tbb-commits
Threads by month
- ----- 2026 -----
- April
- March
- February
- January
- ----- 2025 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2024 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2023 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2022 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2021 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2020 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2019 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2018 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2017 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2016 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2015 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2014 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- 1 participants
- 20248 discussions
[tor-browser-build/maint-10.0-desktop] Bug 40224: Backport Tor patch for v3 onion services
by gkï¼ torproject.org 02 Feb '21
by gkï¼ torproject.org 02 Feb '21
02 Feb '21
commit 9f965640252fb1c64df5214cd71d19ef0e440126
Author: Matthew Finkel <sysrqb(a)torproject.org>
Date: Mon Feb 1 21:31:46 2021 +0000
Bug 40224: Backport Tor patch for v3 onion services
---
...1-hs-v3-Require-reasonably-live-consensus.patch | 672 +++++++++++++++++++++
...tests-Fix-unit-tests-after-merge-of-40237.patch | 97 +++
.../0003-Pick-up-merge-conflict-resolutions.patch | 82 +++
projects/tor/build | 4 +
projects/tor/config | 3 +
5 files changed, 858 insertions(+)
diff --git a/projects/tor/0001-hs-v3-Require-reasonably-live-consensus.patch b/projects/tor/0001-hs-v3-Require-reasonably-live-consensus.patch
new file mode 100644
index 0000000..9a4ec5c
--- /dev/null
+++ b/projects/tor/0001-hs-v3-Require-reasonably-live-consensus.patch
@@ -0,0 +1,672 @@
+From a363b64e82bc1dac2409a65dee0606c4b66f71fc Mon Sep 17 00:00:00 2001
+From: David Goulet <dgoulet(a)torproject.org>
+Date: Mon, 11 Jan 2021 16:01:22 -0500
+Subject: [PATCH 1/3] hs-v3: Require reasonably live consensus
+
+Some days before this commit, the network experienced a DDoS on the directory
+authorities that prevented them to generate a consensus for more than 5 hours
+straight.
+
+That in turn entirely disabled onion service v3, client and service side, due
+to the subsystem requiring a live consensus to function properly.
+
+We know require a reasonably live consensus which means that the HSv3
+subsystem will to its job for using the best consensus tor can find. If the
+entire network is using an old consensus, than this should be alright.
+
+If the service happens to use a live consensus while a client is not, it
+should still work because the client will use the current SRV it sees which
+might be the previous SRV for the service for which it still publish
+descriptors for.
+
+If the service is using an old one and somehow can't get a new one while
+clients are on a new one, then reachability issues might arise. However, this
+is a situation we already have at the moment since the service will simply not
+work if it doesn't have a live consensus while a client has one.
+
+Fixes #40237
+
+Signed-off-by: David Goulet <dgoulet(a)torproject.org>
+
+diff --git a/changes/ticket40237 b/changes/ticket40237
+new file mode 100644
+index 0000000000..fc32f59cd4
+--- /dev/null
++++ b/changes/ticket40237
+@@ -0,0 +1,5 @@
++ o Major bugfixes (onion service v3):
++ - Stop requiring a live consensus for v3 clients and services to work. The
++ use of a reasonably live consensus will allow v3 to work properly in most
++ cases if the network failed to generate a consensus for more than 2 hours
++ in a row. Fixes bug 40237; bugfix on 0.3.5.1-alpha.
+diff --git a/src/core/mainloop/mainloop.c b/src/core/mainloop/mainloop.c
+index e4e17f6b76..b4dbedbfe4 100644
+--- a/src/core/mainloop/mainloop.c
++++ b/src/core/mainloop/mainloop.c
+@@ -2154,7 +2154,8 @@ hs_service_callback(time_t now, const or_options_t *options)
+ /* We need to at least be able to build circuits and that we actually have
+ * a working network. */
+ if (!have_completed_a_circuit() || net_is_disabled() ||
+- networkstatus_get_live_consensus(now) == NULL) {
++ !networkstatus_get_reasonably_live_consensus(now,
++ usable_consensus_flavor())) {
+ goto end;
+ }
+
+diff --git a/src/feature/hs/hs_cache.c b/src/feature/hs/hs_cache.c
+index 44cd2505fd..ef5e88e947 100644
+--- a/src/feature/hs/hs_cache.c
++++ b/src/feature/hs/hs_cache.c
+@@ -17,6 +17,7 @@
+ #include "feature/hs/hs_common.h"
+ #include "feature/hs/hs_client.h"
+ #include "feature/hs/hs_descriptor.h"
++#include "feature/nodelist/microdesc.h"
+ #include "feature/nodelist/networkstatus.h"
+ #include "feature/rend/rendcache.h"
+
+@@ -739,7 +740,9 @@ cached_client_descriptor_has_expired(time_t now,
+ /* We use the current consensus time to see if we should expire this
+ * descriptor since we use consensus time for all other parts of the protocol
+ * as well (e.g. to build the blinded key and compute time periods). */
+- const networkstatus_t *ns = networkstatus_get_live_consensus(now);
++ const networkstatus_t *ns =
++ networkstatus_get_reasonably_live_consensus(now,
++ usable_consensus_flavor());
+ /* If we don't have a recent consensus, consider this entry expired since we
+ * will want to fetch a new HS desc when we get a live consensus. */
+ if (!ns) {
+diff --git a/src/feature/hs/hs_client.c b/src/feature/hs/hs_client.c
+index fc1fd76efc..0f6109195b 100644
+--- a/src/feature/hs/hs_client.c
++++ b/src/feature/hs/hs_client.c
+@@ -29,6 +29,7 @@
+ #include "feature/hs/hs_descriptor.h"
+ #include "feature/hs/hs_ident.h"
+ #include "feature/nodelist/describe.h"
++#include "feature/nodelist/microdesc.h"
+ #include "feature/nodelist/networkstatus.h"
+ #include "feature/nodelist/nodelist.h"
+ #include "feature/nodelist/routerset.h"
+@@ -1302,9 +1303,10 @@ can_client_refetch_desc(const ed25519_public_key_t *identity_pk,
+ goto cannot;
+ }
+
+- /* Without a live consensus we can't do any client actions. It is needed to
+- * compute the hashring for a service. */
+- if (!networkstatus_get_live_consensus(approx_time())) {
++ /* Without a usable consensus we can't do any client actions. It is needed
++ * to compute the hashring for a service. */
++ if (!networkstatus_get_reasonably_live_consensus(approx_time(),
++ usable_consensus_flavor())) {
+ log_info(LD_REND, "Can't fetch descriptor for service %s because we "
+ "are missing a live consensus. Stalling connection.",
+ safe_str_client(ed25519_fmt(identity_pk)));
+diff --git a/src/feature/hs/hs_common.c b/src/feature/hs/hs_common.c
+index 4639cdb68a..86d3fcab7d 100644
+--- a/src/feature/hs/hs_common.c
++++ b/src/feature/hs/hs_common.c
+@@ -27,6 +27,7 @@
+ #include "feature/hs/hs_service.h"
+ #include "feature/hs_common/shared_random_client.h"
+ #include "feature/nodelist/describe.h"
++#include "feature/nodelist/microdesc.h"
+ #include "feature/nodelist/networkstatus.h"
+ #include "feature/nodelist/nodelist.h"
+ #include "feature/nodelist/routerset.h"
+@@ -276,7 +277,9 @@ hs_get_time_period_num(time_t now)
+ if (now != 0) {
+ current_time = now;
+ } else {
+- networkstatus_t *ns = networkstatus_get_live_consensus(approx_time());
++ networkstatus_t *ns =
++ networkstatus_get_reasonably_live_consensus(approx_time(),
++ usable_consensus_flavor());
+ current_time = ns ? ns->valid_after : approx_time();
+ }
+
+@@ -1107,7 +1110,8 @@ hs_in_period_between_tp_and_srv,(const networkstatus_t *consensus, time_t now))
+ time_t srv_start_time, tp_start_time;
+
+ if (!consensus) {
+- consensus = networkstatus_get_live_consensus(now);
++ consensus = networkstatus_get_reasonably_live_consensus(now,
++ usable_consensus_flavor());
+ if (!consensus) {
+ return 0;
+ }
+@@ -1352,7 +1356,9 @@ hs_get_responsible_hsdirs(const ed25519_public_key_t *blinded_pk,
+ sorted_nodes = smartlist_new();
+
+ /* Make sure we actually have a live consensus */
+- networkstatus_t *c = networkstatus_get_live_consensus(approx_time());
++ networkstatus_t *c =
++ networkstatus_get_reasonably_live_consensus(approx_time(),
++ usable_consensus_flavor());
+ if (!c || smartlist_len(c->routerstatus_list) == 0) {
+ log_warn(LD_REND, "No live consensus so we can't get the responsible "
+ "hidden service directories.");
+diff --git a/src/feature/hs/hs_service.c b/src/feature/hs/hs_service.c
+index a42879a48f..2f3f45f252 100644
+--- a/src/feature/hs/hs_service.c
++++ b/src/feature/hs/hs_service.c
+@@ -23,6 +23,7 @@
+ #include "feature/hs_common/shared_random_client.h"
+ #include "feature/keymgt/loadkey.h"
+ #include "feature/nodelist/describe.h"
++#include "feature/nodelist/microdesc.h"
+ #include "feature/nodelist/networkstatus.h"
+ #include "feature/nodelist/nickname.h"
+ #include "feature/nodelist/node_select.h"
+@@ -2504,7 +2505,8 @@ should_rotate_descriptors(hs_service_t *service, time_t now)
+
+ tor_assert(service);
+
+- ns = networkstatus_get_live_consensus(now);
++ ns = networkstatus_get_reasonably_live_consensus(now,
++ usable_consensus_flavor());
+ if (ns == NULL) {
+ goto no_rotation;
+ }
+@@ -3188,10 +3190,8 @@ should_service_upload_descriptor(const hs_service_t *service,
+ }
+
+ /* Don't upload desc if we don't have a live consensus */
+- if (!networkstatus_get_live_consensus(now)) {
+- msg = tor_strdup("No live consensus");
+- log_cant_upload_desc(service, desc, msg,
+- LOG_DESC_UPLOAD_REASON_NO_LIVE_CONSENSUS);
++ if (!networkstatus_get_reasonably_live_consensus(now,
++ usable_consensus_flavor())) {
+ goto cannot;
+ }
+
+diff --git a/src/feature/hs_common/shared_random_client.c b/src/feature/hs_common/shared_random_client.c
+index c2ea5afe32..4e8a2942fc 100644
+--- a/src/feature/hs_common/shared_random_client.c
++++ b/src/feature/hs_common/shared_random_client.c
+@@ -13,6 +13,7 @@
+ #include "app/config/config.h"
+ #include "feature/dirauth/authmode.h"
+ #include "feature/dirauth/voting_schedule.h"
++#include "feature/nodelist/microdesc.h"
+ #include "feature/nodelist/networkstatus.h"
+ #include "lib/encoding/binascii.h"
+
+@@ -55,7 +56,9 @@ int
+ get_voting_interval(void)
+ {
+ int interval;
+- networkstatus_t *consensus = networkstatus_get_live_consensus(time(NULL));
++ networkstatus_t *consensus =
++ networkstatus_get_reasonably_live_consensus(time(NULL),
++ usable_consensus_flavor());
+
+ if (consensus) {
+ /* Ideally we have a live consensus and we can just use that. */
+@@ -147,7 +150,8 @@ sr_get_current(const networkstatus_t *ns)
+ if (ns) {
+ consensus = ns;
+ } else {
+- consensus = networkstatus_get_live_consensus(approx_time());
++ consensus = networkstatus_get_reasonably_live_consensus(approx_time(),
++ usable_consensus_flavor());
+ }
+ /* Ideally we would never be asked for an SRV without a live consensus. Make
+ * sure this assumption is correct. */
+@@ -170,7 +174,8 @@ sr_get_previous(const networkstatus_t *ns)
+ if (ns) {
+ consensus = ns;
+ } else {
+- consensus = networkstatus_get_live_consensus(approx_time());
++ consensus = networkstatus_get_reasonably_live_consensus(approx_time(),
++ usable_consensus_flavor());
+ }
+ /* Ideally we would never be asked for an SRV without a live consensus. Make
+ * sure this assumption is correct. */
+@@ -242,13 +247,14 @@ sr_state_get_start_time_of_current_protocol_run(void)
+ int voting_interval = get_voting_interval();
+ time_t beginning_of_curr_round;
+
+- /* This function is not used for voting purposes, so if we have a live
+- consensus, use its valid-after as the beginning of the current round.
+- If we have no consensus but we're an authority, use our own
+- schedule. Otherwise, try using our view of the voting interval
+- to figure out when the current round _should_ be starting.
+- */
+- networkstatus_t *ns = networkstatus_get_live_consensus(approx_time());
++ /* This function is not used for voting purposes, so if we have a reasonably
++ * live consensus, use its valid-after as the beginning of the current
++ * round. If we have no consensus but we're an authority, use our own
++ * schedule. Otherwise, try using our view of the voting interval to figure
++ * out when the current round _should_ be starting. */
++ networkstatus_t *ns =
++ networkstatus_get_reasonably_live_consensus(approx_time(),
++ usable_consensus_flavor());
+ if (ns) {
+ beginning_of_curr_round = ns->valid_after;
+ } else if (authdir_mode(get_options()) || ASSUME_AUTHORITY_SCHEDULING) {
+diff --git a/src/feature/nodelist/nodelist.c b/src/feature/nodelist/nodelist.c
+index 7454f342f9..6ee1d11cae 100644
+--- a/src/feature/nodelist/nodelist.c
++++ b/src/feature/nodelist/nodelist.c
+@@ -362,7 +362,7 @@ node_set_hsdir_index(node_t *node, const networkstatus_t *ns)
+ tor_assert(node);
+ tor_assert(ns);
+
+- if (!networkstatus_is_live(ns, now)) {
++ if (!networkstatus_consensus_reasonably_live(ns, now)) {
+ static struct ratelim_t live_consensus_ratelim = RATELIM_INIT(30 * 60);
+ log_fn_ratelim(&live_consensus_ratelim, LOG_INFO, LD_GENERAL,
+ "Not setting hsdir index with a non-live consensus.");
+diff --git a/src/test/test_hs_cache.c b/src/test/test_hs_cache.c
+index f25bba3584..379f23ec72 100644
+--- a/src/test/test_hs_cache.c
++++ b/src/test/test_hs_cache.c
+@@ -462,9 +462,10 @@ test_hsdir_revision_counter_check(void *arg)
+ static networkstatus_t mock_ns;
+
+ static networkstatus_t *
+-mock_networkstatus_get_live_consensus(time_t now)
++mock_networkstatus_get_reasonably_live_consensus(time_t now, int flavor)
+ {
+ (void) now;
++ (void) flavor;
+ return &mock_ns;
+ }
+
+@@ -485,8 +486,8 @@ test_client_cache(void *arg)
+ /* Initialize HSDir cache subsystem */
+ init_test();
+
+- MOCK(networkstatus_get_live_consensus,
+- mock_networkstatus_get_live_consensus);
++ MOCK(networkstatus_get_reasonably_live_consensus,
++ mock_networkstatus_get_reasonably_live_consensus);
+
+ /* Set consensus time */
+ parse_rfc1123_time("Sat, 26 Oct 1985 13:00:00 UTC",
+diff --git a/src/test/test_hs_client.c b/src/test/test_hs_client.c
+index ae5cc5ed84..fd84293dc2 100644
+--- a/src/test/test_hs_client.c
++++ b/src/test/test_hs_client.c
+@@ -66,16 +66,18 @@ static networkstatus_t mock_ns;
+
+ /* Always return NULL. */
+ static networkstatus_t *
+-mock_networkstatus_get_live_consensus_false(time_t now)
++mock_networkstatus_get_reasonably_live_consensus_false(time_t now, int flavor)
+ {
+ (void) now;
++ (void) flavor;
+ return NULL;
+ }
+
+ static networkstatus_t *
+-mock_networkstatus_get_live_consensus(time_t now)
++mock_networkstatus_get_reasonably_live_consensus(time_t now, int flavor)
+ {
+ (void) now;
++ (void) flavor;
+ return &mock_ns;
+ }
+
+@@ -379,8 +381,8 @@ test_client_pick_intro(void *arg)
+ ed25519_keypair_t service_kp;
+ hs_descriptor_t *desc = NULL;
+
+- MOCK(networkstatus_get_live_consensus,
+- mock_networkstatus_get_live_consensus);
++ MOCK(networkstatus_get_reasonably_live_consensus,
++ mock_networkstatus_get_reasonably_live_consensus);
+
+ (void) arg;
+
+@@ -632,15 +634,15 @@ test_descriptor_fetch(void *arg)
+ get_options_mutable()->FetchHidServDescriptors = 1;
+
+ /* 2. We don't have a live consensus. */
+- MOCK(networkstatus_get_live_consensus,
+- mock_networkstatus_get_live_consensus_false);
++ MOCK(networkstatus_get_reasonably_live_consensus,
++ mock_networkstatus_get_reasonably_live_consensus_false);
+ ret = hs_client_refetch_hsdesc(&service_pk);
+- UNMOCK(networkstatus_get_live_consensus);
++ UNMOCK(networkstatus_get_reasonably_live_consensus);
+ tt_int_op(ret, OP_EQ, HS_CLIENT_FETCH_MISSING_INFO);
+
+ /* From now on, return a live consensus. */
+- MOCK(networkstatus_get_live_consensus,
+- mock_networkstatus_get_live_consensus);
++ MOCK(networkstatus_get_reasonably_live_consensus,
++ mock_networkstatus_get_reasonably_live_consensus);
+
+ /* 3. Not enough dir information. */
+ MOCK(router_have_minimum_dir_info,
+@@ -682,7 +684,7 @@ test_descriptor_fetch(void *arg)
+
+ done:
+ connection_free_minimal(ENTRY_TO_CONN(ec));
+- UNMOCK(networkstatus_get_live_consensus);
++ UNMOCK(networkstatus_get_reasonably_live_consensus);
+ UNMOCK(router_have_minimum_dir_info);
+ hs_free_all();
+ }
+@@ -880,8 +882,8 @@ test_desc_has_arrived_cleanup(void *arg)
+
+ hs_init();
+
+- MOCK(networkstatus_get_live_consensus,
+- mock_networkstatus_get_live_consensus);
++ MOCK(networkstatus_get_reasonably_live_consensus,
++ mock_networkstatus_get_reasonably_live_consensus);
+ MOCK(connection_mark_unattached_ap_,
+ mock_connection_mark_unattached_ap_);
+ MOCK(router_have_minimum_dir_info,
+@@ -953,7 +955,7 @@ test_desc_has_arrived_cleanup(void *arg)
+ tor_free(desc_str);
+ hs_free_all();
+
+- UNMOCK(networkstatus_get_live_consensus);
++ UNMOCK(networkstatus_get_reasonably_live_consensus);
+ UNMOCK(connection_mark_unattached_ap_);
+ UNMOCK(router_have_minimum_dir_info);
+ }
+@@ -974,8 +976,8 @@ test_close_intro_circuits_new_desc(void *arg)
+
+ /* This is needed because of the client cache expiration timestamp is based
+ * on having a consensus. See cached_client_descriptor_has_expired(). */
+- MOCK(networkstatus_get_live_consensus,
+- mock_networkstatus_get_live_consensus);
++ MOCK(networkstatus_get_reasonably_live_consensus,
++ mock_networkstatus_get_reasonably_live_consensus);
+
+ /* Set consensus time */
+ parse_rfc1123_time("Sat, 26 Oct 1985 13:00:00 UTC",
+@@ -1101,7 +1103,7 @@ test_close_intro_circuits_new_desc(void *arg)
+ hs_descriptor_free(desc1);
+ hs_descriptor_free(desc2);
+ hs_free_all();
+- UNMOCK(networkstatus_get_live_consensus);
++ UNMOCK(networkstatus_get_reasonably_live_consensus);
+ }
+
+ static void
+diff --git a/src/test/test_hs_common.c b/src/test/test_hs_common.c
+index 9202074e25..e3d130fb32 100644
+--- a/src/test/test_hs_common.c
++++ b/src/test/test_hs_common.c
+@@ -360,9 +360,10 @@ mock_networkstatus_get_latest_consensus(void)
+ }
+
+ static networkstatus_t *
+-mock_networkstatus_get_live_consensus(time_t now)
++mock_networkstatus_get_reasonably_live_consensus(time_t now, int flavor)
+ {
+ (void) now;
++ (void) flavor;
+
+ tt_assert(mock_ns);
+
+@@ -382,6 +383,8 @@ test_responsible_hsdirs(void *arg)
+
+ MOCK(networkstatus_get_latest_consensus,
+ mock_networkstatus_get_latest_consensus);
++ MOCK(networkstatus_get_reasonably_live_consensus,
++ mock_networkstatus_get_reasonably_live_consensus);
+
+ ns = networkstatus_get_latest_consensus();
+
+@@ -418,6 +421,8 @@ test_responsible_hsdirs(void *arg)
+ smartlist_clear(ns->routerstatus_list);
+ networkstatus_vote_free(mock_ns);
+ cleanup_nodelist();
++
++ UNMOCK(networkstatus_get_reasonably_live_consensus);
+ }
+
+ static void
+@@ -467,6 +472,8 @@ test_desc_reupload_logic(void *arg)
+
+ hs_init();
+
++ MOCK(networkstatus_get_reasonably_live_consensus,
++ mock_networkstatus_get_reasonably_live_consensus);
+ MOCK(router_have_minimum_dir_info,
+ mock_router_have_minimum_dir_info);
+ MOCK(get_or_state,
+@@ -911,9 +918,11 @@ static smartlist_t *service_responsible_hsdirs = NULL;
+ static smartlist_t *client_responsible_hsdirs = NULL;
+
+ static networkstatus_t *
+-mock_networkstatus_get_live_consensus_service(time_t now)
++mock_networkstatus_get_reasonably_live_consensus_service(time_t now,
++ int flavor)
+ {
+ (void) now;
++ (void) flavor;
+
+ if (mock_service_ns) {
+ return mock_service_ns;
+@@ -929,13 +938,14 @@ mock_networkstatus_get_live_consensus_service(time_t now)
+ static networkstatus_t *
+ mock_networkstatus_get_latest_consensus_service(void)
+ {
+- return mock_networkstatus_get_live_consensus_service(0);
++ return mock_networkstatus_get_reasonably_live_consensus_service(0, 0);
+ }
+
+ static networkstatus_t *
+-mock_networkstatus_get_live_consensus_client(time_t now)
++mock_networkstatus_get_reasonably_live_consensus_client(time_t now, int flavor)
+ {
+ (void) now;
++ (void) flavor;
+
+ if (mock_client_ns) {
+ return mock_client_ns;
+@@ -951,7 +961,7 @@ mock_networkstatus_get_live_consensus_client(time_t now)
+ static networkstatus_t *
+ mock_networkstatus_get_latest_consensus_client(void)
+ {
+- return mock_networkstatus_get_live_consensus_client(0);
++ return mock_networkstatus_get_reasonably_live_consensus_client(0, 0);
+ }
+
+ /* Mock function because we are not trying to test the close circuit that does
+@@ -1411,8 +1421,8 @@ run_reachability_scenario(const reachability_cfg_t *cfg, int num_scenario)
+ * === Client setup ===
+ */
+
+- MOCK(networkstatus_get_live_consensus,
+- mock_networkstatus_get_live_consensus_client);
++ MOCK(networkstatus_get_reasonably_live_consensus,
++ mock_networkstatus_get_reasonably_live_consensus_client);
+ MOCK(networkstatus_get_latest_consensus,
+ mock_networkstatus_get_latest_consensus_client);
+
+@@ -1436,14 +1446,14 @@ run_reachability_scenario(const reachability_cfg_t *cfg, int num_scenario)
+ tt_int_op(smartlist_len(client_responsible_hsdirs), OP_EQ, 6);
+
+ UNMOCK(networkstatus_get_latest_consensus);
+- UNMOCK(networkstatus_get_live_consensus);
++ UNMOCK(networkstatus_get_reasonably_live_consensus);
+
+ /*
+ * === Service setup ===
+ */
+
+- MOCK(networkstatus_get_live_consensus,
+- mock_networkstatus_get_live_consensus_service);
++ MOCK(networkstatus_get_reasonably_live_consensus,
++ mock_networkstatus_get_reasonably_live_consensus_service);
+ MOCK(networkstatus_get_latest_consensus,
+ mock_networkstatus_get_latest_consensus_service);
+
+@@ -1470,7 +1480,7 @@ run_reachability_scenario(const reachability_cfg_t *cfg, int num_scenario)
+ tt_int_op(smartlist_len(service_responsible_hsdirs), OP_EQ, 8);
+
+ UNMOCK(networkstatus_get_latest_consensus);
+- UNMOCK(networkstatus_get_live_consensus);
++ UNMOCK(networkstatus_get_reasonably_live_consensus);
+
+ /* Some testing of the values we just got from the client and service. */
+ tt_mem_op(&client_blinded_pk, OP_EQ, &service_blinded_pk,
+@@ -1721,8 +1731,8 @@ test_client_service_hsdir_set_sync(void *arg)
+
+ MOCK(networkstatus_get_latest_consensus,
+ mock_networkstatus_get_latest_consensus);
+- MOCK(networkstatus_get_live_consensus,
+- mock_networkstatus_get_live_consensus);
++ MOCK(networkstatus_get_reasonably_live_consensus,
++ mock_networkstatus_get_reasonably_live_consensus);
+ MOCK(get_or_state,
+ get_or_state_replacement);
+ MOCK(hs_desc_encode_descriptor,
+diff --git a/src/test/test_hs_service.c b/src/test/test_hs_service.c
+index 80383baff8..630cfef1fe 100644
+--- a/src/test/test_hs_service.c
++++ b/src/test/test_hs_service.c
+@@ -83,9 +83,10 @@
+ static networkstatus_t mock_ns;
+
+ static networkstatus_t *
+-mock_networkstatus_get_live_consensus(time_t now)
++mock_networkstatus_get_reasonably_live_consensus(time_t now, int flavor)
+ {
+ (void) now;
++ (void) flavor;
+ return &mock_ns;
+ }
+
+@@ -1375,8 +1376,8 @@ test_rotate_descriptors(void *arg)
+ hs_init();
+ MOCK(get_or_state, get_or_state_replacement);
+ MOCK(circuit_mark_for_close_, mock_circuit_mark_for_close);
+- MOCK(networkstatus_get_live_consensus,
+- mock_networkstatus_get_live_consensus);
++ MOCK(networkstatus_get_reasonably_live_consensus,
++ mock_networkstatus_get_reasonably_live_consensus);
+
+ /* Descriptor rotation happens with a consensus with a new SRV. */
+
+@@ -1464,7 +1465,7 @@ test_rotate_descriptors(void *arg)
+ hs_free_all();
+ UNMOCK(get_or_state);
+ UNMOCK(circuit_mark_for_close_);
+- UNMOCK(networkstatus_get_live_consensus);
++ UNMOCK(networkstatus_get_reasonably_live_consensus);
+ }
+
+ /** Test building descriptors: picking intro points, setting up their link
+@@ -1484,8 +1485,8 @@ test_build_update_descriptors(void *arg)
+
+ MOCK(get_or_state,
+ get_or_state_replacement);
+- MOCK(networkstatus_get_live_consensus,
+- mock_networkstatus_get_live_consensus);
++ MOCK(networkstatus_get_reasonably_live_consensus,
++ mock_networkstatus_get_reasonably_live_consensus);
+
+ dummy_state = or_state_new();
+
+@@ -1715,8 +1716,8 @@ test_build_descriptors(void *arg)
+
+ MOCK(get_or_state,
+ get_or_state_replacement);
+- MOCK(networkstatus_get_live_consensus,
+- mock_networkstatus_get_live_consensus);
++ MOCK(networkstatus_get_reasonably_live_consensus,
++ mock_networkstatus_get_reasonably_live_consensus);
+
+ dummy_state = or_state_new();
+
+@@ -1816,8 +1817,8 @@ test_upload_descriptors(void *arg)
+ hs_init();
+ MOCK(get_or_state,
+ get_or_state_replacement);
+- MOCK(networkstatus_get_live_consensus,
+- mock_networkstatus_get_live_consensus);
++ MOCK(networkstatus_get_reasonably_live_consensus,
++ mock_networkstatus_get_reasonably_live_consensus);
+
+ dummy_state = or_state_new();
+
+diff --git a/src/test/test_shared_random.c b/src/test/test_shared_random.c
+index 148eb5cf90..9e49e835c9 100644
+--- a/src/test/test_shared_random.c
++++ b/src/test/test_shared_random.c
+@@ -167,6 +167,15 @@ mock_networkstatus_get_live_consensus(time_t now)
+ return &mock_consensus;
+ }
+
++/* Mock function to immediately return our local 'mock_consensus'. */
++static networkstatus_t *
++mock_networkstatus_get_reasonably_live_consensus(time_t now, int flavor)
++{
++ (void) now;
++ (void) flavor;
++ return &mock_consensus;
++}
++
+ static void
+ test_get_state_valid_until_time(void *arg)
+ {
+@@ -179,6 +188,8 @@ test_get_state_valid_until_time(void *arg)
+
+ MOCK(networkstatus_get_live_consensus,
+ mock_networkstatus_get_live_consensus);
++ MOCK(networkstatus_get_reasonably_live_consensus,
++ mock_networkstatus_get_reasonably_live_consensus);
+
+ retval = parse_rfc1123_time("Mon, 20 Apr 2015 01:00:00 UTC",
+ &mock_consensus.fresh_until);
+@@ -235,7 +246,7 @@ test_get_state_valid_until_time(void *arg)
+ }
+
+ done:
+- UNMOCK(networkstatus_get_live_consensus);
++ UNMOCK(networkstatus_get_reasonably_live_consensus);
+ }
+
+ /** Test the function that calculates the start time of the current SRV
+@@ -251,6 +262,8 @@ test_get_start_time_of_current_run(void *arg)
+
+ MOCK(networkstatus_get_live_consensus,
+ mock_networkstatus_get_live_consensus);
++ MOCK(networkstatus_get_reasonably_live_consensus,
++ mock_networkstatus_get_reasonably_live_consensus);
+
+ retval = parse_rfc1123_time("Mon, 20 Apr 2015 01:00:00 UTC",
+ &mock_consensus.fresh_until);
+@@ -335,6 +348,7 @@ test_get_start_time_of_current_run(void *arg)
+ /* Next test is testing it without a consensus to use the testing voting
+ * interval . */
+ UNMOCK(networkstatus_get_live_consensus);
++ UNMOCK(networkstatus_get_reasonably_live_consensus);
+
+ /* Now let's alter the voting schedule and check the correctness of the
+ * function. Voting interval of 10 seconds, means that an SRV protocol run
+@@ -366,8 +380,8 @@ test_get_start_time_functions(void *arg)
+ (void) arg;
+ int retval;
+
+- MOCK(networkstatus_get_live_consensus,
+- mock_networkstatus_get_live_consensus);
++ MOCK(networkstatus_get_reasonably_live_consensus,
++ mock_networkstatus_get_reasonably_live_consensus);
+
+ retval = parse_rfc1123_time("Mon, 20 Apr 2015 01:00:00 UTC",
+ &mock_consensus.fresh_until);
+@@ -388,7 +402,7 @@ test_get_start_time_functions(void *arg)
+ start_time_of_protocol_run);
+
+ done:
+- UNMOCK(networkstatus_get_live_consensus);
++ UNMOCK(networkstatus_get_reasonably_live_consensus);
+ }
+
+ static void
+--
+2.25.1
+
diff --git a/projects/tor/0002-tests-Fix-unit-tests-after-merge-of-40237.patch b/projects/tor/0002-tests-Fix-unit-tests-after-merge-of-40237.patch
new file mode 100644
index 0000000..32e6812
--- /dev/null
+++ b/projects/tor/0002-tests-Fix-unit-tests-after-merge-of-40237.patch
@@ -0,0 +1,97 @@
+From 10acc0ce99283ed0aa5c6c5d203f1b0514e60f4a Mon Sep 17 00:00:00 2001
+From: David Goulet <dgoulet(a)torproject.org>
+Date: Tue, 12 Jan 2021 10:50:01 -0500
+Subject: [PATCH 2/3] tests: Fix unit tests after merge of #40237
+
+
+diff --git a/src/test/test_hs_cache.c b/src/test/test_hs_cache.c
+index 379f23ec72..df96b2c791 100644
+--- a/src/test/test_hs_cache.c
++++ b/src/test/test_hs_cache.c
+@@ -590,8 +590,8 @@ test_client_cache_decrypt(void *arg)
+ /* Initialize HSDir cache subsystem */
+ hs_init();
+
+- MOCK(networkstatus_get_live_consensus,
+- mock_networkstatus_get_live_consensus);
++ MOCK(networkstatus_get_reasonably_live_consensus,
++ mock_networkstatus_get_reasonably_live_consensus);
+
+ /* Set consensus time */
+ parse_rfc1123_time("Sat, 26 Oct 1985 13:00:00 UTC",
+@@ -646,7 +646,7 @@ test_client_cache_decrypt(void *arg)
+
+ hs_free_all();
+
+- UNMOCK(networkstatus_get_live_consensus);
++ UNMOCK(networkstatus_get_reasonably_live_consensus);
+ }
+
+ static void
+@@ -660,8 +660,8 @@ test_client_cache_remove(void *arg)
+
+ hs_init();
+
+- MOCK(networkstatus_get_live_consensus,
+- mock_networkstatus_get_live_consensus);
++ MOCK(networkstatus_get_reasonably_live_consensus,
++ mock_networkstatus_get_reasonably_live_consensus);
+
+ /* Set consensus time. Lookup will not return the entry if it has expired
+ * and it is checked against the consensus valid_after time. */
+@@ -699,7 +699,7 @@ test_client_cache_remove(void *arg)
+ hs_descriptor_free(desc1);
+ hs_free_all();
+
+- UNMOCK(networkstatus_get_live_consensus);
++ UNMOCK(networkstatus_get_reasonably_live_consensus);
+ }
+
+ struct testcase_t hs_cache[] = {
+diff --git a/src/test/test_hs_client.c b/src/test/test_hs_client.c
+index fd84293dc2..0cd7d81eea 100644
+--- a/src/test/test_hs_client.c
++++ b/src/test/test_hs_client.c
+@@ -1122,8 +1122,8 @@ test_close_intro_circuits_cache_clean(void *arg)
+
+ /* This is needed because of the client cache expiration timestamp is based
+ * on having a consensus. See cached_client_descriptor_has_expired(). */
+- MOCK(networkstatus_get_live_consensus,
+- mock_networkstatus_get_live_consensus);
++ MOCK(networkstatus_get_reasonably_live_consensus,
++ mock_networkstatus_get_reasonably_live_consensus);
+
+ /* Set consensus time */
+ parse_rfc1123_time("Sat, 26 Oct 1985 13:00:00 UTC",
+@@ -1188,7 +1188,7 @@ test_close_intro_circuits_cache_clean(void *arg)
+ hs_descriptor_free(desc1);
+ hs_free_all();
+ rend_cache_free_all();
+- UNMOCK(networkstatus_get_live_consensus);
++ UNMOCK(networkstatus_get_reasonably_live_consensus);
+ }
+
+ static void
+@@ -1209,8 +1209,8 @@ test_socks_hs_errors(void *arg)
+
+ (void) arg;
+
+- MOCK(networkstatus_get_live_consensus,
+- mock_networkstatus_get_live_consensus);
++ MOCK(networkstatus_get_reasonably_live_consensus,
++ mock_networkstatus_get_reasonably_live_consensus);
+ MOCK(connection_mark_unattached_ap_,
+ mock_connection_mark_unattached_ap_no_close);
+ MOCK(read_file_to_str, mock_read_file_to_str);
+@@ -1358,7 +1358,7 @@ test_socks_hs_errors(void *arg)
+
+ hs_free_all();
+
+- UNMOCK(networkstatus_get_live_consensus);
++ UNMOCK(networkstatus_get_reasonably_live_consensus);
+ UNMOCK(connection_mark_unattached_ap_);
+ UNMOCK(read_file_to_str);
+ UNMOCK(tor_listdir);
+--
+2.25.1
+
diff --git a/projects/tor/0003-Pick-up-merge-conflict-resolutions.patch b/projects/tor/0003-Pick-up-merge-conflict-resolutions.patch
new file mode 100644
index 0000000..dcc8b52
--- /dev/null
+++ b/projects/tor/0003-Pick-up-merge-conflict-resolutions.patch
@@ -0,0 +1,82 @@
+From 2deca96cb8836a95095354cc717e1738f10b8ce1 Mon Sep 17 00:00:00 2001
+From: Matthew Finkel <sysrqb(a)torproject.org>
+Date: Mon, 1 Feb 2021 21:03:54 +0000
+Subject: [PATCH 3/3] Pick up merge conflict resolutions
+
+
+diff --git a/src/feature/hs/hs_service.c b/src/feature/hs/hs_service.c
+index 2f3f45f252..c29f39c6b4 100644
+--- a/src/feature/hs/hs_service.c
++++ b/src/feature/hs/hs_service.c
+@@ -3192,6 +3192,9 @@ should_service_upload_descriptor(const hs_service_t *service,
+ /* Don't upload desc if we don't have a live consensus */
+ if (!networkstatus_get_reasonably_live_consensus(now,
+ usable_consensus_flavor())) {
++ msg = tor_strdup("No reasonably live consensus");
++ log_cant_upload_desc(service, desc, msg,
++ LOG_DESC_UPLOAD_REASON_NO_LIVE_CONSENSUS);
+ goto cannot;
+ }
+
+diff --git a/src/test/test_hs_service.c b/src/test/test_hs_service.c
+index 630cfef1fe..8b94bb6cf1 100644
+--- a/src/test/test_hs_service.c
++++ b/src/test/test_hs_service.c
+@@ -91,9 +91,10 @@ mock_networkstatus_get_reasonably_live_consensus(time_t now, int flavor)
+ }
+
+ static networkstatus_t *
+-mock_networkstatus_get_live_consensus_null(time_t now)
++mock_networkstatus_get_reasonably_live_consensus_null(time_t now, int flavor)
+ {
+ (void) now;
++ (void) flavor;
+ return NULL;
+ }
+
+@@ -2554,8 +2555,8 @@ test_cannot_upload_descriptors(void *arg)
+ hs_init();
+ MOCK(get_or_state,
+ get_or_state_replacement);
+- MOCK(networkstatus_get_live_consensus,
+- mock_networkstatus_get_live_consensus);
++ MOCK(networkstatus_get_reasonably_live_consensus,
++ mock_networkstatus_get_reasonably_live_consensus);
+
+ dummy_state = or_state_new();
+
+@@ -2631,17 +2632,17 @@ test_cannot_upload_descriptors(void *arg)
+
+ /* 4. Testing missing live consensus. */
+ {
+- MOCK(networkstatus_get_live_consensus,
+- mock_networkstatus_get_live_consensus_null);
++ MOCK(networkstatus_get_reasonably_live_consensus,
++ mock_networkstatus_get_reasonably_live_consensus_null);
+ setup_full_capture_of_logs(LOG_INFO);
+ run_upload_descriptor_event(now);
+ expect_log_msg_containing(
+ "Service [scrubbed] can't upload its current descriptor: "
+- "No live consensus");
++ "No reasonably live consensus");
+ teardown_capture_of_logs();
+ /* Reset. */
+- MOCK(networkstatus_get_live_consensus,
+- mock_networkstatus_get_live_consensus);
++ MOCK(networkstatus_get_reasonably_live_consensus,
++ mock_networkstatus_get_reasonably_live_consensus);
+ }
+
+ /* 5. Test missing minimum directory information. */
+@@ -2680,7 +2681,7 @@ test_cannot_upload_descriptors(void *arg)
+ done:
+ hs_free_all();
+ UNMOCK(count_desc_circuit_established);
+- UNMOCK(networkstatus_get_live_consensus);
++ UNMOCK(networkstatus_get_reasonably_live_consensus);
+ UNMOCK(get_or_state);
+ }
+
+--
+2.25.1
+
diff --git a/projects/tor/build b/projects/tor/build
index c7e9190..219301a 100644
--- a/projects/tor/build
+++ b/projects/tor/build
@@ -93,6 +93,10 @@ openssldir=/var/tmp/dist/openssl/openssl
[% END %]
cd /var/tmp/build/[% project %]-[% c('version') %]
+# Patch Tor 0.4.4.6 with the fix for tpo/core/tor#40237
+patch -p1 < $rootdir/0001-hs-v3-Require-reasonably-live-consensus.patch
+patch -p1 < $rootdir/0002-tests-Fix-unit-tests-after-merge-of-40237.patch
+patch -p1 < $rootdir/0003-Pick-up-merge-conflict-resolutions.patch
# add git hash to micro-revision.i for #24995
echo '"[% c("abbrev", { abbrev_length => 16 }) %]"' > micro-revision.i
./autogen.sh
diff --git a/projects/tor/config b/projects/tor/config
index 3050d7d..1a53d39 100644
--- a/projects/tor/config
+++ b/projects/tor/config
@@ -68,3 +68,6 @@ input_files:
- name: zstd
project: zstd
enable: '[% c("var/android") %]'
+ - filename: '0001-hs-v3-Require-reasonably-live-consensus.patch'
+ - filename: '0002-tests-Fix-unit-tests-after-merge-of-40237.patch'
+ - filename: '0003-Pick-up-merge-conflict-resolutions.patch'
1
0
02 Feb '21
commit 2c784b891a3f8d8bafe7dd40cd4349342b5792bb
Author: Georg Koppen <gk(a)torproject.org>
Date: Tue Feb 2 08:21:42 2021 +0000
Bump NoScript version to 11.2
---
projects/tor-browser/config | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/projects/tor-browser/config b/projects/tor-browser/config
index 4111d63..b5b4470 100644
--- a/projects/tor-browser/config
+++ b/projects/tor-browser/config
@@ -78,9 +78,9 @@ input_files:
enable: '[% c("var/snowflake") && ! c("var/android") %]'
- filename: Bundle-Data
enable: '[% ! c("var/android") %]'
- - URL: https://addons.cdn.mozilla.net/user-media/addons/722/noscript_security_suit…
+ - URL: https://addons.cdn.mozilla.net/user-media/addons/722/noscript_security_suit…
name: noscript
- sha256sum: 5f68a63637e286433089aeb3b6a0aa930317dd988184876b5d6dcff2ca07bb34
+ sha256sum: 4258bcd0bcdfc8ecb231d250e3adf1c477a1a672ede74a5cd10ba05a5381babb
- filename: 'RelativeLink/start-tor-browser.desktop'
enable: '[% c("var/linux") %]'
- filename: 'RelativeLink/execdesktop'
1
0
[tor-browser-build/master] Bump HTTPS Everywhere version to 2021.1.27
by gkï¼ torproject.org 02 Feb '21
by gkï¼ torproject.org 02 Feb '21
02 Feb '21
commit fb8c34548414ab3208e7e01a46a711220fc52684
Author: Georg Koppen <gk(a)torproject.org>
Date: Tue Feb 2 08:19:59 2021 +0000
Bump HTTPS Everywhere version to 2021.1.27
---
projects/https-everywhere/config | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/projects/https-everywhere/config b/projects/https-everywhere/config
index 255d36f..5ef51dd 100644
--- a/projects/https-everywhere/config
+++ b/projects/https-everywhere/config
@@ -1,5 +1,5 @@
# vim: filetype=yaml sw=2
-version: 2020.11.17
+version: 2021.1.27
git_url: https://git.torproject.org/https-everywhere.git
git_hash: '[% c("version") %]'
git_submodule: 1
1
0
02 Feb '21
commit e71d7141310186fe22078d0971a21d67c470153d
Author: Matthew Finkel <sysrqb(a)torproject.org>
Date: Tue Feb 2 05:53:51 2021 +0000
Bug 40214: Update AMO Collection URL
---
tools/fetch_allowed_addons.py | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/tools/fetch_allowed_addons.py b/tools/fetch_allowed_addons.py
index 065e490..ff82537 100755
--- a/tools/fetch_allowed_addons.py
+++ b/tools/fetch_allowed_addons.py
@@ -31,7 +31,7 @@ def patch_https_everywhere(addons):
def main(argv):
amo_collection = argv[0] if argv else '83a9cccfe6e24a34bd7b155ff9ee32'
- url = 'https://addons.mozilla.org/api/v4/accounts/account/mozilla/collections/' + amo_collection + '/addons/'
+ url = 'https://services.addons.mozilla.org/api/v4/accounts/account/mozilla/collect…' + amo_collection + '/addons/'
data = json.loads(fetch(url))
fetch_and_embed_icons(data)
patch_https_everywhere(data)
1
0
commit 9dc29fad2c6ab245f8519c1528b50b95647f2dc2
Author: Georg Koppen <gk(a)torproject.org>
Date: Tue Feb 2 08:17:26 2021 +0000
Update allowed_addons.json
---
projects/tor-browser/allowed_addons.json | 278 +++++++++++++++----------------
1 file changed, 139 insertions(+), 139 deletions(-)
diff --git a/projects/tor-browser/allowed_addons.json b/projects/tor-browser/allowed_addons.json
index e9e5d9d..ad64dea 100644
--- a/projects/tor-browser/allowed_addons.json
+++ b/projects/tor-browser/allowed_addons.json
@@ -12,12 +12,12 @@
{
"id": 13299734,
"name": "Alexander Shutau",
- "url": "https://addons.mozilla.org/en-US/android/user/13299734/",
+ "url": "https://addons.mozilla.org/en-US/firefox/user/13299734/",
"username": "alexanderby",
"picture_url": "https://addons.cdn.mozilla.net/user-media/userpics/13/13299/13299734.png?mo…"
}
],
- "average_daily_users": 566381,
+ "average_daily_users": 577081,
"categories": {
"android": [
"experimental",
@@ -54,7 +54,7 @@
"platform": "all",
"size": 518564,
"status": "public",
- "url": "https://addons.mozilla.org/android/downloads/file/3712931/dark_reader-4.9.2…",
+ "url": "https://addons.mozilla.org/firefox/downloads/file/3712931/dark_reader-4.9.2…",
"permissions": [
"storage",
"tabs",
@@ -237,12 +237,12 @@
"category": "recommended"
},
"ratings": {
- "average": 4.5614,
- "bayesian_average": 4.5597207572687815,
- "count": 3258,
- "text_count": 1077
+ "average": 4.5585,
+ "bayesian_average": 4.556835213074099,
+ "count": 3293,
+ "text_count": 1090
},
- "ratings_url": "https://addons.mozilla.org/en-US/android/addon/darkreader/reviews/",
+ "ratings_url": "https://addons.mozilla.org/en-US/firefox/addon/darkreader/reviews/",
"requires_payment": false,
"review_url": "https://addons.mozilla.org/en-US/reviewers/review/855413",
"slug": "darkreader",
@@ -335,8 +335,8 @@
"theme"
],
"type": "extension",
- "url": "https://addons.mozilla.org/en-US/android/addon/darkreader/",
- "weekly_downloads": 25282
+ "url": "https://addons.mozilla.org/en-US/firefox/addon/darkreader/",
+ "weekly_downloads": 26593
},
"notes": null
},
@@ -347,12 +347,12 @@
{
"id": 5474073,
"name": "EFF Technologists",
- "url": "https://addons.mozilla.org/en-US/android/user/5474073/",
+ "url": "https://addons.mozilla.org/en-US/firefox/user/5474073/",
"username": "eff-technologists",
"picture_url": "https://addons.cdn.mozilla.net/user-media/userpics/5/5474/5474073.png?modif…"
}
],
- "average_daily_users": 739840,
+ "average_daily_users": 743583,
"categories": {
"firefox": [
"privacy-security"
@@ -361,7 +361,7 @@
"contributions_url": "https://www.paypal.me/SupportEFF?utm_content=product-page-contribute&utm_me…",
"created": "2010-09-16T15:09:10Z",
"current_version": {
- "id": 5135114,
+ "id": 5172099,
"compatibility": {
"firefox": {
"min": "42.0",
@@ -372,19 +372,19 @@
"max": "*"
}
},
- "edit_url": "https://addons.mozilla.org/en-US/developers/addon/https-everywhere/versions…",
+ "edit_url": "https://addons.mozilla.org/en-US/developers/addon/https-everywhere/versions…",
"files": [
{
- "id": 3679479,
- "created": "2020-11-16T23:33:04Z",
- "hash": "sha256:a6ebcb0a05607e54e7a9fc0b5b3832eda6f13f8dce2ee802164a455919e385c9",
+ "id": 3716461,
+ "created": "2021-01-28T01:33:53Z",
+ "hash": "sha256:da049748bba7282c0f8c0ab85ac8f494e795e79d6bdc6f9f726d687aa8cc2a1f",
"is_restart_required": false,
"is_webextension": true,
"is_mozilla_signed_extension": false,
"platform": "all",
- "size": 1745655,
+ "size": 1748610,
"status": "public",
- "url": "https://addons.mozilla.org/android/downloads/file/3679479/https_everywhere-…",
+ "url": "https://addons.mozilla.org/firefox/downloads/file/3716461/https_everywhere-…",
"permissions": [
"webNavigation",
"webRequest",
@@ -405,13 +405,13 @@
"name": {
"en-US": "Multiple"
},
- "url": "https://addons.mozilla.org/en-US/android/addon/https-everywhere/license/202…"
+ "url": "https://addons.mozilla.org/en-US/firefox/addon/https-everywhere/license/202…"
},
"release_notes": {
- "en-US": "* Copy URL ability in EASE interstitial\n* Dependapot NPM updates\n* CRX distribution scripts for transparency for Edge and Opera\n* Port inclusion on allowlist for EASE\n* UI change to reflect a global setting"
+ "en-US": "2021.1.27\n* EASE Mode UI Changes\n* NPM Dependency updates\n* Geckodriver pull update\n* Chromedriver pull update\n* Integrate CSS Grid for Options Page and EASE UI\n* Put Options in new tab"
},
"reviewed": null,
- "version": "2020.11.17"
+ "version": "2021.1.27"
},
"default_locale": "en-US",
"description": {
@@ -447,7 +447,7 @@
},
"is_disabled": false,
"is_experimental": false,
- "last_updated": "2020-11-17T09:09:47Z",
+ "last_updated": "2021-01-28T11:24:44Z",
"name": {
"de": "HTTPS Everywhere",
"en-US": "HTTPS Everywhere",
@@ -482,12 +482,12 @@
"category": "recommended"
},
"ratings": {
- "average": 4.6133,
- "bayesian_average": 4.610763496975475,
- "count": 2185,
+ "average": 4.6136,
+ "bayesian_average": 4.611070111786746,
+ "count": 2197,
"text_count": 554
},
- "ratings_url": "https://addons.mozilla.org/en-US/android/addon/https-everywhere/reviews/",
+ "ratings_url": "https://addons.mozilla.org/en-US/firefox/addon/https-everywhere/reviews/",
"requires_payment": false,
"review_url": "https://addons.mozilla.org/en-US/reviewers/review/229918",
"slug": "https-everywhere",
@@ -518,7 +518,7 @@
],
"type": "extension",
"url": "https://www.eff.org/https-everywhere",
- "weekly_downloads": 17897
+ "weekly_downloads": 18225
},
"notes": null
},
@@ -529,12 +529,12 @@
{
"id": 6937656,
"name": "Thomas Rientjes",
- "url": "https://addons.mozilla.org/en-US/android/user/6937656/",
+ "url": "https://addons.mozilla.org/en-US/firefox/user/6937656/",
"username": "Synzvato",
"picture_url": "https://addons.cdn.mozilla.net/user-media/userpics/6/6937/6937656.png?modif…"
}
],
- "average_daily_users": 202121,
+ "average_daily_users": 204179,
"categories": {
"android": [
"security-privacy"
@@ -569,7 +569,7 @@
"platform": "all",
"size": 6857292,
"status": "public",
- "url": "https://addons.mozilla.org/android/downloads/file/3672658/decentraleyes-2.0…",
+ "url": "https://addons.mozilla.org/firefox/downloads/file/3672658/decentraleyes-2.0…",
"permissions": [
"*://*/*",
"privacy",
@@ -747,12 +747,12 @@
"category": "recommended"
},
"ratings": {
- "average": 4.8002,
- "bayesian_average": 4.7954104566041265,
- "count": 1211,
- "text_count": 306
+ "average": 4.801,
+ "bayesian_average": 4.796215721212788,
+ "count": 1216,
+ "text_count": 307
},
- "ratings_url": "https://addons.mozilla.org/en-US/android/addon/decentraleyes/reviews/",
+ "ratings_url": "https://addons.mozilla.org/en-US/firefox/addon/decentraleyes/reviews/",
"requires_payment": false,
"review_url": "https://addons.mozilla.org/en-US/reviewers/review/521554",
"slug": "decentraleyes",
@@ -844,8 +844,8 @@
"tracking"
],
"type": "extension",
- "url": "https://addons.mozilla.org/en-US/android/addon/decentraleyes/",
- "weekly_downloads": 6066
+ "url": "https://addons.mozilla.org/en-US/firefox/addon/decentraleyes/",
+ "weekly_downloads": 6199
},
"notes": null
},
@@ -856,12 +856,12 @@
{
"id": 5474073,
"name": "EFF Technologists",
- "url": "https://addons.mozilla.org/en-US/android/user/5474073/",
+ "url": "https://addons.mozilla.org/en-US/firefox/user/5474073/",
"username": "eff-technologists",
"picture_url": "https://addons.cdn.mozilla.net/user-media/userpics/5/5474/5474073.png?modif…"
}
],
- "average_daily_users": 976267,
+ "average_daily_users": 988059,
"categories": {
"android": [
"security-privacy"
@@ -896,7 +896,7 @@
"platform": "all",
"size": 1277059,
"status": "public",
- "url": "https://addons.mozilla.org/android/downloads/file/3691765/privacy_badger-20…",
+ "url": "https://addons.mozilla.org/firefox/downloads/file/3691765/privacy_badger-20…",
"permissions": [
"tabs",
"http://*/*",
@@ -1405,12 +1405,12 @@
"category": "recommended"
},
"ratings": {
- "average": 4.7834,
- "bayesian_average": 4.780097856300104,
- "count": 1750,
- "text_count": 413
+ "average": 4.7854,
+ "bayesian_average": 4.7821169191877395,
+ "count": 1766,
+ "text_count": 412
},
- "ratings_url": "https://addons.mozilla.org/en-US/android/addon/privacy-badger17/reviews/",
+ "ratings_url": "https://addons.mozilla.org/en-US/firefox/addon/privacy-badger17/reviews/",
"requires_payment": false,
"review_url": "https://addons.mozilla.org/en-US/reviewers/review/506646",
"slug": "privacy-badger17",
@@ -1426,8 +1426,8 @@
},
"tags": [],
"type": "extension",
- "url": "https://addons.mozilla.org/en-US/android/addon/privacy-badger17/",
- "weekly_downloads": 38261
+ "url": "https://addons.mozilla.org/en-US/firefox/addon/privacy-badger17/",
+ "weekly_downloads": 39655
},
"notes": null
},
@@ -1438,12 +1438,12 @@
{
"id": 11423598,
"name": "Raymond Hill",
- "url": "https://addons.mozilla.org/en-US/android/user/11423598/",
+ "url": "https://addons.mozilla.org/en-US/firefox/user/11423598/",
"username": "gorhill",
"picture_url": null
}
],
- "average_daily_users": 4971335,
+ "average_daily_users": 4974716,
"categories": {
"android": [
"security-privacy"
@@ -1455,30 +1455,30 @@
"contributions_url": "",
"created": "2015-04-25T07:26:22Z",
"current_version": {
- "id": 5156717,
+ "id": 5174693,
"compatibility": {
"firefox": {
- "min": "55.0",
+ "min": "57.0",
"max": "*"
},
"android": {
- "min": "55.0",
+ "min": "57.0",
"max": "*"
}
},
- "edit_url": "https://addons.mozilla.org/en-US/developers/addon/ublock-origin/versions/51…",
+ "edit_url": "https://addons.mozilla.org/en-US/developers/addon/ublock-origin/versions/51…",
"files": [
{
- "id": 3701081,
- "created": "2020-12-29T13:58:02Z",
- "hash": "sha256:5b94fd7f749319a6ff6d83dd20b05b29e733446465aff2ab7669499a3e8fb9cc",
+ "id": 3719054,
+ "created": "2021-02-01T14:04:16Z",
+ "hash": "sha256:5c3a5ef6f5b5475895053238026360020d6793b05541d20032ea9dd1c9cae451",
"is_restart_required": false,
"is_webextension": true,
"is_mozilla_signed_extension": false,
"platform": "all",
- "size": 2748800,
+ "size": 2742973,
"status": "public",
- "url": "https://addons.mozilla.org/android/downloads/file/3701081/ublock_origin-1.3…",
+ "url": "https://addons.mozilla.org/firefox/downloads/file/3719054/ublock_origin-1.3…",
"permissions": [
"dns",
"menus",
@@ -1534,10 +1534,10 @@
"url": "http://www.gnu.org/licenses/gpl-3.0.html"
},
"release_notes": {
- "en-US": "<a href=\"https://outgoing.prod.mozaws.net/v1/9fa7d3c9ad42a6b694799cc29274f9b7089f1e6…" rel=\"nofollow\">Complete release notes</a>.\n\n<b>Closed as fixed:</b>\n\n<ul><li><a href=\"https://outgoing.prod.mozaws.net/v1/396d45d7f82e1bf630b3f16ab1f6be4d60ae2d0…" rel=\"nofollow\">Problems with asterisk in the destination of hostname-based rules</a></li></ul>\n<a href=\"https://outgoing.prod.mozaws.net/v1/345396c53b050d1081014dc73d56f95d30eb255…" rel=\"nofollow\">Commits history since 1.32.2</a>."
+ "en-US": "<a href=\"https://outgoing.prod.mozaws.net/v1/a24fd1d9a1598d49cdc2cdc6d3ecd4359712543…" rel=\"nofollow\">Complete release notes</a>.\n\n<b>Closed as fixed:</b>\n\n<ul><li><a href=\"https://outgoing.prod.mozaws.net/v1/0e94bcfacc284b39a3164377711e52b9ded21cd…" rel=\"nofollow\">After downgrading to 1.32.4, uBO is broken</a></li><li><a href=\"https://outgoing.prod.mozaws.net/v1/88ab9531e629dc0a259dbe61b357b13316fa1a9…" rel=\"nofollow\">Whitelisting a site on Chromium Edge still blocks resources fetched by service worker</a></li></ul>\n<a href=\"https://outgoing.prod.mozaws.net/v1/35c6fcff904629a7392564335b09eb1fe5f661f…" rel=\"nofollow
\">Commits history since 1.33.0</a>."
},
"reviewed": null,
- "version": "1.32.4"
+ "version": "1.33.2"
},
"default_locale": "en-US",
"description": {
@@ -1627,7 +1627,7 @@
},
"is_disabled": false,
"is_experimental": false,
- "last_updated": "2021-01-22T14:50:11Z",
+ "last_updated": "2021-02-02T00:55:07Z",
"name": {
"ar": "uBlock Origin",
"bg": "uBlock Origin",
@@ -1772,12 +1772,12 @@
"category": "recommended"
},
"ratings": {
- "average": 4.7336,
- "bayesian_average": 4.733167443332824,
- "count": 13208,
- "text_count": 4402
+ "average": 4.7334,
+ "bayesian_average": 4.732968759522842,
+ "count": 13285,
+ "text_count": 4420
},
- "ratings_url": "https://addons.mozilla.org/en-US/android/addon/ublock-origin/reviews/",
+ "ratings_url": "https://addons.mozilla.org/en-US/firefox/addon/ublock-origin/reviews/",
"requires_payment": false,
"review_url": "https://addons.mozilla.org/en-US/reviewers/review/607454",
"slug": "ublock-origin",
@@ -1828,8 +1828,8 @@
},
"tags": [],
"type": "extension",
- "url": "https://addons.mozilla.org/en-US/android/addon/ublock-origin/",
- "weekly_downloads": 118274
+ "url": "https://addons.mozilla.org/en-US/firefox/addon/ublock-origin/",
+ "weekly_downloads": 124198
},
"notes": null
},
@@ -1840,12 +1840,12 @@
{
"id": 11797710,
"name": "JanH",
- "url": "https://addons.mozilla.org/en-US/android/user/11797710/",
+ "url": "https://addons.mozilla.org/en-US/firefox/user/11797710/",
"username": "JanH",
"picture_url": null
}
],
- "average_daily_users": 55478,
+ "average_daily_users": 58394,
"categories": {
"android": [
"photos-media"
@@ -1876,7 +1876,7 @@
"platform": "all",
"size": 11927,
"status": "public",
- "url": "https://addons.mozilla.org/android/downloads/file/3630185/videowiedergabe_i…",
+ "url": "https://addons.mozilla.org/firefox/downloads/file/3630185/videowiedergabe_i…",
"permissions": [
"*://*.youtube.com/*",
"*://*.youtube-nocookie.com/*",
@@ -1958,12 +1958,12 @@
"category": "recommended"
},
"ratings": {
- "average": 4.5087,
- "bayesian_average": 4.503205611529312,
- "count": 979,
- "text_count": 369
+ "average": 4.5107,
+ "bayesian_average": 4.505196681975634,
+ "count": 983,
+ "text_count": 372
},
- "ratings_url": "https://addons.mozilla.org/en-US/android/addon/video-background-play-fix/re…",
+ "ratings_url": "https://addons.mozilla.org/en-US/firefox/addon/video-background-play-fix/re…",
"requires_payment": false,
"review_url": "https://addons.mozilla.org/en-US/reviewers/review/811592",
"slug": "video-background-play-fix",
@@ -1985,8 +1985,8 @@
"youtube"
],
"type": "extension",
- "url": "https://addons.mozilla.org/en-US/android/addon/video-background-play-fix/",
- "weekly_downloads": 59
+ "url": "https://addons.mozilla.org/en-US/firefox/addon/video-background-play-fix/",
+ "weekly_downloads": 32
},
"notes": null
},
@@ -1997,12 +1997,12 @@
{
"id": 12808157,
"name": "cowlicks",
- "url": "https://addons.mozilla.org/en-US/android/user/12808157/",
+ "url": "https://addons.mozilla.org/en-US/firefox/user/12808157/",
"username": "cowlicks",
"picture_url": null
}
],
- "average_daily_users": 95688,
+ "average_daily_users": 95533,
"categories": {
"android": [
"experimental",
@@ -2038,7 +2038,7 @@
"platform": "all",
"size": 284724,
"status": "public",
- "url": "https://addons.mozilla.org/android/downloads/file/3360398/privacy_possum-20…",
+ "url": "https://addons.mozilla.org/firefox/downloads/file/3360398/privacy_possum-20…",
"permissions": [
"tabs",
"http://*/*",
@@ -2141,12 +2141,12 @@
"category": "recommended"
},
"ratings": {
- "average": 4.4829,
- "bayesian_average": 4.46463504208983,
- "count": 292,
- "text_count": 82
+ "average": 4.4864,
+ "bayesian_average": 4.468197845946811,
+ "count": 294,
+ "text_count": 83
},
- "ratings_url": "https://addons.mozilla.org/en-US/android/addon/privacy-possum/reviews/",
+ "ratings_url": "https://addons.mozilla.org/en-US/firefox/addon/privacy-possum/reviews/",
"requires_payment": false,
"review_url": "https://addons.mozilla.org/en-US/reviewers/review/953945",
"slug": "privacy-possum",
@@ -2168,8 +2168,8 @@
"tracking"
],
"type": "extension",
- "url": "https://addons.mozilla.org/en-US/android/addon/privacy-possum/",
- "weekly_downloads": 1591
+ "url": "https://addons.mozilla.org/en-US/firefox/addon/privacy-possum/",
+ "weekly_downloads": 1565
},
"notes": null
},
@@ -2180,12 +2180,12 @@
{
"id": 12929064,
"name": "Armin Sebastian",
- "url": "https://addons.mozilla.org/en-US/android/user/12929064/",
+ "url": "https://addons.mozilla.org/en-US/firefox/user/12929064/",
"username": "dessant",
"picture_url": "https://addons.cdn.mozilla.net/user-media/userpics/12/12929/12929064.png?mo…"
}
],
- "average_daily_users": 161350,
+ "average_daily_users": 166133,
"categories": {
"android": [
"photos-media",
@@ -2222,7 +2222,7 @@
"platform": "all",
"size": 639916,
"status": "public",
- "url": "https://addons.mozilla.org/android/downloads/file/3702070/search_by_image-3…",
+ "url": "https://addons.mozilla.org/firefox/downloads/file/3702070/search_by_image-3…",
"permissions": [
"contextMenus",
"storage",
@@ -2407,12 +2407,12 @@
"category": "recommended"
},
"ratings": {
- "average": 4.6609,
- "bayesian_average": 4.653940298348592,
- "count": 805,
- "text_count": 168
+ "average": 4.6601,
+ "bayesian_average": 4.653207694902121,
+ "count": 815,
+ "text_count": 169
},
- "ratings_url": "https://addons.mozilla.org/en-US/android/addon/search_by_image/reviews/",
+ "ratings_url": "https://addons.mozilla.org/en-US/firefox/addon/search_by_image/reviews/",
"requires_payment": false,
"review_url": "https://addons.mozilla.org/en-US/reviewers/review/824288",
"slug": "search_by_image",
@@ -2444,8 +2444,8 @@
"yandex"
],
"type": "extension",
- "url": "https://addons.mozilla.org/en-US/android/addon/search_by_image/",
- "weekly_downloads": 8564
+ "url": "https://addons.mozilla.org/en-US/firefox/addon/search_by_image/",
+ "weekly_downloads": 8603
},
"notes": null
},
@@ -2456,19 +2456,19 @@
{
"id": 13394925,
"name": "Thomas Wisniewski",
- "url": "https://addons.mozilla.org/en-US/android/user/13394925/",
+ "url": "https://addons.mozilla.org/en-US/firefox/user/13394925/",
"username": "wisniewskit",
"picture_url": null
},
{
"id": 6084813,
"name": "Rob W",
- "url": "https://addons.mozilla.org/en-US/android/user/6084813/",
+ "url": "https://addons.mozilla.org/en-US/firefox/user/6084813/",
"username": "RobW",
"picture_url": null
}
],
- "average_daily_users": 32912,
+ "average_daily_users": 35051,
"categories": {
"android": [
"other"
@@ -2499,7 +2499,7 @@
"platform": "all",
"size": 13786,
"status": "public",
- "url": "https://addons.mozilla.org/android/downloads/file/3655036/google_search_fix…",
+ "url": "https://addons.mozilla.org/firefox/downloads/file/3655036/google_search_fix…",
"permissions": [
"webRequest",
"webRequestBlocking",
@@ -2750,12 +2750,12 @@
"category": "recommended"
},
"ratings": {
- "average": 4.4419,
- "bayesian_average": 4.436303974414219,
- "count": 946,
- "text_count": 254
+ "average": 4.4383,
+ "bayesian_average": 4.432747479528366,
+ "count": 956,
+ "text_count": 257
},
- "ratings_url": "https://addons.mozilla.org/en-US/android/addon/google-search-fixer/reviews/",
+ "ratings_url": "https://addons.mozilla.org/en-US/firefox/addon/google-search-fixer/reviews/",
"requires_payment": false,
"review_url": "https://addons.mozilla.org/en-US/reviewers/review/869140",
"slug": "google-search-fixer",
@@ -2771,8 +2771,8 @@
},
"tags": [],
"type": "extension",
- "url": "https://addons.mozilla.org/en-US/android/addon/google-search-fixer/",
- "weekly_downloads": 53
+ "url": "https://addons.mozilla.org/en-US/firefox/addon/google-search-fixer/",
+ "weekly_downloads": 60
},
"notes": null
},
@@ -2783,12 +2783,12 @@
{
"id": 143,
"name": "Giorgio Maone",
- "url": "https://addons.mozilla.org/en-US/android/user/143/",
+ "url": "https://addons.mozilla.org/en-US/firefox/user/143/",
"username": "giorgio-maone",
"picture_url": "https://addons.cdn.mozilla.net/user-media/userpics/0/0/143.png?modified=150…"
}
],
- "average_daily_users": 410215,
+ "average_daily_users": 408584,
"categories": {
"android": [
"performance",
@@ -2802,7 +2802,7 @@
"contributions_url": "https://www.paypal.me/NoScript?utm_content=product-page-contribute&utm_medi…",
"created": "2005-05-13T10:51:32Z",
"current_version": {
- "id": 5166141,
+ "id": 5171142,
"compatibility": {
"firefox": {
"min": "59.0",
@@ -2813,19 +2813,19 @@
"max": "*"
}
},
- "edit_url": "https://addons.mozilla.org/en-US/developers/addon/noscript/versions/5166141",
+ "edit_url": "https://addons.mozilla.org/en-US/developers/addon/noscript/versions/5171142",
"files": [
{
- "id": 3710503,
- "created": "2021-01-17T22:30:16Z",
- "hash": "sha256:5f68a63637e286433089aeb3b6a0aa930317dd988184876b5d6dcff2ca07bb34",
+ "id": 3715504,
+ "created": "2021-01-26T20:49:20Z",
+ "hash": "sha256:4258bcd0bcdfc8ecb231d250e3adf1c477a1a672ede74a5cd10ba05a5381babb",
"is_restart_required": false,
"is_webextension": true,
"is_mozilla_signed_extension": false,
"platform": "all",
- "size": 600156,
+ "size": 601909,
"status": "public",
- "url": "https://addons.mozilla.org/android/downloads/file/3710503/noscript_security…",
+ "url": "https://addons.mozilla.org/firefox/downloads/file/3715504/noscript_security…",
"permissions": [
"contextMenus",
"storage",
@@ -2872,10 +2872,10 @@
"url": "http://www.gnu.org/licenses/gpl-2.0.html"
},
"release_notes": {
- "en-US": "v 11.1.9\n============================================================\nx Return null when webgl is not allowed (thanks Matthew \n Finkel for patch)\nx [XSS] Fixed memoization bug resulting in performance \n degradation on some payloads\nx [XSS] Include call stack in debugging log output\nx [XSS] Skip naps when InjectionChecker runs in its own \n worker\nx Shortcut for easier XSS filter testing\nx More lenient filter to add a new entry to per-site \n permissions\nx [L10n] Updated de\nx Replace script-embedded bitmap with css-embedded SVG as \n the placeholder logo\nx Updated TLDs\nx Remove source map reference causing console noise\nx Fix per-site permissions UI glitches when base domain is \n added to existing subdomain (thanks barbaz for reporting)"
+ "en-US": "v 11.2\n============================================================\nx [XSS] New UI to reveal and selectively remove permanent\n user choices\nx [L10n] Updated de\nx Webgl hook refactored on nscl/content/patchWindow.js and\n made Chromium-compatibile\nx Updated TLDs"
},
"reviewed": null,
- "version": "11.1.9"
+ "version": "11.2"
},
"default_locale": "en-US",
"description": {
@@ -2925,7 +2925,7 @@
},
"is_disabled": false,
"is_experimental": false,
- "last_updated": "2021-01-19T08:35:13Z",
+ "last_updated": "2021-01-27T09:23:29Z",
"name": {
"de": "NoScript",
"el": "NoScript",
@@ -3013,12 +3013,12 @@
"category": "recommended"
},
"ratings": {
- "average": 4.5416,
- "bayesian_average": 4.540012526012674,
- "count": 3429,
- "text_count": 2367
+ "average": 4.5411,
+ "bayesian_average": 4.53951064079964,
+ "count": 3434,
+ "text_count": 2369
},
- "ratings_url": "https://addons.mozilla.org/en-US/android/addon/noscript/reviews/",
+ "ratings_url": "https://addons.mozilla.org/en-US/firefox/addon/noscript/reviews/",
"requires_payment": false,
"review_url": "https://addons.mozilla.org/en-US/reviewers/review/722",
"slug": "noscript",
@@ -3071,8 +3071,8 @@
"xss"
],
"type": "extension",
- "url": "https://addons.mozilla.org/en-US/android/addon/noscript/",
- "weekly_downloads": 11292
+ "url": "https://addons.mozilla.org/en-US/firefox/addon/noscript/",
+ "weekly_downloads": 10673
},
"notes": null
},
@@ -3083,12 +3083,12 @@
{
"id": 4010195,
"name": "Baris Derin",
- "url": "https://addons.mozilla.org/en-US/android/user/4010195/",
+ "url": "https://addons.mozilla.org/en-US/firefox/user/4010195/",
"username": "baris-derin",
"picture_url": null
}
],
- "average_daily_users": 127688,
+ "average_daily_users": 128290,
"categories": {
"android": [
"performance",
@@ -3125,7 +3125,7 @@
"platform": "all",
"size": 234528,
"status": "public",
- "url": "https://addons.mozilla.org/android/downloads/file/3635763/youtube_high_defi…",
+ "url": "https://addons.mozilla.org/firefox/downloads/file/3635763/youtube_high_defi…",
"permissions": [
"tabs",
"storage",
@@ -3227,12 +3227,12 @@
"category": "recommended"
},
"ratings": {
- "average": 4.1071,
- "bayesian_average": 4.102893844607107,
- "count": 1148,
- "text_count": 550
+ "average": 4.1125,
+ "bayesian_average": 4.108301527957989,
+ "count": 1156,
+ "text_count": 551
},
- "ratings_url": "https://addons.mozilla.org/en-US/android/addon/youtube-high-definition/revi…",
+ "ratings_url": "https://addons.mozilla.org/en-US/firefox/addon/youtube-high-definition/revi…",
"requires_payment": false,
"review_url": "https://addons.mozilla.org/en-US/reviewers/review/328839",
"slug": "youtube-high-definition",
@@ -3267,8 +3267,8 @@
"youtube hd"
],
"type": "extension",
- "url": "https://addons.mozilla.org/en-US/android/addon/youtube-high-definition/",
- "weekly_downloads": 1836
+ "url": "https://addons.mozilla.org/en-US/firefox/addon/youtube-high-definition/",
+ "weekly_downloads": 2035
},
"notes": null
}
1
0
[Git][tpo/applications/fenix][tor-browser-86.0.0b1-10.5-1] 8 commits: Bug 40002: Add GitLab CI
by Matthew Finkel 01 Feb '21
by Matthew Finkel 01 Feb '21
01 Feb '21
Matthew Finkel pushed to branch tor-browser-86.0.0b1-10.5-1 at The Tor Project / Applications / fenix
Commits:
96f976b0 by Matthew Finkel at 2021-01-27T16:58:09+00:00
Bug 40002: Add GitLab CI
Pin CI builds to runners with 32GB of RAM to avoid OOM conditions.
- - - - -
3d0def78 by Matthew Finkel at 2021-01-27T16:59:05+00:00
Rename as Tor Browser
Bug 40020: Change applicationId
Bug 40020: Change app name
Bug 40020: Change deeplink scheme
Bug 40020: Change App icons
Bug 40073: Use correct branding on About page
Bug 40088: Use Tor Browser logo in migration screen
- - - - -
ba587e04 by Matthew Finkel at 2021-01-27T16:59:07+00:00
Disable features and functionality
Bug 33594: Disable data collection by default (Glean)
Bug 40019: Adjust is disabled on Release when data collection is disabled
Bug 34338: Disable the crash reporter
Bug 40014: Neuter Google Advertising ID
Bug 40018: Disable Push service
Bug 40034: Disable PWA onboading
Bug 40072: Disable Tracking Protection
Bug 40061: Do not show "Send to device" in sharing menu
- - - - -
248adf05 by Georg Koppen at 2021-01-27T16:59:07+00:00
Modify build system
Bug 40083: Make locale ordering in BuildConfig deterministic
Bug 40042: Add option do overwrite timestamp in extension version
Bug 40059: Use MOZ_BUILD_DATE for versionCode
At the same time we adapt MOZ_BUILD_DATE to our needs where it is
actually used and not in tor-browser-build. This gives us more
flexibility. See: tor-browser-build#40084.
Bug 40067: Fix reproducibility issue in classes2.dex
We make sure our MOZ_BUILD_DATE gets used as a source for showing date
related information on the Fenix about page.
Bug 40071: Show only supported locales
Bug 40064: Use Gecko Beta for Nightly and Debug variants
Bug 40123: Allow building the instrumented tests apks for variants other than debug
This allows to specify the variant of the instrumented tests via
a `testBuildType` gradle argument. It also applies a workaround for
a R8 issue from https://issuetracker.google.com/issues/140851070.
- - - - -
24abe628 by Matthew Finkel at 2021-01-27T17:01:08+00:00
Add Tor integration and UI
Bug 40001: Start Tor as part of the Fenix initialization
Bug 40028: Implement Tor Service controller
Bug 40028: Integrate Tor Controller into HomeFragment
Bug 40028: Implement Tor connect and logger screens
Bug 40028: Implement Tor Onboarding
Bug 40028: Implement new home screen
Bug 40028: Define bootstrapping events and Quick Start
Bug 40041: Implement Tor Network Settings
Bug 40041: Integrate Tor Network Settings
- - - - -
022d1fed by Alex Catarineu at 2021-01-27T17:08:29+00:00
Modify UI/UX
Bug 40015: Modify Home menu
Bug 40016: Hide unwanted Settings
Bug 40016: Modify Default toolbar menu
Bug 40016: Add Donate settings button
Bug 40016: Move Allow Screenshots under Advanced
Bug 40016: Don't install WebCompat webext
Bug 40016: Don't onboard Search Suggestions
Bug 40094: Do not use MasterPasswordTipProvider in HomeFragment
Bug 40095: Hide "Sign in to sync" in bookmarks
Bug 40031: Hide Mozilla-specific items on About page
Bug 40032: Set usesCleartextTraffic as false
Bug 40063: Do not sort search engines alphabetically
Bug 34378: Port external helper app prompting
With the corresponding android-components patch, this allows all `startActivity`
that may open external apps to be replaced by `TorUtils.startActivityPrompt`.
Bug 34403: Disable Normal mode by default
Bug 40087: Implement a switch for english locale spoofing
- - - - -
ab2d00f6 by Alex Catarineu at 2021-01-27T17:10:37+00:00
Modify Add-on support
Bug 40030: Install HTTPS Everywhere and NoScript addons on startup
HTTPS Everywhere is installed as a builtin extension and NoScript as
a regular AMO addon. To avoid unnecessary I/O we only install NoScript
the first time, and rely on the browser addon updating mechanism for
keeping up with new versions. This is the same behaviour that was
implemented in the Fennec-based Tor Browser, where it was installed
as a "distribution addon", which also only occurred once.
Bug 40062: HTTPS Everywhere is not shown as installed
Also 40070: Consider storing the list of recommended addons
This implements our own AddonsProvider, which loads the list of
available addons from assets instead of fetching it from an
endpoint. In this list, we replace https-everywhere by
our https-everywhere-eff, so that the EFF one is shown as installed
in the addons list and the AMO one is not displayed.
Also, we hide the uninstall button for builtin addons.
Bug 40058: Hide option for disallowing addon in private mode
- - - - -
d95db65d by Matthew Finkel at 2021-02-01T16:24:37+00:00
Add Security Level UI
Bug 40026: Implement Security Level settings
Bug 40026: Integrate Security Level settings
- - - - -
30 changed files:
- + .gitlab-ci.yml
- app/build.gradle
- app/proguard-rules.pro
- app/src/androidTest/java/org/mozilla/fenix/ui/robots/SettingsSubMenuAboutRobot.kt
- − app/src/beta/res/drawable/ic_launcher_foreground.xml
- app/src/beta/res/mipmap-hdpi/ic_launcher.png
- app/src/beta/res/mipmap-mdpi/ic_launcher.png
- app/src/beta/res/mipmap-xhdpi/ic_launcher.png
- app/src/beta/res/mipmap-xxhdpi/ic_launcher.png
- app/src/beta/res/mipmap-xxxhdpi/ic_launcher.png
- app/src/beta/res/values/static_strings.xml
- app/src/beta/res/xml/shortcuts.xml
- − app/src/debug/res/drawable/ic_launcher_foreground.xml
- app/src/debug/res/xml/shortcuts.xml
- app/src/main/AndroidManifest.xml
- + app/src/main/assets/allowed_addons.json
- app/src/main/java/org/mozilla/fenix/FeatureFlags.kt
- app/src/main/java/org/mozilla/fenix/FenixApplication.kt
- app/src/main/java/org/mozilla/fenix/HomeActivity.kt
- app/src/main/java/org/mozilla/fenix/addons/InstalledAddonDetailsFragment.kt
- app/src/main/java/org/mozilla/fenix/browser/BaseBrowserFragment.kt
- app/src/main/java/org/mozilla/fenix/components/Analytics.kt
- app/src/main/java/org/mozilla/fenix/components/Components.kt
- app/src/main/java/org/mozilla/fenix/components/Core.kt
- + app/src/main/java/org/mozilla/fenix/components/TorAddonCollectionProvider.kt
- + app/src/main/java/org/mozilla/fenix/components/TorBrowserFeatures.kt
- app/src/main/java/org/mozilla/fenix/components/metrics/AdjustMetricsService.kt
- app/src/main/java/org/mozilla/fenix/components/metrics/MetricsUtils.kt
- app/src/main/java/org/mozilla/fenix/components/toolbar/DefaultToolbarMenu.kt
- app/src/main/java/org/mozilla/fenix/home/HomeFragment.kt
The diff was not included because it is too large.
View it on GitLab: https://gitlab.torproject.org/tpo/applications/fenix/-/compare/0e6b466e02b0…
--
View it on GitLab: https://gitlab.torproject.org/tpo/applications/fenix/-/compare/0e6b466e02b0…
You're receiving this email because of your account on gitlab.torproject.org.
1
0
01 Feb '21
commit 52ba09265002299e7fcba1f181c1656c372dbbc1
Author: Nicolas Vigier <boklm(a)torproject.org>
Date: Sun Jan 31 22:57:20 2021 +0100
Bug 40221: Add tools/prune-old-builds
This script was already present in the directory
tools/ansible/roles/tbb-nightly-build/files, however this directory will
soon be removed as part of #40196.
---
tools/prune-old-builds | 136 +++++++++++++++++++++++++++++++++++++++++++++++++
1 file changed, 136 insertions(+)
diff --git a/tools/prune-old-builds b/tools/prune-old-builds
new file mode 100755
index 0000000..852a9da
--- /dev/null
+++ b/tools/prune-old-builds
@@ -0,0 +1,136 @@
+#!/usr/bin/perl -w
+
+# Copyright (c) 2019, The Tor Project, Inc.
+#
+# Redistribution and use in source and binary forms, with or without
+# modification, are permitted provided that the following conditions are
+# met:
+#
+# * Redistributions of source code must retain the above copyright
+# notice, this list of conditions and the following disclaimer.
+#
+# * Redistributions in binary form must reproduce the above
+# copyright notice, this list of conditions and the following disclaimer
+# in the documentation and/or other materials provided with the
+# distribution.
+#
+# * Neither the names of the copyright owners nor the names of its
+# contributors may be used to endorse or promote products derived from
+# this software without specific prior written permission.
+#
+# THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
+# "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
+# LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
+# A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
+# OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
+# SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
+# LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
+# DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
+# THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
+# (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
+# OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
+
+
+# 'prune-old-builds' is a script to prune old builds.
+#
+#
+# Usage:
+# $ ./prune-old-builds [options] <directory>
+#
+#
+# Available options:
+#
+# --dry-run
+# Don't delete anything, but say what would be deleted.
+#
+# --prefix <prefix>
+# Prefix of the directories to be removed. Default is 'tbb-nightly.'.
+#
+# --separator <c>
+# Separator character to separate the year, month, day in the directory
+# names. Default is '.'.
+#
+# --days <n>
+# Number of days that we should keep. Default is 6.
+#
+# --weeks <n>
+# Number of monday builds that we should keep. Default is 3.
+#
+# --months <n>
+# Number of 1st day of the month builds that we should keep.
+# Default is 3.
+
+use strict;
+use Getopt::Long;
+use DateTime;
+use DateTime::Duration;
+use File::Path qw(remove_tree);
+
+my %options = (
+ days => 6,
+ weeks => 3,
+ months => 3,
+ prefix => 'tbb-nightly.',
+ separator => '.',
+);
+
+sub keep_builds {
+ my %res;
+
+ my $day = DateTime::Duration->new(days => 1);
+ my $week = DateTime::Duration->new(weeks => 1);
+ my $month = DateTime::Duration->new(months => 1);
+
+ my $n = $options{days};
+ my $dt = DateTime->now;
+ while ($n) {
+ $res{ $options{prefix} . $dt->ymd($options{separator}) } = 1;
+ $dt = $dt - $day;
+ $n--;
+ }
+
+ my $w = $options{weeks};
+ while ($dt->day_of_week != 1) {
+ $dt = $dt - $day;
+ }
+ while ($w) {
+ $res{ $options{prefix} . $dt->ymd($options{separator}) } = 1;
+ $dt = $dt - $week;
+ $w--;
+ }
+
+ my $m = $options{months};
+ $dt = DateTime->now;
+ while ($dt->day != 1) {
+ $dt = $dt - $day;
+ }
+ while ($m) {
+ $res{ $options{prefix} . $dt->ymd($options{separator}) } = 1;
+ $dt = $dt - $month;
+ $m--;
+ }
+
+ return \%res;
+}
+
+sub clean_directory {
+ my ($directory) = @_;
+ my $k = keep_builds;
+ chdir $directory || die "Error entering $directory";
+ foreach my $file (glob "$options{prefix}*") {
+ next unless $file =~ m/^$options{prefix}\d{4}$options{separator}\d{2}$options{separator}\d{2}$/;
+ next if $k->{$file};
+ if ($options{'dry-run'}) {
+ print "Would remove $file\n";
+ } else {
+ remove_tree($file);
+ }
+ }
+}
+
+my @opts = qw(days=i weeks=i months=i prefix=s dry-run!);
+Getopt::Long::GetOptions(\%options, @opts);
+die "Missing argument: directory to clean" unless @ARGV;
+foreach my $dir (@ARGV) {
+ clean_directory($dir);
+}
1
0
[tor-browser/tor-browser-86.0b1-10.5-1] Bug 16940: After update, load local change notes.
by gkï¼ torproject.org 30 Jan '21
by gkï¼ torproject.org 30 Jan '21
30 Jan '21
commit 89072a2d6e3104124a017ed590d3edb7d9c030ee
Author: Kathy Brade <brade(a)pearlcrescent.com>
Date: Wed Nov 25 11:36:20 2015 -0500
Bug 16940: After update, load local change notes.
Add an about:tbupdate page that displays the first section from
TorBrowser/Docs/ChangeLog.txt and includes a link to the remote
post-update page (typically our blog entry for the release).
Always load about:tbupdate in a content process, but implement the
code that reads the file system (changelog) in the chrome process
for compatibility with future sandboxing efforts.
Also fix bug 29440. Now about:tbupdate is styled as a fairly simple
changelog page that is designed to be displayed via a link that is on
about:tor.
---
browser/actors/AboutTBUpdateChild.jsm | 12 +++
browser/actors/AboutTBUpdateParent.jsm | 120 +++++++++++++++++++++
browser/actors/moz.build | 6 ++
.../base/content/abouttbupdate/aboutTBUpdate.css | 74 +++++++++++++
.../base/content/abouttbupdate/aboutTBUpdate.js | 27 +++++
.../base/content/abouttbupdate/aboutTBUpdate.xhtml | 39 +++++++
browser/base/content/browser-siteIdentity.js | 2 +-
browser/base/content/browser.js | 4 +
browser/base/jar.mn | 5 +
browser/components/BrowserContentHandler.jsm | 55 +++++++---
browser/components/BrowserGlue.jsm | 15 +++
browser/components/about/AboutRedirector.cpp | 6 ++
browser/components/about/components.conf | 3 +
browser/components/moz.build | 5 +-
.../locales/en-US/chrome/browser/aboutTBUpdate.dtd | 8 ++
browser/locales/jar.mn | 3 +
toolkit/modules/RemotePageAccessManager.jsm | 5 +
17 files changed, 373 insertions(+), 16 deletions(-)
diff --git a/browser/actors/AboutTBUpdateChild.jsm b/browser/actors/AboutTBUpdateChild.jsm
new file mode 100644
index 000000000000..4670da19b3db
--- /dev/null
+++ b/browser/actors/AboutTBUpdateChild.jsm
@@ -0,0 +1,12 @@
+// Copyright (c) 2020, The Tor Project, Inc.
+// See LICENSE for licensing information.
+//
+// vim: set sw=2 sts=2 ts=8 et syntax=javascript:
+
+var EXPORTED_SYMBOLS = ["AboutTBUpdateChild"];
+
+const { RemotePageChild } = ChromeUtils.import(
+ "resource://gre/actors/RemotePageChild.jsm"
+);
+
+class AboutTBUpdateChild extends RemotePageChild {}
diff --git a/browser/actors/AboutTBUpdateParent.jsm b/browser/actors/AboutTBUpdateParent.jsm
new file mode 100644
index 000000000000..56a10394565a
--- /dev/null
+++ b/browser/actors/AboutTBUpdateParent.jsm
@@ -0,0 +1,120 @@
+// Copyright (c) 2020, The Tor Project, Inc.
+// See LICENSE for licensing information.
+//
+// vim: set sw=2 sts=2 ts=8 et syntax=javascript:
+
+"use strict";
+
+this.EXPORTED_SYMBOLS = ["AboutTBUpdateParent"];
+
+const { Services } = ChromeUtils.import("resource://gre/modules/Services.jsm");
+const { NetUtil } = ChromeUtils.import("resource://gre/modules/NetUtil.jsm");
+const { AppConstants } = ChromeUtils.import(
+ "resource://gre/modules/AppConstants.jsm"
+);
+
+const kRequestUpdateMessageName = "FetchUpdateData";
+
+/**
+ * This code provides services to the about:tbupdate page. Whenever
+ * about:tbupdate needs to do something chrome-privileged, it sends a
+ * message that's handled here. It is modeled after Mozilla's about:home
+ * implementation.
+ */
+class AboutTBUpdateParent extends JSWindowActorParent {
+ receiveMessage(aMessage) {
+ if (aMessage.name == kRequestUpdateMessageName) {
+ return this.releaseNoteInfo;
+ }
+ return undefined;
+ }
+
+ get moreInfoURL() {
+ try {
+ return Services.prefs.getCharPref("torbrowser.post_update.url");
+ } catch (e) {}
+
+ // Use the default URL as a fallback.
+ return Services.urlFormatter.formatURLPref("startup.homepage_override_url");
+ }
+
+ // Read the text from the beginning of the changelog file that is located
+ // at TorBrowser/Docs/ChangeLog.txt and return an object that contains
+ // the following properties:
+ // version e.g., Tor Browser 8.5
+ // releaseDate e.g., March 31 2019
+ // releaseNotes details of changes (lines 2 - end of ChangeLog.txt)
+ // We attempt to parse the first line of ChangeLog.txt to extract the
+ // version and releaseDate. If parsing fails, we return the entire first
+ // line in version and omit releaseDate.
+ //
+ // On Mac OS, when building with --enable-tor-browser-data-outside-app-dir
+ // to support Gatekeeper signing, the ChangeLog.txt file is located in
+ // TorBrowser.app/Contents/Resources/TorBrowser/Docs/.
+ get releaseNoteInfo() {
+ let info = { moreInfoURL: this.moreInfoURL };
+
+ try {
+ let f;
+ if (AppConstants.TOR_BROWSER_DATA_OUTSIDE_APP_DIR) {
+ // "XREExeF".parent is the directory that contains firefox, i.e.,
+ // Browser/ or, on Mac OS, TorBrowser.app/Contents/MacOS/.
+ f = Services.dirsvc.get("XREExeF", Ci.nsIFile).parent;
+ if (AppConstants.platform === "macosx") {
+ f = f.parent;
+ f.append("Resources");
+ }
+ f.append("TorBrowser");
+ } else {
+ // "DefProfRt" is .../TorBrowser/Data/Browser
+ f = Services.dirsvc.get("DefProfRt", Ci.nsIFile);
+ f = f.parent.parent; // Remove "Data/Browser"
+ }
+
+ f.append("Docs");
+ f.append("ChangeLog.txt");
+
+ let fs = Cc["@mozilla.org/network/file-input-stream;1"].createInstance(
+ Ci.nsIFileInputStream
+ );
+ fs.init(f, -1, 0, 0);
+ let s = NetUtil.readInputStreamToString(fs, fs.available());
+ fs.close();
+
+ // Truncate at the first empty line.
+ s = s.replace(/[\r\n][\r\n][\s\S]*$/m, "");
+
+ // Split into first line (version plus releaseDate) and
+ // remainder (releaseNotes).
+ // This first match() uses multiline mode with two capture groups:
+ // first line: (.*$)
+ // remaining lines: ([\s\S]+)
+ // [\s\S] matches all characters including end of line. This trick
+ // is needed because when using JavaScript regex in multiline mode,
+ // . does not match an end of line character.
+ let matchArray = s.match(/(.*$)\s*([\s\S]+)/m);
+ if (matchArray && matchArray.length == 3) {
+ info.releaseNotes = matchArray[2];
+ let line1 = matchArray[1];
+ // Extract the version and releaseDate. The first line looks like:
+ // Tor Browser 8.5 -- May 1 2019
+ // The regex uses two capture groups:
+ // text that does not include a hyphen: (^[^-]*)
+ // remaining text: (.*$)
+ // In between we match optional whitespace, one or more hyphens, and
+ // optional whitespace by using: \s*-+\s*
+ matchArray = line1.match(/(^[^-]*)\s*-+\s*(.*$)/);
+ if (matchArray && matchArray.length == 3) {
+ info.version = matchArray[1];
+ info.releaseDate = matchArray[2];
+ } else {
+ info.version = line1; // Match failed: return entire line in version.
+ }
+ } else {
+ info.releaseNotes = s; // Only one line: use as releaseNotes.
+ }
+ } catch (e) {}
+
+ return info;
+ }
+}
diff --git a/browser/actors/moz.build b/browser/actors/moz.build
index 3952d5a95246..229f7290b98e 100644
--- a/browser/actors/moz.build
+++ b/browser/actors/moz.build
@@ -87,3 +87,9 @@ FINAL_TARGET_FILES.actors += [
"WebRTCChild.jsm",
"WebRTCParent.jsm",
]
+
+if CONFIG["TOR_BROWSER_UPDATE"]:
+ FINAL_TARGET_FILES.actors += [
+ "AboutTBUpdateChild.jsm",
+ "AboutTBUpdateParent.jsm",
+ ]
diff --git a/browser/base/content/abouttbupdate/aboutTBUpdate.css b/browser/base/content/abouttbupdate/aboutTBUpdate.css
new file mode 100644
index 000000000000..7c1a34b77f17
--- /dev/null
+++ b/browser/base/content/abouttbupdate/aboutTBUpdate.css
@@ -0,0 +1,74 @@
+/*
+ * Copyright (c) 2019, The Tor Project, Inc.
+ * See LICENSE for licensing information.
+ *
+ * vim: set sw=2 sts=2 ts=8 et syntax=css:
+ */
+
+:root {
+ --abouttor-text-color: white;
+ --abouttor-bg-toron-color: #420C5D;
+}
+
+body {
+ font-family: Helvetica, Arial, sans-serif;
+ color: var(--abouttor-text-color);
+ background-color: var(--abouttor-bg-toron-color);
+ background-attachment: fixed;
+ background-size: 100% 100%;
+}
+
+a {
+ color: var(--abouttor-text-color);
+}
+
+.two-column-grid {
+ display: inline-grid;
+ grid-template-columns: auto auto;
+ grid-column-gap: 50px;
+ margin: 10px 0px 0px 50px;
+}
+
+.two-column-grid div {
+ margin-top: 40px;
+ align-self: baseline; /* Align baseline of text across the row. */
+}
+
+.label-column {
+ font-size: 14px;
+ font-weight: 400;
+}
+
+/*
+ * Use a reduced top margin to bring the row that contains the
+ * "visit our website" link closer to the row that precedes it. This
+ * looks better because the "visit our website" row does not have a
+ * label in the left column.
+ */
+div.more-info-row {
+ margin-top: 5px;
+ font-size: 14px;
+}
+
+#version-content {
+ font-size: 50px;
+ font-weight: 300;
+}
+
+body:not([havereleasedate]) .release-date-cell {
+ display: none;
+}
+
+#releasedate-content {
+ font-size: 17px;
+}
+
+#releasenotes-label {
+ align-self: start; /* Anchor "Release Notes" label at the top. */
+}
+
+#releasenotes-content {
+ font-family: monospace;
+ font-size: 15px;
+ white-space: pre;
+}
diff --git a/browser/base/content/abouttbupdate/aboutTBUpdate.js b/browser/base/content/abouttbupdate/aboutTBUpdate.js
new file mode 100644
index 000000000000..ec070e2cb131
--- /dev/null
+++ b/browser/base/content/abouttbupdate/aboutTBUpdate.js
@@ -0,0 +1,27 @@
+// Copyright (c) 2020, The Tor Project, Inc.
+// See LICENSE for licensing information.
+//
+// vim: set sw=2 sts=2 ts=8 et syntax=javascript:
+
+/* eslint-env mozilla/frame-script */
+
+// aData may contain the following string properties:
+// version
+// releaseDate
+// moreInfoURL
+// releaseNotes
+function onUpdate(aData) {
+ document.getElementById("version-content").textContent = aData.version;
+ if (aData.releaseDate) {
+ document.body.setAttribute("havereleasedate", "true");
+ document.getElementById("releasedate-content").textContent =
+ aData.releaseDate;
+ }
+ if (aData.moreInfoURL) {
+ document.getElementById("infolink").setAttribute("href", aData.moreInfoURL);
+ }
+ document.getElementById("releasenotes-content").textContent =
+ aData.releaseNotes;
+}
+
+RPMSendQuery("FetchUpdateData").then(onUpdate);
diff --git a/browser/base/content/abouttbupdate/aboutTBUpdate.xhtml b/browser/base/content/abouttbupdate/aboutTBUpdate.xhtml
new file mode 100644
index 000000000000..8489cfef5083
--- /dev/null
+++ b/browser/base/content/abouttbupdate/aboutTBUpdate.xhtml
@@ -0,0 +1,39 @@
+<?xml version="1.0" encoding="UTF-8"?>
+
+<!DOCTYPE html [
+ <!ENTITY % htmlDTD
+ PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
+ "DTD/xhtml1-strict.dtd">
+ %htmlDTD;
+ <!ENTITY % globalDTD SYSTEM "chrome://global/locale/global.dtd">
+ %globalDTD;
+ <!ENTITY % tbUpdateDTD SYSTEM "chrome://browser/locale/aboutTBUpdate.dtd">
+ %tbUpdateDTD;
+]>
+
+<html xmlns="http://www.w3.org/1999/xhtml">
+<head>
+ <meta http-equiv="Content-Security-Policy" content="default-src chrome:; object-src 'none'" />
+ <title>&aboutTBUpdate.changelogTitle;</title>
+ <link rel="stylesheet" type="text/css"
+ href="chrome://browser/content/abouttbupdate/aboutTBUpdate.css"/>
+ <script src="chrome://browser/content/abouttbupdate/aboutTBUpdate.js"
+ type="text/javascript"/>
+</head>
+<body dir="&locale.dir;">
+<div class="two-column-grid">
+ <div class="label-column">&aboutTBUpdate.version;</div>
+ <div id="version-content"/>
+
+ <div class="label-column release-date-cell">&aboutTBUpdate.releaseDate;</div>
+ <div id="releasedate-content" class="release-date-cell"/>
+
+ <div class="more-info-row"/>
+ <div class="more-info-row">&aboutTBUpdate.linkPrefix;<a id="infolink">&aboutTBUpdate.linkLabel;</a>&aboutTBUpdate.linkSuffix;</div>
+
+ <div id="releasenotes-label"
+ class="label-column">&aboutTBUpdate.releaseNotes;</div>
+ <div id="releasenotes-content"></div>
+</div>
+</body>
+</html>
diff --git a/browser/base/content/browser-siteIdentity.js b/browser/base/content/browser-siteIdentity.js
index 5850d7ceb4c2..9cf2ff85cbbd 100644
--- a/browser/base/content/browser-siteIdentity.js
+++ b/browser/base/content/browser-siteIdentity.js
@@ -57,7 +57,7 @@ var gIdentityHandler = {
* RegExp used to decide if an about url should be shown as being part of
* the browser UI.
*/
- _secureInternalPages: /^(?:accounts|addons|cache|certificate|config|crashes|downloads|license|logins|preferences|protections|rights|sessionrestore|support|welcomeback|ion)(?:[?#]|$)/i,
+ _secureInternalPages: (AppConstants.TOR_BROWSER_UPDATE ? /^(?:accounts|addons|cache|certificate|config|crashes|downloads|license|logins|preferences|protections|rights|sessionrestore|support|welcomeback|ion|tor|tbupdate)(?:[?#]|$)/i : /^(?:accounts|addons|cache|certificate|config|crashes|downloads|license|logins|preferences|protections|rights|sessionrestore|support|welcomeback|ion|tor)(?:[?#]|$)/i),
/**
* Whether the established HTTPS connection is considered "broken".
diff --git a/browser/base/content/browser.js b/browser/base/content/browser.js
index 2d7341287566..5ad00bdddb30 100644
--- a/browser/base/content/browser.js
+++ b/browser/base/content/browser.js
@@ -658,6 +658,10 @@ var gInitialPages = [
"about:newinstall",
];
+if (AppConstants.TOR_BROWSER_UPDATE) {
+ gInitialPages.push("about:tbupdate");
+}
+
function isInitialPage(url) {
if (!(url instanceof Ci.nsIURI)) {
try {
diff --git a/browser/base/jar.mn b/browser/base/jar.mn
index 471544f6b7f7..d6c9e31c2c95 100644
--- a/browser/base/jar.mn
+++ b/browser/base/jar.mn
@@ -31,6 +31,11 @@ browser.jar:
content/browser/aboutTabCrashed.css (content/aboutTabCrashed.css)
content/browser/aboutTabCrashed.js (content/aboutTabCrashed.js)
content/browser/aboutTabCrashed.xhtml (content/aboutTabCrashed.xhtml)
+#ifdef TOR_BROWSER_UPDATE
+ content/browser/abouttbupdate/aboutTBUpdate.xhtml (content/abouttbupdate/aboutTBUpdate.xhtml)
+ content/browser/abouttbupdate/aboutTBUpdate.js (content/abouttbupdate/aboutTBUpdate.js)
+ content/browser/abouttbupdate/aboutTBUpdate.css (content/abouttbupdate/aboutTBUpdate.css)
+#endif
* content/browser/browser.css (content/browser.css)
content/browser/browser.js (content/browser.js)
* content/browser/browser.xhtml (content/browser.xhtml)
diff --git a/browser/components/BrowserContentHandler.jsm b/browser/components/BrowserContentHandler.jsm
index 0a37ca088ca0..ab63c16087f0 100644
--- a/browser/components/BrowserContentHandler.jsm
+++ b/browser/components/BrowserContentHandler.jsm
@@ -652,6 +652,23 @@ nsBrowserContentHandler.prototype = {
}
}
+ // Retrieve the home page early so we can compare it against about:tor
+ // to decide whether or not we need an override page (second tab) after
+ // an update was applied.
+ var startPage = "";
+ try {
+ var choice = prefb.getIntPref("browser.startup.page");
+ if (choice == 1 || choice == 3) {
+ startPage = HomePage.get();
+ }
+ } catch (e) {
+ Cu.reportError(e);
+ }
+
+ if (startPage == "about:blank") {
+ startPage = "";
+ }
+
var override;
var overridePage = "";
var additionalPage = "";
@@ -703,6 +720,16 @@ nsBrowserContentHandler.prototype = {
// into account because that requires waiting for the session file
// to be read. If a crash occurs after updating, before restarting,
// we may open the startPage in addition to restoring the session.
+ //
+ // Tor Browser: Instead of opening the post-update "override page"
+ // directly, we ensure that about:tor will be opened in a special
+ // mode that notifies the user that their browser was updated.
+ // The about:tor page will provide a link to the override page
+ // where the user can learn more about the update, as well as a
+ // link to the Tor Browser changelog page (about:tbupdate). The
+ // override page URL comes from the openURL attribute within the
+ // updates.xml file or, if no showURL action is present, from the
+ // startup.homepage_override_url pref.
willRestoreSession = SessionStartup.isAutomaticRestoreEnabled();
overridePage = Services.urlFormatter.formatURLPref(
@@ -722,6 +749,20 @@ nsBrowserContentHandler.prototype = {
overridePage = overridePage.replace("%OLD_VERSION%", old_mstone);
overridePage = overridePage.replace("%OLD_TOR_BROWSER_VERSION%",
old_tbversion);
+#ifdef TOR_BROWSER_UPDATE
+ if (overridePage)
+ {
+ prefb.setCharPref("torbrowser.post_update.url", overridePage);
+ prefb.setBoolPref("torbrowser.post_update.shouldNotify", true);
+ // If the user's homepage is about:tor, we will inform them
+ // about the update on that page; otherwise, we arrange to
+ // open about:tor in a secondary tab.
+ if (startPage === "about:tor")
+ overridePage = "";
+ else
+ overridePage = "about:tor";
+ }
+#endif
break;
case OVERRIDE_NEW_BUILD_ID:
if (UpdateManager.readyUpdate) {
@@ -794,20 +835,6 @@ nsBrowserContentHandler.prototype = {
}
}
- var startPage = "";
- try {
- var choice = prefb.getIntPref("browser.startup.page");
- if (choice == 1 || choice == 3) {
- startPage = HomePage.get();
- }
- } catch (e) {
- Cu.reportError(e);
- }
-
- if (startPage == "about:blank") {
- startPage = "";
- }
-
let skipStartPage =
(override == OVERRIDE_NEW_PROFILE ||
override == OVERRIDE_ALTERNATE_PROFILE) &&
diff --git a/browser/components/BrowserGlue.jsm b/browser/components/BrowserGlue.jsm
index ebc52d19e48d..d04fdda538de 100644
--- a/browser/components/BrowserGlue.jsm
+++ b/browser/components/BrowserGlue.jsm
@@ -730,6 +730,21 @@ let JSWINDOWACTORS = {
},
};
+if (AppConstants.TOR_BROWSER_UPDATE) {
+ JSWINDOWACTORS["AboutTBUpdate"] = {
+ parent: {
+ moduleURI: "resource:///actors/AboutTBUpdateParent.jsm",
+ },
+ child: {
+ moduleURI: "resource:///actors/AboutTBUpdateChild.jsm",
+ events: {
+ DOMWindowCreated: { capture: true },
+ },
+ },
+ matches: ["about:tbupdate"],
+ };
+}
+
(function earlyBlankFirstPaint() {
let startTime = Cu.now();
if (
diff --git a/browser/components/about/AboutRedirector.cpp b/browser/components/about/AboutRedirector.cpp
index 9fb93eddaab2..bc1eaaae25c1 100644
--- a/browser/components/about/AboutRedirector.cpp
+++ b/browser/components/about/AboutRedirector.cpp
@@ -121,6 +121,12 @@ static const RedirEntry kRedirMap[] = {
nsIAboutModule::URI_CAN_LOAD_IN_PRIVILEGEDABOUT_PROCESS},
{"ion", "chrome://browser/content/ion.html",
nsIAboutModule::ALLOW_SCRIPT | nsIAboutModule::HIDE_FROM_ABOUTABOUT},
+#ifdef TOR_BROWSER_UPDATE
+ {"tbupdate", "chrome://browser/content/abouttbupdate/aboutTBUpdate.xhtml",
+ nsIAboutModule::URI_SAFE_FOR_UNTRUSTED_CONTENT |
+ nsIAboutModule::URI_MUST_LOAD_IN_CHILD | nsIAboutModule::ALLOW_SCRIPT |
+ nsIAboutModule::HIDE_FROM_ABOUTABOUT},
+#endif
};
static nsAutoCString GetAboutModuleName(nsIURI* aURI) {
diff --git a/browser/components/about/components.conf b/browser/components/about/components.conf
index 42011d509481..56731d70c386 100644
--- a/browser/components/about/components.conf
+++ b/browser/components/about/components.conf
@@ -32,6 +32,9 @@ pages = [
'welcomeback',
]
+if defined('TOR_BROWSER_UPDATE'):
+ pages.append('tbupdate')
+
Classes = [
{
'cid': '{7e4bb6ad-2fc4-4dc6-89ef-23e8e5ccf980}',
diff --git a/browser/components/moz.build b/browser/components/moz.build
index 78fce1bfb464..7e7b928d757d 100644
--- a/browser/components/moz.build
+++ b/browser/components/moz.build
@@ -88,11 +88,14 @@ EXTRA_COMPONENTS += [
]
EXTRA_JS_MODULES += [
- "BrowserContentHandler.jsm",
"BrowserGlue.jsm",
"distribution.js",
]
+EXTRA_PP_JS_MODULES += [
+ "BrowserContentHandler.jsm",
+]
+
BROWSER_CHROME_MANIFESTS += [
"safebrowsing/content/test/browser.ini",
"tests/browser/browser.ini",
diff --git a/browser/locales/en-US/chrome/browser/aboutTBUpdate.dtd b/browser/locales/en-US/chrome/browser/aboutTBUpdate.dtd
new file mode 100644
index 000000000000..2d1e59b40eaf
--- /dev/null
+++ b/browser/locales/en-US/chrome/browser/aboutTBUpdate.dtd
@@ -0,0 +1,8 @@
+<!ENTITY aboutTBUpdate.changelogTitle "Tor Browser Changelog">
+<!ENTITY aboutTBUpdate.updated "Tor Browser has been updated.">
+<!ENTITY aboutTBUpdate.linkPrefix "For the most up-to-date information about this release, ">
+<!ENTITY aboutTBUpdate.linkLabel "visit our website">
+<!ENTITY aboutTBUpdate.linkSuffix ".">
+<!ENTITY aboutTBUpdate.version "Version">
+<!ENTITY aboutTBUpdate.releaseDate "Release Date">
+<!ENTITY aboutTBUpdate.releaseNotes "Release Notes">
diff --git a/browser/locales/jar.mn b/browser/locales/jar.mn
index 6000f3b48c01..2aecae56bdca 100644
--- a/browser/locales/jar.mn
+++ b/browser/locales/jar.mn
@@ -20,6 +20,9 @@
locale/browser/accounts.properties (%chrome/browser/accounts.properties)
locale/browser/app-extension-fields.properties (%chrome/browser/app-extension-fields.properties)
+#ifdef TOR_BROWSER_UPDATE
+ locale/browser/aboutTBUpdate.dtd (%chrome/browser/aboutTBUpdate.dtd)
+#endif
locale/browser/browser.dtd (%chrome/browser/browser.dtd)
locale/browser/browser.properties (%chrome/browser/browser.properties)
locale/browser/customizableui/customizableWidgets.properties (%chrome/browser/customizableui/customizableWidgets.properties)
diff --git a/toolkit/modules/RemotePageAccessManager.jsm b/toolkit/modules/RemotePageAccessManager.jsm
index 4d16894f1164..877aa998dd4e 100644
--- a/toolkit/modules/RemotePageAccessManager.jsm
+++ b/toolkit/modules/RemotePageAccessManager.jsm
@@ -192,6 +192,11 @@ let RemotePageAccessManager = {
RPMAddMessageListener: ["*"],
RPMRemoveMessageListener: ["*"],
},
+ "about:tbupdate": {
+ RPMSendQuery: [
+ "FetchUpdateData",
+ ],
+ },
},
/**
1
0
[tor-browser/tor-browser-86.0b1-10.5-1] Bug 23104: Add a default line height compensation
by gkï¼ torproject.org 30 Jan '21
by gkï¼ torproject.org 30 Jan '21
30 Jan '21
commit 55151f69fe02715e35cb649ccc70cfac67e555f8
Author: Igor Oliveira <igor.oliveira(a)posteo.net>
Date: Sun Dec 10 18:16:59 2017 -0200
Bug 23104: Add a default line height compensation
Many fonts have issues with their vertical metrics. they
are used to influence the height of ascenders and depth
of descenders. Gecko uses it to calculate the line height
(font height + ascender + descender), however because of
that idiosyncratic behavior across multiple operating
systems, it can be used to identify the user's OS.
The solution proposed in the patch uses a default factor
to be multiplied with the font size, simulating the concept
of ascender and descender. This way all operating
systems will have the same line height only and only if the
frame is outside the chrome.
---
layout/generic/ReflowInput.cpp | 19 +++++++++---
layout/generic/test/mochitest.ini | 1 +
layout/generic/test/test_tor_bug23104.html | 50 ++++++++++++++++++++++++++++++
3 files changed, 65 insertions(+), 5 deletions(-)
diff --git a/layout/generic/ReflowInput.cpp b/layout/generic/ReflowInput.cpp
index fb78c89e913b..60fdc5023d5e 100644
--- a/layout/generic/ReflowInput.cpp
+++ b/layout/generic/ReflowInput.cpp
@@ -31,6 +31,7 @@
#include "mozilla/SVGUtils.h"
#include "mozilla/dom/HTMLInputElement.h"
#include "nsGridContainerFrame.h"
+#include "nsContentUtils.h"
using namespace mozilla;
using namespace mozilla::css;
@@ -2666,7 +2667,8 @@ void ReflowInput::CalculateBlockSideMargins(LayoutFrameType aFrameType) {
// For risk management, we use preference to control the behavior, and
// eNoExternalLeading is the old behavior.
-static nscoord GetNormalLineHeight(nsFontMetrics* aFontMetrics) {
+static nscoord GetNormalLineHeight(nsIContent* aContent,
+ nsFontMetrics* aFontMetrics) {
MOZ_ASSERT(nullptr != aFontMetrics, "no font metrics");
nscoord normalLineHeight;
@@ -2674,6 +2676,12 @@ static nscoord GetNormalLineHeight(nsFontMetrics* aFontMetrics) {
nscoord externalLeading = aFontMetrics->ExternalLeading();
nscoord internalLeading = aFontMetrics->InternalLeading();
nscoord emHeight = aFontMetrics->EmHeight();
+
+ if (nsContentUtils::ShouldResistFingerprinting() &&
+ !aContent->IsInChromeDocument()) {
+ return NSToCoordRound(emHeight * NORMAL_LINE_HEIGHT_FACTOR);
+ }
+
switch (GetNormalLineHeightCalcControl()) {
case eIncludeExternalLeading:
normalLineHeight = emHeight + internalLeading + externalLeading;
@@ -2691,7 +2699,8 @@ static nscoord GetNormalLineHeight(nsFontMetrics* aFontMetrics) {
return normalLineHeight;
}
-static inline nscoord ComputeLineHeight(ComputedStyle* aComputedStyle,
+static inline nscoord ComputeLineHeight(nsIContent* aContent,
+ ComputedStyle* aComputedStyle,
nsPresContext* aPresContext,
nscoord aBlockBSize,
float aFontSizeInflation) {
@@ -2720,7 +2729,7 @@ static inline nscoord ComputeLineHeight(ComputedStyle* aComputedStyle,
RefPtr<nsFontMetrics> fm = nsLayoutUtils::GetFontMetricsForComputedStyle(
aComputedStyle, aPresContext, aFontSizeInflation);
- return GetNormalLineHeight(fm);
+ return GetNormalLineHeight(aContent, fm);
}
nscoord ReflowInput::CalcLineHeight() const {
@@ -2742,7 +2751,7 @@ nscoord ReflowInput::CalcLineHeight(nsIContent* aContent,
float aFontSizeInflation) {
MOZ_ASSERT(aComputedStyle, "Must have a ComputedStyle");
- nscoord lineHeight = ComputeLineHeight(aComputedStyle, aPresContext,
+ nscoord lineHeight = ComputeLineHeight(aContent, aComputedStyle, aPresContext,
aBlockBSize, aFontSizeInflation);
NS_ASSERTION(lineHeight >= 0, "ComputeLineHeight screwed up");
@@ -2755,7 +2764,7 @@ nscoord ReflowInput::CalcLineHeight(nsIContent* aContent,
if (!lh.IsNormal()) {
RefPtr<nsFontMetrics> fm = nsLayoutUtils::GetFontMetricsForComputedStyle(
aComputedStyle, aPresContext, aFontSizeInflation);
- nscoord normal = GetNormalLineHeight(fm);
+ nscoord normal = GetNormalLineHeight(aContent, fm);
if (lineHeight < normal) {
lineHeight = normal;
}
diff --git a/layout/generic/test/mochitest.ini b/layout/generic/test/mochitest.ini
index 2d61b5dae990..93d7d9ae1fb9 100644
--- a/layout/generic/test/mochitest.ini
+++ b/layout/generic/test/mochitest.ini
@@ -150,3 +150,4 @@ skip-if = debug == true || tsan # the test is slow. tsan: bug 1612707
support-files =
file_reframe_for_lazy_load_image.html
[test_bug1655135.html]
+[test_tor_bug23104.html]
diff --git a/layout/generic/test/test_tor_bug23104.html b/layout/generic/test/test_tor_bug23104.html
new file mode 100644
index 000000000000..8ff1d2190c45
--- /dev/null
+++ b/layout/generic/test/test_tor_bug23104.html
@@ -0,0 +1,50 @@
+<!DOCTYPE HTML>
+<meta charset="UTF-8">
+<html>
+<head>
+ <title>Test for Tor Bug #23104: CSS line-height reveals the platform Tor browser is running</title>
+ <script type="application/javascript" src="/tests/SimpleTest/SimpleTest.js"></script>
+ <script type="application/javascript" src="/tests/SimpleTest/SpawnTask.js"></script>
+ <style type="text/css">
+ span {
+ background-color: #000;
+ color: #fff;
+ font-size: 16.5px;
+ }
+ </style>
+</head>
+<body>
+<span id="test1">Test1</span>
+<span id="test2">كلمة</span>
+<span id="test3">ação</span>
+<script>
+
+let setPref = async function (key, value) {
+ await SpecialPowers.pushPrefEnv({"set": [[key, value]]});
+}
+
+function getStyle(el, styleprop) {
+ el = document.getElementById(el);
+ return document.defaultView.getComputedStyle(el, null).getPropertyValue(styleprop);
+}
+
+function validateElement(elementName, isFingerprintResistent) {
+ var fontSize = getStyle(elementName, 'font-size');
+ var lineHeight = getStyle(elementName, 'line-height');
+ var validationCb = isFingerprintResistent ? is : isnot;
+ validationCb(parseFloat(lineHeight), Math.round(parseFloat(fontSize)) * 1.2, 'Line Height validation');
+}
+
+add_task(async function() {
+ await setPref("layout.css.line-height.normal-as-resolved-value.enabled", false);
+ for (let resistFingerprintingValue of [true, false]) {
+ await setPref("privacy.resistFingerprinting", resistFingerprintingValue);
+ for (let elementId of ['test1', 'test2', 'test3']) {
+ validateElement(elementId, resistFingerprintingValue);
+ }
+ }
+});
+
+</script>
+</body>
+</html>
1
0
[tor-browser/tor-browser-86.0b1-10.5-1] Bug 16285: Exclude ClearKey system for now
by gkï¼ torproject.org 30 Jan '21
by gkï¼ torproject.org 30 Jan '21
30 Jan '21
commit 7c1f1640d2165bd7dd752014021165dcd56a7ee5
Author: Georg Koppen <gk(a)torproject.org>
Date: Mon May 22 12:44:40 2017 +0000
Bug 16285: Exclude ClearKey system for now
In the past the ClearKey system had not been compiled when specifying
--disable-eme. But that changed and it is even bundled nowadays (see:
Mozilla's bug 1300654). We don't want to ship it right now as the use
case for it is not really visible while the code had security
vulnerabilities in the past.
---
browser/installer/package-manifest.in | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/browser/installer/package-manifest.in b/browser/installer/package-manifest.in
index f40210cc51cb..0929e113ea71 100644
--- a/browser/installer/package-manifest.in
+++ b/browser/installer/package-manifest.in
@@ -464,8 +464,8 @@ bin/libfreebl_64int_3.so
#endif
; media
-@RESPATH@/gmp-clearkey/0.1/@DLL_PREFIX@clearkey@DLL_SUFFIX@
-@RESPATH@/gmp-clearkey/0.1/manifest.json
+;@RESPATH@/gmp-clearkey/0.1/@DLL_PREFIX@clearkey@DLL_SUFFIX@
+;@RESPATH@/gmp-clearkey/0.1/manifest.json
#ifdef MOZ_DMD
; DMD
1
0