[tbb-commits] [Git][tpo/applications/tor-browser][tor-browser-128.1.0esr-14.0-1] 13 commits: dropme! Bug 30237: Add v3 onion services client authentication prompt
morgan (@morgan)
git at gitlab.torproject.org
Wed Aug 14 21:25:50 UTC 2024
morgan pushed to branch tor-browser-128.1.0esr-14.0-1 at The Tor Project / Applications / Tor Browser
Commits:
54c55848 by Pier Angelo Vendrame at 2024-08-14T20:45:05+00:00
dropme! Bug 30237: Add v3 onion services client authentication prompt
Drop this change to make the following rebase easier.
- - - - -
4d0c6f53 by Pier Angelo Vendrame at 2024-08-14T20:45:05+00:00
fixup! Firefox preference overrides.
Bug 42596: Add preferences for log levels.
Added a comment to start a section where we can put the various default
log levels.
- - - - -
edceacf8 by Pier Angelo Vendrame at 2024-08-14T20:45:05+00:00
fixup! Bug 40926: Implemented the New Identity feature
Bug 42596: Add preferences for log levels.
- - - - -
f6c72cec by Pier Angelo Vendrame at 2024-08-14T20:45:05+00:00
fixup! Bug 40562: Added Tor Browser preferences to 000-tor-browser.js
Bug 42596: Add preferences for log levels.
Added a comment to start a section where we can put the various default
log levels.
- - - - -
57a7116e by Pier Angelo Vendrame at 2024-08-14T20:45:05+00:00
fixup! Bug 40933: Add tor-launcher functionality
Bug 42596: Add preferences for log levels.
- - - - -
778a6111 by Pier Angelo Vendrame at 2024-08-14T20:45:05+00:00
fixup! Lox integration
Bug 42596: Add preferences for log levels.
- - - - -
45a30339 by Pier Angelo Vendrame at 2024-08-14T20:45:05+00:00
fixup! Bug 40597: Implement TorSettings module
Bug 42596: Add preferences for log levels.
- - - - -
1dc73588 by Pier Angelo Vendrame at 2024-08-14T20:45:05+00:00
fixup! Bug 3455: Add DomainIsolator, for isolating circuit by domain.
Bug 42596: Add preferences for log levels.
- - - - -
29101148 by Pier Angelo Vendrame at 2024-08-14T20:45:05+00:00
fixup! Bug 41600: Add a tor circuit display panel.
Bug 42596: Add preferences for log levels.
- - - - -
e0e6c02b by Pier Angelo Vendrame at 2024-08-14T20:45:05+00:00
fixup! Bug 42247: Android helpers for the TorProvider
Bug 42596: Add preferences for log levels.
- - - - -
ed55e544 by Pier Angelo Vendrame at 2024-08-14T20:45:05+00:00
fixup! Bug 8324: Prevent DNS proxy bypasses caused by Drag&Drop
Bug 42596: Add preferences for log levels.
- - - - -
3d71f241 by Pier Angelo Vendrame at 2024-08-14T20:45:05+00:00
fixup! Bug 30237: Add v3 onion services client authentication prompt
Bug 42596: Add preferences for log levels.
- - - - -
b4e46ed0 by Pier Angelo Vendrame at 2024-08-14T20:45:05+00:00
fixup! Bug 40458: Implement .tor.onion aliases
Bug 42596: Add preferences for log levels.
- - - - -
14 changed files:
- browser/app/profile/000-tor-browser.js
- browser/app/profile/001-base-profile.js
- browser/components/newidentity/content/newidentity.js
- browser/components/onionservices/OnionAliasStore.sys.mjs
- browser/components/onionservices/TorRequestWatch.sys.mjs
- browser/components/torcircuit/content/torCircuitPanel.js
- toolkit/components/lox/Lox.sys.mjs
- toolkit/components/tor-launcher/TorControlPort.sys.mjs
- toolkit/components/tor-launcher/TorDomainIsolator.sys.mjs
- toolkit/components/tor-launcher/TorProvider.sys.mjs
- toolkit/modules/DragDropFilter.sys.mjs
- toolkit/modules/TorAndroidIntegration.sys.mjs
- toolkit/modules/TorConnect.sys.mjs
- toolkit/modules/TorSettings.sys.mjs
Changes:
=====================================
browser/app/profile/000-tor-browser.js
=====================================
@@ -101,6 +101,7 @@ pref("extensions.torlauncher.tor_path", "");
// which is TorBrowser-Data/ if it exists as a sibling of the application
// directory. If TorBrowser-Data/ does not exist, these paths are relative
// to the TorBrowser/ directory within the application directory.
+pref
pref("extensions.torlauncher.torrc_path", "");
pref("extensions.torlauncher.tordatadir_path", "");
@@ -108,3 +109,17 @@ pref("extensions.torlauncher.tordatadir_path", "");
pref("extensions.torlauncher.bridgedb_front", "www.phpmyadmin.net");
pref("extensions.torlauncher.bridgedb_reflector", "https://1723079976.rsc.cdn77.org");
pref("extensions.torlauncher.moat_service", "https://bridges.torproject.org/moat");
+
+// Log levels
+pref("browser.tor_provider.log_level", "Warn");
+pref("browser.tor_provider.cp_log_level", "Warn");
+pref("lox.log_level", "Warn");
+pref("torbrowser.bootstrap.log_level", "Info");
+pref("browser.torsettings.log_level", "Warn");
+pref("browser.tordomainisolator.loglevel", "Warn");
+pref("browser.torcircuitpanel.loglevel", "Log");
+pref("browser.tor_android.log_level", "Info");
+pref("browser.dragdropfilter.log_level", "Warn");
+pref("browser.onionAuthPrompt.loglevel", "Warn");
+pref("browser.onionalias.log_level", "Warn");
+pref("browser.torRequestWatch.log_level", "Warn");
=====================================
browser/app/profile/001-base-profile.js
=====================================
@@ -649,7 +649,8 @@ pref("privacy.query_stripping.strip_on_share.enabled", true);
// Disable platform text recogniition functionality (tor-browser#42057)
pref("dom.text-recognition.enabled", false);
-pref("browser.onionAuthPrompt.loglevel", "Warn");
+// Log levels
+pref("browser.new_identity.log_level", "Info");
#ifdef XP_WIN
pref("browser.taskbar.lists.enabled", false);
=====================================
browser/components/newidentity/content/newidentity.js
=====================================
@@ -8,7 +8,6 @@ ChromeUtils.defineLazyGetter(this, "NewIdentityButton", () => {
// Logger adapted from CustomizableUI.jsm
const logger = (() => {
const consoleOptions = {
- maxLogLevel: "Info",
maxLogLevelPref: "browser.new_identity.log_level",
prefix: "NewIdentity",
};
=====================================
browser/components/onionservices/OnionAliasStore.sys.mjs
=====================================
@@ -29,11 +29,9 @@ const SECURE_DROP = {
};
const kPrefOnionAliasEnabled = "browser.urlbar.onionRewrites.enabled";
-const kPrefOnionAliasLogLevel = "browser.onionalias.log_level";
const log = console.createInstance({
- maxLogLevel: "Warn",
- maxLogLevelPref: kPrefOnionAliasLogLevel,
+ maxLogLevelPref: "browser.onionalias.log_level",
prefix: "OnionAlias",
});
=====================================
browser/components/onionservices/TorRequestWatch.sys.mjs
=====================================
@@ -3,7 +3,6 @@
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
const log = console.createInstance({
- maxLogLevel: "Warn",
maxLogLevelPref: "browser.torRequestWatch.log_level",
prefix: "TorRequestWatch",
});
=====================================
browser/components/torcircuit/content/torCircuitPanel.js
=====================================
@@ -56,7 +56,6 @@ var gTorCircuitPanel = {
this._log = console.createInstance({
prefix: "TorCircuitPanel",
- maxLogLevel: "Log",
maxLogLevelPref: "browser.torcircuitpanel.loglevel",
});
=====================================
toolkit/components/lox/Lox.sys.mjs
=====================================
@@ -9,7 +9,6 @@ const lazy = {};
ChromeUtils.defineLazyGetter(lazy, "logger", () => {
return console.createInstance({
- maxLogLevel: "Warn",
maxLogLevelPref: "lox.log_level",
prefix: "Lox",
});
=====================================
toolkit/components/tor-launcher/TorControlPort.sys.mjs
=====================================
@@ -5,7 +5,6 @@
import { TorParsers } from "resource://gre/modules/TorParsers.sys.mjs";
const logger = console.createInstance({
- maxLogLevel: "Warn",
maxLogLevelPref: "browser.tor_provider.cp_log_level",
prefix: "TorControlPort",
});
=====================================
toolkit/components/tor-launcher/TorDomainIsolator.sys.mjs
=====================================
@@ -25,7 +25,6 @@ XPCOMUtils.defineLazyServiceGetters(lazy, {
const logger = console.createInstance({
prefix: "TorDomainIsolator",
- maxLogLevel: "Warn",
maxLogLevelPref: "browser.tordomainisolator.loglevel",
});
=====================================
toolkit/components/tor-launcher/TorProvider.sys.mjs
=====================================
@@ -19,7 +19,6 @@ ChromeUtils.defineESModuleGetters(lazy, {
});
const logger = console.createInstance({
- maxLogLevel: "Warn",
maxLogLevelPref: "browser.tor_provider.log_level",
prefix: "TorProvider",
});
=====================================
toolkit/modules/DragDropFilter.sys.mjs
=====================================
@@ -14,8 +14,7 @@ ChromeUtils.defineLazyGetter(lazy, "logger", () => {
// fission.enforceBlocklistedPrefsInSubprocesses is true).
// (Or maybe this crash used to happen when the logger was not lazy, and maybe
// the preferences were not ready, yet?)
- return new console.createInstance({
- maxLogLevel: "Warn",
+ return console.createInstance({
maxLogLevelPref: "browser.dragdropfilter.log_level",
prefix: "DragDropFilter",
});
=====================================
toolkit/modules/TorAndroidIntegration.sys.mjs
=====================================
@@ -19,7 +19,6 @@ const Prefs = Object.freeze({
});
const logger = console.createInstance({
- maxLogLevel: "Info",
maxLogLevelPref: Prefs.logLevel,
prefix: "TorAndroidIntegration",
});
=====================================
toolkit/modules/TorConnect.sys.mjs
=====================================
@@ -74,7 +74,6 @@ export class TorConnectError extends Error {
ChromeUtils.defineLazyGetter(lazy, "logger", () =>
console.createInstance({
- maxLogLevel: "Info",
maxLogLevelPref: TorConnectPrefs.log_level,
prefix: "TorConnect",
})
=====================================
toolkit/modules/TorSettings.sys.mjs
=====================================
@@ -14,7 +14,6 @@ ChromeUtils.defineESModuleGetters(lazy, {
ChromeUtils.defineLazyGetter(lazy, "logger", () => {
return console.createInstance({
- maxLogLevel: "Warn",
maxLogLevelPref: "browser.torsettings.log_level",
prefix: "TorSettings",
});
View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/compare/190db2e18c0dfbf20fb8af877672d44d39a81aa4...b4e46ed02f5055ca47290f6166525a522d790bf9
--
View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/compare/190db2e18c0dfbf20fb8af877672d44d39a81aa4...b4e46ed02f5055ca47290f6166525a522d790bf9
You're receiving this email because of your account on gitlab.torproject.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.torproject.org/pipermail/tbb-commits/attachments/20240814/b400b87b/attachment-0001.htm>
More information about the tbb-commits
mailing list