- Aug 26, 2024
-
-
- Revert 612d54e8
-
-
The GeckoView AndroidManifest.xml is not preprocessed unlike Fennec's manifest, so we can't use the ifdef preprocessor guards around the permissions we do not want. Commenting the permissions is the next-best-thing.
-
-
Pier Angelo Vendrame authored
-
Pier Angelo Vendrame authored
This is a workaround to fix the GeckoView build with WebRTC disabled. We should replace this workaround with a proper solution, that excludes this test when MOZ_WEBRTC is undefined/False.
-
Pier Angelo Vendrame authored
-
Pier Angelo Vendrame authored
Bug 40857: Modified the fat .aar creation file This is a workaround to build fat .aars with the compiling enviornment disabled. Mozilla does not use a similar configuration, but either runs a Firefox build and discards its output, or uses artifacts build. We might switch to artifact builds too, and drop this patch, or write a better one to upstream. But until then we need this patch. See also https://bugzilla.mozilla.org/show_bug.cgi?id=1763770. Bug 41458: Prevent `mach package-multi-locale` from actually creating a package macOS builds need some files to be moved around with ./mach package-multi-locale to create multi-locale packages. The required command isn't exposed through any other mach command. So, we patch package-multi-locale both to prevent it from failing when doing official builds and to detect any future changes on it.
-
Pier Angelo Vendrame authored
Bug 17858: Cannot create incremental MARs for hardened builds. Define HOST_CFLAGS, etc. to avoid compiling programs such as mbsdiff (which is part of mar-tools and is not distributed to end-users) with ASan. Bug 21849: Don't allow SSL key logging. Bug 25741 - TBA: Disable features at compile-time Define MOZ_ANDROID_NETWORK_STATE and MOZ_ANDROID_LOCATION Bug 27623 - Export MOZILLA_OFFICIAL during desktop builds This fixes a problem where some preferences had the wrong default value. Also see bug 27472 where we made a similar fix for Android. Bug 29859: Disable HLS support for now Bug 30463: Explicitly disable MOZ_TELEMETRY_REPORTING Bug 32493: Disable MOZ_SERVICES_HEALTHREPORT Bug 33734: Set MOZ_NORMANDY to False Bug 33851: Omit Parental Controls. Bug 40252: Add --enable-rust-simd to our tor-browser mozconfig files Bug 41584: Move some configuration options to base-browser level
-
Fix issue that prevents the create-bundle job from succeeding when there is already a branch with the same name as the one being pushed to in the CI -- mostly happens on protected branches.
-
Bug 42997: Reduce the number of git fetches by fetching during a setup job and passing that initial fetch around as a git bundle to other jobs through the Gitlab artifacts. Further reduce the number of fetches by creating a list of changed files in the setup job and passing that around as well as an artifact.
-
-
-
-
add QA issue templates for tor browser desktop and android
-
-
-
Bug 43064: Make file filtering more specific
-
-
-
- fixes required to build dom/media/systemservices
-
- fixes required to build dom/media/webrtc
-
- fixes requried to build netwerk/sctp
-
- fixes required to build third_party/sipcc
-
- fixes required to build third_party/libwebrtc
-
- properly define NOMINMAX for just MSVC builds
-
Remove this patch after upstream bugzilla bug 1790187
-
-
Temporary fix until mozilla bug 1799153 gets a patch upstream.
-
Bug 43005: followup, fix backporting conflict.
-
Original Revision: https://phabricator.services.mozilla.com/D216996 Differential Revision: https://phabricator.services.mozilla.com/D217718
-
Differential Revision: https://phabricator.services.mozilla.com/D214799
-
Bug 1899180. If a channel is not nsIPrivateBrowsingChannel and has no load context, use the private browsing field from it's origin attributes. r=necko-reviewers,anti-tracking-reviewers,valentin If the channel is not a nsIPrivateBrowsingChannel, and it also has no load context (eg inside svg images) then we will over write a non-zero mPrivateBrowsingId on the OriginAttributes of the channel with 0, making NS_UsePrivateBrowsing return false for the channel. Differential Revision: https://phabricator.services.mozilla.com/D212083
-
ffxbld authored
Differential Revision: https://phabricator.services.mozilla.com/D220102
-
- Aug 24, 2024
-
-
Ryan VanderMeulen authored
This was created by reverting revs 5b6b822f52e6+9bac10b90db8 then re-grafting revs 5f911e4787cb+4e9fe79abfdf and folding the resulting commits together.
-
- Aug 08, 2024
-
-
Peter Van der Beken authored
Bug 1906744 - Check if constructor is enabled before installing named property. r=mccr8,dom-storage-reviewers,janv,asuth,eemeli a=RyanVM Differential Revision: https://phabricator.services.mozilla.com/D216671
-
- Jul 27, 2024
-
-
Kelsey Gilbert authored
There's no sufficiently robust way to identify POD types in C++, such that we could rely on this kind of thing for serialization. As one example, `bool` must be carefully handled on deserialize, in case an attacker wants to exploit the UB of bool with value 2. Additionally, generally it's not viable to tell whether all the members of a struct are PODs as well, and we need that level of assurance recursively! So we instead lean on e.g. ParamTraits_TiedFields/_IsEnumCase for our extreme robustness requirements. Differential Revision: https://phabricator.services.mozilla.com/D217518
-
- Jul 24, 2024
-
-
Kelsey Gilbert authored
Differential Revision: https://phabricator.services.mozilla.com/D217185
-