richard pushed to branch mullvad-browser-115.12.0esr-13.5-1 at The Tor Project / Applications / Mullvad Browser
Commits:
d82b4689 by Edgar Chen at 2024-06-07T22:22:01+00:00
Bug 1828259 - Close XUL popup when entering/exiting fullscreen; r=smaug
Differential Revision: https://phabricator.services.mozilla.com/D209355
- - - - -
1 changed file:
- xpfe/appshell/AppWindow.cpp
Changes:
=====================================
xpfe/appshell/AppWindow.cpp
=====================================
@@ -3025,6 +3025,9 @@ void AppWindow::FullscreenChanged(bool aInFullscreen) {
void AppWindow::FinishFullscreenChange(bool aInFullscreen) {
mFullscreenChangeState = FullscreenChangeState::NotChanging;
+ if (nsXULPopupManager* pm = nsXULPopupManager::GetInstance()) {
+ pm->Rollup({});
+ }
if (mDocShell) {
if (nsCOMPtr<nsPIDOMWindowOuter> ourWindow = mDocShell->GetWindow()) {
ourWindow->FinishFullscreenChange(aInFullscreen);
View it on GitLab: https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/d82…
--
This project does not include diff previews in email notifications.
View it on GitLab: https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/d82…
You're receiving this email because of your account on gitlab.torproject.org.
richard pushed to branch base-browser-115.12.0esr-13.5-1 at The Tor Project / Applications / Tor Browser
Commits:
7e85a0ee by Edgar Chen at 2024-06-07T22:21:07+00:00
Bug 1828259 - Close XUL popup when entering/exiting fullscreen; r=smaug
Differential Revision: https://phabricator.services.mozilla.com/D209355
- - - - -
1 changed file:
- xpfe/appshell/AppWindow.cpp
Changes:
=====================================
xpfe/appshell/AppWindow.cpp
=====================================
@@ -3025,6 +3025,9 @@ void AppWindow::FullscreenChanged(bool aInFullscreen) {
void AppWindow::FinishFullscreenChange(bool aInFullscreen) {
mFullscreenChangeState = FullscreenChangeState::NotChanging;
+ if (nsXULPopupManager* pm = nsXULPopupManager::GetInstance()) {
+ pm->Rollup({});
+ }
if (mDocShell) {
if (nsCOMPtr<nsPIDOMWindowOuter> ourWindow = mDocShell->GetWindow()) {
ourWindow->FinishFullscreenChange(aInFullscreen);
View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/7e85a0e…
--
This project does not include diff previews in email notifications.
View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/7e85a0e…
You're receiving this email because of your account on gitlab.torproject.org.
richard pushed to branch main at The Tor Project / Applications / tor-browser-build
Commits:
b5cadea4 by Richard Pospesel at 2024-06-07T22:15:20+00:00
Bug 41146,41147: Tor, Mullvad Browser 13.5a9 Release Prep
- - - - -
10 changed files:
- projects/browser/Bundle-Data/Docs-MB/ChangeLog.txt
- projects/browser/Bundle-Data/Docs-TBB/ChangeLog.txt
- projects/browser/allowed_addons.json
- projects/browser/config
- projects/firefox-android/config
- projects/go/config
- projects/manual/config
- projects/openssl/config
- projects/translation/config
- rbm.conf
Changes:
=====================================
projects/browser/Bundle-Data/Docs-MB/ChangeLog.txt
=====================================
@@ -1,3 +1,25 @@
+Mullvad Browser 13.5a9 - June 07 2024
+ * All Platforms
+ * Updated Firefox to 115.12.0esr
+ * Updated uBlock Origin to 1.58.0
+ * Bug 290: Add default bookmarks in the alpha channels for testing [mullvad-browser]
+ * Bug 308: Rebase Mullvad Browser stable onto 115.12.0esr [mullvad-browser]
+ * Bug 41467: compat: beacon: re-enable the API but transform it to a no-op [tor-browser]
+ * Windows + macOS
+ * Bug 42586: Add support link to OS deprecation message [tor-browser]
+ * Linux
+ * Bug 29: rpm installation package for Linux [mullvad-browser]
+ * Build System
+ * All Platforms
+ * Bug 301: Deb package in the debian software installer is showing the License as "Proprietary" [mullvad-browser]
+ * Bug 42594: Update mach to work with python 3.12 [tor-browser]
+ * Bug 41153: Update README for Ubuntu 24.04 unprivileged user namespace changes [tor-browser-build]
+ * Bug 41154: Update keyring/boklm.gpg for new subkeys [tor-browser-build]
+ * Windows
+ * Bug 41151: Explicitly initialize the plugin directory on the Windows installer [tor-browser-build]
+ * Linux
+ * Bug 41129: Make rpm package for Mullvad Browser [tor-browser-build]
+
Mullvad Browser 13.5a8 - May 16 2024
* All Platforms
* Updated Firefox to 115.11.0esr
=====================================
projects/browser/Bundle-Data/Docs-TBB/ChangeLog.txt
=====================================
@@ -1,3 +1,40 @@
+Tor Browser 13.5a9 - June 07 2024
+ * All Platforms
+ * Updated OpenSSL to 3.0.14
+ * Bug 41467: compat: beacon: re-enable the API but transform it to a no-op [tor-browser]
+ * Bug 42604: Add some debug logs about circuits [tor-browser]
+ * Bug 42614: Rebase Tor Browser Stable onto 115.12.0esr [tor-browser]
+ * Windows + macOS + Linux
+ * Updated Firefox to 115.12.0esr
+ * Bug 41149: Add be, bg and pt-PT translations to nightlies [tor-browser-build]
+ * Windows + macOS
+ * Bug 42586: Add support link to OS deprecation message [tor-browser]
+ * Windows
+ * Bug 41859: Font used for IPs in circuit display is illegible [tor-browser]
+ * Android
+ * Updated GeckoView to 115.12.0esr
+ * Bug 42593: Unable to disable bridges after they have been configured and successfully bootstrapped [tor-browser]
+ * Bug 42621: Backport security fixes from Firefox 127 [tor-browser]
+ * Build System
+ * All Platforms
+ * Updated Go to 1.21.11
+ * Bug 42594: Update mach to work with python 3.12 [tor-browser]
+ * Bug 41153: Update README for Ubuntu 24.04 unprivileged user namespace changes [tor-browser-build]
+ * Bug 41154: Update keyring/boklm.gpg for new subkeys [tor-browser-build]
+ * Windows
+ * Bug 41150: Do not check for SSE2 on the Windows installer [tor-browser-build]
+ * Linux
+ * Bug 41126: Make deb and rpm packages for Tor Browser [tor-browser-build]
+ * Bug 41160: Enable build of Tor Browser rpm/deb packages for nightly only [tor-browser-build]
+ * Android
+ * Bug 42568: Remove legacy tor dependencies from firefox-android [tor-browser]
+ * Bug 42569: Remove tor-onion-proxy-library and and tor-android-service deployment/ingestion steps from firefox-android dev tools/scripts [tor-browser]
+ * Bug 42570: Add tor-expert-bundle aar depoyment/ingestion step to firefox-android dev tools/scripts [tor-browser]
+ * Bug 42581: Check if a file exists before trying to sign it in tools/tba-sign-devbuild.sh [tor-browser]
+ * Bug 41139: Remove tor-android-service and tor-onion-proxy-library dependencies and ingestion steps from firefox-android config and build script [tor-browser-build]
+ * Bug 41140: Remove tor-onion-proxy-library and tor-android-service projects from tor-browser-build [tor-browser-build]
+ * Bug 41141: Add tor-expert-bundle aar dependency to firefox-android [tor-browser-build]
+
Tor Browser 13.5a8 - May 16 2024
* All Platforms
* Bug 42290: "DuckDuckGoOnion" is a weird naming format for onion search engines [tor-browser]
=====================================
projects/browser/allowed_addons.json
=====================================
Binary files a/projects/browser/allowed_addons.json and b/projects/browser/allowed_addons.json differ
=====================================
projects/browser/config
=====================================
@@ -107,9 +107,9 @@ input_files:
- URL: https://addons.mozilla.org/firefox/downloads/file/4206186/noscript-11.4.29.…
name: noscript
sha256sum: 05b98840b05ef2acbac333543e4b7c3d40fee2ce5fb4e29260b05e2ff6fe24cd
- - URL: https://addons.mozilla.org/firefox/downloads/file/4261710/ublock_origin-1.5…
+ - URL: https://addons.mozilla.org/firefox/downloads/file/4290466/ublock_origin-1.5…
name: ublock-origin
- sha256sum: 9928e79a52cecf7cfa231fdb0699c7d7a427660d94eb10d711ed5a2f10d2eb89
+ sha256sum: 470c56994a7174db21578adce598b158a5dc0970c87c5cfe889ac632bd3085ea
enable: '[% c("var/mullvad-browser") %]'
- URL: https://cdn.mullvad.net/browser-extension/0.9.0/mullvad-browser-extension-0…
name: mullvad-extension
=====================================
projects/firefox-android/config
=====================================
@@ -16,7 +16,7 @@ container:
var:
fenix_version: 115.2.1
browser_branch: 13.5-1
- browser_build: 10
+ browser_build: 11
variant: Beta
# This should be updated when the list of gradle dependencies is changed.
gradle_dependencies_version: 1
=====================================
projects/go/config
=====================================
@@ -7,7 +7,7 @@ container:
var:
use_go_1_20: 0
- go_1_21: 1.21.10
+ go_1_21: 1.21.11
go_1_20: 1.20.14
no_crosscompile: 1
setup: |
@@ -131,7 +131,7 @@ input_files:
enable: '[% ! c("var/linux") %]'
- URL: 'https://go.dev/dl/go[% c("var/go_1_21") %].src.tar.gz'
name: go
- sha256sum: 900e0afe8900c1ee65a8a8c4f0c5a3ca02dcf85c1d1cb13a652be22c21399394
+ sha256sum: 42aee9bf2b6956c75a7ad6aa3f0a51b5821ffeac57f5a2e733a2d6eae1e6d9d2
enable: '[% !c("var/use_go_1_20") %]'
- URL: 'https://go.dev/dl/go[% c("var/go_1_20") %].src.tar.gz'
name: go
=====================================
projects/manual/config
=====================================
@@ -1,7 +1,7 @@
# vim: filetype=yaml sw=2
# To update, see doc/how-to-update-the-manual.txt
# Remember to update also the package's hash, with the version!
-version: 168690
+version: 172720
filename: 'manual-[% c("version") %]-[% c("var/build_id") %].tar.[% c("compress_tar") %]'
container:
use_container: 1
=====================================
projects/openssl/config
=====================================
@@ -1,5 +1,5 @@
# vim: filetype=yaml sw=2
-version: 3.0.13
+version: 3.0.14
filename: '[% project %]-[% c("version") %]-[% c("var/osname") %]-[% c("var/build_id") %].tar.[% c("compress_tar") %]'
container:
use_container: 1
@@ -36,5 +36,5 @@ input_files:
- name: '[% c("var/compiler") %]'
project: '[% c("var/compiler") %]'
- URL: 'https://www.openssl.org/source/openssl-[% c("version") %].tar.gz'
- sha256sum: 88525753f79d3bec27d2fa7c66aa0b92b3aa9498dafd93d7cfa4b3780cdae313
+ sha256sum: eeca035d4dd4e84fc25846d952da6297484afa0650a6f84c682e39df3a4123ca
name: openssl
=====================================
projects/translation/config
=====================================
@@ -12,13 +12,13 @@ compress_tar: 'gz'
steps:
base-browser:
base-browser: '[% INCLUDE build %]'
- git_hash: 02d2dc0ff0ec101c63a125646c3e92cfa80c0b20
+ git_hash: 0fa2e3c3041cfd6730edbd09ecba4926840cbf45
targets:
nightly:
git_hash: 'base-browser'
tor-browser:
tor-browser: '[% INCLUDE build %]'
- git_hash: c41ffa18b5fc7e7d40cd98e482a689d727a506eb
+ git_hash: 5a548c5a3c8de50182cebb560901792a9513f37b
targets:
nightly:
git_hash: 'tor-browser'
@@ -32,7 +32,7 @@ steps:
fenix: '[% INCLUDE build %]'
# We need to bump the commit before releasing but just pointing to a branch
# might cause too much rebuidling of the Firefox part.
- git_hash: 1a73b419bbfbf792a2d20e26d167d99f9a6cf90f
+ git_hash: 90cb3269f3fd7a8676d5724045b2403715797eef
compress_tar: 'zst'
targets:
nightly:
=====================================
rbm.conf
=====================================
@@ -73,18 +73,18 @@ buildconf:
git_signtag_opt: '-s'
var:
- torbrowser_version: '13.5a8'
+ torbrowser_version: '13.5a9'
torbrowser_build: 'build1'
# This should be the date of when the build is started. For the build
# to be reproducible, browser_release_date should always be in the past.
- browser_release_date: '2024/05/16 00:00:00'
+ browser_release_date: '2024/06/07 00:00:00'
browser_release_date_timestamp: '[% USE date; date.format(c("var/browser_release_date"), "%s") %]'
updater_enabled: 1
build_mar: 1
torbrowser_incremental_from:
+ - 13.5a8
- 13.5a7
- 13.5a6
- - 13.5a5
mar_channel_id: '[% c("var/projectname") %]-torproject-[% c("var/channel") %]'
# By default, we sort the list of installed packages. This allows sharing
View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/commit/b…
--
This project does not include diff previews in email notifications.
View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/commit/b…
You're receiving this email because of your account on gitlab.torproject.org.
richard pushed to branch tor-browser-115.12.0esr-13.5-1 at The Tor Project / Applications / Tor Browser
Commits:
020b1edd by Edgar Chen at 2024-06-07T22:01:05+00:00
Bug 1828259 - Close XUL popup when entering/exiting fullscreen; r=smaug
Differential Revision: https://phabricator.services.mozilla.com/D209355
- - - - -
1 changed file:
- xpfe/appshell/AppWindow.cpp
Changes:
=====================================
xpfe/appshell/AppWindow.cpp
=====================================
@@ -3025,6 +3025,9 @@ void AppWindow::FullscreenChanged(bool aInFullscreen) {
void AppWindow::FinishFullscreenChange(bool aInFullscreen) {
mFullscreenChangeState = FullscreenChangeState::NotChanging;
+ if (nsXULPopupManager* pm = nsXULPopupManager::GetInstance()) {
+ pm->Rollup({});
+ }
if (mDocShell) {
if (nsCOMPtr<nsPIDOMWindowOuter> ourWindow = mDocShell->GetWindow()) {
ourWindow->FinishFullscreenChange(aInFullscreen);
View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/020b1ed…
--
This project does not include diff previews in email notifications.
View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/020b1ed…
You're receiving this email because of your account on gitlab.torproject.org.
richard pushed to branch main at The Tor Project / Applications / tor-browser-build
Commits:
b307a74e by Nicolas Vigier at 2024-06-07T09:32:04+02:00
Bug 41160: Enable build of Tor Browser rpm/deb packages for nightly only
Until #41159 is fixed, disable building packages for alpha releases.
- - - - -
1 changed file:
- projects/release/config
Changes:
=====================================
projects/release/config
=====================================
@@ -93,7 +93,7 @@ targets:
var:
browser_type: torbrowser
git_tag_prefix: tbb
- tor-browser-linux-packages: '[% ! c("var/release") %]'
+ tor-browser-linux-packages: '[% c("var/nightly") %]'
basebrowser:
var:
browser_type: basebrowser
View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/commit/b…
--
This project does not include diff previews in email notifications.
View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/commit/b…
You're receiving this email because of your account on gitlab.torproject.org.
richard pushed to branch firefox-android-115.2.1-13.5-1 at The Tor Project / Applications / firefox-android
Commits:
1cf0ae40 by Dan Ballard at 2024-06-07T11:08:19-07:00
fixup! Add Tor integration and UI
Bug 42593: Also persisting of bridges set to off, support enabling bridges once a previous selection is remembered
- - - - -
2 changed files:
- fenix/app/src/main/java/org/mozilla/fenix/settings/TorBridgeConfigFragment.kt
- fenix/app/src/main/java/org/mozilla/fenix/tor/TorControllerGV.kt
Changes:
=====================================
fenix/app/src/main/java/org/mozilla/fenix/settings/TorBridgeConfigFragment.kt
=====================================
@@ -103,7 +103,7 @@ class TorBridgeConfigFragment : PreferenceFragmentCompat() {
preference.context.components.torController.bridgeTransport = bridge
previousTransportConfig = bridge
updateCurrentConfiguredBridgePref(preference)
- context.components.torController.restartTor()
+ preference.context.components.torController.restartTor()
}
true
}
=====================================
fenix/app/src/main/java/org/mozilla/fenix/tor/TorControllerGV.kt
=====================================
@@ -89,13 +89,13 @@ class TorControllerGV(
}
- // Bridges Enabled is a cache variable. The TorController interface we are locked into at the
- // moment to support the TAS backend calls setting `bridgesEnabled = true` and setting
- // the bridge type seperately so to support that,
- // while at the same time it being invalid states to not submit them together to the TorSettings
- // backend where TorSettings.sys.mjs's #cleanupSettings will remove a lone bridgeEnabled
- // we thus have to hold it here to support the UI but not submit to the backend until
- // bridgeTransport is also set (below)
+ // On a fresh install bridgeEnagled can be set to true without a valid bridgeSource
+ // having been selected. After first use this will not happen because last selected bridge
+ // will be remembered and reused.
+ // However, on first use, submitting this to TorSettings is an invalid state.
+ // TorSettings.sys.mjs's #cleanupSettings will remove a lone bridgeEnabled with no source
+ // selected. Therefore we check and don't call setSettings if bridgeSource isn't selected
+ // (when trying to enable). Disabeling is always valid.
private var _bridgesEnabled: Boolean? = null
override var bridgesEnabled: Boolean
get() {
@@ -103,6 +103,12 @@ class TorControllerGV(
}
set(value) {
_bridgesEnabled = value
+ getTorSettings()?.let {
+ if (!value || it.bridgesSource != BridgeSource.Invalid) {
+ it.bridgesEnabled = value
+ getTorIntegration().setSettings(it, true, true)
+ }
+ }
}
@@ -146,8 +152,9 @@ class TorControllerGV(
// Currently the UI takes a user provided string and sets this in one step so there is where we
- // actually set it.bridgesSource = BridgeSource.UserProvided, not above, as TorSettings.sys.mjs #cleanupSettings
- // could reject BridgeSource.UserProvided with no bridge strings
+ // actually set it.bridgesSource = BridgeSource.UserProvided, not above,
+ // as TorSettings.sys.mjs #cleanupSettings could reject BridgeSource.UserProvided
+ // with no bridge strings
override var userProvidedBridges: String?
get() {
return getTorSettings()?.bridgeBridgeStrings?.joinToString("\r\n")
View it on GitLab: https://gitlab.torproject.org/tpo/applications/firefox-android/-/commit/1cf…
--
This project does not include diff previews in email notifications.
View it on GitLab: https://gitlab.torproject.org/tpo/applications/firefox-android/-/commit/1cf…
You're receiving this email because of your account on gitlab.torproject.org.
Pier Angelo Vendrame pushed to branch mullvad-browser-115.12.0esr-13.5-1 at The Tor Project / Applications / Mullvad Browser
Commits:
ee1d1495 by Pier Angelo Vendrame at 2024-06-07T12:43:32+02:00
fixup! Firefox preference overrides.
Bug 41467: Do not set beacon.enabled anymore.
NoScript already blocks these pings (and maybe also Firefox under
certain conditions I am not sure about).
- - - - -
1 changed file:
- browser/app/profile/001-base-profile.js
Changes:
=====================================
browser/app/profile/001-base-profile.js
=====================================
@@ -433,10 +433,6 @@ pref("privacy.purge_trackers.enabled", false);
// Do not allow cross-origin sub-resources to open HTTP authentication
// credentials dialogs. Hardens against potential credentials phishing.
pref("network.auth.subresource-http-auth-allow", 1);
-// Disable sending additional analytics to web servers.
-// This disables navigator.sendBeacon, even though this is discouraged by the
-// standard: https://w3c.github.io/beacon/#privacy-and-security
-pref("beacon.enabled", false);
pref("network.dns.disablePrefetch", true);
pref("network.dns.disablePrefetchFromHTTPS", true);
View it on GitLab: https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/ee1…
--
This project does not include diff previews in email notifications.
View it on GitLab: https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/ee1…
You're receiving this email because of your account on gitlab.torproject.org.
Pier Angelo Vendrame pushed to branch base-browser-115.12.0esr-13.5-1 at The Tor Project / Applications / Tor Browser
Commits:
e366a92e by Pier Angelo Vendrame at 2024-06-07T12:43:12+02:00
fixup! Firefox preference overrides.
Bug 41467: Do not set beacon.enabled anymore.
NoScript already blocks these pings (and maybe also Firefox under
certain conditions I am not sure about).
- - - - -
1 changed file:
- browser/app/profile/001-base-profile.js
Changes:
=====================================
browser/app/profile/001-base-profile.js
=====================================
@@ -434,10 +434,6 @@ pref("privacy.purge_trackers.enabled", false);
// Do not allow cross-origin sub-resources to open HTTP authentication
// credentials dialogs. Hardens against potential credentials phishing.
pref("network.auth.subresource-http-auth-allow", 1);
-// Disable sending additional analytics to web servers.
-// This disables navigator.sendBeacon, even though this is discouraged by the
-// standard: https://w3c.github.io/beacon/#privacy-and-security
-pref("beacon.enabled", false);
pref("network.dns.disablePrefetch", true);
pref("network.dns.disablePrefetchFromHTTPS", true);
View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/e366a92…
--
This project does not include diff previews in email notifications.
View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/e366a92…
You're receiving this email because of your account on gitlab.torproject.org.