Skip to content
Permalink
18958+2

Commits on May 11, 2016

  1. fixup! Regression tests for #5856: Do not expose physical screen info…

    … via window & window.screen.
    arthuredelstein committed May 11, 2016
  2. Bug #18958: Spoof screen.orientation values

    Make sure that
    screen.orientation.angle -> 0 and
    screen.orientation.type -> "landscape-primary"
    
    Also refactors screen.mozOrientation.
    arthuredelstein committed May 11, 2016

Commits on May 4, 2016

  1. fixup! Bug #13670.1: Isolate favicon requests by first party

    This fixes the isolation issues on the Page Info dialog (both video and
    audio related). See bug 18703 for more details.
    arthuredelstein authored and gk-tpo committed May 4, 2016

Commits on May 2, 2016

  1. fixup! Bug #4234: Use the Firefox Update Process for Tor Browser.

    Avoid special handling and use of "add-if" for unpacked add-ons
    that are located under distribution/extensions (fixes bug #18951).
    Kathy Brade
    Kathy Brade committed May 2, 2016

Commits on Apr 29, 2016

  1. fixup! TB4: Tor Browser's Firefox preference overrides.

    Disable Pocket feature (bug 18886)
    arthuredelstein authored and gk-tpo committed Apr 29, 2016

Commits on Apr 26, 2016

  1. Bug 18900: updater doesn't work on Linux (cannot find libraries)

    Revert "Bug 1159090 - Only append library path for updater if it is a unique value. r=rstrong"
    
    This reverts commit 5c4fcaf.
    Kathy Brade authored and gk-tpo committed Apr 26, 2016
  2. squash! Bug #13749.2: Regression tests for first-party isolation of c…

    …ache
    
    Also tests for isolation of WorkerGlobalScope.importScripts()
    https://bugs.torproject.org/18890
    arthuredelstein committed Apr 26, 2016

Commits on Apr 22, 2016

  1. Bug 18821: Disable libmdns for Android and Desktop

    There should be no need to remove the OS X support introduced in
    https://bugzilla.mozilla.org/show_bug.cgi?id=1225726 as enabling this
    is governed by a preference (which is actually set to `false`). However,
    we remove it at build time as well (defense in depth).
    
    This is basically a backout of the relevant passages of
    https://hg.mozilla.org/mozilla-central/rev/6bfb430de85d,
    https://hg.mozilla.org/mozilla-central/rev/609b337bf7ab and
    https://hg.mozilla.org/mozilla-central/rev/8e092ec5fbbd.
    gk-tpo committed Apr 22, 2016
  2. Bug 18800: Remove localhost DNS lookup in nsProfileLock.cpp

    Instead of using the local computer's IP address within
    symlink-based profile lock signatures, always use 127.0.0.1.
    Kathy Brade authored and gk-tpo committed Apr 22, 2016
  3. Bug 13419: Fix ICU cross-compilation for Windows

    This patch fixes bug 16874 and 18767 as well.
    gk-tpo committed Apr 22, 2016
  4. Bug 14970: Don't block our unsigned extensions

    Mozilla introduced extension signing as a way to make it harder for an
    attacker to get a malicious add-on running in a user's browser. See:
    https://blog.mozilla.org/addons/2015/02/10/extension-signing-safer-experience
    and https://blog.mozilla.org/addons/2016/01/22/add-on-signing-update/
    for some background information.
    
    In ESR45 this feature is enabled by default and we exempt both our own
    extensions and EFF's HTTPS-Everywhere from this requirement.
    gk-tpo committed Apr 22, 2016
  5. Bug 18799: disable Network Tickler

    Ensure that the tickler is always stubbed out, even on
    Android (e.g., for Orfox).
    Kathy Brade authored and gk-tpo committed Apr 22, 2016
  6. Bug 6786: Do not expose system colors to CSS or canvas.

    Restore the portion of this fix that was not upstreamed as part of
    https://bugzilla.mozilla.org/show_bug.cgi?id=232227: use properly
    contrasting colors if the desktop theme specifies white on black
    for text colors (see bug 7920). These color choices are not exposed
    to content.
    Kathy Brade authored and gk-tpo committed Apr 22, 2016
  7. Bug 1250046 - Remove Shumway core files. r=till

    Backported for Tor Browser
    yurydelendik authored and gk-tpo committed Apr 22, 2016
  8. Bug 17506: Reenable the startup cache

    The hardened Tor Browser based on ESR45 is working fine again without
    disabling the startup cache. We should enable it again even if the
    performance win is probably minor.
    gk-tpo committed Apr 22, 2016
  9. Bug 13252 - Do not store data in the app bundle

    Add an --enable-tor-browser-data-outside-app-dir configure option.
    When this is enabled, all user data is stored in a directory named
    TorBrowser-Data which is located next to the application directory.
    
    The first time an updated browser is opened, migrate the existing
    browser profile, Tor data directory contents, and UpdateInfo to the
    TorBrowser-Data directory. If migration of the browser profile
    fails, an error alert is displayed and the browser is started
    using a new profile.
    
    Display an informative error messages if the TorBrowser-Data
    directory cannot be created due to an "access denied" or a
    "read only volume" error.
    
    Add support for installing "override" preferences within the user's
    browser profile. All .js files in distribution/preferences (on
    Mac OS, Contents/Resources/distribution/preferences) will be copied
    to the preferences directory within the user's browser profile when
    the profile is created and each time Tor Browser is updated. This
    mechanism will be used to install the extension-overrides.js file
    into the profile.
    
    On Mac OS, add support for the --invisible command line option which
    is used by the meek-http-helper to avoid showing an icon for the
    helper browser on the dock.
    Kathy Brade authored and gk-tpo committed Apr 22, 2016
  10. Bug 18292: Staged updates fail on Windows

    Temporarily disable staged updates on Windows.
    Kathy Brade authored and gk-tpo committed Apr 22, 2016
  11. Bug 16940: After update, load local change notes.

    Add an about:tbupdate page that displays the first section from
    TorBrowser/Docs/ChangeLog.txt and includes a link to the remote
    post-update page (typically our blog entry for the release).
    Kathy Brade authored and gk-tpo committed Apr 22, 2016
  12. Bug 18008: Create a new MAR Signing key

    This is part of our plan to rotate the main key used for signing MAR
    files about once a year to make. This is a defense in depth measure as
    there is no official way for revoking MAR signing keys.
    
    We begin with just replacing the secondary key as this one got mostly
    used to sign MAR files over the last year.
    gk-tpo committed Apr 22, 2016
  13. Bug 13379: Sign our MAR files.

    Replace Mozilla's MAR signing certificates with our own.
    Configure with --enable-signmar (build the signmar tool).
    Configure with --enable-verify-mar (when updating, require a valid signature
      on the MAR file before it is applied).
    Use the Tor Browser version instead of the Firefox version inside the
      MAR file info block (necessary to prevent downgrade attacks).
    Use NSS on all platforms for checking MAR signatures (Mozilla plans to use
      OS-native APIs on Mac OS and they already do so on Windows). So that the
      NSS and NSPR libraries the updater depends on can be found at runtime, we
      add the firefox directory to the shared library search path on all platforms.
    Use SHA512-based MAR signatures instead of the SHA1-based ones that Mozilla
      uses. This is implemented inside MAR_USE_SHA512_RSA_SIG #ifdef's and with
      a signature algorithm ID of 512 to help avoid collisions with future work
      Mozilla might do in this area.
      See: https://bugzilla.mozilla.org/show_bug.cgi?id=1105689
    Kathy Brade authored and gk-tpo committed Apr 22, 2016
  14. Bug #4234: Use the Firefox Update Process for Tor Browser.

    New configure options:
      --with-tor-browser-version=VERSION # Pass TB version throughout build.
      --enable-tor-browser-update        # Enable bundle update behavior.
    The following files are never updated:
      TorBrowser/Data/Browser/profiles.ini
      TorBrowser/Data/Browser/profile.default/bookmarks.html
      TorBrowser/Data/Tor/torrc
    Mac OS: Store update metadata under TorBrowser/UpdateInfo.
    Removed the %OS_VERSION% component from the update URL (13047) and
      added support for minSupportedOSVersion, an attribute of the
      <update> element that may be used to trigger Firefox's
      "unsupported platform" behavior.
    Windows: disable "runas" code path in updater (15201).
    Windows: avoid writing to the registry (16236).
    Also includes fixes for tickets 13047, 13301, 13356, 13594, 15406,
      16014, and 16909.
    Kathy Brade authored and gk-tpo committed Apr 22, 2016
  15. Bug 18170: After update, only changelog tab shown

    When in permanent private browsing mode, always return false
    for isAutomaticRestoreEnabled. This ensures that there will
    not be any confusion inside nsBrowserContentHandler.defaultArgs
    as to whether a one time session restore will occur.
    
    Also, for consistency and in case someone looks at the pref,
    avoid setting browser.sessionstore.resume_session = true during
    browser shutdown.
    
    This bug occurred when staging was not used during the update
    process. On Windows it always occurred because staging is not
    used even when it should be (see #18292).
    Kathy Brade authored and gk-tpo committed Apr 22, 2016
  16. Bug #11641: change TBB directory structure to be more like Firefox's

    Unless the -osint command line flag is used, the browser now defaults
    to the equivalent of -no-remote.  There is a new -allow-remote flag that
    may be used to restore the original (Firefox-like) default behavior.
    Kathy Brade authored and gk-tpo committed Apr 22, 2016
  17. Bug #9173: Change the default Firefox profile directory to be TBB-rel…

    …ative.
    
    This should eliminate our need to rely on a wrapper script that
    sets $HOME and launches Firefox with -profile.
    Kathy Brade authored and gk-tpo committed Apr 22, 2016
  18. Bug 16300: Isolate Broadcast Channels to first party.

    Note that when the privacy.thirdparty.isolate pref. is set to 1 or 2,
    we disable use of Broadcast Channels by SharedWorkers since we cannot
    obtain the isolation host.
    Kathy Brade authored and gk-tpo committed Apr 22, 2016
Older