- 22 Jan, 2021 9 commits
-
-
We avoid including the screencasting code on mobile (it got ripped out for desktop in bug 1393582) by simply excluding the related JS modules from Tor Browser.
-
This is technically an embargoed Mozilla bug, so I probably shouldn't provide too many details. Suffice to say that NTLM and Negotiate auth are bad for Tor users, and I doubt very many (or any of them) actually need it. The Mozilla bug is https://bugzilla.mozilla.org/show_bug.cgi?id=1046421
-
-
Because of the non-restartless nature of Torbutton, it required a two-stage installation process. On mobile, it was a problem, because it was not loading when the user opened the browser for the first time. Moving it to tor-browser and making it a system extension allows it to load when the user opens the browser for first time. Additionally, this patch also fixes Bug 27611. Bug 26321: New Circuit and New Identity menu items Bug 14392: Make about:tor behave like other initial pages. Bug 25013: Add torbutton as a tor-browser submodule
-
-
Build and package Tor Launcher as part of the browser (similar to how pdfjs is handled). If a Tor Launcher extension is present in the user's profile, it is removed.
-
Regression tests for Bug #2950: Make Permissions Manager memory-only Regression tests for TB4: Tor Browser's Firefox preference overrides. Note: many more functional tests could be made here Regression tests for #2874: Block Components.interfaces from content Bug 18923: Add a script to run all Tor Browser specific tests Regression tests for Bug #16441: Suppress "Reset Tor Browser" prompt.
-
This hack directly includes our preference changes in omni.ja. Bug 18292: Staged updates fail on Windows Temporarily disable staged updates on Windows. Bug 18297: Use separate Noto JP,KR,SC,TC fonts Bug 23404: Add Noto Sans Buginese to the macOS whitelist Bug 23745: Set dom.indexedDB.enabled = true Bug 13575: Disable randomised Firefox HTTP cache decay user tests. (Fernando Fernandez Mancera <ffmancera@riseup.net>) Bug 17252: Enable session identifiers with FPI Session tickets and session identifiers were isolated by OriginAttributes, so we can re-enable them by allowing the default value (true) of "security.ssl.disable_session_identifiers". The pref "security.enable_tls_session_tickets" is obsolete (removed in https://bugzilla.mozilla.org/917049) Bug 14952: Enable http/2 and AltSvc In Firefox, SPDY/HTTP2 now uses Origin Attributes for isolation of connections, push streams, origin frames, etc. That means we get first-party isolation provided "privacy.firstparty.isolate" is true. So in this patch, we stop overriding "network.http.spdy.enabled" and "network.http.spdy.enabled.http2". Alternate Services also use Origin Attributes for isolation. So we stop overriding "network.http.altsvc.enabled" and "network.http.altsvc.oe" as well. (All 4 of the abovementioned "network.http.*" prefs adopt Firefox 60ESR's default value of true.) However, we want to disable HTTP/2 push for now, so we set "network.http.spdy.allow-push" to false. "network.http.spdy.enabled.http2draft" was removed in Bug 1132357. "network.http.sped.enabled.v2" was removed in Bug 912550. "network.http.sped.enabled.v3" was removed in Bug 1097944. "network.http.sped.enabled.v3-1" was removed in Bug 1248197. Bug 26114: addons.mozilla.org is not special * Don't expose navigator.mozAddonManager on any site * Don't block NoScript from modifying addons.mozilla.org or other sites Enable ReaderView mode again (#27281). Bug 29916: Make sure enterprise policies are disabled Bug 2874: Block Components.interfaces from content Bug 26146: Spoof HTTP User-Agent header for desktop platforms In Tor Browser 8.0, the OS was revealed in both the HTTP User-Agent header and to JavaScript code via navigator.userAgent. To avoid leaking the OS inside each HTTP request (which many web servers log), always use the Windows 7 OS value in the desktop User-Agent header. We continue to allow access to the actual OS via JavaScript, since doing so improves compatibility with web applications such as GitHub and Google Docs. Bug 12885: Windows Jump Lists fail for Tor Browser Jumplist entries are stored in a binary file in: %APPDATA%\\Microsoft\Windows\Recent\CustomDestinations\ and has a name in the form [a-f0-9]+.customDestinations-ms The hex at the front is unique per app, and is ultimately derived from something called the 'App User Model ID' (AUMID) via some unknown hashing method. The AUMID is provided as a key when programmatically creating, updating, and deleting a jumplist. The default behaviour in firefox is for the installer to define an AUMID for an app, and save it in the registry so that the jumplist data can be removed by the uninstaller. However, the Tor Browser does not set this (or any other) regkey during installation, so this codepath fails and the app's AUMID is left undefined. As a result the app's AUMID ends up being defined by windows, but unknowable by Tor Browser. This unknown AUMID is used to create and modify the jumplist, but the delete API requires that we provide the app's AUMID explicitly. Since we don't know what the AUMID is (since the expected regkey where it is normally stored does not exist) jumplist deletion will fail and we will leave behind a mostly empty customDestinations-ms file. The name of the file is derived from the binary path, so an enterprising person could reverse engineer how that hex name is calculated, and generate the name for Tor Browser's default Desktop installation path to determine whether a person had used Tor Browser in the past. The 'taskbar.grouping.useprofile' option that is enabled by this patch works around this AUMID problem by having firefox.exe create it's own AUMID based on the profile path (rather than looking for a regkey). This way, if a user goes in and enables and disables jumplist entries, the backing store is properly deleted. Unfortunately, all windows users currently have this file lurking in the above mentioned directory and this patch will not remove it since it was created with an unknown AUMID. However, another patch could be written which goes to that directory and deletes any item containing the 'Tor Browser' string. See bug 28996. Bug 31396: Disable indexedDB WebExtension storage backend. Bug 30845: Make sure default themes and other internal extensions are enabled Bug 28896: Enable extensions in private browsing by default Bug 31065: Explicitly allow proxying localhost Bug 31598: Enable letterboxing Disable Presentation API everywhere Bug 21549 - Use Firefox's WASM default pref. It is disabled at safer security levels. Bug 32321: Disable Mozilla's MitM pings Bug 19890: Disable installation of system addons By setting the URL to "" we make sure that already installed system addons get deleted as well. Bug 22548: Firefox downgrades VP9 videos to VP8. On systems where H.264 is not available or no HWA, VP9 is preferred. But in Tor Browser 7.0 all youtube videos are degraded to VP8. This behaviour can be turned off by setting media.benchmark.vp9.threshold to 0. All clients will get better experience and lower traffic, beause TBB doesn't use "Use hardware acceleration when available". Bug 25741 - TBA: Add mobile-override of 000-tor-browser prefs Bug 16441: Suppress "Reset Tor Browser" prompt. Bug 29120: Use the in-memory media cache and increase its maximum size. Bug 33697: use old search config based on list.json Bug 33855: Ensure that site-specific browser mode is disabled. Bug 30682: Disable Intermediate CA Preloading. Bug 40061: Omit the Windows default browser agent from the build Bug 40140: Videos stop working with Tor Browser 10.0 on Windows
-
Also: Bug #9829.1: new .mozconfig file for the new cross-compiler and ESR24 Changes needed to build Mac in 64bit Bug 10715: Enable Webgl for mingw-w64 again. Disable ICU when cross-compiling; clean-up. Bug 15773: Enable ICU on OS X Bug 15990: Don't build the sandbox with mingw-w64 Bug 12761: Switch to ESR 38 for OS X Updating .mozconfig-asan Bug 12516: Compile hardenend Tor Browser with -fwrapv Bug 18331: Switch to Mozilla's toolchain for building Tor Browser for OS X Bug 17858: Cannot create incremental MARs for hardened builds. Define HOST_CFLAGS, etc. to avoid compiling programs such as mbsdiff (which is part of mar-tools and is not distributed to end-users) with ASan. Bug 13419: Add back ICU for Windows Bug 21239: Use GTK2 for ESR52 Linux builds Bug 23025: Add hardening flags for macOS Bug 24478: Enable debug assertions and tests in our ASan builds --enable-proxy-bypass-protection Bug 27597: ASan build option in tor-browser-build is broken Bug 27623 - Export MOZILLA_OFFICIAL during desktop builds This fixes a problem where some preferences had the wrong default value. Also see bug 27472 where we made a similar fix for Android. Bug 30463: Explicitly disable MOZ_TELEMETRY_REPORTING Bug 31450: Set proper BINDGEN_CFLAGS for ASan builds Add an --enable-tor-browser-data-outside-app-dir configure option Add --with-tor-browser-version configure option Bug 21849: Don't allow SSL key logging. Bug 31457: disable per-installation profiles The dedicated profiles (per-installation) feature does not interact well with our bundled profiles on Linux and Windows, and it also causes multiple profiles to be created on macOS under TorBrowser-Data. Bug 31935: Disable profile downgrade protection. Since Tor Browser does not support more than one profile, disable the prompt and associated code that offers to create one when a version downgrade situation is detected. Bug 32493: Disable MOZ_SERVICES_HEALTHREPORT Bug 25741 - TBA: Disable features at compile-time MOZ_NATIVE_DEVICES for casting and the media player MOZ_TELEMETRY_REPORTING for telemetry MOZ_DATA_REPORTING for all data reporting preferences (crashreport, telemetry, geo) Bug 25741 - TBA: Add default configure options in dedicated file Define MOZ_ANDROID_NETWORK_STATE and MOZ_ANDROID_LOCATION Bug 29859: Disable HLS support for now Add --disable-tor-launcher build option Add --enable-tor-browser-update build option Bug 33734: Set MOZ_NORMANDY to False Bug 33851: Omit Parental Controls. Bug 40061: Omit the Windows default browser agent from the build Bug 40211: Lower required build-tools version to 29.0.2
-
- 11 Jan, 2021 1 commit
-
-
Erica Wright authored
Differential Revision: https://phabricator.services.mozilla.com/D101387
-
- 15 Jan, 2021 2 commits
-
-
Gijs Kruitbosch authored
Bug 1686907 - fix the window title being affected by JS's 'replace' API treating dollar signs as 'special', r=emilio, a=jcristau Differential Revision: https://phabricator.services.mozilla.com/D101930
-
harry authored
Differential Revision: https://phabricator.services.mozilla.com/D101823
-
- 14 Jan, 2021 1 commit
-
-
harry authored
Bug 1686767 - Unhide urlbar.extension.enabled pref and add experimental APIs to set it. r=adw, a=jcristau Having browser.urlbar.extension.enabled be a hidden pref was causing issues with the new experimental APIs and their tests. Both the APIs and their tests first read the value of the pref before modifying it so it can later be restored to its default value. The default value of a hidden pref is undefined, which was causing errors. It's not a particularly sensitive pref, so I think unhiding it is preferable to finding a workaround to get the APIs/tests working with hidden prefs. Differential Revision: https://phabricator.services.mozilla.com/D101799
-
- 15 Jan, 2021 2 commits
-
-
Dale Harvey authored
Differential Revision: https://phabricator.services.mozilla.com/D100609
-
Dão Gottwald authored
Differential Revision: https://phabricator.services.mozilla.com/D101935
-
- 18 Jan, 2021 5 commits
-
-
Mozilla Releng Treescript authored
-
Mozilla Releng Treescript authored
No bug - tagging b0f978e50aeb0e13c0e19c7752c72ef99fe937f1 with FIREFOX_RELEASE_84_END a=release DONTBUILD CLOSED TREE
-
Mozilla Releng Treescript authored
-
Mozilla Releng Treescript authored
Merge old head via |hg debugsetparents 463bbc5c4fc95bd5f3337cdd3340e5ada987561a b0f978e50aeb0e13c0e19c7752c72ef99fe937f1| CLOSED TREE DONTBUILD a=release
-
Mozilla Releng Treescript authored
No bug - tagging 04b23d0aa31dc4900ed37b42c85ac4c4f91dbda0 with FIREFOX_RELEASE_85_BASE a=release DONTBUILD CLOSED TREE
-
- 17 Jan, 2021 1 commit
-
-
Mozilla Releng Treescript authored
cak -> 348fb951da2e44231b1fbb9381dd16933df05603 cs -> 52299869923f96dedb36777d26b3e3786301c780 el -> 405b8fe65766300f306da2b998e71f2a209605fd fi -> f6976fadbb902414d8ccfa1817719efc58da8a6a hr -> deadd8f68ba55a73b8194f41100dc4b28766467b kk -> b74d15d5572fea9d615eec802e3402e48f845844 oc -> bc210791bdfcd1a9941e62d6f9f3bd11949dafb8 pa-IN -> e002c738964319dc29a063ed206aac0c99a97137 ru -> 67cdcb3532efc212bc1ef8be22ee1460aa7320c0 th -> 4a8026c1564e312e4d952fdddf5b7f998f03a8d8 uk -> 5d40241a26298ee40ecd4919c6b412435410d649
-
- 16 Jan, 2021 1 commit
-
-
Mozilla Releng Treescript authored
be -> 486e503c3cea65b9fa4302c24f150c3525d100ab cs -> fb10a7cc0da55d88abdb061c36a59321be8daef6 es-CL -> 5359018de29824f58836350a45637f91651056c6 it -> d342ad30e60a95059c4a59cc1674c869e2a517b6 ja -> 3bf640364769b6b1c70c0119f5f9997b3861262a ja-JP-mac -> 6deeb76870e9272b4b7538ae852841282ecc5783 ka -> d3de2aab42be56ba3efc5c7ae2a39b25a0da4692 lt -> fc5ea3fa4b246e53fd79c9d21c466b08e62b7697 nb-NO -> d806c3b140104228468a960ba6fd40ce1d4cc314 pa-IN -> d7321e6b35ef5cb09b780f4f404d90d1bc401d5a pl -> be448df7cce1750e767baca2b04aa466d60e489d pt-BR -> cce4bfbb3bca07dbcecb2d15f566551b56c4d7dc sk -> fcacf7c3b0553af13da134faefa3d110d0dea50a sl -> 409c6a3d314cecc2d7c2ced9d8d6640eaaf4ecbf
-
- 14 Jan, 2021 1 commit
-
-
ffxbld authored
Differential Revision: https://phabricator.services.mozilla.com/D101728
-
- 11 Jan, 2021 1 commit
-
-
ffxbld authored
Differential Revision: https://phabricator.services.mozilla.com/D101332
-
- 08 Jan, 2021 1 commit
-
-
Connor Sheehan authored
Bug 1684914: stop passing `-flto=thin` to gcc since it doesn't actually work r=glandium,mhentges a=RyanVM Passing `-flto=thin` worked previously but the value passed was just ignored and full lto was performed. On newer versions of gcc passing an unknown value causes failure. So this commit checks if `-flto=thin` is passed and fails with an error message if so, else full lto is enabled if any other value is passed. Differential Revision: https://phabricator.services.mozilla.com/D100953
-
- 06 Jan, 2021 1 commit
-
-
Hiroyuki Ikezoe authored
Bug 1674104 - Reset the vertical clipping value to zero whenever we change the dynamic toolbar max height. r=botond, a=RyanVM So that we will not mis-align position:fixed elements with the old stale clipping value. Differential Revision: https://phabricator.services.mozilla.com/D100862
-
- 14 Jan, 2021 4 commits
-
-
Andrew Osmond authored
Also disable for users with 64-bit Firefox with 1-2 cores, and less than 2 GB of physical memory. It was already disabled for 32-bit Firefox. Differential Revision: https://phabricator.services.mozilla.com/D101052
-
Tom Tung authored
This patch: - adds a new pref for site quota. - sets 25 MB as the default site qutoa. - renames LocalStorageManager::GetQuota() to LocalStorageManager::GetOriginQuota(). - adds LocalStorageManager::GetSiteQuota(). - updates LocalStorage quota tests. Differential Revision: https://phabricator.services.mozilla.com/D101756
-
Jan Varga authored
Differential Revision: https://phabricator.services.mozilla.com/D101726
-
Jan de Mooij authored
Differential Revision: https://phabricator.services.mozilla.com/D101344
-
- 15 Jan, 2021 4 commits
-
-
Mozilla Releng Treescript authored
be -> dc6b873dab73417f68fb07edd623c61ce3761933 eu -> 6631fb78bf0afe5573032db4c3fd07384025c351 fr -> 81ddb962639bcacac59600a57ebcbd9aad4a4411 fy-NL -> 5712c29aa35eadaf3a4c4d9be0a50d65d8bd0569 ia -> 8a6fa89de8870280cbc3a6f18af73daf1fc602d5 it -> 4e6048ce51b256a12a6451c7a48a88cdb3405a47 ka -> 1febfcc9569284994ac3e23802c89053b01b78da kab -> eebd2fbbe86cb52f4cc3c834d5f9bb3a799dbc4d nb-NO -> 0d5afffb906b59216ce050b0b4db5e9760f87d25 nl -> 836f75380c48ee1e1e410b1f362d37a4b8e4b9aa uk -> 313556c8b52e70b8229f122bfabf4f19af59103e
-
Mozilla Releng Treescript authored
No bug - Tagging 8e3aa8fc3e1513594f07edb2e9c5f11e57560ebe with FIREFOX_85_0b9_RELEASE a=release CLOSED TREE DONTBUILD
-
Mozilla Releng Treescript authored
-
Mozilla Releng Treescript authored
No bug - Tagging 8e3aa8fc3e1513594f07edb2e9c5f11e57560ebe with DEVEDITION_85_0b9_RELEASE a=release CLOSED TREE DONTBUILD
-
- 14 Jan, 2021 3 commits
-
-
Mozilla Releng Treescript authored
No bug - Tagging 8e3aa8fc3e1513594f07edb2e9c5f11e57560ebe with FIREFOX_85_0b9_BUILD1 a=release CLOSED TREE DONTBUILD
-
Mozilla Releng Treescript authored
No bug - Tagging 8e3aa8fc3e1513594f07edb2e9c5f11e57560ebe with DEVEDITION_85_0b9_BUILD1 a=release CLOSED TREE DONTBUILD
-
Sebastian Hengst authored
Bug 1686615 - update hardcode certificate data in test browser_certificateManager.js after certificate got updated. a=test-only
-
- 13 Jan, 2021 3 commits
-
-
Steve Fink authored
Differential Revision: https://phabricator.services.mozilla.com/D100427
-
Steve Fink authored
Bug 1682068 - Fix rooting hazard in ImageBitmap::CreateInternal by avoiding movable data. r=jrmuizel, a=RyanVM Differential Revision: https://phabricator.services.mozilla.com/D100428
-
Steve Fink authored
Bug 1686532 - Add dom::TypedArray_base::Reset() as a signal to the hazard analysis that no invalidatable data is being held onto. r=jonco, a=RyanVM Differential Revision: https://phabricator.services.mozilla.com/D100429
-