- 24 Mar, 2021 3 commits
-
-
Regression tests for Bug #2950: Make Permissions Manager memory-only Regression tests for TB4: Tor Browser's Firefox preference overrides. Note: many more functional tests could be made here Regression tests for #2874: Block Components.interfaces from content Bug 18923: Add a script to run all Tor Browser specific tests Regression tests for Bug #16441: Suppress "Reset Tor Browser" prompt.
-
This hack directly includes our preference changes in omni.ja. Bug 18292: Staged updates fail on Windows Temporarily disable staged updates on Windows. Bug 18297: Use separate Noto JP,KR,SC,TC fonts Bug 23404: Add Noto Sans Buginese to the macOS whitelist Bug 23745: Set dom.indexedDB.enabled = true Bug 13575: Disable randomised Firefox HTTP cache decay user tests. (Fernando Fernandez Mancera <ffmancera@riseup.net>) Bug 17252: Enable session identifiers with FPI Session tickets and session identifiers were isolated by OriginAttributes, so we can re-enable them by allowing the default value (true) of "security.ssl.disable_session_identifiers". The pref "security.enable_tls_session_tickets" is obsolete (removed in https://bugzilla.mozilla.org/917049) Bug 14952: Enable http/2 and AltSvc In Firefox, SPDY/HTTP2 now uses Origin Attributes for isolation of connections, push streams, origin frames, etc. That means we get first-party isolation provided "privacy.firstparty.isolate" is true. So in this patch, we stop overriding "network.http.spdy.enabled" and "network.http.spdy.enabled.http2". Alternate Services also use Origin Attributes for isolation. So we stop overriding "network.http.altsvc.enabled" and "network.http.altsvc.oe" as well. (All 4 of the abovementioned "network.http.*" prefs adopt Firefox 60ESR's default value of true.) However, we want to disable HTTP/2 push for now, so we set "network.http.spdy.allow-push" to false. "network.http.spdy.enabled.http2draft" was removed in Bug 1132357. "network.http.sped.enabled.v2" was removed in Bug 912550. "network.http.sped.enabled.v3" was removed in Bug 1097944. "network.http.sped.enabled.v3-1" was removed in Bug 1248197. Bug 26114: addons.mozilla.org is not special * Don't expose navigator.mozAddonManager on any site * Don't block NoScript from modifying addons.mozilla.org or other sites Enable ReaderView mode again (#27281). Bug 29916: Make sure enterprise policies are disabled Bug 2874: Block Components.interfaces from content Bug 26146: Spoof HTTP User-Agent header for desktop platforms In Tor Browser 8.0, the OS was revealed in both the HTTP User-Agent header and to JavaScript code via navigator.userAgent. To avoid leaking the OS inside each HTTP request (which many web servers log), always use the Windows 7 OS value in the desktop User-Agent header. We continue to allow access to the actual OS via JavaScript, since doing so improves compatibility with web applications such as GitHub and Google Docs. Bug 12885: Windows Jump Lists fail for Tor Browser Jumplist entries are stored in a binary file in: %APPDATA%\\Microsoft\Windows\Recent\CustomDestinations\ and has a name in the form [a-f0-9]+.customDestinations-ms The hex at the front is unique per app, and is ultimately derived from something called the 'App User Model ID' (AUMID) via some unknown hashing method. The AUMID is provided as a key when programmatically creating, updating, and deleting a jumplist. The default behaviour in firefox is for the installer to define an AUMID for an app, and save it in the registry so that the jumplist data can be removed by the uninstaller. However, the Tor Browser does not set this (or any other) regkey during installation, so this codepath fails and the app's AUMID is left undefined. As a result the app's AUMID ends up being defined by windows, but unknowable by Tor Browser. This unknown AUMID is used to create and modify the jumplist, but the delete API requires that we provide the app's AUMID explicitly. Since we don't know what the AUMID is (since the expected regkey where it is normally stored does not exist) jumplist deletion will fail and we will leave behind a mostly empty customDestinations-ms file. The name of the file is derived from the binary path, so an enterprising person could reverse engineer how that hex name is calculated, and generate the name for Tor Browser's default Desktop installation path to determine whether a person had used Tor Browser in the past. The 'taskbar.grouping.useprofile' option that is enabled by this patch works around this AUMID problem by having firefox.exe create it's own AUMID based on the profile path (rather than looking for a regkey). This way, if a user goes in and enables and disables jumplist entries, the backing store is properly deleted. Unfortunately, all windows users currently have this file lurking in the above mentioned directory and this patch will not remove it since it was created with an unknown AUMID. However, another patch could be written which goes to that directory and deletes any item containing the 'Tor Browser' string. See bug 28996. Bug 31396: Disable indexedDB WebExtension storage backend. Bug 30845: Make sure default themes and other internal extensions are enabled Bug 28896: Enable extensions in private browsing by default Bug 31065: Explicitly allow proxying localhost Bug 31598: Enable letterboxing Disable Presentation API everywhere Bug 21549 - Use Firefox's WASM default pref. It is disabled at safer security levels. Bug 32321: Disable Mozilla's MitM pings Bug 19890: Disable installation of system addons By setting the URL to "" we make sure that already installed system addons get deleted as well. Bug 22548: Firefox downgrades VP9 videos to VP8. On systems where H.264 is not available or no HWA, VP9 is preferred. But in Tor Browser 7.0 all youtube videos are degraded to VP8. This behaviour can be turned off by setting media.benchmark.vp9.threshold to 0. All clients will get better experience and lower traffic, beause TBB doesn't use "Use hardware acceleration when available". Bug 25741 - TBA: Add mobile-override of 000-tor-browser prefs Bug 16441: Suppress "Reset Tor Browser" prompt. Bug 29120: Use the in-memory media cache and increase its maximum size. Bug 33697: use old search config based on list.json Bug 33855: Ensure that site-specific browser mode is disabled. Bug 30682: Disable Intermediate CA Preloading. Bug 40061: Omit the Windows default browser agent from the build Bug 40140: Videos stop working with Tor Browser 10.0 on Windows Bug 40308: Disable network partitioning until we evaluate dFPI Bug 40322: Consider disabling network.connectivity-service.enabled Bug 40383: Disable dom.enable_event_timing
-
Also: Bug #9829.1: new .mozconfig file for the new cross-compiler and ESR24 Changes needed to build Mac in 64bit Bug 10715: Enable Webgl for mingw-w64 again. Disable ICU when cross-compiling; clean-up. Bug 15773: Enable ICU on OS X Bug 15990: Don't build the sandbox with mingw-w64 Bug 12761: Switch to ESR 38 for OS X Updating .mozconfig-asan Bug 12516: Compile hardenend Tor Browser with -fwrapv Bug 18331: Switch to Mozilla's toolchain for building Tor Browser for OS X Bug 17858: Cannot create incremental MARs for hardened builds. Define HOST_CFLAGS, etc. to avoid compiling programs such as mbsdiff (which is part of mar-tools and is not distributed to end-users) with ASan. Bug 13419: Add back ICU for Windows Bug 21239: Use GTK2 for ESR52 Linux builds Bug 23025: Add hardening flags for macOS Bug 24478: Enable debug assertions and tests in our ASan builds --enable-proxy-bypass-protection Bug 27597: ASan build option in tor-browser-build is broken Bug 27623 - Export MOZILLA_OFFICIAL during desktop builds This fixes a problem where some preferences had the wrong default value. Also see bug 27472 where we made a similar fix for Android. Bug 30463: Explicitly disable MOZ_TELEMETRY_REPORTING Bug 31450: Set proper BINDGEN_CFLAGS for ASan builds Add an --enable-tor-browser-data-outside-app-dir configure option Add --with-tor-browser-version configure option Bug 21849: Don't allow SSL key logging. Bug 31457: disable per-installation profiles The dedicated profiles (per-installation) feature does not interact well with our bundled profiles on Linux and Windows, and it also causes multiple profiles to be created on macOS under TorBrowser-Data. Bug 31935: Disable profile downgrade protection. Since Tor Browser does not support more than one profile, disable the prompt and associated code that offers to create one when a version downgrade situation is detected. Bug 32493: Disable MOZ_SERVICES_HEALTHREPORT Bug 25741 - TBA: Disable features at compile-time MOZ_NATIVE_DEVICES for casting and the media player MOZ_TELEMETRY_REPORTING for telemetry MOZ_DATA_REPORTING for all data reporting preferences (crashreport, telemetry, geo) Bug 25741 - TBA: Add default configure options in dedicated file Define MOZ_ANDROID_NETWORK_STATE and MOZ_ANDROID_LOCATION Bug 29859: Disable HLS support for now Add --disable-tor-launcher build option Add --enable-tor-browser-update build option Bug 33734: Set MOZ_NORMANDY to False Bug 33851: Omit Parental Controls. Bug 40061: Omit the Windows default browser agent from the build Bug 40211: Lower required build-tools version to 29.0.2 Bug 40252: Add --enable-rust-simd to our tor-browser mozconfig files
-
- 17 Mar, 2021 3 commits
-
-
Jonathan Kew authored
Bug 1699240 - Add print.css stylesheet to print reftest to suppress default footer text (because the timestamp is potentially problematic). r=dholbert, a=test-only Differential Revision: https://phabricator.services.mozilla.com/D108839
-
Jonathan Kew authored
Differential Revision: https://phabricator.services.mozilla.com/D108652
-
Jonathan Kew authored
The important changes here are a handful of places where we replace memcpy(&m, mask++, sizeof(uint32_t)); or similar code with uint8_t m = *mask++; because we're only supposed to be considering a single byte from *mask. I've also changed a bunch of other places to use this same pattern (a local 8-bit variable) when reading individual bytes from the mask; the code was inconsistent about this, sometimes casting the byte to a uint32_t instead. This makes no actual difference, it just seemed better to use a consistent pattern throughout the file. Differential Revision: https://phabricator.services.mozilla.com/D108614
-
- 16 Mar, 2021 1 commit
-
-
Nihanth Subramanya authored
Bug 1698807 - Block TRR on confirmation by default until we can complete a performance study. r=necko-reviewers,valentin, a=jcristau Differential Revision: https://phabricator.services.mozilla.com/D108634
-
- 17 Mar, 2021 1 commit
-
-
Tooru Fujisawa authored
Differential Revision: https://phabricator.services.mozilla.com/D108810
-
- 18 Mar, 2021 1 commit
-
-
ffxbld authored
Differential Revision: https://phabricator.services.mozilla.com/D108919
-
- 15 Mar, 2021 3 commits
-
-
Mozilla Releng Treescript authored
No bug - Tagging 7b73c14202a39e440f8eddd9b48ecf17b7b59eee with FIREFOX_87_0_BUILD2 a=release CLOSED TREE DONTBUILD
-
Mozilla Releng Treescript authored
No bug - Tagging 7b73c14202a39e440f8eddd9b48ecf17b7b59eee with FIREFOX_87_0_BUILD1 a=release CLOSED TREE DONTBUILD
-
Julien Cristau authored
Backed out changeset 695194f849b1 (bug 1695666)
-
- 11 Mar, 2021 1 commit
-
-
Drew Willcoxon authored
Differential Revision: https://phabricator.services.mozilla.com/D107973
-
- 12 Mar, 2021 1 commit
-
-
Dave Townsend authored
Differential Revision: https://phabricator.services.mozilla.com/D108217
-
- 11 Mar, 2021 1 commit
-
-
Byron Campen [:bwc] authored
Bug 1696593: Ensure that the DNS service is initted (on main) before trying to init NrIceCtx. r=mjf,kershaw,necko-reviewers, a=jcristau Also add some NS_WARN_IF that helped find the bug. Differential Revision: https://phabricator.services.mozilla.com/D107508
-
- 15 Mar, 2021 6 commits
-
-
ffxbld authored
Differential Revision: https://phabricator.services.mozilla.com/D108414
-
Mozilla Releng Treescript authored
-
Mozilla Releng Treescript authored
No bug - tagging 3015dca9a86d64a61a7ffc96e0ad609f3da79f83 with FIREFOX_RELEASE_86_END a=release DONTBUILD CLOSED TREE
-
Mozilla Releng Treescript authored
-
Mozilla Releng Treescript authored
Merge old head via |hg debugsetparents c7d3da65b97e1f7cd162c29b8b4f4c64096852cb 3015dca9a86d64a61a7ffc96e0ad609f3da79f83| CLOSED TREE DONTBUILD a=release
-
Mozilla Releng Treescript authored
No bug - tagging 557bab6160978a71e90c226c4750db67affe470e with FIREFOX_RELEASE_87_BASE a=release DONTBUILD CLOSED TREE
-
- 14 Mar, 2021 1 commit
-
-
Mozilla Releng Treescript authored
ast -> 9e7c8cb022e19ad8a9270fee6c235c318ec70186 be -> 34b0f313c6a3e2a7cc9e3d1d349b10e1e3ce4381 cak -> 147db1f71e7e65a884e678cc227e55410cac5a07 da -> a5bd41d60c1fefad4c78bd0ce8925518a6a6fe86 de -> 9897887ebb3da8b2eda4ba5f466b8ad602e3fabf el -> bb3ee973b3a450bf1230fd28083afccbec55b9de en-CA -> ce8532b8b691c630ac58e2c47750e769ae42356b eo -> d83ff24301ecca406da3fd1de6c2bc0064ab2136 es-AR -> 2a99fd7d10f0cdd8db624f0777762c75d8b29f03 et -> 7365923469c4e01557906c3d677f2f83892b1ff1 he -> 09eb38186b2d0712f68d2ee45b2af6f4ac28fafa hsb -> f7bf22570b9f0beaf21a8dd6a52398e972f53062 ia -> ab5f840366f6e78c2a12ca4249c4740a00074eab it -> d89ebbadc70c0e7cb1418290d1b838b564e36640 kab -> d3db8428d2a62eecd8cd149584da693cb0c6ca80 lt -> 101dfe7e79be8b1cf65151629990b771f4cfe156 nb-NO -> 005aa0fdaac8f486e0599218483a65acdc9b46c6 nl -> 4bd106514c8209e84a57e4be909ae1323d667542 nn-NO -> 210b9a6a0df7d7749c23cdcb6ff4d075b1945011 oc -> f03c2e240e00dcdaeeb318b71058f82274687a58 pt-BR -> 57998e1b3488d3039dad12ff234b04032416badc pt-PT -> bb097d6b2ac2f87461fb19caf0816e11fb06cee1 rm -> 8a25d75d22c9078f4321547ef7169e2f60c181b9 ru -> 1e59a99a8a69559598eadb9327af357741637b21 sk -> 723a278fc7f17612b4613122b67fcd42d86120ca th -> f10e6dbf375d41cb30e598faee55745a4c841838 tr -> e6d7841382b4eeefea86b429a8be0b04603b5a59 zh-TW -> 71dd0f71fbca07d9043a6ab92b231228db8cf4fb
-
- 13 Mar, 2021 1 commit
-
-
Mozilla Releng Treescript authored
be -> 9606f8c42572d8e2cd09056a800a45df45f2c7ac cy -> 4a4d375bd1f519e8166eeddf9eeb6cd47e21b8ca de -> addbd3987aaf5257883bbcc1307fd7bc7907d579 dsb -> 2e61c8a381d9d1f0cd11f0f31602c1bd90d6d555 el -> ee6845910d47a48b93f67fc8c814d8c39f89c09a en-CA -> af52cacd5b329c5453535e98c312bf3523af6cd1 eo -> 082607578a6229efe9d3e3e5c162e3cc25a0f75a fa -> 4ef6c033734f60813e7bdd1bb77d9170d66adc45 hsb -> 1d8ca6dfabc0d6f670de8024fb19cd8d62331396 hu -> 36d264dafd5ebaf75c2ce65516e9710cfdb5699c it -> 3900702bc4c6be5e69674e068441771fc59d3f49 ka -> 246fa435851ae07a28d55e83de8bc657235debad kab -> 82add5e18a4d99a3de8679f095ed4a73b6b58f97 ko -> 2f7176a090edd7a8e104125e2c18069ae1a7d34e nn-NO -> 606c2f754a9b8db2c92fd23c571d6fc7fb3b9ae9 oc -> 5666b8037a7ed6b618bcf72e6471f74435c1ff27 pl -> 89af6ee170b76bda332f6789c7ac18ee1830d1ff rm -> 1b58611f90913c9aa035b371da55584f34ffe47a sl -> 2f3de4ef28065096add556fbec7afffc5a1b28c6 sv-SE -> 7f41b3018c5b0801e1e49ee1ba8881aefda7c558 uk -> 3871b42bf3d2113974dc774717781920297d0bad vi -> c86d3e9174808d2e3d9b6723cca5a709a8f604c7 zh-CN -> 67c45846b9675fb92cbe5115c5ad2437f1ed9855 zh-TW -> 8ca14c01d87a3b49b18ff54b2ff8b7a6719d2672
-
- 12 Mar, 2021 1 commit
-
-
Mozilla Releng Treescript authored
ast -> f9c1a6df7946095e2b95b2764a970f582f666b27 cak -> 80f9aea27a342d402cc50333bc9e7da283b07212 cs -> dba5e4f4147769999c6ffadb7ddf9ae1a221605c cy -> 7195eb7ed4bdb68e757dff4e8df515aa2fcc9d0d dsb -> 1f1c6d50e7c2cb1c8903d97e27a8b17e8def6cae el -> 7d690d6e94bce51dc3e5aa2743f83da8801efcc4 en-CA -> 8c756691f37bc72a67ca6bf88f91bf5ae7b86a28 en-GB -> bda893a89524ba876b0fc4aa532dd7e4ebbebe9a eo -> 0c98f3ad0e3a6ff7e8eccf8df22ced27af255098 es-AR -> beb33c6e6147452df4cbbfba7491c95ab54a8232 eu -> dc57059d857e45fa7c8501eb62416b30f7fe3c57 fi -> 731932a122991855f6c435ef27cb7cad13b11409 fr -> b4f22c3e3754839767993f899d9b830282e3ac04 fy-NL -> a88324d7e4d7d66e61a163616230bd7ddd430e45 gn -> 4af4c66903929e0015b980d24ecabefe377032ff he -> 63b5fa913bdc44562de456347abb08ac6dce30ff hr -> 9c7145ab297179b9b5ab3c7146107474816d49b7 hsb -> f503feeacd3de6017c566dd6e1fb664eef9e971a hu -> f72b5fdbde6a415192490dd539df4958367f2e3d ia -> f6b1fcfc279dcaca009cb3ab056ac7039a9aee5b id -> f31ab32b7e4468d6333849347fdca7c5dfe099c9 it -> 5762764d9bdd29e8f348623caf6c2520f247c743 ja -> a2185d75cd2a294201a4cf765b3dd64048f11706 ja-JP-mac -> 5c0667ad2749db5195cb6d73d31e1814ffe47a63 kab -> 1e0405fbf683e4c77f53799a2cf5461420d08962 kk -> 596e3b849366608b6d02a8596d4f432f874f8749 km -> 3a3811ffc3e69bb6b8b4432896b72c3376d8c5ae ko -> d08e0f99a4d220b5efc796ed3fb2ecb99140952f lt -> bbb7016937ce1a6c40eb3a0d60ba3ec71b30baa1 nb-NO -> 45e3bbe332bc00ca0b13427a2e956dc863d305fe nl -> 09b7920318cc214708bf7cedb15e3d35cd0e2b97 nn-NO -> 637fe1f40c8fac41b17c7957ba7a78d317fb1ef0 oc -> 7815ca25e7919890da9e246b2b03fc849228aa61 pt-BR -> 5449e55ac4481d808dbf9bcd82825d5d5f8e79ca pt-PT -> c4e6c24807ad044d24201955f661aa31575fec7c rm -> 30d8ed81e7d881e2d65738d5244269c13a0cefc2 sk -> 2fd5a67651725030e876225139f1f0fcaa8e1526 sl -> 623ee909b9e87baccd7e61e5d5a743005a0f5470 sr -> e15478b1caad2f356da3fad5e36aff1557c178f1 sv-SE -> 77e1df415d2fd4d56e50eedc73ebad99cdb6cd0d th -> d2f3c8ae720630bf844066dca4570728e51c01de tr -> 37765fc13ff060e3da1759c8e86d78652bac4f86 uk -> b8229f87f42246308c70461bb1c7dda52219e027 vi -> dec52af6d9ade86cf44a41f533c7d21ea9aeb43e zh-CN -> dece9dd30077d64b147303b4f881063599bbd1df zh-TW -> d0cae1e5f25cd0b06a9f81f874a801a269629134
-
- 11 Mar, 2021 1 commit
-
-
Florian Quèze authored
Bug 1673742 - browser_save_video_frame.js should clear the mockTransferCallback before resolving the waitForTransferComplete promise, r=mconley. a=test-only Differential Revision: https://phabricator.services.mozilla.com/D107853
-
- 12 Mar, 2021 3 commits
-
-
Mozilla Releng Treescript authored
No bug - Tagging 0a445fa9981e3c65c6b62fa4f1deccb39c87fc87 with DEVEDITION_87_0b9_RELEASE a=release CLOSED TREE DONTBUILD
-
Mozilla Releng Treescript authored
-
Mozilla Releng Treescript authored
No bug - Tagging 0a445fa9981e3c65c6b62fa4f1deccb39c87fc87 with FIREFOX_87_0b9_RELEASE a=release CLOSED TREE DONTBUILD
-
- 11 Mar, 2021 5 commits
-
-
Mozilla Releng Treescript authored
No bug - Tagging 0a445fa9981e3c65c6b62fa4f1deccb39c87fc87 with FIREFOX_87_0b9_BUILD1 a=release CLOSED TREE DONTBUILD
-
Mozilla Releng Treescript authored
No bug - Tagging 0a445fa9981e3c65c6b62fa4f1deccb39c87fc87 with DEVEDITION_87_0b9_BUILD1 a=release CLOSED TREE DONTBUILD
-
ffxbld authored
Differential Revision: https://phabricator.services.mozilla.com/D107989
-
Mozilla Releng Treescript authored
-
Mozilla Releng Treescript authored
No bug - Tagging 79d8545221202e234cf587c0b36c9aaa6cdc3a41 with FIREFOX_86_0_1_RELEASE a=release CLOSED TREE DONTBUILD
-
- 10 Mar, 2021 4 commits
-
-
Mozilla Releng Treescript authored
No bug - Tagging 79d8545221202e234cf587c0b36c9aaa6cdc3a41 with FIREFOX_86_0_1_BUILD1 a=release CLOSED TREE DONTBUILD
-
Bryce Seager van Dyk authored
Bug 1695033 - Reset image rectangle in the MediaChangeMonitor when changing resolutions. r=alwu, a=jcristau This avoids an issue where we end up with invalid sizes if the metadata in a webm file has a greater resolution than the in band video data. Differential Revision: https://phabricator.services.mozilla.com/D107725
-
Bryce Seager van Dyk authored
This makes debugging decode failures using logs a little nicer when we hit these cases. Differential Revision: https://phabricator.services.mozilla.com/D107724
-
Bryce Seager van Dyk authored
This patch - adds several test files derived from bipbop.mp4. These files are re-encodes that used vp8 and opus. One reference file is added with metadata that is correct, and several others are added with bad metadata (it doesn't match the stream resolution). - adds these files to the `gPlayTests` to ensure we can play them. Differential Revision: https://phabricator.services.mozilla.com/D107723
-
- 11 Mar, 2021 2 commits
-
-
ffxbld authored
Differential Revision: https://phabricator.services.mozilla.com/D108026
-
Julien Cristau authored
Backed out changeset c648cec12f77 (bug 1669840) Backed out changeset b4f43fdd6d04 (bug 1669840) Backed out changeset 1582820076e0 (bug 1669840)
-
- 03 Mar, 2021 1 commit
-
-
Daniel Holbert authored
Depends on D107034 Differential Revision: https://phabricator.services.mozilla.com/D107035
-