[tor-project] Tor Browser team meeting notes, 3 September 2019
Georg Koppen
gk at torproject.org
Wed Sep 4 11:47:00 UTC 2019
Hello!
We held our weekly Tor Browser sync yesterday in #tor-meeting as usual.
The log can be found at:
http://meetbot.debian.net/tor-meeting2/2019/tor-meeting2.2019-09-03-17.29.log.txt
The notes from the pad are:
Discussion:
[tjr] We currently have a team IRC highlight for 'tbb-team'. I
recently joined #tor-bots and get regular highlights there for the owner
changing to tbb-team.
Is this a mild annoyance to anyone else? If so, I know
renaming trac accounts is not possible, but maybe in gitlab we could
have a different name for
the account; or try to migrate our highlight? (Or maybe the
answer is "Yes it's not ideal, but it's not worth changing.")
GeKo:
Last week:
- release preparation for 8.5.5 and 9.0a6
- built release candidates for both series
- signed the 8.5.5 bundles
- reviewed loads of patches to get 9.0a6 into alpha shape (it
seems we managed to do so!)
- helped pili with time estimations for tickets and roadmapping
for September
- staring at Windows reproducibility issue (#31538)
- helped with diagnosing Windows updater issue (#31567) (thanks
to pospeselr for stepping up and diagnosing the issue)
- provided patches to smaller issues (#30800, #27493
- filed already a number of issues against our ESR 68-based Tor
Browser
This week:
- help with getting the releases out
- continue to work on #31538
- macOS notarization? (GeKo will chat with mcs/brade after the
meeting)
- reviews
- monthly reports (I'll combine July and August)
mcs and brade:
Last week:
- #30126 (Make Tor Browser on macOS compatible with Apple's
notarization).
- Added a comment to the ticket that lists the remaining
things that we need.
- #29430 (Use uTLS for meek TLS camouflage in Tor Browser).
- create Torbutton patch to avoid breaking circuit display.
- #30429 (ESR 68 Rebase).
- tested the updater on Windows.
- created and helped with #31567 (NS_tsnprintf() does not
handle %s correctly on Windows).
- Discussed recent Mozilla updater security fix patches with gk.
- Started to look at #31457 (disable per-installation profiles).
This week/upcoming:
- #31457 (disable per-installation profiles).
- Work on other tbb-9.0-must-alpha tickets as time permits,
e.g., #31491 (clean up the old meek http helper browser
profiles).
- More ESR68 updater testing.
- We will be away from keyboard this Thursday and Friday
(September 5th and 6th).
- As we mentioned at the dev meeting, we have vacation planned
for the week of September 23rd.
tjr:
- Some minor build uplifts to esr 68
- There is a path forward on the wasm for extensions thing:
https://bugzilla.mozilla.org/show_bug.cgi?id=1576254
- Currently pretty far behind on things
pospeselr:
Last Week:
- #31567 investigation (printf fun)
- #31548 (verify mingw HEAD builds ff with working screen reader
support)
- #31286 work:
- finished prototype UX, sent review build to antonela
- started work to wire tor-launcher code into new
about:preferences configuration
This Week:
- make a test Linux build with bridge UX for y'all to review
(#31286)
- labor day off
- SF for browser privacy meet-up
acat:
Last week:
- Fixed #31396 - Communication with noscript for
security settings not working in nightlies
- Reviewed latest #31010 changes.
- Fixed some esr68 tbb-9.0-must-alpha bugs.
- Investigated onboarding regressions (#28822).
This week:
- Fix onboarding regressions + address review
comments (#28822).
- #26345 - Disable tracking protection UI in FF67-esr
- #31562 - The circuit display is not visible on
error pages in Tor Browser based on ESR68
- #31575 - Firefox is phoning home during start-up
in Tor Browser based on ESR 68
- #30662 - Make sure about:newtab is blank
- #31601 - Don't let Mozilla recommend extensions again
- Maybe others tbb-9.0-must-alpha
boklm:
Last week:
- Reviewed mingw-w64-clang patches (#28716, #28238)
- Made patch for #30384 (Use 64bit containers to build 32bit
Windows Tor Browser)
- Made small patches for #31606 (Update website update
instructions in Tor Browser release process)
- Helped with new releases build
- Started looking at #31448 (gold and lld break linking 32bit
Linux bundles we need to resort to bfd)
- Looked a little at #31564 (Android bundles based on ESR 68
are not built reproducibly anymore)
- Commented on #28942 (Evaluate pion WebRTC) and #28325 (Use go
1.11 module versioning support)
- Reviewed #31264 (tar.gz output files contain non-reproducible
timestamps)
This week:
- Finish publishing new releases
- Investigate #31448 (gold and lld break linking 32bit Linux
bundles we need to resort to bfd)
- Review #30334 (build_go_lib for executables)
- Other tbb-9.0-must-alpha toolchain tickets: #29013
- Review #31596 (Bump mingw-w64 version to pick up fix for #31567)
pili:
Last week:
- OTF Browser Proposal
- September Roadmap and estimations
This week:
- Final Orfox update!!
sisbell:
- #31568: Creating grade dependencies - determined cause of multiple
artifact entries (proposed solution but needs to be implemented)
- #30461: Update tor-android-service: redid config/build to use older
version of project until we get latest updates merged into tor repo
- #31293 - found that adding JVM settings overrides the no-daemon flag
for gradle. This causes network interface failures in some build
environments
- #31564 - Reproducibility - tried various solutions, including
upgrading, downgrading gradle plugin. All caused failures of Firefox build
- Various Changes to Firefox build to get it building with full set of
options
This week:
- For reproducibility - try downloading google source and see if we
can patch it.
- Fix for #31568
Georg
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: OpenPGP digital signature
URL: <http://lists.torproject.org/pipermail/tor-project/attachments/20190904/914e7e8a/attachment-0001.sig>
More information about the tor-project
mailing list