Loading .gitlab/issue_templates/000 Bug Report.md +4 −8 Original line number Diff line number Diff line Loading @@ -40,16 +40,13 @@ Please provide the following information: - [ ] Alpha - [ ] Nightly - Distribution method: - [ ] Installer/archive from torproject.org - [ ] tor-browser-launcher - [ ] Installer/archive from mullvad.net - [ ] homebrew - [ ] other (please specify): - Operating System: - [ ] Windows - [ ] macOS - [ ] Linux - [ ] Android - [ ] Tails - [ ] Other (please specify): - Operating System Version: Loading Loading @@ -87,11 +84,10 @@ Archived packages for past versions can be found here: <!-- Sometimes bugs are fixed in the Alpha (development) channel but not in the Stable channel. ⚠️ However, the Alpha release channel is the development version and as such may be contain critical bugs not present in the Stable release channel. Do not test in Alpha if you are an at risk user unless you really, actually, truly know what you are doing! critical bugs not present in the Stable release channel. The latest Alpha can be found here: - https://www.torproject.org/download/alpha/ - https://github.com/mullvad/mullvad-browser/releases?q=prerelease%3Atrue --> ### Does this bug occur in Firefox ESR (Desktop only)? Loading @@ -117,5 +113,5 @@ If the issue has been fixed in Firefox, do you know the Bugzilla issue number as --- /label ~"Apps::Product::TorBrowser" /label ~"Apps::Product::MullvadBrowser" /label ~"Apps::Type::Bug" .gitlab/issue_templates/010 Proposal.md +3 −1 Original line number Diff line number Diff line Loading @@ -26,6 +26,7 @@ guarantees? ### Security <!-- TODO: Mullvad Browser's threat model is somehow less restrictive than Tor Browser's, but currently undefined Outline any security implications this feature would introduce. The browser's security requirements can be found in our threat model document here: - https://gitlab.torproject.org/tpo/applications/wiki/-/wikis/Design-Documents/Tor-Browser-Design-Doc#21-security-requirements Loading @@ -33,6 +34,7 @@ security requirements can be found in our threat model document here: ### Privacy <!-- TODO: Mullvad Browser's threat model is somehow less restrictive than Tor Browser's, but currently undefined Outline any privacy implications this feature would introduce. The browser's privacy requirements can be found in our threat model document here: - https://gitlab.torproject.org/tpo/applications/wiki/-/wikis/Design-Documents/Tor-Browser-Design-Doc#22-privacy-requirements Loading Loading @@ -66,5 +68,5 @@ are there for users? --- /label ~"Apps::Product::TorBrowser" /label ~"Apps::Product::MullvadBrowser" /label ~"Apps::Type::Proposal" .gitlab/issue_templates/020 Web Compatibility.md +4 −8 Original line number Diff line number Diff line Loading @@ -38,16 +38,13 @@ Please provide the following information: - [ ] Alpha - [ ] Nightly - Distribution method: - [ ] Installer/archive from torproject.org - [ ] tor-browser-launcher - [ ] Installer/archive from mullvad.net - [ ] homebrew - [ ] other (please specify): - Operating System: - [ ] Windows - [ ] macOS - [ ] Linux - [ ] Android - [ ] Tails - [ ] Other (please specify): - Operating System Version: Loading Loading @@ -78,11 +75,10 @@ Archived packages for past versions can be found here: <!-- Sometimes bugs are fixed in the Alpha (development) channel but not in the Stable channel. ⚠️ However, the Alpha release channel is the development version and as such may be contain critical bugs not present in the Stable release channel. Do not test in Alpha if you are an at risk user unless you really, actually, truly know what you are doing! critical bugs not present in the Stable release channel. The latest Alpha can be found here: - https://www.torproject.org/download/alpha/ - https://github.com/mullvad/mullvad-browser/releases?q=prerelease%3Atrue --> ### Does this bug occur in Firefox ESR (Desktop only)? Loading @@ -108,5 +104,5 @@ If the issue has been fixed in Firefox, do you know the Bugzilla issue number as --- /label ~"Apps::Product::TorBrowser" /label ~"Apps::Product::MullvadBrowser" /label ~"Apps::Type::WebCompatibility" .gitlab/issue_templates/030 Test.md +1 −1 Original line number Diff line number Diff line Loading @@ -25,5 +25,5 @@ and the expected behaviour of each --- /label ~"Apps::Product::TorBrowser" /label ~"Apps::Product::MullvadBrowser" /label ~"Apps::Type::Test" .gitlab/issue_templates/040 Feature.md +2 −2 Original line number Diff line number Diff line Loading @@ -18,7 +18,7 @@ Provide an overview of the technical/implementation aspects of this feature ### Proposal <!-- Add links to associated proposal issues (or delete block) --> - tor-browser#xxxxx - mullvad-browser#xyz ### Design <!-- Add links to associated design issues (or delete block) --> Loading @@ -28,5 +28,5 @@ Provide an overview of the technical/implementation aspects of this feature --- /label ~"Apps::Product::TorBrowser" /label ~"Apps::Product::MullvadBrowser" /label ~"Apps::Type::Feature" Loading
.gitlab/issue_templates/000 Bug Report.md +4 −8 Original line number Diff line number Diff line Loading @@ -40,16 +40,13 @@ Please provide the following information: - [ ] Alpha - [ ] Nightly - Distribution method: - [ ] Installer/archive from torproject.org - [ ] tor-browser-launcher - [ ] Installer/archive from mullvad.net - [ ] homebrew - [ ] other (please specify): - Operating System: - [ ] Windows - [ ] macOS - [ ] Linux - [ ] Android - [ ] Tails - [ ] Other (please specify): - Operating System Version: Loading Loading @@ -87,11 +84,10 @@ Archived packages for past versions can be found here: <!-- Sometimes bugs are fixed in the Alpha (development) channel but not in the Stable channel. ⚠️ However, the Alpha release channel is the development version and as such may be contain critical bugs not present in the Stable release channel. Do not test in Alpha if you are an at risk user unless you really, actually, truly know what you are doing! critical bugs not present in the Stable release channel. The latest Alpha can be found here: - https://www.torproject.org/download/alpha/ - https://github.com/mullvad/mullvad-browser/releases?q=prerelease%3Atrue --> ### Does this bug occur in Firefox ESR (Desktop only)? Loading @@ -117,5 +113,5 @@ If the issue has been fixed in Firefox, do you know the Bugzilla issue number as --- /label ~"Apps::Product::TorBrowser" /label ~"Apps::Product::MullvadBrowser" /label ~"Apps::Type::Bug"
.gitlab/issue_templates/010 Proposal.md +3 −1 Original line number Diff line number Diff line Loading @@ -26,6 +26,7 @@ guarantees? ### Security <!-- TODO: Mullvad Browser's threat model is somehow less restrictive than Tor Browser's, but currently undefined Outline any security implications this feature would introduce. The browser's security requirements can be found in our threat model document here: - https://gitlab.torproject.org/tpo/applications/wiki/-/wikis/Design-Documents/Tor-Browser-Design-Doc#21-security-requirements Loading @@ -33,6 +34,7 @@ security requirements can be found in our threat model document here: ### Privacy <!-- TODO: Mullvad Browser's threat model is somehow less restrictive than Tor Browser's, but currently undefined Outline any privacy implications this feature would introduce. The browser's privacy requirements can be found in our threat model document here: - https://gitlab.torproject.org/tpo/applications/wiki/-/wikis/Design-Documents/Tor-Browser-Design-Doc#22-privacy-requirements Loading Loading @@ -66,5 +68,5 @@ are there for users? --- /label ~"Apps::Product::TorBrowser" /label ~"Apps::Product::MullvadBrowser" /label ~"Apps::Type::Proposal"
.gitlab/issue_templates/020 Web Compatibility.md +4 −8 Original line number Diff line number Diff line Loading @@ -38,16 +38,13 @@ Please provide the following information: - [ ] Alpha - [ ] Nightly - Distribution method: - [ ] Installer/archive from torproject.org - [ ] tor-browser-launcher - [ ] Installer/archive from mullvad.net - [ ] homebrew - [ ] other (please specify): - Operating System: - [ ] Windows - [ ] macOS - [ ] Linux - [ ] Android - [ ] Tails - [ ] Other (please specify): - Operating System Version: Loading Loading @@ -78,11 +75,10 @@ Archived packages for past versions can be found here: <!-- Sometimes bugs are fixed in the Alpha (development) channel but not in the Stable channel. ⚠️ However, the Alpha release channel is the development version and as such may be contain critical bugs not present in the Stable release channel. Do not test in Alpha if you are an at risk user unless you really, actually, truly know what you are doing! critical bugs not present in the Stable release channel. The latest Alpha can be found here: - https://www.torproject.org/download/alpha/ - https://github.com/mullvad/mullvad-browser/releases?q=prerelease%3Atrue --> ### Does this bug occur in Firefox ESR (Desktop only)? Loading @@ -108,5 +104,5 @@ If the issue has been fixed in Firefox, do you know the Bugzilla issue number as --- /label ~"Apps::Product::TorBrowser" /label ~"Apps::Product::MullvadBrowser" /label ~"Apps::Type::WebCompatibility"
.gitlab/issue_templates/030 Test.md +1 −1 Original line number Diff line number Diff line Loading @@ -25,5 +25,5 @@ and the expected behaviour of each --- /label ~"Apps::Product::TorBrowser" /label ~"Apps::Product::MullvadBrowser" /label ~"Apps::Type::Test"
.gitlab/issue_templates/040 Feature.md +2 −2 Original line number Diff line number Diff line Loading @@ -18,7 +18,7 @@ Provide an overview of the technical/implementation aspects of this feature ### Proposal <!-- Add links to associated proposal issues (or delete block) --> - tor-browser#xxxxx - mullvad-browser#xyz ### Design <!-- Add links to associated design issues (or delete block) --> Loading @@ -28,5 +28,5 @@ Provide an overview of the technical/implementation aspects of this feature --- /label ~"Apps::Product::TorBrowser" /label ~"Apps::Product::MullvadBrowser" /label ~"Apps::Type::Feature"