<feed xmlns='http://www.w3.org/2005/Atom'>
<title>user/sysrqb/tor-browser, branch tor-browser-60.2.1esr-8.5-1-build1</title>
<subtitle>Matt's tor-browser repository</subtitle>
<link rel='alternate' type='text/html' href='https://gitweb.torproject.org/user/sysrqb/tor-browser.git/'/>
<entry>
<title>Bug 1489785: Remove a workaround for gcc, introduced in bug 678607, that is no longer needed and that causes hangs in modal dialogs on macOS 10.14. r=mstange, a=jcristau</title>
<updated>2018-10-01T19:41:20+00:00</updated>
<author>
<name>Stephen A Pohl</name>
<email>spohl.mozilla.bugs@gmail.com</email>
</author>
<published>2018-09-30T05:02:08+00:00</published>
<link rel='alternate' type='text/html' href='https://gitweb.torproject.org/user/sysrqb/tor-browser.git/commit/?id=0c004047822a94a6e16851a9f46d237be10eebce'/>
<id>0c004047822a94a6e16851a9f46d237be10eebce</id>
<content type='text'>
--HG--
extra : source : 3920c858319dff66ebbc9263f6aa8d24f16071f8
extra : intermediate-source : d7a52857cd862b4e2f8305baddc119f4e9a47146
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
--HG--
extra : source : 3920c858319dff66ebbc9263f6aa8d24f16071f8
extra : intermediate-source : d7a52857cd862b4e2f8305baddc119f4e9a47146
</pre>
</div>
</content>
</entry>
<entry>
<title>Bug 1493903 - Don't inline push with more than 1 argument. r=tcampbell a=dveditz</title>
<updated>2018-10-01T19:41:06+00:00</updated>
<author>
<name>Jan de Mooij</name>
<email>jdemooij@mozilla.com</email>
</author>
<published>2018-09-25T10:33:42+00:00</published>
<link rel='alternate' type='text/html' href='https://gitweb.torproject.org/user/sysrqb/tor-browser.git/commit/?id=50e3be5d0c750483f8e2367cb8b8e0c3c26bba11'/>
<id>50e3be5d0c750483f8e2367cb8b8e0c3c26bba11</id>
<content type='text'>
--HG--
extra : source : b193307614e2f56615e7b5fe5ca97c2f6638c29d
extra : intermediate-source : dc688e0c970278799f4d0ca9bde78545380e4110
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
--HG--
extra : source : b193307614e2f56615e7b5fe5ca97c2f6638c29d
extra : intermediate-source : dc688e0c970278799f4d0ca9bde78545380e4110
</pre>
</div>
</content>
</entry>
<entry>
<title>Bug 1493900.  r=bhackett,sunfish a=dveditz</title>
<updated>2018-10-01T19:40:43+00:00</updated>
<author>
<name>Jan de Mooij</name>
<email>jdemooij@mozilla.com</email>
</author>
<published>2018-09-25T10:14:11+00:00</published>
<link rel='alternate' type='text/html' href='https://gitweb.torproject.org/user/sysrqb/tor-browser.git/commit/?id=34bcbdca41c7949318930b44b504e88696d0aeee'/>
<id>34bcbdca41c7949318930b44b504e88696d0aeee</id>
<content type='text'>
--HG--
extra : source : b5e3f4138c0ca0a2a42ec8007f27e1e7b6cb2150
extra : intermediate-source : d596c94e62cd99b7efa048cb8016368047aaa079
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
--HG--
extra : source : b5e3f4138c0ca0a2a42ec8007f27e1e7b6cb2150
extra : intermediate-source : d596c94e62cd99b7efa048cb8016368047aaa079
</pre>
</div>
</content>
</entry>
<entry>
<title>Bug 27865: Fix start-up crashes on Windows</title>
<updated>2018-09-30T17:53:15+00:00</updated>
<author>
<name>Georg Koppen</name>
<email>gk@torproject.org</email>
</author>
<published>2018-09-30T17:53:00+00:00</published>
<link rel='alternate' type='text/html' href='https://gitweb.torproject.org/user/sysrqb/tor-browser.git/commit/?id=06750f24d6c10d12158d2402361e3ce71d8493e1'/>
<id>06750f24d6c10d12158d2402361e3ce71d8493e1</id>
<content type='text'>
Don't bind --enable-release to MOZILLA_OFFICIAL for Windows targets as
we are currently crashing on start-up for unknown reasons if
--enable-release is set, see:
https://bugzilla.mozilla.org/show_bug.cgi?id=1470772.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Don't bind --enable-release to MOZILLA_OFFICIAL for Windows targets as
we are currently crashing on start-up for unknown reasons if
--enable-release is set, see:
https://bugzilla.mozilla.org/show_bug.cgi?id=1470772.
</pre>
</div>
</content>
</entry>
<entry>
<title>Bug 27623 - Export MOZILLA_OFFICIAL during desktop builds</title>
<updated>2018-09-30T11:42:54+00:00</updated>
<author>
<name>Kathy Brade</name>
<email>brade@pearlcrescent.com</email>
</author>
<published>2018-09-17T20:39:42+00:00</published>
<link rel='alternate' type='text/html' href='https://gitweb.torproject.org/user/sysrqb/tor-browser.git/commit/?id=914585c6917d19e4a036065d219fcea3524f83c6'/>
<id>914585c6917d19e4a036065d219fcea3524f83c6</id>
<content type='text'>
This fixes a problem where some preferences had the wrong default value.
Also see bug 27472 where we made a similar fix for Android.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
This fixes a problem where some preferences had the wrong default value.
Also see bug 27472 where we made a similar fix for Android.
</pre>
</div>
</content>
</entry>
<entry>
<title>Bug 26381: about:tor page does not load on first start on Windows</title>
<updated>2018-09-30T11:42:53+00:00</updated>
<author>
<name>Richard Pospesel</name>
<email>richard@torproject.org</email>
</author>
<published>2018-09-15T04:01:17+00:00</published>
<link rel='alternate' type='text/html' href='https://gitweb.torproject.org/user/sysrqb/tor-browser.git/commit/?id=431295ec92739b00c98f8ea07202216f43dd81c5'/>
<id>431295ec92739b00c98f8ea07202216f43dd81c5</id>
<content type='text'>
Child content processes require certain directories to be marked as
readable or writeable when Sandboxing is enabled. The directories
to be whitelisted are saved in static variables in
sandboxBroker.cpp and are initialized in
SandboxBroker::GeckoDependentInitialize(). Any child content process
which is created before these directories are saved will be unable to
read or write to them.

The tor-launcher extension triggers the creation of a content process
which hosts the tor network configuration settings window. This process
is created before the whitelisted directories are saved.  The network
settings process doesn't need access to these directories to function,
but subsequent content processes which are created once the settings
window exits do need these directories to function.  Sometimes, the
creation of these subsequent processes is slow enough for the parent
process to 'catch up' and create the whitelist resulting in the broken
about:tor tab or broken white tab.

A previous iteration of this patch moved the GeckoDependentInitialize()
call directly above the call to DoStartup().  However, Mozilla dev Bob
Owen objected to this since this places the call before various
services are initialized which the SandboxBroker may depend on.  Some
experimentation would seem to confirm his objections: placing the
whitelist init just prior to DoStartup() results in an empty value for
the profile directory which prevents child processes reading the chrome
and extensions directory.

This patch inserts the GeckoDependentInitialize() call into DoStartup()
just after the profile directory is known and queryable by the
SandboxBroker, and before the 'profile-after-change' notification is
fired.  It also reverts the temp fix which reduced the sandbox level to
2 on windows.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Child content processes require certain directories to be marked as
readable or writeable when Sandboxing is enabled. The directories
to be whitelisted are saved in static variables in
sandboxBroker.cpp and are initialized in
SandboxBroker::GeckoDependentInitialize(). Any child content process
which is created before these directories are saved will be unable to
read or write to them.

The tor-launcher extension triggers the creation of a content process
which hosts the tor network configuration settings window. This process
is created before the whitelisted directories are saved.  The network
settings process doesn't need access to these directories to function,
but subsequent content processes which are created once the settings
window exits do need these directories to function.  Sometimes, the
creation of these subsequent processes is slow enough for the parent
process to 'catch up' and create the whitelist resulting in the broken
about:tor tab or broken white tab.

A previous iteration of this patch moved the GeckoDependentInitialize()
call directly above the call to DoStartup().  However, Mozilla dev Bob
Owen objected to this since this places the call before various
services are initialized which the SandboxBroker may depend on.  Some
experimentation would seem to confirm his objections: placing the
whitelist init just prior to DoStartup() results in an empty value for
the profile directory which prevents child processes reading the chrome
and extensions directory.

This patch inserts the GeckoDependentInitialize() call into DoStartup()
just after the profile directory is known and queryable by the
SandboxBroker, and before the 'profile-after-change' notification is
fired.  It also reverts the temp fix which reduced the sandbox level to
2 on windows.
</pre>
</div>
</content>
</entry>
<entry>
<title>Bug 26146: Spoof HTTP User-Agent header for desktop platforms</title>
<updated>2018-09-30T11:42:51+00:00</updated>
<author>
<name>Kathy Brade</name>
<email>brade@pearlcrescent.com</email>
</author>
<published>2018-09-14T14:02:17+00:00</published>
<link rel='alternate' type='text/html' href='https://gitweb.torproject.org/user/sysrqb/tor-browser.git/commit/?id=5bae6afa39097f154a3697badbf7d780c22ee277'/>
<id>5bae6afa39097f154a3697badbf7d780c22ee277</id>
<content type='text'>
In Tor Browser 8.0, the OS was revealed in both the HTTP User-Agent
header and to JavaScript code via navigator.userAgent. To avoid
leaking the OS inside each HTTP request (which many web servers
log), always use the Windows 7 OS value in the desktop User-Agent
header. We continue to allow access to the actual OS via JavaScript,
since doing so improves compatibility with web applications such
as GitHub and Google Docs.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
In Tor Browser 8.0, the OS was revealed in both the HTTP User-Agent
header and to JavaScript code via navigator.userAgent. To avoid
leaking the OS inside each HTTP request (which many web servers
log), always use the Windows 7 OS value in the desktop User-Agent
header. We continue to allow access to the actual OS via JavaScript,
since doing so improves compatibility with web applications such
as GitHub and Google Docs.
</pre>
</div>
</content>
</entry>
<entry>
<title>Bug 27472 - Export MOZILLA_OFFICIAL during Android build</title>
<updated>2018-09-30T11:42:50+00:00</updated>
<author>
<name>Matthew Finkel</name>
<email>Matthew.Finkel@gmail.com</email>
</author>
<published>2018-09-05T13:38:09+00:00</published>
<link rel='alternate' type='text/html' href='https://gitweb.torproject.org/user/sysrqb/tor-browser.git/commit/?id=f3ad3b81dc4b2aff0c591ac4752164aee792b22b'/>
<id>f3ad3b81dc4b2aff0c591ac4752164aee792b22b</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>Bug 27400 - Target Android API 26</title>
<updated>2018-09-30T11:42:47+00:00</updated>
<author>
<name>Matthew Finkel</name>
<email>Matthew.Finkel@gmail.com</email>
</author>
<published>2018-09-04T21:59:41+00:00</published>
<link rel='alternate' type='text/html' href='https://gitweb.torproject.org/user/sysrqb/tor-browser.git/commit/?id=cec9c15c64eb213f37712be304a223862d956ba9'/>
<id>cec9c15c64eb213f37712be304a223862d956ba9</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>Bug 27473 - Change app name on Android for Alpha version</title>
<updated>2018-09-30T11:42:46+00:00</updated>
<author>
<name>Matthew Finkel</name>
<email>Matthew.Finkel@gmail.com</email>
</author>
<published>2018-09-05T14:00:01+00:00</published>
<link rel='alternate' type='text/html' href='https://gitweb.torproject.org/user/sysrqb/tor-browser.git/commit/?id=25254b9f827480087440666d1447c221c90fb832'/>
<id>25254b9f827480087440666d1447c221c90fb832</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
</feed>
