Feature #15023

Upgrade to Tor Browser based on Firefox ESR60

Added by intrigeri 2017-12-08 08:31:12 . Updated 2018-09-05 16:18:44 .

Status:
Resolved
Priority:
Normal
Assignee:
Category:
Target version:
Start date:
2017-08-30
Due date:
2018-08-09
% Done:

100%

Feature Branch:
feature/15023-tor-browser-8, torbrowser-launcher:feature/15023-tor-browser-8
Type of work:
Code
Blueprint:

Starter:
Affected tool:
Browser
Deliverable for:

Description

Relevant upstream tickets: https://trac.torproject.org/projects/tor/query?status=!closed&keywords=~ff60-esr&max=256

Foreseeable issues:

  • See subtasks.
  • Likely there will be a non-XUL (or system add-on) Tor Launcher to migrate to.
  • Likely Torbutton will be installed in a different manner. XXX: reference needed
  • sandboxing improvements require unprivileged user namespaces to be enabled + some AppArmor tweaks: is the risk/benefit worth it? this does not have to be solved as part of this ticket but it’s something to keep in mind and if not dealt with here, a follow-up ticket shall be created

Subtasks

Bug #14555: Migrate to Tor Launcher compatible with Firefox ESR60 Resolved

100

Feature #15530: Start upgrading to Tor Browser based on Firefox ESR60 Rejected

0

Feature #15531: Update plans and timeline wrt. upgrading to Tor Browser based on Firefox 60ESR Resolved

100

Feature #15701: Adapt and run our test suite for Tor Browser 8 Resolved

100

Feature #15702: Adjust to uBlock web extension Resolved

100

Feature #15703: Check that all our custom browser prefs are taken into account with Firefox ESR60 Resolved

100

Feature #15704: Check what to do wrt. the libmozsandbox.so loading error Resolved

100

Feature #15705: Review current state of feature/15023-tor-browser-8 Resolved

100

Bug #15707: Our custom extensions.torbutton.launch_warning is not honored Resolved

100

Bug #15708: The Unsafe Browser lacks some of our customization with Firefox ESR60 Resolved

100

Bug #15716: Check Tor Browser 8 memory usage Resolved

100

Bug #15717: Firefox' "Web Content" processes are not confined as strictly as they used to Resolved

100

Bug #15719: Our custom bookmarks are not enabled in Tor Browser 8 in a non-English session Rejected

100

Feature #15773: Tor Browser 8 can't install new addons Rejected

0

Bug #15777: NoScript and HTTPS Everywhere icons are not shown on first start Resolved

100


Related issues

Related to Tails - Bug #15092: Update our 2018 release schedule wrt. new Firefox ESR plans Resolved 2017-12-22
Related to Tails - Feature #12571: Find a nicer way to add exceptions from mandatory signing for our Tor Browser add-ons Confirmed 2017-05-19
Related to Tails - Bug #15706: Tor Browser 8 always prompts wrt. asking webpages in English Resolved 2018-07-03
Blocks Tails - Feature #15334: Core work 2018Q3: Foundations Team Resolved 2018-02-20
Blocks Tails - Bug #14962: Tor Browser >= 7.0.8 fails to render local pages correctly Resolved 2017-11-16
Blocks Tails - Feature #15720: Use Tor Browser for offline documentation and drop the documentation browser Resolved 2018-07-06
Blocks Tails - Bug #14771: Retrying mechanism for the "I open the address" step is buggy in the Unsafe Browser Resolved 2017-10-04
Blocks Tails - Feature #7759: Chroot browsers should use their own icons Resolved
Blocks Tails - Bug #15725: Are recent Firefox sandboxing improvements worth enabling unprivileged user namespaces? Confirmed 2018-07-10
Blocks Tails - Bug #15101: Add feedback when opening desktop launchers Resolved 2017-12-25
Blocks Tails - Bug #11711: "The Unsafe Browser can be used in all languages supported in Tails" test is broken for locales that have a translated homepage Resolved 2016-08-24

History

#1 Updated by intrigeri 2017-12-08 08:32:23

  • Description updated

#2 Updated by intrigeri 2017-12-22 09:07:33

  • Subject changed from Upgrade to Tor Browser based on Firefox 59 ESR to Upgrade to Tor Browser based on Firefox ESR60

I’ll update the target version once https://lists.torproject.org/pipermail/tbb-dev/2017-December/000701.html reaches an actionable conclusion.

#3 Updated by intrigeri 2017-12-22 09:07:44

  • related to Bug #15092: Update our 2018 release schedule wrt. new Firefox ESR plans added

#4 Updated by intrigeri 2017-12-23 11:26:14

  • Target version changed from Tails_3.8 to Tails_3.9

#5 Updated by intrigeri 2018-01-04 16:54:45

  • Status changed from Confirmed to In Progress

Applied in changeset commit:7b518f363a7be412143a5c12ca9308c90e458084.

#6 Updated by intrigeri 2018-02-20 08:36:18

#7 Updated by intrigeri 2018-03-22 07:22:22

  • Description updated

#8 Updated by intrigeri 2018-04-13 12:41:33

  • Description updated

#9 Updated by intrigeri 2018-04-27 10:27:57

  • Description updated

#10 Updated by intrigeri 2018-05-19 15:09:53

  • Description updated

#11 Updated by intrigeri 2018-05-22 16:29:36

FTR a first TB Linux nightly based on ESR 60 is planned for this week :)

#12 Updated by intrigeri 2018-05-24 10:39:45

… and the 60.2 release date has changed again. It’s now later than planned initially which will make things easier for us! :)

#13 Updated by intrigeri 2018-05-25 13:24:17

  • related to Feature #12571: Find a nicer way to add exceptions from mandatory signing for our Tor Browser add-ons added

#14 Updated by intrigeri 2018-06-25 11:36:59

The first TB alpha based on ESR60 is there: https://lists.torproject.org/pipermail/tor-qa/2018-June/000942.html :)

#15 Updated by intrigeri 2018-06-25 18:43:49

  • blocks Bug #14962: Tor Browser >= 7.0.8 fails to render local pages correctly added

#16 Updated by intrigeri 2018-06-26 17:22:04

  • Assignee changed from anonym to intrigeri

We’ll decide on Feature #15531 how we’ll handle this.

#17 Updated by intrigeri 2018-06-28 14:12:49

  • Assignee changed from intrigeri to segfault

segfault will give it a first try by next Tuesday and then we’ll meet to plan the next steps.

#18 Updated by intrigeri 2018-06-30 16:35:32

  • Feature Branch set to feature/15023-tor-browser-8

#19 Updated by intrigeri 2018-06-30 21:48:24

Got an ISO that builds! First issues identified via random manual testing:

  • missing icon in the apps menu
  • “Something Went Wrong! Tor is not working in this browser”, fixed by allowing GETINFO net/listeners/socks in onion grater
  • no circuits display in the onion menu
  • ublock is not enabled, possibly the way we patch stuff in apply_extension_code_signing_hacks is broken
  • default search engine is YouTube, maybe that’s what people want these days but I’d rather stick to DDG like Tor Browser upstream
  • a few AppArmor denials that might explain some of the above
  • in about:addons → Languages, all language packs are flagged as “could not be verified”. I guess we’ll have to live with it.
  • our custom homepage is not loaded: about:tor is
  • ERROR: ld.so: object 'libmozsandbox.so' from LD_PRELOAD cannot be preloaded (cannot open shared object file): ignored. (after patching the AppArmor profile to allow reading /etc/ld.so.conf,{.d,.d/*}; looks like we need to teach Tor Browser where its libraries live; next step: look at changes in the start-tor-browser script that we should import

#20 Updated by intrigeri 2018-07-01 12:41:23

intrigeri wrote:
> * missing icon in the apps menu

Fixed in Git.

> * “Something Went Wrong! Tor is not working in this browser”, fixed by allowing GETINFO net/listeners/socks in onion grater

Fixed in Git.

> * no circuits display in the onion menu

Actually, that’s because this has been moved to the identity box in the URL bar domain and there it works fine.

> * ublock is not enabled, possibly the way we patch stuff in apply_extension_code_signing_hacks is broken

Later.

> * default search engine is YouTube, maybe that’s what people want these days but I’d rather stick to DDG like Tor Browser upstream
> * our custom homepage is not loaded: about:tor is

It looks like /etc/tor-browser/locale-profiles/ is not considered anymore, which explains these 2 issues.

> * ERROR: ld.so: object 'libmozsandbox.so' from LD_PRELOAD cannot be preloaded (cannot open shared object file): ignored. (after patching the AppArmor profile to allow reading /etc/ld.so.conf,{.d,.d/*}; looks like we need to teach Tor Browser where its libraries live; next step: look at changes in the start-tor-browser script that we should import

Later. Next step: reproduce with pristine Tor Browser 8.0aN outside of Tails.

#21 Updated by intrigeri 2018-07-01 13:15:02

intrigeri wrote:
> > * ublock is not enabled, possibly the way we patch stuff in apply_extension_code_signing_hacks is broken
>
> Later.

> > * default search engine is YouTube, maybe that’s what people want these days but I’d rather stick to DDG like Tor Browser upstream
> > * our custom homepage is not loaded: about:tor is
>
> It looks like /etc/tor-browser/locale-profiles/ is not considered anymore, which explains these 2 issues.

Fixed in Git.

> > * ERROR: ld.so: object 'libmozsandbox.so' from LD_PRELOAD cannot be preloaded (cannot open shared object file): ignored. (after patching the AppArmor profile to allow reading /etc/ld.so.conf,{.d,.d/*}; looks like we need to teach Tor Browser where its libraries live; next step: look at changes in the start-tor-browser script that we should import
>
> Later. Next step: reproduce with pristine Tor Browser 8.0aN outside of Tails.

Also, localized search engines, that we install in /usr/local/lib/tor-browser/distribution/searchplugins/locale/, are not taken into account. So for non-English languages the default search engine remains YouTube. Note that pristine Firefox already ships localized Wikipedia search engines (browser/locales/searchplugins/) and has a per-locale list (browser/locales/search/list.json), that Tor Browser patches to remove localized search engines. This makes sense to me in terms of not leaking the user’s locales unless they explicitly choose to do so. Given this area has been a recurring PITA to maintain accross major upgrades, I’m very tempted to just drop the ball and stick to Tor Browser’s defaults.

#22 Updated by intrigeri 2018-07-01 13:34:08

  • blocks Feature #10267: Test that the search plugins (disconnect.me, WP, and StartPage) are localized added

#23 Updated by intrigeri 2018-07-01 14:34:45

intrigeri wrote:
> intrigeri wrote:
> > > * ublock is not enabled, possibly the way we patch stuff in apply_extension_code_signing_hacks is broken
> >
> > Later.

Should be fixed in Git (locally, will push after testing).

> > > * ERROR: ld.so: object 'libmozsandbox.so' from LD_PRELOAD cannot be preloaded (cannot open shared object file): ignored. (after patching the AppArmor profile to allow reading /etc/ld.so.conf,{.d,.d/*}; looks like we need to teach Tor Browser where its libraries live; next step: look at changes in the start-tor-browser script that we should import
> >
> > Later. Next step: reproduce with pristine Tor Browser 8.0aN outside of Tails.

Unchanged.

> Also, localized search engines, that we install in /usr/local/lib/tor-browser/distribution/searchplugins/locale/, are not taken into account. So for non-English languages the default search engine remains YouTube. Note that pristine Firefox already ships localized Wikipedia search engines (browser/locales/searchplugins/) and has a per-locale list (browser/locales/search/list.json), that Tor Browser patches to remove localized search engines. This makes sense to me in terms of not leaking the user’s locales unless they explicitly choose to do so. Given this area has been a recurring PITA to maintain accross major upgrades, I’m very tempted to just drop the ball and stick to Tor Browser’s defaults.

Done.

Also, the Unsafe Browser window is entirely black.

#24 Updated by intrigeri 2018-07-01 15:15:06

intrigeri wrote:
> > > > * ERROR: ld.so: object 'libmozsandbox.so' from LD_PRELOAD cannot be preloaded (cannot open shared object file): ignored. (after patching the AppArmor profile to allow reading /etc/ld.so.conf,{.d,.d/*}; looks like we need to teach Tor Browser where its libraries live; next step: look at changes in the start-tor-browser script that we should import
> > >
> > > Later. Next step: reproduce with pristine Tor Browser 8.0aN outside of Tails.
>
> Unchanged.

> Also, the Unsafe Browser window is entirely black.

Fixed locally in Git but it lacks some of our customization:

  • it’s listed as “Tor Browser” in the taskbar and in the window title
  • it has search engines (I thought we disabled them, got to check that)
  • it has the default Firefox bookmarks (not sure what we have usually, maybe not a problem)

And we need to check that our prefs are taken into account, both for the Unsafe Browser and for Tor Browser:

  • config/chroot_local-includes/etc/tor-browser/profile/preferences/0000tails.js, e.g. extensions.torbutton.lastUpdateCheck seems to be ignored
  • config/chroot_local-includes/etc/xul-ext/tor-launcher.js
  • all calls to set_mozilla_pref
    • destination file (some are now ignored)
    • adding the user_pref optional argument may be needed in some cases

#25 Updated by intrigeri 2018-07-01 18:35:34

intrigeri wrote:
> intrigeri wrote:
> > > > > * ERROR: ld.so: object 'libmozsandbox.so' from LD_PRELOAD cannot be preloaded (cannot open shared object file): ignored. (after patching the AppArmor profile to allow reading /etc/ld.so.conf,{.d,.d/*}; looks like we need to teach Tor Browser where its libraries live; next step: look at changes in the start-tor-browser script that we should import
> > > >
> > > > Later. Next step: reproduce with pristine Tor Browser 8.0aN outside of Tails.
> >
Unchanged.
>
> > Also, the Unsafe Browser window is entirely black.
>
> Fixed locally in Git but it lacks some of our customization:
>
> * it’s listed as “Tor Browser” in the taskbar and in the window title
> * it has search engines (I thought we disabled them, got to check that)
> * it has the default Firefox bookmarks (not sure what we have usually, maybe not a problem)
>
> And we need to check that our prefs are taken into account, both for the Unsafe Browser and for Tor Browser:

I think I’ve fixed it all in Git, but it would be good to double-check.

#26 Updated by intrigeri 2018-07-03 13:00:52

  • Description updated

#27 Updated by intrigeri 2018-07-03 14:03:52

  • Assignee changed from segfault to intrigeri

I’ve filed subtasks for the remaining problems mentionned above. Let’s create new ones as we discover problems as a single Redmine discussion is not a good enough way to track them (it was OK for the initial investigation but it won’t scale).

#28 Updated by intrigeri 2018-07-03 14:04:53

  • Description updated

#29 Updated by intrigeri 2018-07-03 22:40:26

  • Description updated

#30 Updated by intrigeri 2018-07-05 16:05:06

  • Feature Branch changed from feature/15023-tor-browser-8 to feature/15023-tor-browser-8, torbrowser-launcher:feature/15023-tor-browser-8

#31 Updated by intrigeri 2018-07-06 08:53:48

  • blocks Feature #15720: Use Tor Browser for offline documentation and drop the documentation browser added

#32 Updated by intrigeri 2018-07-07 07:43:59

  • blocks Bug #14771: Retrying mechanism for the "I open the address" step is buggy in the Unsafe Browser added

#33 Updated by intrigeri 2018-07-07 07:45:33

  • blocks Feature #7759: Chroot browsers should use their own icons added

#34 Updated by intrigeri 2018-07-10 16:00:53

intrigeri wrote:
> * sandboxing improvements require unprivileged user namespaces to be enabled + some AppArmor tweaks: is the risk/benefit worth it? this does not have to be solved as part of this ticket but it’s something to keep in mind and if not dealt with here, a follow-up ticket shall be created

Starting the discussion on Bug #15725.

#35 Updated by intrigeri 2018-07-10 16:01:08

  • Description updated

#36 Updated by intrigeri 2018-07-10 16:15:33

  • blocks Bug #15725: Are recent Firefox sandboxing improvements worth enabling unprivileged user namespaces? added

#37 Updated by intrigeri 2018-07-28 05:20:22

  • blocks Bug #15101: Add feedback when opening desktop launchers added

#38 Updated by segfault 2018-07-30 21:07:45

I reviewed up to b959708bebf61e502c3f7bb6720ce41a921bf5c1 today.

My comments so far:

b55fff9f89c623b707d8c2a4e0fe893702d31785:

  • inconsistent indentation in apply_extension_prefs_hacks
  • I would put tbb_timestamp in a global variable instead of assigning it the same value in multiple functions

8b7dbd13d58c6e89cc9d3b5f69a9153347ea1ad6:

> Do NOT edit prefs.js directly.

> The administrator may add an all-companyname.js preference file (install_directory/browser/defaults/preferences/all-companyname.js). This will be parsed last during the preference loading process.

  • configure_xulrunner_app_locale() is writing pref(...) to prefs.js - should that be user_pref(...)? (based on that prefs.js seems to only contain user_pref lines and you changed other lines to use user_pref in the same commit)

b959708bebf61e502c3f7bb6720ce41a921bf5c1:

  • webext-ublock-origin is back in buster since 2018-07-17 - should we install it from buster instead of sid?

#39 Updated by intrigeri 2018-08-08 08:10:09

Hi segfault!

> I reviewed up to b959708bebf61e502c3f7bb6720ce41a921bf5c1 today.

Thanks a lot!

> My comments so far:

> b55fff9f89c623b707d8c2a4e0fe893702d31785:

> * inconsistent indentation in apply_extension_prefs_hacks

Right. Thankfully this code was removed later.

> * I would put tbb_timestamp in a global variable instead of assigning it the same value in multiple functions

Good idea, done locally and I’ll now test it :)

> 8b7dbd13d58c6e89cc9d3b5f69a9153347ea1ad6:

> * Are you sure it is safe to edit to prefs.js directly?

Yes, as long as we do this before the browser is started. I’m basically following the lead of the Tor Browser build scripts do.

> Maybe we should set our
> default settings in a all-tails.js file instead. Quoting from
> https://developer.mozilla.org/en-US/docs/Mozilla/Preferences/A_brief_guide_to_Mozilla_preferences:
>> prefs.js is automatically generated by the application and should not be edited manually

>> Do NOT edit prefs.js directly.

I think that’s meant for users. We do lots of things that Mozilla would not want end-users to do :)

>> The administrator may add an all-companyname.js preference file
>> (install_directory/browser/defaults/preferences/all-companyname.js). This will be
>> parsed last during the preference loading process.

This mechanism is meant for administrators who are able to modify the installed Tor Browser directory. This code is run as the amnesia user so we can’t use this.

> * configure_xulrunner_app_locale() is writing pref(...) to prefs.js - should
> that be user_pref(...)? (based on that prefs.js seems to only contain user_pref
> lines and you changed other lines to use user_pref in the same commit)

Right. This was fixed in commit:ac81013029d4e617dc6263edf65e903d07a5462b already.

> b959708bebf61e502c3f7bb6720ce41a921bf5c1:

> * webext-ublock-origin is back in buster since 2018-07-17 - should we install it from buster instead of sid?

Debian testing has no security support; I prefer tracking a dist that gets the security fixes ASAP. Otherwise, for each package we pin to Buster, we need to track security issues & fixes manually.

#40 Updated by segfault 2018-08-08 08:16:20

6f6d798378d06064d3258273a0900d359d14702d:

I tested this and it’s enough to mount a tmpfs on the chroot’s /dev/shm, we don’t have give it access to the root filesystem’s /dev/shm.

#41 Updated by segfault 2018-08-08 08:41:50

2b521bc21581fe922782bb2e553b460c370da2d6:

Most of the Torbutton prefs removed here are still listed on https://www.torproject.org/docs/torbutton/en/design/index.html. Maybe we should create a ticket in the torproject trac if the prefs are not supported anymore.

#42 Updated by intrigeri 2018-08-08 08:51:26

> Most of the Torbutton prefs removed here are still listed on https://www.torproject.org/docs/torbutton/en/design/index.html. Maybe we should create a ticket in the torproject trac if the prefs are not supported anymore.

Yeah, the Tor Browser desing doc is awfully outdated. https://trac.torproject.org/projects/tor/ticket/25021 already tracks this.

#43 Updated by intrigeri 2018-08-08 09:14:32

> I tested this and it’s enough to mount a tmpfs on the chroot’s /dev/shm, we don’t have give it access to the root filesystem’s /dev/shm.

Great idea, implemented!

#44 Updated by segfault 2018-08-08 09:20:14

9757969e891054b2b259ea63b1d2a97c568a59ba:

I don’t see a Stop/Reload button in my test build. And browser.uiCustomization.state in about:config doesn’t include stop-reload-button.

#45 Updated by segfault 2018-08-08 09:46:23

> 9757969e891054b2b259ea63b1d2a97c568a59ba:
>
> I don’t see a Stop/Reload button in my test build. And browser.uiCustomization.state in about:config doesn’t include stop-reload-button.

Nevermind, that’s because my test build doesn’t include this commit (which is strange, because the commit is from July 3 and I built the branch last week, but whatever).

#46 Updated by segfault 2018-08-08 12:39:50

0bcdc8ad14374f5c4e91807a84ece82a20e684a0:

I don’t understand the purpose of the changed line. Can you explain the effect of that line?

#47 Updated by segfault 2018-08-08 12:43:20

segfault wrote:
> 0bcdc8ad14374f5c4e91807a84ece82a20e684a0:
>
> I don’t understand the purpose of the changed line. Can you explain the effect of that line?

Same for the change in 6d681cd90343bb4e7ef6e7d49241dbb744063b34.

#48 Updated by segfault 2018-08-08 13:33:23

f255a4ede6ab285287556e39e358110e513132b1:

In the recovery method, what’s the purpose of hitting Escape and then waiting for the reload button to vanish? I thought that maybe this should stop loading the page, but then it should be the stop button that vanishes.

#49 Updated by segfault 2018-08-08 13:54:56

I’m done with the review up to 85392012d5dc8b5934286fa92a3f3c7e6829998c (the currently most recent commit).

#50 Updated by intrigeri 2018-08-08 14:29:03

segfault wrote:
> 0bcdc8ad14374f5c4e91807a84ece82a20e684a0:
>
> I don’t understand the purpose of the changed line. Can you explain the effect of that line?

This was addressed over IM.

#51 Updated by intrigeri 2018-08-08 14:29:44

segfault wrote:
> Same for the change in 6d681cd90343bb4e7ef6e7d49241dbb744063b34.

This was resolved over IM.

#52 Updated by intrigeri 2018-08-08 14:30:48

> f255a4ede6ab285287556e39e358110e513132b1:

> In the recovery method, what’s the purpose of hitting Escape and then waiting for the reload button to vanish? I thought that maybe this should stop loading the page, but then it should be the stop button that vanishes.

Wow, good catch! It seems that I’ve cargo-culted this code from When /^I open the address "([^"]*)" in the (.*)$/ do |address, browser|, where it was introduced 3 years ago via commit:26d902fe90d68ab0fa58d4bd46b4c821a48e5277. That code does not make any sense to me so I’ve fixed it as you’re suggesting. I’m running the full test suite on it and we’ll see.

#53 Updated by segfault 2018-08-08 16:10:26

852ce14b81c00e6bb1bf0376e2d007c4dfb4e875:

I don’t like it that currently the icons of NoScript and HTTPS Everywhere are not shown during the first TB launch (FWIW, the uBlock Origin icon is still shown).

Which problems did you see that made you remove these preferences? I tried readding this single pref; it fixes the hidden icons and I don’t see any problems:

user_pref("extensions.torbutton.inserted_button", true);

#54 Updated by intrigeri 2018-08-09 05:27:28

intrigeri wrote:
> > f255a4ede6ab285287556e39e358110e513132b1:
>
> > In the recovery method, what’s the purpose of hitting Escape and then waiting for the reload button to vanish? I thought that maybe this should stop loading the page, but then it should be the stop button that vanishes.
>
> Wow, good catch! It seems that I’ve cargo-culted this code from When /^I open the address "([^"]*)" in the (.*)$/ do |address, browser|, where it was introduced 3 years ago via commit:26d902fe90d68ab0fa58d4bd46b4c821a48e5277. That code does not make any sense to me so I’ve fixed it as you’re suggesting. I’m running the full test suite on it and we’ll see.

The fix seems to work fine: commit:b6a409fe7057da5149df272a529bfa9b463faa0a :)

#55 Updated by intrigeri 2018-08-09 07:04:56

> I don’t like it that currently the icons of NoScript and HTTPS Everywhere are not shown during the first TB launch (FWIW, the uBlock Origin icon is still shown).

I don’t like it either but that’s an upstream bug (see bug link in the commit message and I can reproduce this with a pristine Tor Browser). Now, of course Tails users are affected more than others because on every boot of Tails they’re in the “first launch” situation.

> Which problems did you see that made you remove these preferences?

I don’t remember :/
My bad for not writing a better commit message, now I get to spend more time on it…

> I tried readding this single pref; it fixes the hidden icons and I don’t see any problems:
> user_pref("extensions.torbutton.inserted_button", true);

Interesting, I’ll take another quick look at it ⇒ I’ve filed Bug #15777.

#56 Updated by intrigeri 2018-08-09 08:51:02

  • blocks Bug #11711: "The Unsafe Browser can be used in all languages supported in Tails" test is broken for locales that have a translated homepage added

#57 Updated by segfault 2018-08-09 09:13:47

Reviewed up to commit 7bdea0f2edd43eb1d91e619b53d88b911cffffbb, everything LGTM.

#58 Updated by intrigeri 2018-08-14 05:49:11

  • related to Bug #15706: Tor Browser 8 always prompts wrt. asking webpages in English added

#59 Updated by intrigeri 2018-08-14 05:51:56

  • Status changed from In Progress to Fix committed
  • Assignee deleted (intrigeri)

Merged! Remaining issues that cannot be solved before the 3.9 freeze will be tracked as separate tickets. For now the only one is Bug #15706.

#60 Updated by intrigeri 2018-08-14 06:03:50

  • blocked by deleted (Feature #10267: Test that the search plugins (disconnect.me, WP, and StartPage) are localized)

#61 Updated by Anonymous 2018-08-19 07:04:15

  • related to Feature #15807: Define & apply clear criteria for including dictionaries, fonts and language packs added

#62 Updated by Anonymous 2018-08-19 07:04:23

  • related to deleted (Feature #15807: Define & apply clear criteria for including dictionaries, fonts and language packs)

#63 Updated by intrigeri 2018-09-05 16:18:44

  • Status changed from Fix committed to Resolved