[or-cvs] r14191: Update README and Makefile for 1.0.1 release Update prefs.js (in torbrowser/trunk: . build-scripts build-scripts/config)
sjm217 at seul.org
sjm217 at seul.org
Wed Mar 26 15:51:27 UTC 2008
Author: sjm217
Date: 2008-03-26 11:51:26 -0400 (Wed, 26 Mar 2008)
New Revision: 14191
Modified:
torbrowser/trunk/README
torbrowser/trunk/build-scripts/INSTALL
torbrowser/trunk/build-scripts/Makefile
torbrowser/trunk/build-scripts/config/prefs.js
Log:
Update README and Makefile for 1.0.1 release
Update prefs.js for new Firefox and Torbutton version
Modified: torbrowser/trunk/README
===================================================================
--- torbrowser/trunk/README 2008-03-26 11:31:43 UTC (rev 14190)
+++ torbrowser/trunk/README 2008-03-26 15:51:26 UTC (rev 14191)
@@ -38,11 +38,11 @@
Included applications
---------------------
-Vidalia (svn trunk revision 2423)
-Tor 0.2.0.22-rc (with libevent-1.3e, zlib-1.2.3 and openssl-0.9.8g)
+Vidalia (svn trunk revision 2464)
+Tor 0.2.0.23-rc (with libevent-1.3e, zlib-1.2.3 and openssl-0.9.8g)
Polipo 1.0.4
-FirefoxPortable 2.0.0.12
- \_ Firefox 2.0.0.12
+FirefoxPortable 2.0.0.13
+ \_ Firefox 2.0.0.13
\_ Torbutton 1.1.17-alpha
Usage
@@ -114,5 +114,10 @@
http://torbutton.torproject.org/dev/CHANGELOG)
Update of Vidalia to revision 2424
Supress warning on viewing an encrypted page
-1.0.1: Released 2008-xx-xx
- Install .jar files placed in /extensions, as well as .xpi files
\ No newline at end of file
+1.0.1: Released 2008-03-26
+ Install .jar files placed in /extensions, as well as .xpi files
+ Update of Firefox to 2.0.0.13 to fix security problems (see
+ http://www.mozilla.org/projects/security/known-vulnerabilities.html#firefox2.0.0.13)
+ Update of Vidalia to revision 2464
+ Update of Tor to 0.2.0.23-rc
+ Update prefs.js for new Torbutton defaults
Modified: torbrowser/trunk/build-scripts/INSTALL
===================================================================
--- torbrowser/trunk/build-scripts/INSTALL 2008-03-26 11:31:43 UTC (rev 14190)
+++ torbrowser/trunk/build-scripts/INSTALL 2008-03-26 15:51:26 UTC (rev 14191)
@@ -129,23 +129,6 @@
For libevent, use 1.3e, as suggested by the document above.
libevent 1.4.0 is newer but untested.
-Building miniupnp
-=================
-
-mingw32-make.exe -f Makefile.mingw
-INSTALL=install
-INSTALLPREFIX=/usr/local
-INSTALLDIRINC=$INSTALLPREFIX/include/miniupnpc
-INSTALLDIRLIB=$INSTALLPREFIX/lib
-HEADERS="miniupnpc.h miniwget.h upnpcommands.h igd_desc_parse.h upnpreplyparse.h upnperrors.h declspec.h bsdqueue.h"
-LIBRARY=libminiupnpc.a
-APIVERSION=2
-SONAME=$SHAREDLIBRARY.$APIVERSION
-$INSTALL -d $INSTALLDIRINC
-$INSTALL --mode=644 $HEADERS $INSTALLDIRINC
-$INSTALL -d $INSTALLDIRLIB
-$INSTALL --mode=644 $LIBRARY $INSTALLDIRLIB
-
Building Vidalia
================
Modified: torbrowser/trunk/build-scripts/Makefile
===================================================================
--- torbrowser/trunk/build-scripts/Makefile 2008-03-26 11:31:43 UTC (rev 14190)
+++ torbrowser/trunk/build-scripts/Makefile 2008-03-26 15:51:26 UTC (rev 14191)
@@ -17,7 +17,7 @@
## Location of bundle components
VIDALIA=/c/build/vidalia
-TOR=/c/build/tor-0.2.0.22-rc
+TOR=/c/build/tor-0.2.0.23-rc
POLIPO=/c/build/polipo-1.0.4
FIREFOX_SRC=/c/build/FirefoxPortable
@@ -35,7 +35,7 @@
NAME="Tor Browser"
## Version and name of the compressed bundle (also used for source)
-VERSION=1.0.0
+VERSION=1.0.1
COMPRESSED_NAME=tor-browser-$(VERSION)
## Extensions to install by default
Modified: torbrowser/trunk/build-scripts/config/prefs.js
===================================================================
--- torbrowser/trunk/build-scripts/config/prefs.js 2008-03-26 11:31:43 UTC (rev 14190)
+++ torbrowser/trunk/build-scripts/config/prefs.js 2008-03-26 15:51:26 UTC (rev 14191)
@@ -22,15 +22,16 @@
user_pref("browser.formfill.enable", false);
user_pref("browser.history_expire_days", 0);
user_pref("browser.preferences.advanced.selectedTabIndex", 0);
+user_pref("browser.safebrowsing.enabled", false);
user_pref("browser.search.suggest.enabled", false);
user_pref("browser.search.update", false);
user_pref("browser.send_pings", false);
user_pref("browser.sessionstore.enabled", false);
user_pref("browser.shell.checkDefaultBrowser", false);
user_pref("browser.startup.homepage", "https://check.torproject.org/?lang=BUNDLELOCALE");
-user_pref("browser.startup.homepage_override.mstone", "rv:1.8.1.12");
+user_pref("browser.startup.homepage_override.mstone", "rv:1.8.1.13");
user_pref("dom.storage.enabled", false);
-user_pref("extensions.lastAppVersion", "2.0.0.12");
+user_pref("extensions.lastAppVersion", "2.0.0.13");
user_pref("extensions.torbutton.custom.http_port", 8118);
user_pref("extensions.torbutton.custom.http_proxy", "127.0.0.1");
user_pref("extensions.torbutton.custom.https_port", 8118);
@@ -62,7 +63,7 @@
user_pref("general.appversion.override", "5.0 (Windows; en-US)");
user_pref("general.platform.override", "Win32");
user_pref("general.useragent.locale", "BUNDLELOCALE");
-user_pref("general.useragent.override", "Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8.1.7) Gecko/20070914 Firefox/2.0.0.7");
+user_pref("general.useragent.override", "Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8.1.12) Gecko/20080201 Firefox/2.0.0.12");
user_pref("general.useragent.vendor", "");
user_pref("general.useragent.vendorSub", "");
user_pref("intl.accept_languages", "en-us, en");
@@ -77,6 +78,10 @@
user_pref("network.protocol-handler.external.news", false);
user_pref("network.protocol-handler.external.nntp", false);
user_pref("network.protocol-handler.external.snews", false);
+user_pref("network.protocol-handler.warn-external.mailto", true);
+user_pref("network.protocol-handler.warn-external.news", true);
+user_pref("network.protocol-handler.warn-external.nntp", true);
+user_pref("network.protocol-handler.warn-external.snews", true);
user_pref("network.proxy.failover_timeout", 0);
user_pref("network.proxy.http", "127.0.0.1");
user_pref("network.proxy.http_port", 8118);
@@ -87,9 +92,9 @@
user_pref("network.proxy.ssl", "127.0.0.1");
user_pref("network.proxy.ssl_port", 8118);
user_pref("network.proxy.type", 1);
+user_pref("network.security.ports.banned", "8118,8123,9050,9051");
user_pref("privacy.item.cookies", true);
user_pref("privacy.item.passwords", true);
-user_pref("privacy.sanitize.didShutdownSanitize", true);
user_pref("privacy.sanitize.promptOnSanitize", false);
user_pref("privacy.sanitize.sanitizeOnShutdown", true);
user_pref("security.enable_java", false);
More information about the tor-commits
mailing list