[tor-commits] [Git][tpo/applications/tor-browser][base-browser-115.6.0esr-13.5-1] 3 commits: fixup! Base Browser's .mozconfigs.

Pier Angelo Vendrame (@pierov) git at gitlab.torproject.org
Mon Jan 15 17:39:45 UTC 2024



Pier Angelo Vendrame pushed to branch base-browser-115.6.0esr-13.5-1 at The Tor Project / Applications / Tor Browser


Commits:
87e50941 by Pier Angelo Vendrame at 2024-01-15T18:30:54+01:00
fixup! Base Browser's .mozconfigs.

Bug 42337: Enable GeckoDriver for all desktop platforms

- - - - -
2aaaaab1 by Pier Angelo Vendrame at 2024-01-15T18:30:58+01:00
fixup! Base Browser's .mozconfigs.

Bug 42146: Use LLD on Linux.

This should allow us to restore debug symbols on Linux i686.

- - - - -
b6fdd885 by Tom Ritter at 2024-01-15T18:39:37+01:00
Bug 1873526: Refactor the restriction override list from a big if statement to a list r=KrisWright

Differential Revision: https://phabricator.services.mozilla.com/D198081

- - - - -


5 changed files:

- browser/config/mozconfigs/base-browser
- modules/libpref/Preferences.cpp
- mozconfig-linux-i686
- mozconfig-linux-x86_64
- mozconfig-linux-x86_64-dev


Changes:

=====================================
browser/config/mozconfigs/base-browser
=====================================
@@ -50,4 +50,7 @@ if test -z "$WASI_SYSROOT"; then
     ac_add_options --without-wasm-sandboxed-libraries
 fi
 
+# tor-browser#42337
+ac_add_options --enable-geckodriver
+
 ac_add_options --with-relative-data-dir=BaseBrowser/Data/Browser


=====================================
modules/libpref/Preferences.cpp
=====================================
@@ -6024,7 +6024,8 @@ struct PrefListEntry {
 //      StaticPrefList.yml), a string pref, and it is NOT exempted in
 //      sDynamicPrefOverrideList
 //
-// This behavior is codified in ShouldSanitizePreference() below
+// This behavior is codified in ShouldSanitizePreference() below.
+// Exclusions of preferences can be defined in sOverrideRestrictionsList[].
 static const PrefListEntry sRestrictFromWebContentProcesses[] = {
     // Remove prefs with user data
     PREF_LIST_ENTRY("datareporting.policy."),
@@ -6073,6 +6074,15 @@ static const PrefListEntry sRestrictFromWebContentProcesses[] = {
     PREF_LIST_ENTRY("toolkit.telemetry.previousBuildID"),
 };
 
+// Allowlist for prefs and branches blocklisted in
+// sRestrictFromWebContentProcesses[], including prefs from
+// StaticPrefList.yaml and *.js, to let them pass.
+static const PrefListEntry sOverrideRestrictionsList[]{
+    PREF_LIST_ENTRY("services.settings.clock_skew_seconds"),
+    PREF_LIST_ENTRY("services.settings.last_update_seconds"),
+    PREF_LIST_ENTRY("services.settings.server"),
+};
+
 // These prefs are dynamically-named (i.e. not specified in prefs.js or
 // StaticPrefList) and would normally by blocklisted but we allow them through
 // anyway, so this override list acts as an allowlist
@@ -6168,10 +6178,12 @@ static bool ShouldSanitizePreference(const Pref* const aPref) {
   // pref through.
   for (const auto& entry : sRestrictFromWebContentProcesses) {
     if (strncmp(entry.mPrefBranch, prefName, entry.mLen) == 0) {
-      const auto* p = prefName;  // This avoids clang-format doing ugly things.
-      return !(strncmp("services.settings.clock_skew_seconds", p, 36) == 0 ||
-               strncmp("services.settings.last_update_seconds", p, 37) == 0 ||
-               strncmp("services.settings.server", p, 24) == 0);
+      for (const auto& pasEnt : sOverrideRestrictionsList) {
+        if (strncmp(pasEnt.mPrefBranch, prefName, pasEnt.mLen) == 0) {
+          return false;
+        }
+      }
+      return true;
     }
   }
 


=====================================
mozconfig-linux-i686
=====================================
@@ -2,8 +2,11 @@
 
 ac_add_options --target=i686-linux-gnu
 
-ac_add_options --enable-default-toolkit=cairo-gtk3
+# Moz switched to lld for all Linux targets in Bug 1839739.
+# Also, gold used not to work with debug symbols (tor-browser#42146).
+ac_add_options --enable-linker=lld
+
+ac_add_options --disable-strip
+ac_add_options --disable-install-strip
 
-# Bug 31448: ld.gold fails if we don't disable debug-symbols.
-# Also, we keep strip enabled.
-ac_add_options --disable-debug-symbols
+ac_add_options --enable-default-toolkit=cairo-gtk3


=====================================
mozconfig-linux-x86_64
=====================================
@@ -1,9 +1,9 @@
 . $topsrcdir/browser/config/mozconfigs/base-browser
 
-ac_add_options --enable-default-toolkit=cairo-gtk3
+# Moz switched to lld for all Linux targets in Bug 1839739.
+ac_add_options --enable-linker=lld
 
 ac_add_options --disable-strip
 ac_add_options --disable-install-strip
 
-# We want to bundle an own geckodriver, so we can use it for QA and other work
-ac_add_options --enable-geckodriver
+ac_add_options --enable-default-toolkit=cairo-gtk3


=====================================
mozconfig-linux-x86_64-dev
=====================================
@@ -4,6 +4,9 @@
 # It is only intended to be used when doing incremental Linux builds
 # during development.
 
+# Moz switched to lld for all Linux targets in Bug 1839739.
+ac_add_options --enable-linker=lld
+
 export MOZILLA_OFFICIAL=
 
 ac_add_options --enable-default-toolkit=cairo-gtk3



View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/compare/ae39cc13b8d1f032dd7c6ff4219a5cc5bb66960c...b6fdd885e01515d697d32790be156d85dd9c670c

-- 
View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/compare/ae39cc13b8d1f032dd7c6ff4219a5cc5bb66960c...b6fdd885e01515d697d32790be156d85dd9c670c
You're receiving this email because of your account on gitlab.torproject.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.torproject.org/pipermail/tor-commits/attachments/20240115/0b7af6cf/attachment-0001.htm>


More information about the tor-commits mailing list