[tor-project] Tor Browser team meeting notes, 22 and 29 July 2019
Georg Koppen
gk at torproject.org
Tue Jul 30 07:58:00 UTC 2019
Hello!
Here come the notes from our last two meetings, held on 22 and 29 July.
The IRC logs can be found at:
http://meetbot.debian.net/tor-meeting2/2019/tor-meeting2.2019-07-22-17.29.log.txt
http://meetbot.debian.net/tor-meeting2/2019/tor-meeting2.2019-07-29-17.30.log.txt
And the pad items for both meetings are:
Week of July 29, 2019
Discussion
- team capacity and ticket estimations
- We seem to get a bunch of messages on frontdesk@ with no subject and
no content other than a generic sent by mobile phone make signature.
Could these be coming from TBA somehow? [sysrqb: i think no. At least I
don't think we added frontdesk@ anywhere on Android][GeKo: Pili tries to
investigate this issue by asking back how users got to send those
messages to our system]
- esr68 switch for nightlies
(https://trac.torproject.org/projects/tor/query?status=!closed&keywords=~tbb-9.0-must-nightly)
[GeKo: The plan is to get Linux nightlies going early next week,
building support for the other platforms on top of that]
pospeselr:
just got back home last night and still out of it so will probably
miss this meeting
Last Week(s):
- vacation
- investigated cause of #31251 (Security Level menu hangs off
of the toolbarbutton element when it should hang off of the
toolbarbutton's child element with toolbarbutton-icon class)
- solution here seems to be a relatively simple refactor
This Week:
- catch up on backlog
- sync up with antonela on design for network settings in
preferences (do we have a ticket # for this?) [GeKo: Yes, I just created
one: #31286]
- fix #31251
- review how screen reader UX is for the security level UI and files
bugs if necessary
Ongoing:
- bug the wine devs to get our widl patches in
mcs and brade:
Last week:
- #30429 (ESR 68 Rebase) — provided feedback on a few patches
that acat rebased already.
- #30429 (ESR 68 Rebase) — started rebasing updater patches.
- Upgraded our primary Tor development computer from macOS
10.13.x to 10.14.x and dealt with fallout.
This week/upcoming:
- #30126 (Make Tor Browser on macOS compatible with Apple's
notarization).
- #29197 (Remove use of overlays from Tor Launcher).
- #30429 (ESR 68 Rebase) — rebase updater patches.
- Respond to Antonela's comments in #30237 (Onion Services
client auth prompt).
GeKo:
Last week:
- afk
This week:
- sending out remaining feedback summaries
- dealing with backlog
- helping with #30126
- review of esr68-rebased patches (#30429 and related tickets)
- helping with linux toolchain patches/issues for esr68
migration (see: #30320 and #30321 + respective child tickets)
- work on setting up android signing environment
- help with release for Google's 64bit requirement starting on
Aug 1 (see: #31260 and #31192 for discussions)
sisbell:
Last Week:
- Created esr68 branch and merged gk branch with new toolchain code.
- Fix for rust config to handle android
- Fix for using tor built clang rather than ndk one
- Patch for removing emulator requirement from Firefox build
- Investigation of breaking issues with mozconfig
This Week
- Start applying previous esr60 patches to esr68 [need assets, etc]
- Generate firefox gradle dependencies list
pili:
Last week:
- S27 July report
- GSoD final candidate selection
- Playing around with gitlab
- roadmap review
This week:
- S27 July report
- Future funding proposal for Browser team
- S27 work completion report
- Figuring out browser team task distribution
- Following up on fundraising banner localization
- coordinating Orfox transition
boklm:
Last week:
- afk
This week:
- Review gk's linux-esr68 branch, and try to make it ready to
merge for nightly
- Help with build for the TBA 64bit release
tjr
- Found a better solution for the alloc/dealloc bug, requested review
https://bugzilla.mozilla.org/show_bug.cgi?id=1547519
sysrqb:
Last week:
Recovery from travel
A little work on 68esr rebase/testing
Mail/backlog/etc
This week:
Backport patch for supporting x86 and aarch64 architectures (31260)
Investigate x86_64 support?
Help investigate aarch64 crash (31140)
68esr branch testing (and rebasing onto acat's most-recent branch)
acat:
Last week:
- Addressing review comments of rebased esr68 patches,
rebasing to new gecko-dev esr68 branch.
This week:
- Push rebased esr68 branches.
- Review/test Android ESR 68 rebased patches (#31010).
- Backlog: upstreaming patches
antonela:
Last week:
- vacations
This week:
- post-vacations
- we ran a Tor Browser Usage survey during the dev meeting.
Sharing results with lists this week.
- should work on Network settings -> General settings (#29197)
-----------------------------------------------------
Week of July 22, 2019
Discussion:
- 9.0 Nightly blockers:
https://trac.torproject.org/projects/tor/query?status=!closed&keywords=~tbb-9.0-must-nightly&order=status
- Is there anything else that is missing from that list?
- tjr: Building project debootstrap-image -
container-image_jessie-amd64-2.tar.gz
- bash: cannot set terminal process group (8): Inappropriate ioctl
for device
- anyone recognize this?
Pili:
Last Week:
- reading and uploading notes from dev meeting
- digitizing roadmaps
- recovering from dev meeting
This week:
- Start looking at team capacity vs workload
- Roadmap review
- I need some help identifying whether some of the August
items have tickets for them already:
- Switch meek uTLS?
- #29430 - Use uTLS for meek TLS camouflage in Tor Browser -
https://trac.torproject.org/projects/tor/ticket/29430 ?
-Rip out meek?
- ? [from mcs: I think this is covered in #29430]
- Tor button migration
- #28745 - THE Torbutton clean-up -
https://trac.torproject.org/projects/tor/ticket/28745 ?
- Network settings in General settings
- #31286 - Include bridge configuration into about:preferences -
https://trac.torproject.org/projects/tor/ticket/31286
- Toolbar button for New Identity
- ? [brade: #27511]
- Tor Launcher for ESR68
- #29197 - remove use of overlays from Tor Launcher -
https://trac.torproject.org/projects/tor/ticket/29197 ?
- #30506 - Follow Firefox ESlint rules for torbutton and
tor-launcher integrated code -
https://trac.torproject.org/projects/tor/ticket/30506 ?
tjr
- Figured out at least one solution for the alloc/dealloc max
https://bugzilla.mozilla.org/show_bug.cgi?id=1547519
mcs and brade:
Last week:
- #30126 (Make Tor Browser on macOS compatible with Apple's
notarization).
- We need some help from gk; see comment:11 in the ticket.
- #29197 (remove use of overlays from Tor Launcher)
- We hope to do this by load XUL fragments instead, but that
requires some ESR68 features.
- This is on hold until we make some progress on #30429.
This week/upcoming:
- #30429 (ESR 68 Rebase — look over a few patches that acat
rebased already).
- #30429 (ESR 68 Rebase — updater patches).
- #29197 (Remove use of overlays from Tor Launcher).
- #30126 (Make Tor Browser on macOS compatible with Apple's
notarization).
- Respond to Antonela's comments in #30237 (Onion Services
client auth prompt).
acat:
Last week:
- Worked on revision of #21830 upstream patch (locale detectable
by button width) https://bugzilla.mozilla.org/show_bug.cgi?id=1396224
- Investigated #29563 (css line-height revisited [at least zoom
and linux])
This week:
- Address GeKo's comments on #30429 (desktop ESR68 rebased patches)
- Review/test Android ESR 68 rebased patches (#31010).
- Submit revision for
https://bugzilla.mozilla.org/show_bug.cgi?id=1561322
- Try to fix #29563.
- Follow up https://bugzilla.mozilla.org/show_bug.cgi?id=1433030
(Copying large text from web console leaks to /tmp)
sisbell:
Last Week:
- #30461 - Update tor-android-service to use android toolchain (ready
for review)
- #30460 - Update TOPL to use android toolchain (ready for review)
- #31174 - Update android toolchain (ready for review)
- changes to tor-android-service (decoupled VPN module so we can
exclude building, updated jSocks so we use binary rather than build)
This Week
- integration and testing for Firefox build
Georg
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: OpenPGP digital signature
URL: <http://lists.torproject.org/pipermail/tor-project/attachments/20190730/d50dd4fd/attachment-0001.sig>
More information about the tor-project
mailing list