henry pushed to branch tor-browser-128.8.0esr-14.5-1 at The Tor Project / Applications / Tor Browser

Commits:

8 changed files:

Changes:

  • browser/components/BrowserGlue.sys.mjs
    ... ... @@ -96,6 +96,8 @@ ChromeUtils.defineESModuleGetters(lazy, {
    96 96
       TorConnect: "resource://gre/modules/TorConnect.sys.mjs",
    
    97 97
       TorConnectTopics: "resource://gre/modules/TorConnect.sys.mjs",
    
    98 98
       TorProviderBuilder: "resource://gre/modules/TorProviderBuilder.sys.mjs",
    
    99
    +  TorSettingsNotification:
    
    100
    +    "resource:///modules/TorSettingsNotification.sys.mjs",
    
    99 101
       UIState: "resource://services-sync/UIState.sys.mjs",
    
    100 102
       UrlbarPrefs: "resource:///modules/UrlbarPrefs.sys.mjs",
    
    101 103
       WebChannel: "resource://gre/modules/WebChannel.sys.mjs",
    
    ... ... @@ -2030,6 +2032,8 @@ BrowserGlue.prototype = {
    2030 2032
     
    
    2031 2033
         lazy.TorProviderBuilder.firstWindowLoaded();
    
    2032 2034
     
    
    2035
    +    lazy.TorSettingsNotification.ready();
    
    2036
    +
    
    2033 2037
         ClipboardPrivacy.startup();
    
    2034 2038
     
    
    2035 2039
         this._firstWindowTelemetry(aWindow);
    

  • browser/components/torpreferences/content/connectionSettingsDialog.js
    ... ... @@ -5,6 +5,7 @@ const { TorSettings, TorProxyType } = ChromeUtils.importESModule(
    5 5
     );
    
    6 6
     
    
    7 7
     const gConnectionSettingsDialog = {
    
    8
    +  _acceptButton: null,
    
    8 9
       _useProxyCheckbox: null,
    
    9 10
       _proxyTypeLabel: null,
    
    10 11
       _proxyTypeMenulist: null,
    
    ... ... @@ -38,25 +39,43 @@ const gConnectionSettingsDialog = {
    38 39
           "input#torPreferences-connection-textboxAllowedPorts",
    
    39 40
       },
    
    40 41
     
    
    41
    -  // disables the provided list of elements
    
    42
    -  _setElementsDisabled(elements, disabled) {
    
    43
    -    for (let currentElement of elements) {
    
    44
    -      currentElement.disabled = disabled;
    
    45
    -    }
    
    46
    -  },
    
    42
    +  /**
    
    43
    +   * The "proxy" and "firewall" settings to pass on to TorSettings.
    
    44
    +   *
    
    45
    +   * Each group is `null` whilst the inputs are invalid.
    
    46
    +   *
    
    47
    +   * @type {{proxy: ?object, firewall: ?object}}
    
    48
    +   */
    
    49
    +  _settings: { proxy: null, firewall: null },
    
    47 50
     
    
    48 51
       init() {
    
    52
    +    const currentSettings = TorSettings.getSettings();
    
    53
    +
    
    54
    +    const dialog = document.getElementById("torPreferences-connection-dialog");
    
    55
    +    dialog.addEventListener("dialogaccept", event => {
    
    56
    +      if (!this._settings.proxy || !this._settings.firewall) {
    
    57
    +        // Do not close yet.
    
    58
    +        event.preventDefault();
    
    59
    +        return;
    
    60
    +      }
    
    61
    +      // TODO: Maybe wait for the method to resolve before closing. Although
    
    62
    +      // this can take a few seconds. See tor-browser#43467.
    
    63
    +      TorSettings.changeSettings(this._settings);
    
    64
    +    });
    
    65
    +    this._acceptButton = dialog.getButton("accept");
    
    66
    +
    
    49 67
         const selectors = this.selectors;
    
    50 68
     
    
    51 69
         // Local Proxy
    
    52 70
         this._useProxyCheckbox = document.querySelector(selectors.useProxyCheckbox);
    
    71
    +    this._useProxyCheckbox.checked = currentSettings.proxy.enabled;
    
    53 72
         this._useProxyCheckbox.addEventListener("command", () => {
    
    54
    -      const checked = this._useProxyCheckbox.checked;
    
    55
    -      this.onToggleProxy(checked);
    
    73
    +      this.updateProxyType();
    
    56 74
         });
    
    75
    +
    
    57 76
         this._proxyTypeLabel = document.querySelector(selectors.proxyTypeLabel);
    
    58 77
     
    
    59
    -    let mockProxies = [
    
    78
    +    const mockProxies = [
    
    60 79
           {
    
    61 80
             value: TorProxyType.Socks4,
    
    62 81
             l10nId: "tor-advanced-dialog-proxy-socks4-menuitem",
    
    ... ... @@ -72,15 +91,17 @@ const gConnectionSettingsDialog = {
    72 91
         ];
    
    73 92
         this._proxyTypeMenulist = document.querySelector(selectors.proxyTypeList);
    
    74 93
         this._proxyTypeMenulist.addEventListener("command", () => {
    
    75
    -      const value = this._proxyTypeMenulist.value;
    
    76
    -      this.onSelectProxyType(value);
    
    94
    +      this.updateProxyType();
    
    77 95
         });
    
    78
    -    for (let currentProxy of mockProxies) {
    
    96
    +    for (const currentProxy of mockProxies) {
    
    79 97
           let menuEntry = window.document.createXULElement("menuitem");
    
    80 98
           menuEntry.setAttribute("value", currentProxy.value);
    
    81 99
           menuEntry.setAttribute("data-l10n-id", currentProxy.l10nId);
    
    82 100
           this._proxyTypeMenulist.querySelector("menupopup").appendChild(menuEntry);
    
    83 101
         }
    
    102
    +    this._proxyTypeMenulist.value = currentSettings.proxy.enabled
    
    103
    +      ? currentSettings.proxy.type
    
    104
    +      : "";
    
    84 105
     
    
    85 106
         this._proxyAddressLabel = document.querySelector(
    
    86 107
           selectors.proxyAddressLabel
    
    ... ... @@ -89,13 +110,15 @@ const gConnectionSettingsDialog = {
    89 110
           selectors.proxyAddressTextbox
    
    90 111
         );
    
    91 112
         this._proxyAddressTextbox.addEventListener("blur", () => {
    
    113
    +      // If the address includes a port move it to the port input instead.
    
    92 114
           let value = this._proxyAddressTextbox.value.trim();
    
    93 115
           let colon = value.lastIndexOf(":");
    
    94 116
           if (colon != -1) {
    
    95
    -        let maybePort = parseInt(value.substr(colon + 1));
    
    96
    -        if (!isNaN(maybePort) && maybePort > 0 && maybePort < 65536) {
    
    117
    +        let maybePort = this.parsePort(value.substr(colon + 1));
    
    118
    +        if (maybePort !== null) {
    
    97 119
               this._proxyAddressTextbox.value = value.substr(0, colon);
    
    98 120
               this._proxyPortTextbox.value = maybePort;
    
    121
    +          this.updateProxy();
    
    99 122
             }
    
    100 123
           }
    
    101 124
         });
    
    ... ... @@ -114,23 +137,36 @@ const gConnectionSettingsDialog = {
    114 137
           selectors.proxyPasswordTextbox
    
    115 138
         );
    
    116 139
     
    
    117
    -    this.onToggleProxy(false);
    
    118
    -    if (TorSettings.proxy.enabled) {
    
    119
    -      this.onToggleProxy(true);
    
    120
    -      this.onSelectProxyType(TorSettings.proxy.type);
    
    121
    -      this._proxyAddressTextbox.value = TorSettings.proxy.address;
    
    122
    -      this._proxyPortTextbox.value = TorSettings.proxy.port;
    
    123
    -      this._proxyUsernameTextbox.value = TorSettings.proxy.username;
    
    124
    -      this._proxyPasswordTextbox.value = TorSettings.proxy.password;
    
    140
    +    if (currentSettings.proxy.enabled) {
    
    141
    +      this._proxyAddressTextbox.value = currentSettings.proxy.address;
    
    142
    +      this._proxyPortTextbox.value = currentSettings.proxy.port;
    
    143
    +      this._proxyUsernameTextbox.value = currentSettings.proxy.username;
    
    144
    +      this._proxyPasswordTextbox.value = currentSettings.proxy.password;
    
    145
    +    } else {
    
    146
    +      this._proxyAddressTextbox.value = "";
    
    147
    +      this._proxyPortTextbox.value = "";
    
    148
    +      this._proxyUsernameTextbox.value = "";
    
    149
    +      this._proxyPasswordTextbox.value = "";
    
    150
    +    }
    
    151
    +
    
    152
    +    for (const el of [
    
    153
    +      this._proxyAddressTextbox,
    
    154
    +      this._proxyPortTextbox,
    
    155
    +      this._proxyUsernameTextbox,
    
    156
    +      this._proxyPasswordTextbox,
    
    157
    +    ]) {
    
    158
    +      el.addEventListener("input", () => {
    
    159
    +        this.updateProxy();
    
    160
    +      });
    
    125 161
         }
    
    126 162
     
    
    127 163
         // Local firewall
    
    128 164
         this._useFirewallCheckbox = document.querySelector(
    
    129 165
           selectors.useFirewallCheckbox
    
    130 166
         );
    
    167
    +    this._useFirewallCheckbox.checked = currentSettings.firewall.enabled;
    
    131 168
         this._useFirewallCheckbox.addEventListener("command", () => {
    
    132
    -      const checked = this._useFirewallCheckbox.checked;
    
    133
    -      this.onToggleFirewall(checked);
    
    169
    +      this.updateFirewallEnabled();
    
    134 170
         });
    
    135 171
         this._allowedPortsLabel = document.querySelector(
    
    136 172
           selectors.firewallAllowedPortsLabel
    
    ... ... @@ -138,182 +174,161 @@ const gConnectionSettingsDialog = {
    138 174
         this._allowedPortsTextbox = document.querySelector(
    
    139 175
           selectors.firewallAllowedPortsTextbox
    
    140 176
         );
    
    177
    +    this._allowedPortsTextbox.value = currentSettings.firewall.enabled
    
    178
    +      ? currentSettings.firewall.allowed_ports.join(",")
    
    179
    +      : "80,443";
    
    141 180
     
    
    142
    -    this.onToggleFirewall(false);
    
    143
    -    if (TorSettings.firewall.enabled) {
    
    144
    -      this.onToggleFirewall(true);
    
    145
    -      this._allowedPortsTextbox.value =
    
    146
    -        TorSettings.firewall.allowed_ports.join(", ");
    
    147
    -    }
    
    148
    -
    
    149
    -    const dialog = document.getElementById("torPreferences-connection-dialog");
    
    150
    -    dialog.addEventListener("dialogaccept", () => {
    
    151
    -      this._applySettings();
    
    181
    +    this._allowedPortsTextbox.addEventListener("input", () => {
    
    182
    +      this.updateFirewall();
    
    152 183
         });
    
    153
    -  },
    
    154 184
     
    
    155
    -  // callback when proxy is toggled
    
    156
    -  onToggleProxy(enabled) {
    
    157
    -    this._useProxyCheckbox.checked = enabled;
    
    158
    -    let disabled = !enabled;
    
    185
    +    this.updateProxyType();
    
    186
    +    this.updateFirewallEnabled();
    
    187
    +  },
    
    159 188
     
    
    160
    -    this._setElementsDisabled(
    
    161
    -      [
    
    162
    -        this._proxyTypeLabel,
    
    163
    -        this._proxyTypeMenulist,
    
    164
    -        this._proxyAddressLabel,
    
    165
    -        this._proxyAddressTextbox,
    
    166
    -        this._proxyPortLabel,
    
    167
    -        this._proxyPortTextbox,
    
    168
    -        this._proxyUsernameLabel,
    
    169
    -        this._proxyUsernameTextbox,
    
    170
    -        this._proxyPasswordLabel,
    
    171
    -        this._proxyPasswordTextbox,
    
    172
    -      ],
    
    173
    -      disabled
    
    174
    -    );
    
    175
    -    if (enabled) {
    
    176
    -      this.onSelectProxyType(this._proxyTypeMenulist.value);
    
    189
    +  /**
    
    190
    +   * Convert a string into a port number.
    
    191
    +   *
    
    192
    +   * @param {string} portStr - The string to convert.
    
    193
    +   * @returns {?integer} - The port number, or `null` if the given string could
    
    194
    +   *   not be converted.
    
    195
    +   */
    
    196
    +  parsePort(portStr) {
    
    197
    +    const portRegex = /^[1-9][0-9]*$/; // Strictly-positive decimal integer.
    
    198
    +    if (!portRegex.test(portStr)) {
    
    199
    +      return null;
    
    177 200
         }
    
    201
    +    const port = parseInt(portStr, 10);
    
    202
    +    if (TorSettings.validPort(port)) {
    
    203
    +      return port;
    
    204
    +    }
    
    205
    +    return null;
    
    178 206
       },
    
    179 207
     
    
    180
    -  // callback when proxy type is changed
    
    181
    -  onSelectProxyType(value) {
    
    182
    -    if (typeof value === "string") {
    
    183
    -      value = parseInt(value);
    
    184
    -    }
    
    208
    +  /**
    
    209
    +   * Update the disabled state of the accept button.
    
    210
    +   */
    
    211
    +  updateAcceptButton() {
    
    212
    +    this._acceptButton.disabled =
    
    213
    +      !this._settings.proxy || !this._settings.firewall;
    
    214
    +  },
    
    185 215
     
    
    186
    -    this._proxyTypeMenulist.value = value;
    
    187
    -    switch (value) {
    
    188
    -      case TorProxyType.Invalid: {
    
    189
    -        this._setElementsDisabled(
    
    190
    -          [
    
    191
    -            this._proxyAddressLabel,
    
    192
    -            this._proxyAddressTextbox,
    
    193
    -            this._proxyPortLabel,
    
    194
    -            this._proxyPortTextbox,
    
    195
    -            this._proxyUsernameLabel,
    
    196
    -            this._proxyUsernameTextbox,
    
    197
    -            this._proxyPasswordLabel,
    
    198
    -            this._proxyPasswordTextbox,
    
    199
    -          ],
    
    200
    -          true
    
    201
    -        ); // DISABLE
    
    216
    +  /**
    
    217
    +   * Update the UI when the proxy setting is enabled or disabled, or the proxy
    
    218
    +   * type changes.
    
    219
    +   */
    
    220
    +  updateProxyType() {
    
    221
    +    const enabled = this._useProxyCheckbox.checked;
    
    222
    +    const haveType = enabled && Boolean(this._proxyTypeMenulist.value);
    
    223
    +    const type = parseInt(this._proxyTypeMenulist.value, 10);
    
    202 224
     
    
    203
    -        this._proxyAddressTextbox.value = "";
    
    204
    -        this._proxyPortTextbox.value = "";
    
    205
    -        this._proxyUsernameTextbox.value = "";
    
    206
    -        this._proxyPasswordTextbox.value = "";
    
    207
    -        break;
    
    208
    -      }
    
    209
    -      case TorProxyType.Socks4: {
    
    210
    -        this._setElementsDisabled(
    
    211
    -          [
    
    212
    -            this._proxyAddressLabel,
    
    213
    -            this._proxyAddressTextbox,
    
    214
    -            this._proxyPortLabel,
    
    215
    -            this._proxyPortTextbox,
    
    216
    -          ],
    
    217
    -          false
    
    218
    -        ); // ENABLE
    
    219
    -        this._setElementsDisabled(
    
    220
    -          [
    
    221
    -            this._proxyUsernameLabel,
    
    222
    -            this._proxyUsernameTextbox,
    
    223
    -            this._proxyPasswordLabel,
    
    224
    -            this._proxyPasswordTextbox,
    
    225
    -          ],
    
    226
    -          true
    
    227
    -        ); // DISABLE
    
    225
    +    this._proxyTypeLabel.disabled = !enabled;
    
    226
    +    this._proxyTypeMenulist.disabled = !enabled;
    
    227
    +    this._proxyAddressLabel.disabled = !haveType;
    
    228
    +    this._proxyAddressTextbox.disabled = !haveType;
    
    229
    +    this._proxyPortLabel.disabled = !haveType;
    
    230
    +    this._proxyPortTextbox.disabled = !haveType;
    
    231
    +    this._proxyUsernameTextbox.disabled =
    
    232
    +      !haveType || type === TorProxyType.Socks4;
    
    233
    +    this._proxyPasswordTextbox.disabled =
    
    234
    +      !haveType || type === TorProxyType.Socks4;
    
    235
    +    if (type === TorProxyType.Socks4) {
    
    236
    +      // Clear unused value.
    
    237
    +      this._proxyUsernameTextbox.value = "";
    
    238
    +      this._proxyPasswordTextbox.value = "";
    
    239
    +    }
    
    228 240
     
    
    229
    -        this._proxyUsernameTextbox.value = "";
    
    230
    -        this._proxyPasswordTextbox.value = "";
    
    231
    -        break;
    
    232
    -      }
    
    233
    -      case TorProxyType.Socks5:
    
    234
    -      case TorProxyType.HTTPS: {
    
    235
    -        this._setElementsDisabled(
    
    236
    -          [
    
    237
    -            this._proxyAddressLabel,
    
    238
    -            this._proxyAddressTextbox,
    
    239
    -            this._proxyPortLabel,
    
    240
    -            this._proxyPortTextbox,
    
    241
    -            this._proxyUsernameLabel,
    
    242
    -            this._proxyUsernameTextbox,
    
    243
    -            this._proxyPasswordLabel,
    
    244
    -            this._proxyPasswordTextbox,
    
    245
    -          ],
    
    246
    -          false
    
    247
    -        ); // ENABLE
    
    248
    -        break;
    
    241
    +    this.updateProxy();
    
    242
    +  },
    
    243
    +
    
    244
    +  /**
    
    245
    +   * Update the dialog's stored proxy values.
    
    246
    +   */
    
    247
    +  updateProxy() {
    
    248
    +    if (this._useProxyCheckbox.checked) {
    
    249
    +      const typeStr = this._proxyTypeMenulist.value;
    
    250
    +      const type = parseInt(typeStr, 10);
    
    251
    +      // TODO: Validate the address. See tor-browser#43467.
    
    252
    +      const address = this._proxyAddressTextbox.value;
    
    253
    +      const portStr = this._proxyPortTextbox.value;
    
    254
    +      const username =
    
    255
    +        type === TorProxyType.Socks4 ? "" : this._proxyUsernameTextbox.value;
    
    256
    +      const password =
    
    257
    +        type === TorProxyType.Socks4 ? "" : this._proxyPasswordTextbox.value;
    
    258
    +      const port = parseInt(portStr, 10);
    
    259
    +      if (
    
    260
    +        !typeStr ||
    
    261
    +        !address ||
    
    262
    +        !portStr ||
    
    263
    +        !TorSettings.validPort(port) ||
    
    264
    +        // SOCKS5 needs either both username and password, or neither.
    
    265
    +        (type === TorProxyType.Socks5 &&
    
    266
    +          !TorSettings.validSocks5Credentials(username, password))
    
    267
    +      ) {
    
    268
    +        // Invalid.
    
    269
    +        this._settings.proxy = null;
    
    270
    +      } else {
    
    271
    +        this._settings.proxy = {
    
    272
    +          enabled: true,
    
    273
    +          type,
    
    274
    +          address,
    
    275
    +          port,
    
    276
    +          username,
    
    277
    +          password,
    
    278
    +        };
    
    249 279
           }
    
    280
    +    } else {
    
    281
    +      this._settings.proxy = { enabled: false };
    
    250 282
         }
    
    283
    +
    
    284
    +    this.updateAcceptButton();
    
    251 285
       },
    
    252 286
     
    
    253
    -  // callback when firewall proxy is toggled
    
    254
    -  onToggleFirewall(enabled) {
    
    255
    -    this._useFirewallCheckbox.checked = enabled;
    
    256
    -    let disabled = !enabled;
    
    287
    +  /**
    
    288
    +   * Update the UI when the firewall setting is enabled or disabled.
    
    289
    +   */
    
    290
    +  updateFirewallEnabled() {
    
    291
    +    const enabled = this._useFirewallCheckbox.checked;
    
    292
    +    this._allowedPortsLabel.disabled = !enabled;
    
    293
    +    this._allowedPortsTextbox.disabled = !enabled;
    
    257 294
     
    
    258
    -    this._setElementsDisabled(
    
    259
    -      [this._allowedPortsLabel, this._allowedPortsTextbox],
    
    260
    -      disabled
    
    261
    -    );
    
    295
    +    this.updateFirewall();
    
    262 296
       },
    
    263 297
     
    
    264
    -  // pushes settings from UI to tor
    
    265
    -  _applySettings() {
    
    266
    -    const type = this._useProxyCheckbox.checked
    
    267
    -      ? parseInt(this._proxyTypeMenulist.value)
    
    268
    -      : TorProxyType.Invalid;
    
    269
    -    const address = this._proxyAddressTextbox.value;
    
    270
    -    const port = this._proxyPortTextbox.value;
    
    271
    -    const username = this._proxyUsernameTextbox.value;
    
    272
    -    const password = this._proxyPasswordTextbox.value;
    
    273
    -    const settings = { proxy: {}, firewall: {} };
    
    274
    -    switch (type) {
    
    275
    -      case TorProxyType.Invalid:
    
    276
    -        settings.proxy.enabled = false;
    
    277
    -        break;
    
    278
    -      case TorProxyType.Socks4:
    
    279
    -        settings.proxy.enabled = true;
    
    280
    -        settings.proxy.type = type;
    
    281
    -        settings.proxy.address = address;
    
    282
    -        settings.proxy.port = port;
    
    283
    -        settings.proxy.username = "";
    
    284
    -        settings.proxy.password = "";
    
    285
    -        break;
    
    286
    -      case TorProxyType.Socks5:
    
    287
    -        settings.proxy.enabled = true;
    
    288
    -        settings.proxy.type = type;
    
    289
    -        settings.proxy.address = address;
    
    290
    -        settings.proxy.port = port;
    
    291
    -        settings.proxy.username = username;
    
    292
    -        settings.proxy.password = password;
    
    293
    -        break;
    
    294
    -      case TorProxyType.HTTPS:
    
    295
    -        settings.proxy.enabled = true;
    
    296
    -        settings.proxy.type = type;
    
    297
    -        settings.proxy.address = address;
    
    298
    -        settings.proxy.port = port;
    
    299
    -        settings.proxy.username = username;
    
    300
    -        settings.proxy.password = password;
    
    301
    -        break;
    
    302
    -    }
    
    303
    -
    
    304
    -    let portListString = this._useFirewallCheckbox.checked
    
    305
    -      ? this._allowedPortsTextbox.value
    
    306
    -      : "";
    
    307
    -    if (portListString) {
    
    308
    -      settings.firewall.enabled = true;
    
    309
    -      settings.firewall.allowed_ports = portListString;
    
    298
    +  /**
    
    299
    +   * Update the dialog's stored firewall values.
    
    300
    +   */
    
    301
    +  updateFirewall() {
    
    302
    +    if (this._useFirewallCheckbox.checked) {
    
    303
    +      const portList = [];
    
    304
    +      let listInvalid = false;
    
    305
    +      for (const portStr of this._allowedPortsTextbox.value.split(
    
    306
    +        /(?:\s*,\s*)+/g
    
    307
    +      )) {
    
    308
    +        if (!portStr) {
    
    309
    +          // Trailing or leading comma.
    
    310
    +          continue;
    
    311
    +        }
    
    312
    +        const port = this.parsePort(portStr);
    
    313
    +        if (port === null) {
    
    314
    +          listInvalid = true;
    
    315
    +          break;
    
    316
    +        }
    
    317
    +        portList.push(port);
    
    318
    +      }
    
    319
    +      if (!listInvalid && portList.length) {
    
    320
    +        this._settings.firewall = {
    
    321
    +          enabled: true,
    
    322
    +          allowed_ports: portList,
    
    323
    +        };
    
    324
    +      } else {
    
    325
    +        this._settings.firewall = null;
    
    326
    +      }
    
    310 327
         } else {
    
    311
    -      settings.firewall.enabled = false;
    
    328
    +      this._settings.firewall = { enabled: false };
    
    312 329
         }
    
    313 330
     
    
    314
    -    // FIXME: What if this fails? Should we prevent the dialog to close and show
    
    315
    -    // an error?
    
    316
    -    TorSettings.changeSettings(settings);
    
    331
    +    this.updateAcceptButton();
    
    317 332
       },
    
    318 333
     };
    
    319 334
     
    

  • browser/components/torpreferences/content/connectionSettingsDialog.xhtml
    ... ... @@ -61,6 +61,7 @@
    61 61
             <html:input
    
    62 62
               id="torPreferences-localProxy-textboxAddress"
    
    63 63
               type="text"
    
    64
    +          required="required"
    
    64 65
               class="torMarginFix"
    
    65 66
               data-l10n-id="tor-advanced-dialog-proxy-address-input"
    
    66 67
             />
    
    ... ... @@ -75,7 +76,8 @@
    75 76
               class="proxy-port-input torMarginFix"
    
    76 77
               hidespinbuttons="true"
    
    77 78
               type="number"
    
    78
    -          min="0"
    
    79
    +          required="required"
    
    80
    +          min="1"
    
    79 81
               max="65535"
    
    80 82
               maxlength="5"
    
    81 83
             />
    
    ... ... @@ -121,11 +123,14 @@
    121 123
             />
    
    122 124
           </hbox>
    
    123 125
           <hbox id="torPreferences-connection-hboxAllowedPorts" align="center">
    
    126
    +        <!-- NOTE: The pattern allows comma-separated strictly positive
    
    127
    +           - integers. In particular "0" is not allowed. -->
    
    124 128
             <html:input
    
    125 129
               id="torPreferences-connection-textboxAllowedPorts"
    
    126 130
               type="text"
    
    131
    +          required="required"
    
    132
    +          pattern="^(\s*,\s*)*[1-9][0-9]*((\s*,\s*)|([1-9][0-9]*))*$"
    
    127 133
               class="torMarginFix"
    
    128
    -          value="80,443"
    
    129 134
               data-l10n-id="tor-advanced-dialog-firewall-ports-input"
    
    130 135
             />
    
    131 136
           </hbox>
    

  • browser/modules/TorSettingsNotification.sys.mjs
    1
    +const lazy = {};
    
    2
    +
    
    3
    +ChromeUtils.defineESModuleGetters(lazy, {
    
    4
    +  BrowserWindowTracker: "resource:///modules/BrowserWindowTracker.sys.mjs",
    
    5
    +  TorSettings: "resource://gre/modules/TorSettings.sys.mjs",
    
    6
    +  TorSettingsTopics: "resource://gre/modules/TorSettings.sys.mjs",
    
    7
    +});
    
    8
    +
    
    9
    +ChromeUtils.defineLazyGetter(lazy, "NotificationStrings", function () {
    
    10
    +  return new Localization(["toolkit/global/tor-browser.ftl"]);
    
    11
    +});
    
    12
    +
    
    13
    +/**
    
    14
    + * Shows a notification whenever we get an ApplyError.
    
    15
    + */
    
    16
    +export const TorSettingsNotification = {
    
    17
    +  /**
    
    18
    +   * Whether we have already been initialised.
    
    19
    +   *
    
    20
    +   * @type {boolean}
    
    21
    +   */
    
    22
    +  _initialized: false,
    
    23
    +
    
    24
    +  /**
    
    25
    +   * Called when the UI is ready to show a notification.
    
    26
    +   */
    
    27
    +  ready() {
    
    28
    +    if (this._initialized) {
    
    29
    +      return;
    
    30
    +    }
    
    31
    +    this._initialized = true;
    
    32
    +    Services.obs.addObserver(this, lazy.TorSettingsTopics.ApplyError);
    
    33
    +
    
    34
    +    // Show the notification for each group of settings if they have an error
    
    35
    +    // that was triggered prior to `ready` being called.
    
    36
    +    this.showNotification("bridges");
    
    37
    +    this.showNotification("proxy");
    
    38
    +    this.showNotification("firewall");
    
    39
    +  },
    
    40
    +
    
    41
    +  observe(subject, topic) {
    
    42
    +    if (topic === lazy.TorSettingsTopics.ApplyError) {
    
    43
    +      this.showNotification(subject.wrappedJSObject.group);
    
    44
    +    }
    
    45
    +  },
    
    46
    +
    
    47
    +  /**
    
    48
    +   * A promise for the `showNotification` method to ensure we only show one
    
    49
    +   * notification at a time.
    
    50
    +   *
    
    51
    +   * @type {?Promise}
    
    52
    +   */
    
    53
    +  _notificationPromise: null,
    
    54
    +
    
    55
    +  /**
    
    56
    +   * Show a notification for the given group of settings if `TorSettings` has an
    
    57
    +   * error for them.
    
    58
    +   *
    
    59
    +   * @param {string} group - The settings group to show the notification for.
    
    60
    +   */
    
    61
    +  async showNotification(group) {
    
    62
    +    const prevNotificationPromise = this._notificationPromise;
    
    63
    +    let notificationComplete;
    
    64
    +    ({ promise: this._notificationPromise, resolve: notificationComplete } =
    
    65
    +      Promise.withResolvers());
    
    66
    +    // Only want to show one notification at a time, so queue behind the
    
    67
    +    // previous one.
    
    68
    +    await prevNotificationPromise;
    
    69
    +
    
    70
    +    // NOTE: We only show the notification for a single `group` at a time, even
    
    71
    +    // when TorSettings has errors for multiple groups. This keeps the strings
    
    72
    +    // simple and means we can show different buttons depending on `canUndo` for
    
    73
    +    // each group individually.
    
    74
    +    // If we do have multiple errors the notification for each group will simply
    
    75
    +    // queue behind each other.
    
    76
    +    try {
    
    77
    +      // Grab the latest error value, which may have changed since
    
    78
    +      // showNotification was first called.
    
    79
    +      const error = lazy.TorSettings.getApplyError(group);
    
    80
    +      if (!error) {
    
    81
    +        // No current error for this group.
    
    82
    +        return;
    
    83
    +      }
    
    84
    +
    
    85
    +      const { canUndo } = error;
    
    86
    +
    
    87
    +      let titleId;
    
    88
    +      let introId;
    
    89
    +      switch (group) {
    
    90
    +        case "bridges":
    
    91
    +          titleId = "tor-settings-failed-notification-title-bridges";
    
    92
    +          introId = "tor-settings-failed-notification-cause-bridges";
    
    93
    +          break;
    
    94
    +        case "proxy":
    
    95
    +          titleId = "tor-settings-failed-notification-title-proxy";
    
    96
    +          introId = "tor-settings-failed-notification-cause-proxy";
    
    97
    +          break;
    
    98
    +        case "firewall":
    
    99
    +          titleId = "tor-settings-failed-notification-title-firewall";
    
    100
    +          introId = "tor-settings-failed-notification-cause-firewall";
    
    101
    +          break;
    
    102
    +      }
    
    103
    +
    
    104
    +      const [
    
    105
    +        titleText,
    
    106
    +        introText,
    
    107
    +        bodyText,
    
    108
    +        primaryButtonText,
    
    109
    +        secondaryButtonText,
    
    110
    +      ] = await lazy.NotificationStrings.formatValues([
    
    111
    +        { id: titleId },
    
    112
    +        { id: introId },
    
    113
    +        {
    
    114
    +          id: canUndo
    
    115
    +            ? "tor-settings-failed-notification-body-undo"
    
    116
    +            : "tor-settings-failed-notification-body-default",
    
    117
    +        },
    
    118
    +        {
    
    119
    +          id: canUndo
    
    120
    +            ? "tor-settings-failed-notification-button-undo"
    
    121
    +            : "tor-settings-failed-notification-button-clear",
    
    122
    +        },
    
    123
    +        { id: "tor-settings-failed-notification-button-fix-myself" },
    
    124
    +      ]);
    
    125
    +
    
    126
    +      const propBag = await Services.prompt.asyncConfirmEx(
    
    127
    +        lazy.BrowserWindowTracker.getTopWindow()?.browsingContext ?? null,
    
    128
    +        Services.prompt.MODAL_TYPE_INTERNAL_WINDOW,
    
    129
    +        titleText,
    
    130
    +        // Concatenate the intro text and the body text. Really these should be
    
    131
    +        // separate paragraph elements, but the prompt service does not support
    
    132
    +        // this. We split them with a double newline, which will hopefully avoid
    
    133
    +        // the usual problems with concatenating localised strings.
    
    134
    +        `${introText}\n\n${bodyText}`,
    
    135
    +        Services.prompt.BUTTON_TITLE_IS_STRING * Services.prompt.BUTTON_POS_0 +
    
    136
    +          Services.prompt.BUTTON_TITLE_IS_STRING * Services.prompt.BUTTON_POS_1,
    
    137
    +        primaryButtonText,
    
    138
    +        secondaryButtonText,
    
    139
    +        null,
    
    140
    +        null,
    
    141
    +        null,
    
    142
    +        {}
    
    143
    +      );
    
    144
    +
    
    145
    +      const buttonNum = propBag.get("buttonNumClicked");
    
    146
    +
    
    147
    +      if (buttonNum === 0) {
    
    148
    +        if (canUndo) {
    
    149
    +          // Wait for these methods in case they resolve the error for a pending
    
    150
    +          // showNotification call.
    
    151
    +          await lazy.TorSettings.undoFailedSettings(group);
    
    152
    +        } else {
    
    153
    +          await lazy.TorSettings.clearFailedSettings(group);
    
    154
    +        }
    
    155
    +      } else if (buttonNum === 1) {
    
    156
    +        let win = lazy.BrowserWindowTracker.getTopWindow();
    
    157
    +        if (!win) {
    
    158
    +          win = await lazy.BrowserWindowTracker.promiseOpenWindow();
    
    159
    +        }
    
    160
    +        // Open the preferences or switch to its tab and highlight the Tor log.
    
    161
    +        win.openPreferences("connection-viewlogs");
    
    162
    +      }
    
    163
    +    } finally {
    
    164
    +      notificationComplete();
    
    165
    +    }
    
    166
    +  },
    
    167
    +};

  • browser/modules/moz.build
    ... ... @@ -129,6 +129,7 @@ EXTRA_JS_MODULES += [
    129 129
         "SelectionChangedMenulist.sys.mjs",
    
    130 130
         "SiteDataManager.sys.mjs",
    
    131 131
         "SitePermissions.sys.mjs",
    
    132
    +    "TorSettingsNotification.sys.mjs",
    
    132 133
         "TorUIUtils.sys.mjs",
    
    133 134
         "TransientPrefs.sys.mjs",
    
    134 135
         "URILoadingHelper.sys.mjs",
    

  • toolkit/components/tor-launcher/TorProvider.sys.mjs
    ... ... @@ -210,7 +210,7 @@ export class TorProvider {
    210 210
         if (this.ownsTorDaemon) {
    
    211 211
           try {
    
    212 212
             await lazy.TorSettings.initializedPromise;
    
    213
    -        await this.writeSettings();
    
    213
    +        await lazy.TorSettings.setTorProvider(this);
    
    214 214
           } catch (e) {
    
    215 215
             logger.warn(
    
    216 216
               "Failed to initialize TorSettings or to write our initial settings. Continuing the initialization anyway.",
    
    ... ... @@ -252,44 +252,65 @@ export class TorProvider {
    252 252
       /**
    
    253 253
        * Send settings to the tor daemon.
    
    254 254
        *
    
    255
    -   * This should only be called internally or by the TorSettings module.
    
    255
    +   * @param {Map<string, ?string>} torSettings - The key value pairs to pass in.
    
    256 256
        */
    
    257
    -  async writeSettings() {
    
    258
    -    // Fetch the current settings.
    
    259
    -    // We set the useTemporary parameter since we want to apply temporary
    
    260
    -    // bridges if they are available.
    
    261
    -    const settings = lazy.TorSettings.getSettings(true);
    
    262
    -    logger.debug("TorProvider.writeSettings", settings);
    
    257
    +  async #writeSettings(torSettings) {
    
    258
    +    logger.debug("Mapped settings object", torSettings);
    
    259
    +
    
    260
    +    // NOTE: The order in which TorProvider.#writeSettings should match the
    
    261
    +    // order in which the configuration is passed onto setConf. In turn,
    
    262
    +    // TorControlPort.setConf should similarly ensure that the configuration
    
    263
    +    // reaches the tor process in the same order.
    
    264
    +    // In particular, we do not want a race where an earlier call to
    
    265
    +    // TorProvider.#writeSettings for overlapping settings can be delayed and
    
    266
    +    // override a later call.
    
    267
    +    await this.#controller.setConf(Array.from(torSettings));
    
    268
    +  }
    
    269
    +
    
    270
    +  /**
    
    271
    +   * Send bridge settings to the tor daemon.
    
    272
    +   *
    
    273
    +   * This should only be called by the `TorSettings` module.
    
    274
    +   *
    
    275
    +   * @param {TorBridgeSettings} bridges - The bridge settings to apply.
    
    276
    +   */
    
    277
    +  async writeBridgeSettings(bridges) {
    
    278
    +    logger.debug("TorProvider.writeBridgeSettings", bridges);
    
    263 279
         const torSettings = new Map();
    
    264 280
     
    
    265 281
         // Bridges
    
    266
    -    const haveBridges =
    
    267
    -      settings.bridges?.enabled && !!settings.bridges.bridge_strings.length;
    
    282
    +    const haveBridges = bridges?.enabled && !!bridges.bridge_strings.length;
    
    268 283
         torSettings.set(TorConfigKeys.useBridges, haveBridges);
    
    269
    -    if (haveBridges) {
    
    270
    -      torSettings.set(
    
    271
    -        TorConfigKeys.bridgeList,
    
    272
    -        settings.bridges.bridge_strings
    
    273
    -      );
    
    274
    -    } else {
    
    275
    -      torSettings.set(TorConfigKeys.bridgeList, null);
    
    276
    -    }
    
    284
    +    torSettings.set(
    
    285
    +      TorConfigKeys.bridgeList,
    
    286
    +      haveBridges ? bridges.bridge_strings : null
    
    287
    +    );
    
    288
    +
    
    289
    +    await this.#writeSettings(torSettings);
    
    290
    +  }
    
    291
    +
    
    292
    +  /**
    
    293
    +   * Send proxy settings to the tor daemon.
    
    294
    +   *
    
    295
    +   * This should only be called by the `TorSettings` module.
    
    296
    +   *
    
    297
    +   * @param {TorProxySettings} proxy - The proxy settings to apply.
    
    298
    +   */
    
    299
    +  async writeProxySettings(proxy) {
    
    300
    +    logger.debug("TorProvider.writeProxySettings", proxy);
    
    301
    +    const torSettings = new Map();
    
    277 302
     
    
    278
    -    // Proxy
    
    279 303
         torSettings.set(TorConfigKeys.socks4Proxy, null);
    
    280 304
         torSettings.set(TorConfigKeys.socks5Proxy, null);
    
    281 305
         torSettings.set(TorConfigKeys.socks5ProxyUsername, null);
    
    282 306
         torSettings.set(TorConfigKeys.socks5ProxyPassword, null);
    
    283 307
         torSettings.set(TorConfigKeys.httpsProxy, null);
    
    284 308
         torSettings.set(TorConfigKeys.httpsProxyAuthenticator, null);
    
    285
    -    if (settings.proxy && !settings.proxy.enabled) {
    
    286
    -      settings.proxy.type = null;
    
    287
    -    }
    
    288
    -    const address = settings.proxy?.address;
    
    289
    -    const port = settings.proxy?.port;
    
    290
    -    const username = settings.proxy?.username;
    
    291
    -    const password = settings.proxy?.password;
    
    292
    -    switch (settings.proxy?.type) {
    
    309
    +
    
    310
    +    const type = proxy.enabled ? proxy.type : null;
    
    311
    +    const { address, port, username, password } = proxy;
    
    312
    +
    
    313
    +    switch (type) {
    
    293 314
           case lazy.TorProxyType.Socks4:
    
    294 315
             torSettings.set(TorConfigKeys.socks4Proxy, `${address}:${port}`);
    
    295 316
             break;
    
    ... ... @@ -307,27 +328,28 @@ export class TorProvider {
    307 328
             break;
    
    308 329
         }
    
    309 330
     
    
    310
    -    // Firewall
    
    311
    -    if (settings.firewall?.enabled) {
    
    312
    -      const reachableAddresses = settings.firewall.allowed_ports
    
    313
    -        .map(port => `*:${port}`)
    
    314
    -        .join(",");
    
    315
    -      torSettings.set(TorConfigKeys.reachableAddresses, reachableAddresses);
    
    316
    -    } else {
    
    317
    -      torSettings.set(TorConfigKeys.reachableAddresses, null);
    
    318
    -    }
    
    331
    +    await this.#writeSettings(torSettings);
    
    332
    +  }
    
    319 333
     
    
    320
    -    logger.debug("Mapped settings object", settings, torSettings);
    
    334
    +  /**
    
    335
    +   * Send firewall settings to the tor daemon.
    
    336
    +   *
    
    337
    +   * This should only be called by the `TorSettings` module.
    
    338
    +   *
    
    339
    +   * @param {TorFirewallSettings} firewall - The firewall settings to apply.
    
    340
    +   */
    
    341
    +  async writeFirewallSettings(firewall) {
    
    342
    +    logger.debug("TorProvider.writeFirewallSettings", firewall);
    
    343
    +    const torSettings = new Map();
    
    321 344
     
    
    322
    -    // Send settings to the tor process.
    
    323
    -    // NOTE: Since everything up to this point has been non-async, the order in
    
    324
    -    // which TorProvider.writeSettings is called should match the order in which
    
    325
    -    // the configuration is passed onto setConf. In turn, TorControlPort.setConf
    
    326
    -    // should similarly ensure that the configuration reaches the tor process in
    
    327
    -    // the same order.
    
    328
    -    // In particular, we do not want a race where an earlier call to
    
    329
    -    // TorProvider.writeSettings can be delayed and override a later call.
    
    330
    -    await this.#controller.setConf(Array.from(torSettings));
    
    345
    +    torSettings.set(
    
    346
    +      TorConfigKeys.reachableAddresses,
    
    347
    +      firewall.enabled
    
    348
    +        ? firewall.allowed_ports.map(port => `*:${port}`).join(",")
    
    349
    +        : null
    
    350
    +    );
    
    351
    +
    
    352
    +    await this.#writeSettings(torSettings);
    
    331 353
       }
    
    332 354
     
    
    333 355
       async flushSettings() {
    

  • toolkit/locales/en-US/toolkit/global/tor-browser.ftl
    ... ... @@ -467,6 +467,29 @@ tor-advanced-dialog-firewall-ports-input-label = Allowed ports
    467 467
     tor-advanced-dialog-firewall-ports-input =
    
    468 468
         .placeholder = Comma-separated values
    
    469 469
     
    
    470
    +## Tor settings error notification.
    
    471
    +
    
    472
    +# Shown when the user's Tor bridge settings could not be passed on to the Tor daemon.
    
    473
    +tor-settings-failed-notification-title-bridges = Your Tor bridge settings could not be applied
    
    474
    +# Shown when the user's Tor bridge settings could not be passed on to the Tor daemon.
    
    475
    +tor-settings-failed-notification-cause-bridges = This could be due to an invalid bridge address.
    
    476
    +# Shown when the user's Tor proxy settings could not be passed on to the Tor daemon.
    
    477
    +tor-settings-failed-notification-title-proxy = Your Tor proxy settings could not be applied
    
    478
    +# Shown when the user's Tor proxy settings could not be passed on to the Tor daemon.
    
    479
    +tor-settings-failed-notification-cause-proxy = This could be due to invalid proxy information.
    
    480
    +# Shown when the user's Tor firewall settings could not be passed on to the Tor daemon.
    
    481
    +tor-settings-failed-notification-title-firewall = Your Tor firewall settings could not be applied
    
    482
    +# Shown when the user's Tor firewall settings could not be passed on to the Tor daemon.
    
    483
    +tor-settings-failed-notification-cause-firewall = This could be due to invalid firewall information.
    
    484
    +tor-settings-failed-notification-body-undo = Until fixed, your Tor connection will continue to use your previous settings. You can either undo the latest changes to restore the previous working settings or check the Tor log to find and fix the issue yourself.
    
    485
    +tor-settings-failed-notification-body-default = Until fixed, your Tor connection will continue to use default settings. You can either clear the problematic settings to restore them to default or check the Tor log to find and fix the issue yourself.
    
    486
    +# Button to revert the latest user settings.
    
    487
    +tor-settings-failed-notification-button-undo = Undo changes
    
    488
    +# Button to clear the user settings.
    
    489
    +tor-settings-failed-notification-button-clear = Clear
    
    490
    +# Button for the user to declare that they will fix the problematic settings by themself.
    
    491
    +tor-settings-failed-notification-button-fix-myself = Fix myself
    
    492
    +
    
    470 493
     ## About Tor Browser dialog.
    
    471 494
     
    
    472 495
     # '<label data-l10n-name="project-link">' and '</label>' should wrap the link text for the Tor Project, and will link to the Tor Project web page.
    

  • toolkit/modules/TorSettings.sys.mjs
    ... ... @@ -9,7 +9,6 @@ ChromeUtils.defineESModuleGetters(lazy, {
    9 9
       Lox: "resource://gre/modules/Lox.sys.mjs",
    
    10 10
       LoxTopics: "resource://gre/modules/Lox.sys.mjs",
    
    11 11
       TorParsers: "resource://gre/modules/TorParsers.sys.mjs",
    
    12
    -  TorProviderBuilder: "resource://gre/modules/TorProviderBuilder.sys.mjs",
    
    13 12
     });
    
    14 13
     
    
    15 14
     ChromeUtils.defineLazyGetter(lazy, "logger", () => {
    
    ... ... @@ -23,6 +22,7 @@ ChromeUtils.defineLazyGetter(lazy, "logger", () => {
    23 22
     export const TorSettingsTopics = Object.freeze({
    
    24 23
       Ready: "torsettings:ready",
    
    25 24
       SettingsChanged: "torsettings:settings-changed",
    
    25
    +  ApplyError: "torsettings:apply-error",
    
    26 26
     });
    
    27 27
     
    
    28 28
     /* Prefs used to store settings in TorBrowser prefs */
    
    ... ... @@ -162,44 +162,74 @@ function arrayShuffle(array) {
    162 162
       return array;
    
    163 163
     }
    
    164 164
     
    
    165
    +/**
    
    166
    + * @typedef {Object} TorBridgeSettings
    
    167
    + *
    
    168
    + * Represents the Tor bridge settings.
    
    169
    + *
    
    170
    + * @property {boolean} enabled - Whether bridges are enabled.
    
    171
    + * @property {integer} source - The source of bridges. One of the values in
    
    172
    + *   `TorBridgeSource`.
    
    173
    + * @property {string} lox_id - The ID of the lox credentials to get bridges for.
    
    174
    + *   Or "" if not using a `Lox` `source`.
    
    175
    + * @property {string} builtin_type - The name of the built-in bridge type. Or ""
    
    176
    + *   if not using a `BuiltIn` `source`.
    
    177
    + * @property {string[]} bridge_strings - The bridge lines to be passed to the
    
    178
    + *   provider. Should be empty if and only if the `source` is `Invalid`.
    
    179
    + */
    
    180
    +
    
    181
    +/**
    
    182
    + * @typedef {Object} TorProxySettings
    
    183
    + *
    
    184
    + * Represents the Tor proxy settings.
    
    185
    + *
    
    186
    + * @property {boolean} enabled - Whether the proxy should be enabled.
    
    187
    + * @property {integer} type - The proxy type. One of the values in
    
    188
    + *   `TorProxyType`.
    
    189
    + * @property {string} address - The proxy address, or "" if the proxy is not
    
    190
    + *   being used.
    
    191
    + * @property {integer} port - The proxy port, or 0 if the proxy is not being
    
    192
    + *   used.
    
    193
    + * @property {string} username - The proxy user name, or "" if this is not
    
    194
    + *   needed.
    
    195
    + * @property {string} password - The proxy password, or "" if this is not
    
    196
    + *   needed.
    
    197
    + */
    
    198
    +
    
    199
    +/**
    
    200
    + * @typedef {Object} TorFirewallSettings
    
    201
    + *
    
    202
    + * Represents the Tor firewall settings.
    
    203
    + *
    
    204
    + * @property {boolean} enabled - Whether the firewall settings should be
    
    205
    + *   enabled.
    
    206
    + * @property {integer[]} allowed_ports - The list of ports that are allowed.
    
    207
    + */
    
    208
    +
    
    209
    +/**
    
    210
    + * @typedef {Object} TorCombinedSettings
    
    211
    + *
    
    212
    + * A combination of Tor settings.
    
    213
    + *
    
    214
    + * @property {TorBridgeSettings} bridges - The bridge settings.
    
    215
    + * @property {TorProxySettings} proxy - The proxy settings.
    
    216
    + * @property {TorFirewallSettings} firewall - The firewall settings.
    
    217
    + */
    
    218
    +
    
    165 219
     /* TorSettings module */
    
    166 220
     
    
    167 221
     class TorSettingsImpl {
    
    168 222
       /**
    
    169
    -   * The underlying settings values.
    
    223
    +   * The default settings to use.
    
    170 224
        *
    
    171
    -   * @type {object}
    
    225
    +   * @type {TorCombinedSettings}
    
    172 226
        */
    
    173
    -  #settings = {
    
    227
    +  #defaultSettings = {
    
    174 228
         bridges: {
    
    175
    -      /**
    
    176
    -       * Whether the bridges are enabled or not.
    
    177
    -       *
    
    178
    -       * @type {boolean}
    
    179
    -       */
    
    180 229
           enabled: false,
    
    181 230
           source: TorBridgeSource.Invalid,
    
    182
    -      /**
    
    183
    -       * The lox id is used with the Lox "source", and remains set with the
    
    184
    -       * stored value when other sources are used.
    
    185
    -       *
    
    186
    -       * @type {string}
    
    187
    -       */
    
    188 231
           lox_id: "",
    
    189
    -      /**
    
    190
    -       * The built-in type to use when using the BuiltIn "source", or empty when
    
    191
    -       * using any other source.
    
    192
    -       *
    
    193
    -       * @type {string}
    
    194
    -       */
    
    195 232
           builtin_type: "",
    
    196
    -      /**
    
    197
    -       * The current bridge strings.
    
    198
    -       *
    
    199
    -       * Can only be non-empty if the "source" is not Invalid.
    
    200
    -       *
    
    201
    -       * @type {Array<string>}
    
    202
    -       */
    
    203 233
           bridge_strings: [],
    
    204 234
         },
    
    205 235
         proxy: {
    
    ... ... @@ -216,10 +246,71 @@ class TorSettingsImpl {
    216 246
         },
    
    217 247
       };
    
    218 248
     
    
    249
    +  /**
    
    250
    +   * The underlying settings values.
    
    251
    +   *
    
    252
    +   * @type {TorCombinedSettings}
    
    253
    +   */
    
    254
    +  #settings = structuredClone(this.#defaultSettings);
    
    255
    +
    
    256
    +  /**
    
    257
    +   * The last successfully applied settings for the current `TorProvider`, if
    
    258
    +   * any.
    
    259
    +   *
    
    260
    +   * NOTE: Should only be written to within `#applySettings`.
    
    261
    +   *
    
    262
    +   * @type {{
    
    263
    +   *   bridges: ?TorBridgeSettings,
    
    264
    +   *   proxy: ?TorProxySettings,
    
    265
    +   *   firewall: ?TorFirewallSettings
    
    266
    +   * }}
    
    267
    +   */
    
    268
    +  #successfulSettings = { bridges: null, proxy: null, firewall: null };
    
    269
    +
    
    270
    +  /**
    
    271
    +   * Whether temporary bridge settings have been applied to the current
    
    272
    +   * `TorProvider`.
    
    273
    +   *
    
    274
    +   * @type {boolean}
    
    275
    +   */
    
    276
    +  #temporaryBridgesApplied = false;
    
    277
    +
    
    278
    +  /**
    
    279
    +   * @typedef {TorSettingsApplyError}
    
    280
    +   *
    
    281
    +   * @property {boolean} canUndo - Whether the latest error can be "undone".
    
    282
    +   *   When this is `false`, the TorProvider will be using its default values
    
    283
    +   *   instead.
    
    284
    +   */
    
    285
    +
    
    286
    +  /**
    
    287
    +   * A summary of the latest failures to apply our settings, if any.
    
    288
    +   *
    
    289
    +   * NOTE: Should only be written to within `#applySettings`.
    
    290
    +   *
    
    291
    +   * @type {{
    
    292
    +   *   bridges: ?TorSettingsApplyError,
    
    293
    +   *   proxy: ?TorSettingsApplyError,
    
    294
    +   *   firewall: ?TorSettingsApplyError,
    
    295
    +   * }}
    
    296
    +   */
    
    297
    +  #applyErrors = { bridges: null, proxy: null, firewall: null };
    
    298
    +
    
    299
    +  /**
    
    300
    +   * Get the latest failure for the given setting, if any.
    
    301
    +   *
    
    302
    +   * @param {string} group - The settings to get the error details for.
    
    303
    +   *
    
    304
    +   * @returns {?TorSettingsApplyError} - The error details, if any.
    
    305
    +   */
    
    306
    +  getApplyError(group) {
    
    307
    +    return structuredClone(this.#applyErrors[group]);
    
    308
    +  }
    
    309
    +
    
    219 310
       /**
    
    220 311
        * Temporary bridge settings to apply instead of #settings.bridges.
    
    221 312
        *
    
    222
    -   * @type {?Object}
    
    313
    +   * @type {?TorBridgeSettings}
    
    223 314
        */
    
    224 315
       #temporaryBridgeSettings = null;
    
    225 316
     
    
    ... ... @@ -342,38 +433,39 @@ class TorSettingsImpl {
    342 433
       }
    
    343 434
     
    
    344 435
       /**
    
    345
    -   * Regular expression for a decimal non-negative integer.
    
    436
    +   * Verify a port number is within bounds.
    
    346 437
        *
    
    347
    -   * @type {RegExp}
    
    438
    +   * @param {integer} val - The value to verify.
    
    439
    +   * @return {boolean} - Whether the port is within range.
    
    348 440
        */
    
    349
    -  #portRegex = /^[0-9]+$/;
    
    441
    +  validPort(val) {
    
    442
    +    return Number.isInteger(val) && val >= 1 && val <= 65535;
    
    443
    +  }
    
    444
    +
    
    350 445
       /**
    
    351
    -   * Parse a string as a port number.
    
    446
    +   * Verify that some SOCKS5 credentials are valid.
    
    352 447
        *
    
    353
    -   * @param {string|integer} val - The value to parse.
    
    354
    -   * @param {boolean} trim - Whether a string value can be stripped of
    
    355
    -   *   whitespace before parsing.
    
    356
    -   *
    
    357
    -   * @return {integer?} - The port number, or null if the given value was not
    
    358
    -   *   valid.
    
    448
    +   * @param {string} username - The SOCKS5 username.
    
    449
    +   * @param {string} password - The SOCKS5 password.
    
    450
    +   * @return {boolean} - Whether the credentials are valid.
    
    359 451
        */
    
    360
    -  #parsePort(val, trim) {
    
    361
    -    if (typeof val === "string") {
    
    362
    -      if (trim) {
    
    363
    -        val = val.trim();
    
    452
    +  validSocks5Credentials(username, password) {
    
    453
    +    if (!username && !password) {
    
    454
    +      // Both empty is valid.
    
    455
    +      return true;
    
    456
    +    }
    
    457
    +    for (const val of [username, password]) {
    
    458
    +      if (typeof val !== "string") {
    
    459
    +        return false;
    
    364 460
           }
    
    365
    -      // ensure port string is a valid positive integer
    
    366
    -      if (this.#portRegex.test(val)) {
    
    367
    -        val = Number.parseInt(val, 10);
    
    368
    -      } else {
    
    369
    -        throw new Error(`Invalid port string "${val}"`);
    
    461
    +      const byteLen = new TextEncoder().encode(val).length;
    
    462
    +      if (byteLen < 1 || byteLen > 255) {
    
    463
    +        return false;
    
    370 464
           }
    
    371 465
         }
    
    372
    -    if (!Number.isInteger(val) || val < 1 || val > 65535) {
    
    373
    -      throw new Error(`Port out of range: ${val}`);
    
    374
    -    }
    
    375
    -    return val;
    
    466
    +    return true;
    
    376 467
       }
    
    468
    +
    
    377 469
       /**
    
    378 470
        * Test whether two arrays have equal members and order.
    
    379 471
        *
    
    ... ... @@ -659,10 +751,11 @@ class TorSettingsImpl {
    659 751
           false
    
    660 752
         );
    
    661 753
         if (firewall.enabled) {
    
    662
    -      firewall.allowed_ports = Services.prefs.getStringPref(
    
    663
    -        TorSettingsPrefs.firewall.allowed_ports,
    
    664
    -        ""
    
    665
    -      );
    
    754
    +      firewall.allowed_ports = Services.prefs
    
    755
    +        .getStringPref(TorSettingsPrefs.firewall.allowed_ports, "")
    
    756
    +        .split(",")
    
    757
    +        .filter(p => p.trim())
    
    758
    +        .map(p => parseInt(p, 10));
    
    666 759
         }
    
    667 760
         try {
    
    668 761
           this.#fixupFirewallSettings(firewall);
    
    ... ... @@ -767,19 +860,221 @@ class TorSettingsImpl {
    767 860
         }
    
    768 861
       }
    
    769 862
     
    
    863
    +  /**
    
    864
    +   * A blocker promise for the #applySettings method.
    
    865
    +   *
    
    866
    +   * Ensures only one active caller to protect the #applyErrors and
    
    867
    +   * #successfulSettings properties.
    
    868
    +   *
    
    869
    +   * @type {?Promise}
    
    870
    +   */
    
    871
    +  #applySettingsTask = null;
    
    872
    +
    
    770 873
       /**
    
    771 874
        * Push our settings down to the tor provider.
    
    772 875
        *
    
    773 876
        * Even though this introduces a circular depdency, it makes the API nicer for
    
    774 877
        * frontend consumers.
    
    775 878
        *
    
    776
    -   * @param {boolean} flush - Whether to also flush the settings to disk.
    
    879
    +   * @param {Object} apply - The list of settings to apply.
    
    880
    +   * @param {boolean} [apply.bridges] - Whether to apply our bridge settings.
    
    881
    +   * @param {boolean} [apply.proxy] - Whether to apply our proxy settings.
    
    882
    +   * @param {boolean} [apply.firewall] - Whether to apply our firewall settings.
    
    883
    +   * @param {boolean} [details] - Optional details.
    
    884
    +   * @param {boolean} [details.useTemporaryBridges] - Whether the caller wants
    
    885
    +   *   to apply temporary bridges.
    
    886
    +   * @param {boolean} [details.newProvider] - Whether the caller is initialising
    
    887
    +   *   a new `TorProvider`.
    
    777 888
        */
    
    778
    -  async #applySettings(flush) {
    
    779
    -    const provider = await lazy.TorProviderBuilder.build();
    
    780
    -    await provider.writeSettings();
    
    781
    -    if (flush) {
    
    782
    -      provider.flushSettings();
    
    889
    +  async #applySettings(apply, details) {
    
    890
    +    // Grab this provider before awaiting.
    
    891
    +    // In particular, if the provider is changed we do not want to switch to
    
    892
    +    // writing to the new instance.
    
    893
    +    const providerRef = this.#providerRef;
    
    894
    +    const provider = providerRef?.deref();
    
    895
    +    if (!provider) {
    
    896
    +      // Wait until setTorProvider is called.
    
    897
    +      lazy.logger.info("No TorProvider yet");
    
    898
    +      return;
    
    899
    +    }
    
    900
    +
    
    901
    +    // We only want one instance of #applySettings to be running at any given
    
    902
    +    // time, so we await the previous call first.
    
    903
    +    // Read and replace #applySettingsTask before we do any async operations.
    
    904
    +    // I.e. this is effectively an atomic read and replace.
    
    905
    +    const prevTask = this.#applySettingsTask;
    
    906
    +    let taskComplete;
    
    907
    +    ({ promise: this.#applySettingsTask, resolve: taskComplete } =
    
    908
    +      Promise.withResolvers());
    
    909
    +    await prevTask;
    
    910
    +
    
    911
    +    try {
    
    912
    +      let flush = false;
    
    913
    +      const errors = [];
    
    914
    +
    
    915
    +      // Test whether the provider is no longer running or has been replaced.
    
    916
    +      const providerRunning = () => {
    
    917
    +        return providerRef === this.#providerRef && provider.isRunning;
    
    918
    +      };
    
    919
    +
    
    920
    +      lazy.logger.debug("Passing on settings to the provider", apply, details);
    
    921
    +
    
    922
    +      if (details?.newProvider) {
    
    923
    +        // If we have a new provider we clear our successful settings.
    
    924
    +        // In particular, the user may have changed their settings several times
    
    925
    +        // whilst the tor process was not running. In the event of an
    
    926
    +        // "ApplyError", we want to correctly show to the user that they are now
    
    927
    +        // using default settings and we do not want to allow them to "undo"
    
    928
    +        // since the previous successful settings may be out of date.
    
    929
    +        // NOTE: We do not do this within `setTorProvider` since some other
    
    930
    +        // caller's `#applySettingsTask` may still be running and writing to
    
    931
    +        // these values when `setTorProvider` is called.
    
    932
    +        this.#successfulSettings.bridges = null;
    
    933
    +        this.#successfulSettings.proxy = null;
    
    934
    +        this.#successfulSettings.firewall = null;
    
    935
    +        this.#applyErrors.bridges = null;
    
    936
    +        this.#applyErrors.proxy = null;
    
    937
    +        this.#applyErrors.firewall = null;
    
    938
    +        // Temporary bridges are not applied to the new provider.
    
    939
    +        this.#temporaryBridgesApplied = false;
    
    940
    +      }
    
    941
    +
    
    942
    +      for (const group of ["bridges", "proxy", "firewall"]) {
    
    943
    +        if (!apply[group]) {
    
    944
    +          continue;
    
    945
    +        }
    
    946
    +
    
    947
    +        if (!providerRunning()) {
    
    948
    +          lazy.logger.info("The TorProvider is no longer running");
    
    949
    +          // Bail on this task since the old provider should not accept
    
    950
    +          // settings. setTorProvider will be called for the new provider and
    
    951
    +          // will already handle applying the same settings.
    
    952
    +          return;
    
    953
    +        }
    
    954
    +
    
    955
    +        let usingSettings = true;
    
    956
    +        if (group === "bridges") {
    
    957
    +          // Only record successes or failures when using the user settings.
    
    958
    +          if (this.#temporaryBridgeSettings && !details?.useTemporaryBridges) {
    
    959
    +            // #temporaryBridgeSettings were written whilst awaiting the
    
    960
    +            // previous task. Do nothing and allow applyTemporarySettings to
    
    961
    +            // apply the temporary bridges instead.
    
    962
    +            lazy.logger.info(
    
    963
    +              "Not apply bridges since temporary bridges were applied"
    
    964
    +            );
    
    965
    +            continue;
    
    966
    +          }
    
    967
    +          if (!this.#temporaryBridgeSettings && details?.useTemporaryBridges) {
    
    968
    +            // #temporaryBridgeSettings were cleared whilst awaiting the
    
    969
    +            // previous task. Do nothing and allow changeSettings or
    
    970
    +            // clearTemporaryBridges to apply the non-temporary bridges
    
    971
    +            // instead.
    
    972
    +            lazy.logger.info(
    
    973
    +              "Not apply temporary bridges since they were cleared"
    
    974
    +            );
    
    975
    +            continue;
    
    976
    +          }
    
    977
    +          usingSettings = !details?.useTemporaryBridges;
    
    978
    +        }
    
    979
    +
    
    980
    +        try {
    
    981
    +          switch (group) {
    
    982
    +            case "bridges": {
    
    983
    +              const bridges = structuredClone(
    
    984
    +                usingSettings
    
    985
    +                  ? this.#settings.bridges
    
    986
    +                  : this.#temporaryBridgeSettings
    
    987
    +              );
    
    988
    +
    
    989
    +              try {
    
    990
    +                await provider.writeBridgeSettings(bridges);
    
    991
    +              } catch (e) {
    
    992
    +                if (
    
    993
    +                  usingSettings &&
    
    994
    +                  this.#temporaryBridgesApplied &&
    
    995
    +                  providerRunning()
    
    996
    +                ) {
    
    997
    +                  lazy.logger.warn(
    
    998
    +                    "Recovering to clear temporary bridges from the provider"
    
    999
    +                  );
    
    1000
    +                  // The TorProvider is still using the temporary bridges. As a
    
    1001
    +                  // priority we want to try and restore the TorProvider to the
    
    1002
    +                  // state it was in prior to the temporary bridges being
    
    1003
    +                  // applied.
    
    1004
    +                  const prevBridges = structuredClone(
    
    1005
    +                    this.#successfulSettings.bridges ??
    
    1006
    +                      this.#defaultSettings.bridges
    
    1007
    +                  );
    
    1008
    +                  try {
    
    1009
    +                    await provider.writeBridgeSettings(prevBridges);
    
    1010
    +                    this.#temporaryBridgesApplied = false;
    
    1011
    +                  } catch (e) {
    
    1012
    +                    lazy.logger.error(
    
    1013
    +                      "Failed to clear the temporary bridges from the provider",
    
    1014
    +                      e
    
    1015
    +                    );
    
    1016
    +                  }
    
    1017
    +                }
    
    1018
    +                throw e;
    
    1019
    +              }
    
    1020
    +
    
    1021
    +              if (usingSettings) {
    
    1022
    +                this.#successfulSettings.bridges = bridges;
    
    1023
    +                this.#temporaryBridgesApplied = false;
    
    1024
    +                this.#applyErrors.bridges = null;
    
    1025
    +                flush = true;
    
    1026
    +              } else {
    
    1027
    +                this.#temporaryBridgesApplied = true;
    
    1028
    +                // Do not flush the temporary bridge settings until they are
    
    1029
    +                // saved.
    
    1030
    +              }
    
    1031
    +              break;
    
    1032
    +            }
    
    1033
    +            case "proxy": {
    
    1034
    +              const proxy = structuredClone(this.#settings.proxy);
    
    1035
    +              await provider.writeProxySettings(proxy);
    
    1036
    +              this.#successfulSettings.proxy = proxy;
    
    1037
    +              this.#applyErrors.proxy = null;
    
    1038
    +              flush = true;
    
    1039
    +              break;
    
    1040
    +            }
    
    1041
    +            case "firewall": {
    
    1042
    +              const firewall = structuredClone(this.#settings.firewall);
    
    1043
    +              await provider.writeFirewallSettings(firewall);
    
    1044
    +              this.#successfulSettings.firewall = firewall;
    
    1045
    +              this.#applyErrors.firewall = null;
    
    1046
    +              flush = true;
    
    1047
    +              break;
    
    1048
    +            }
    
    1049
    +          }
    
    1050
    +        } catch (e) {
    
    1051
    +          // Store the error and throw later.
    
    1052
    +          errors.push(e);
    
    1053
    +          if (usingSettings && providerRunning()) {
    
    1054
    +            // Record and signal the error.
    
    1055
    +            // NOTE: We do not signal ApplyError when we fail to apply temporary
    
    1056
    +            // bridges.
    
    1057
    +            this.#applyErrors[group] = {
    
    1058
    +              canUndo: Boolean(this.#successfulSettings[group]),
    
    1059
    +            };
    
    1060
    +            lazy.logger.debug(`Signalling new ApplyError for ${group}`);
    
    1061
    +            Services.obs.notifyObservers(
    
    1062
    +              { group },
    
    1063
    +              TorSettingsTopics.ApplyError
    
    1064
    +            );
    
    1065
    +          }
    
    1066
    +        }
    
    1067
    +      }
    
    1068
    +      if (flush && providerRunning()) {
    
    1069
    +        provider.flushSettings();
    
    1070
    +      }
    
    1071
    +      if (errors.length) {
    
    1072
    +        lazy.logger.error("Failed to apply settings", errors);
    
    1073
    +        throw new Error(`Failed to apply settings. ${errors.join(". ")}.`);
    
    1074
    +      }
    
    1075
    +    } finally {
    
    1076
    +      // Allow the next caller to proceed.
    
    1077
    +      taskComplete();
    
    783 1078
         }
    
    784 1079
       }
    
    785 1080
     
    
    ... ... @@ -869,7 +1164,30 @@ class TorSettingsImpl {
    869 1164
         if (!Object.values(TorProxyType).includes(proxy.type)) {
    
    870 1165
           throw new Error(`Invalid proxy type: ${proxy.type}`);
    
    871 1166
         }
    
    872
    -    proxy.port = this.#parsePort(proxy.port, false);
    
    1167
    +    // Do not allow port value to be 0.
    
    1168
    +    // Whilst Socks4Proxy, Socks5Proxy and HTTPSProxyPort allow you to pass in
    
    1169
    +    // `<address>:0` this will select a default port. Our UI does not indicate
    
    1170
    +    // that `0` maps to a different value, so we disallow it.
    
    1171
    +    if (!this.validPort(proxy.port)) {
    
    1172
    +      throw new Error(`Invalid proxy port: ${proxy.port}`);
    
    1173
    +    }
    
    1174
    +
    
    1175
    +    switch (proxy.type) {
    
    1176
    +      case TorProxyType.Socks4:
    
    1177
    +        // Never use the username or password.
    
    1178
    +        proxy.username = "";
    
    1179
    +        proxy.password = "";
    
    1180
    +        break;
    
    1181
    +      case TorProxyType.Socks5:
    
    1182
    +        if (!this.validSocks5Credentials(proxy.username, proxy.password)) {
    
    1183
    +          throw new Error("Invalid SOCKS5 credentials");
    
    1184
    +        }
    
    1185
    +        break;
    
    1186
    +      case TorProxyType.HTTPS:
    
    1187
    +        // username and password are both optional.
    
    1188
    +        break;
    
    1189
    +    }
    
    1190
    +
    
    873 1191
         proxy.address = String(proxy.address);
    
    874 1192
         proxy.username = String(proxy.username);
    
    875 1193
         proxy.password = String(proxy.password);
    
    ... ... @@ -890,22 +1208,82 @@ class TorSettingsImpl {
    890 1208
           return;
    
    891 1209
         }
    
    892 1210
     
    
    893
    -    let allowed_ports = firewall.allowed_ports;
    
    894
    -    if (!Array.isArray(allowed_ports)) {
    
    895
    -      allowed_ports = allowed_ports === "" ? [] : allowed_ports.split(",");
    
    1211
    +    if (!Array.isArray(firewall.allowed_ports)) {
    
    1212
    +      throw new Error("allowed_ports should be an array of ports");
    
    896 1213
         }
    
    897
    -    // parse and remove duplicates
    
    898
    -    const portSet = new Set();
    
    899
    -
    
    900
    -    for (const port of allowed_ports) {
    
    901
    -      try {
    
    902
    -        portSet.add(this.#parsePort(port, true));
    
    903
    -      } catch (e) {
    
    904
    -        // Do not throw for individual ports.
    
    905
    -        lazy.logger.error(`Failed to parse the port ${port}. Ignoring.`, e);
    
    1214
    +    for (const port of firewall.allowed_ports) {
    
    1215
    +      if (!this.validPort(port)) {
    
    1216
    +        throw new Error(`Invalid firewall port: ${port}`);
    
    906 1217
           }
    
    907 1218
         }
    
    908
    -    firewall.allowed_ports = [...portSet];
    
    1219
    +    // Remove duplicates
    
    1220
    +    firewall.allowed_ports = [...new Set(firewall.allowed_ports)];
    
    1221
    +  }
    
    1222
    +
    
    1223
    +  /**
    
    1224
    +   * The current `TorProvider` instance we are using, if any.
    
    1225
    +   *
    
    1226
    +   * @type {?WeakRef<TorProvider>}
    
    1227
    +   */
    
    1228
    +  #providerRef = null;
    
    1229
    +
    
    1230
    +  /**
    
    1231
    +   * Called whenever we have a new provider to send settings to.
    
    1232
    +   *
    
    1233
    +   * @param {TorProvider} provider - The provider to apply our settings to.
    
    1234
    +   */
    
    1235
    +  async setTorProvider(provider) {
    
    1236
    +    lazy.logger.debug("Applying settings to new provider");
    
    1237
    +    this.#checkIfInitialized();
    
    1238
    +
    
    1239
    +    // Use a WeakRef to not keep the TorProvider instance alive.
    
    1240
    +    this.#providerRef = new WeakRef(provider);
    
    1241
    +    // NOTE: We need the caller to pass in the TorProvider instance because
    
    1242
    +    // TorProvider's initialisation waits for this method. In particular, we
    
    1243
    +    // cannot await TorProviderBuilder.build since it would hang!
    
    1244
    +    await this.#applySettings(
    
    1245
    +      { bridges: true, proxy: true, firewall: true },
    
    1246
    +      { newProvider: true }
    
    1247
    +    );
    
    1248
    +  }
    
    1249
    +
    
    1250
    +  /**
    
    1251
    +   * Undo settings that have failed to be applied by restoring the last
    
    1252
    +   * successfully applied settings instead.
    
    1253
    +   *
    
    1254
    +   * @param {string} group - The group to undo the settings for.
    
    1255
    +   */
    
    1256
    +  async undoFailedSettings(group) {
    
    1257
    +    if (!this.#applyErrors[group]) {
    
    1258
    +      lazy.logger.warn(
    
    1259
    +        `${group} settings have already been successfully replaced.`
    
    1260
    +      );
    
    1261
    +      return;
    
    1262
    +    }
    
    1263
    +    if (!this.#successfulSettings[group]) {
    
    1264
    +      // Unexpected.
    
    1265
    +      lazy.logger.warn(
    
    1266
    +        `Cannot undo ${group} settings since we have no successful settings.`
    
    1267
    +      );
    
    1268
    +      return;
    
    1269
    +    }
    
    1270
    +    await this.changeSettings({ [group]: this.#successfulSettings[group] });
    
    1271
    +  }
    
    1272
    +
    
    1273
    +  /**
    
    1274
    +   * Clear settings that have failed to be applied by using the default settings
    
    1275
    +   * instead.
    
    1276
    +   *
    
    1277
    +   * @param {string} group - The group to clear the settings for.
    
    1278
    +   */
    
    1279
    +  async clearFailedSettings(group) {
    
    1280
    +    if (!this.#applyErrors[group]) {
    
    1281
    +      lazy.logger.warn(
    
    1282
    +        `${group} settings have already been successfully replaced.`
    
    1283
    +      );
    
    1284
    +      return;
    
    1285
    +    }
    
    1286
    +    await this.changeSettings({ [group]: this.#defaultSettings[group] });
    
    909 1287
       }
    
    910 1288
     
    
    911 1289
       /**
    
    ... ... @@ -919,8 +1297,8 @@ class TorSettingsImpl {
    919 1297
        * + proxy settings can be set as a group.
    
    920 1298
        * + firewall settings can be set a group.
    
    921 1299
        *
    
    922
    -   * @param {object} newValues - The new setting values, a subset of the
    
    923
    -   *   complete settings that should be changed.
    
    1300
    +   * @param {object} newValues - The new setting values that should be changed.
    
    1301
    +   *   A subset of the `TorCombinedSettings` object.
    
    924 1302
        */
    
    925 1303
       async changeSettings(newValues) {
    
    926 1304
         lazy.logger.debug("changeSettings()", newValues);
    
    ... ... @@ -932,6 +1310,7 @@ class TorSettingsImpl {
    932 1310
     
    
    933 1311
         const completeSettings = structuredClone(this.#settings);
    
    934 1312
         const changes = [];
    
    1313
    +    const apply = {};
    
    935 1314
     
    
    936 1315
         /**
    
    937 1316
          * Change the given setting to a new value. Does nothing if the new value
    
    ... ... @@ -950,10 +1329,11 @@ class TorSettingsImpl {
    950 1329
           }
    
    951 1330
           completeSettings[group][prop] = value;
    
    952 1331
           changes.push(`${group}.${prop}`);
    
    1332
    +      // Apply these settings.
    
    1333
    +      apply[group] = true;
    
    953 1334
         };
    
    954 1335
     
    
    955 1336
         if ("bridges" in newValues) {
    
    956
    -      const changesLength = changes.length;
    
    957 1337
           if ("source" in newValues.bridges) {
    
    958 1338
             this.#fixupBridgeSettings(newValues.bridges);
    
    959 1339
             changeSetting("bridges", "source", newValues.bridges.source);
    
    ... ... @@ -984,7 +1364,7 @@ class TorSettingsImpl {
    984 1364
             changeSetting("bridges", "enabled", newValues.bridges.enabled);
    
    985 1365
           }
    
    986 1366
     
    
    987
    -      if (this.#temporaryBridgeSettings && changes.length !== changesLength) {
    
    1367
    +      if (this.#temporaryBridgeSettings && apply.bridges) {
    
    988 1368
             // A change in the bridges settings.
    
    989 1369
             // We want to clear the temporary bridge settings to ensure that they
    
    990 1370
             // cannot be used to overwrite these user-provided settings.
    
    ... ... @@ -1034,34 +1414,22 @@ class TorSettingsImpl {
    1034 1414
     
    
    1035 1415
         lazy.logger.debug("setSettings result", this.#settings, changes);
    
    1036 1416
     
    
    1037
    -    // After we have sent out the notifications for the changed settings and
    
    1038
    -    // saved the preferences we send the new settings to TorProvider.
    
    1039
    -    // Some properties are unread by TorProvider. So if only these values change
    
    1040
    -    // there is no need to re-apply the settings.
    
    1041
    -    const unreadProps = ["bridges.builtin_type", "bridges.lox_id"];
    
    1042
    -    const shouldApply = changes.some(prop => !unreadProps.includes(prop));
    
    1043
    -    if (shouldApply) {
    
    1044
    -      await this.#applySettings(true);
    
    1417
    +    if (apply.bridges || apply.proxy || apply.firewall) {
    
    1418
    +      // After we have sent out the notifications for the changed settings and
    
    1419
    +      // saved the preferences we send the new settings to TorProvider.
    
    1420
    +      await this.#applySettings(apply);
    
    1045 1421
         }
    
    1046 1422
       }
    
    1047 1423
     
    
    1048 1424
       /**
    
    1049 1425
        * Get a copy of all our settings.
    
    1050 1426
        *
    
    1051
    -   * @param {boolean} [useTemporary=false] - Whether the returned settings
    
    1052
    -   *   should use the temporary bridge settings, if any, instead.
    
    1053
    -   *
    
    1054
    -   * @returns {object} A copy of the settings object
    
    1427
    +   * @returns {TorCombinedSettings} A copy of the current settings.
    
    1055 1428
        */
    
    1056
    -  getSettings(useTemporary = false) {
    
    1429
    +  getSettings() {
    
    1057 1430
         lazy.logger.debug("getSettings()");
    
    1058 1431
         this.#checkIfInitialized();
    
    1059
    -    const settings = structuredClone(this.#settings);
    
    1060
    -    if (useTemporary && this.#temporaryBridgeSettings) {
    
    1061
    -      // Override the bridge settings with our temporary ones.
    
    1062
    -      settings.bridges = structuredClone(this.#temporaryBridgeSettings);
    
    1063
    -    }
    
    1064
    -    return settings;
    
    1432
    +    return structuredClone(this.#settings);
    
    1065 1433
       }
    
    1066 1434
     
    
    1067 1435
       /**
    
    ... ... @@ -1109,8 +1477,8 @@ class TorSettingsImpl {
    1109 1477
     
    
    1110 1478
         // After checks are complete, we commit them.
    
    1111 1479
         this.#temporaryBridgeSettings = bridgeSettings;
    
    1112
    -    // Do not flush the temporary bridge settings until they are saved.
    
    1113
    -    await this.#applySettings(false);
    
    1480
    +
    
    1481
    +    await this.#applySettings({ bridges: true }, { useTemporaryBridges: true });
    
    1114 1482
       }
    
    1115 1483
     
    
    1116 1484
       /**
    
    ... ... @@ -1137,7 +1505,7 @@ class TorSettingsImpl {
    1137 1505
           return;
    
    1138 1506
         }
    
    1139 1507
         this.#temporaryBridgeSettings = null;
    
    1140
    -    await this.#applySettings();
    
    1508
    +    await this.#applySettings({ bridges: true });
    
    1141 1509
       }
    
    1142 1510
     }
    
    1143 1511