/firefox-android][firefox-android-115.2.1-13.5-1] 2 commits: fixup! Enable the connect assist experiments on alpha

2024-04-15 Thread Pier Angelo Vendrame (@pierov) via tor-commits


Pier Angelo Vendrame pushed to branch firefox-android-115.2.1-13.5-1 at The Tor 
Project / Applications / firefox-android


Commits:
4a8875f4 by Pier Angelo Vendrame at 2024-04-09T20:09:45+02:00
fixup! Enable the connect assist experiments on alpha

Bug 42479: Improve TorConnect error handling

Updated the prototype of onBootstrapError.

- - - - -
c2db7c96 by Pier Angelo Vendrame at 2024-04-11T10:58:42+02:00
fixup! Add Tor integration and UI

Bug 42479: Improve TorConnect error handling

Updated the prototype of onBootstrapError.

- - - - -


3 changed files:

- fenix/app/src/main/java/org/mozilla/fenix/HomeActivity.kt
- fenix/app/src/main/java/org/mozilla/fenix/tor/TorController.kt
- fenix/app/src/main/java/org/mozilla/fenix/tor/TorControllerGV.kt


Changes:

=
fenix/app/src/main/java/org/mozilla/fenix/HomeActivity.kt
=
@@ -1383,12 +1383,12 @@ open class HomeActivity : 
LocaleAwareAppCompatActivity(), NavHostActivity, TorIn
 }
 
 override fun onBootstrapStateChange(state: String) = Unit
-override fun onBootstrapProgress(progress: Double, status: String, 
hasWarnings: Boolean) = Unit
+override fun onBootstrapProgress(progress: Double, hasWarnings: Boolean) = 
Unit
 override fun onBootstrapComplete() {
 components.useCases.tabsUseCases.removeAllTabs()
 navHost.navController.navigate(NavGraphDirections.actionStartupHome())
 }
-override fun onBootstrapError(message: String, details: String) = Unit
+override fun onBootstrapError(code: String?, message: String?, phase: 
String?, reason: String?) = Unit
 override fun onSettingsRequested() {
 
navHost.navController.navigate(NavGraphDirections.actionGlobalSettingsFragment())
 }


=
fenix/app/src/main/java/org/mozilla/fenix/tor/TorController.kt
=
@@ -14,7 +14,9 @@ interface TorEvents {
 }
 class TorError(
 var message: String,
-var details: String
+var details: String,
+var phase: String,
+var reason: String,
 ) { }
 
 interface TorLogs {


=
fenix/app/src/main/java/org/mozilla/fenix/tor/TorControllerGV.kt
=
@@ -301,8 +301,8 @@ class TorControllerGV(
 }
 
 // TorEventsBootstrapStateChangeListener
-override fun onBootstrapProgress(progress: Double, status: String?, 
hasWarnings: Boolean) {
-Log.d(TAG, "onBootstrapProgress($progress, $status, $hasWarnings)")
+override fun onBootstrapProgress(progress: Double, hasWarnings: Boolean) {
+Log.d(TAG, "onBootstrapProgress($progress, $hasWarnings)")
 if (progress == 100.0) {
 lastKnownStatus = TorConnectState.Bootstrapped
 wasTorBootstrapped = true
@@ -312,7 +312,7 @@ class TorControllerGV(
 onTorConnecting()
 
 }
-onTorStatusUpdate(status, lastKnownStatus.toTorStatus().status, 
progress)
+onTorStatusUpdate("", lastKnownStatus.toTorStatus().status, progress)
 }
 
 // TorEventsBootstrapStateChangeListener
@@ -322,8 +322,8 @@ class TorControllerGV(
 }
 
 // TorEventsBootstrapStateChangeListener
-override fun onBootstrapError(message: String?, details: String?) {
-lastKnownError = TorError(message ?: "", details ?: "")
+override fun onBootstrapError(code: String?, message: String?, phase: 
String?, reason: String?) {
+lastKnownError = TorError(code ?: "", message ?: "", phase ?: "", 
reason ?: "")
 onBootstrapStateChange(TorConnectState.Error.state)
 }
 



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/firefox-android/-/compare/7e46e5e3c7a3b8eb37bab035b35aba0499ed962a...c2db7c965697bf8dc76e16f43662e6784e86b98f

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/firefox-android/-/compare/7e46e5e3c7a3b8eb37bab035b35aba0499ed962a...c2db7c965697bf8dc76e16f43662e6784e86b98f
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser-build][maint-13.0] Bug 41122: Add var/browser_release_date

2024-04-15 Thread boklm (@boklm) via tor-commits


boklm pushed to branch maint-13.0 at The Tor Project / Applications / 
tor-browser-build


Commits:
ebea2eb3 by Nicolas Vigier at 2024-04-15T17:17:44+02:00
Bug 41122: Add var/browser_release_date

Add a release date, and use it for MOZ_BUILD_DATE, and as timestamp on
files in projects/browser.

For nightly we use a release date based on the version number.

- - - - -


2 changed files:

- projects/browser/config
- rbm.conf


Changes:

=
projects/browser/config
=
@@ -1,6 +1,7 @@
 # vim: filetype=yaml sw=2
 version: '[% c("var/torbrowser_version") %]'
 filename: '[% c("var/project-name") %]-[% c("version") %]-[% c("var/osname") 
%]-[% c("var/build_id") %]'
+timestamp: '[% c("var/browser_release_date_timestamp") %]'
 container:
   use_container: 1
 


=
rbm.conf
=
@@ -80,6 +80,8 @@ var:
 - '13.0.12'
 - '[% IF c("var/tor-browser") %]13.0.11[% END %]'
 - '[% IF c("var/mullvad-browser") %]13.0.10[% END %]'
+  browser_release_date: '2024/03/28 01:02:03'
+  browser_release_date_timestamp: '[% USE date; 
date.format(c("var/browser_release_date"), "%s") %]'
   updater_enabled: 1
   build_mar: 1
   mar_channel_id: '[% c("var/projectname") %]-torproject-[% c("var/channel") 
%]'
@@ -204,7 +206,8 @@ var:
 [% END -%]
 
   DOCSDIR_project: '[% project %]'
-  set_MOZ_BUILD_DATE: 'export MOZ_BUILD_DATE=[% c("var_p/MOZ_BUILD_DATE") %]'
+  set_MOZ_BUILD_DATE: 'export MOZ_BUILD_DATE=[% c("var/MOZ_BUILD_DATE") %]'
+  MOZ_BUILD_DATE: '[% USE date; date.format(c("var/browser_release_date"), 
"%Y%m%d%H%M%S") %]'
 
   # var/essential_deps is the same as var/deps, except that we never
   # redefine it in projects config. This is for the packages we want to
@@ -246,6 +249,14 @@ targets:
 GET c("var_p/nightly_torbrowser_version");
END;
 -%]
+  browser_release_date: |
+[%
+  IF (matches = 
c("var/torbrowser_version").match('^tbb-nightly\.(\d\d\d\d)\.(\d\d)\.(\d\d)$'));
+GET matches.0 _ "/" _ matches.1 _ "/" _ matches.2 _ " 01:01:01";
+  ELSE;
+GET "2000/01/01 01:01:01";
+  END
+  -%]
   max_torbrowser_incremental_from: 2
   build_infos_json: 1
 
@@ -725,31 +736,5 @@ gpg_allow_expired_keys: 1
 }
 return [@res];
   },
-  MOZ_BUILD_DATE => sub {
-use POSIX qw(strftime);
-my ($project, $options) = @_;
-my $nightly = project_config($project, 'var/nightly', $options);
-my $testbuild = project_config($project, 'var/testbuild', $options);
-
-if ($nightly && !$testbuild) {
-  my $torbrowser_version = project_config($project, 
'var/torbrowser_version', $options);
-  return sprintf("%d%02d%02d01", $1, $2, $3)
-if $torbrowser_version =~ 
m/^tbb-nightly\.([^\.]+)\.([^\.]+)\.([^\.]+)$/;
-  return strftime("%Y%m%d01", gmtime);
-}
-
-my $timestamp = project_config($project, 'timestamp', $options);
-if (!$nightly) {
-  my $torbrowser_version = project_config($project, 
'var/torbrowser_version', $options);
-  my @n = reverse split /[\.\D]/, $torbrowser_version;
-  my $i = 1;
-  unshift @n, 0 if @n < 3;
-  for my $n (@n) {
-$timestamp += $n * $i;
-$i = $i * 10;
-  }
-}
-return strftime "%Y%m%d%H%M%S", gmtime($timestamp);
-  },
 },
   )



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/commit/ebea2eb3a422075851c565841901f133d26b5592

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/commit/ebea2eb3a422075851c565841901f133d26b5592
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [Git][tpo/applications/tor-browser][tor-browser-115.10.0esr-13.5-1] fixup! Bug 41803: Add some developer tools for working on tor-browser.

2024-04-15 Thread ma1 (@ma1) via tor-commits


ma1 pushed to branch tor-browser-115.10.0esr-13.5-1 at The Tor Project / 
Applications / Tor Browser


Commits:
89a5a7fd by hackademix at 2024-04-15T11:52:47+02:00
fixup! Bug 41803: Add some developer tools for working on tor-browser.

Bug 42516: Make tb-dev worktree-compatible

- - - - -


1 changed file:

- tools/torbrowser/tb-dev


Changes:

=
tools/torbrowser/tb-dev
=
@@ -57,10 +57,12 @@ def get_local_root():
 global local_root
 if local_root is None:
 try:
+# Make sure we have a matching remote in this git repository. 
Should raise Exception if we don't.
+get_upstream_name()
 git_root = git_get(["rev-parse", "--show-toplevel"])[0]
-except subprocess.CalledProcessError:
+except Exception:
 git_root = None
-if git_root is None or os.path.basename(git_root) != "tor-browser":
+if git_root is None:
 local_root = ""
 else:
 local_root = git_root



View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/89a5a7fd311640a4b50b951bcf8ef1b035aa37bb

-- 
View it on GitLab: 
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/89a5a7fd311640a4b50b951bcf8ef1b035aa37bb
You're receiving this email because of your account on gitlab.torproject.org.


___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits