[tor-bugs] #25603 [Applications/Tor Browser]: Update Orfox HTTPS-E Add-on

Tor Bug Tracker & Wiki blackhole at torproject.org
Thu May 3 06:52:25 UTC 2018


#25603: Update Orfox HTTPS-E Add-on
-----------------------------------------------+------------------------
 Reporter:  sysrqb                             |          Owner:  sysrqb
     Type:  enhancement                        |         Status:  closed
 Priority:  Very High                          |      Milestone:
Component:  Applications/Tor Browser           |        Version:
 Severity:  Normal                             |     Resolution:  fixed
 Keywords:  tbb-mobile, TorBrowserTeam201805R  |  Actual Points:
Parent ID:                                     |         Points:
 Reviewer:                                     |        Sponsor:
-----------------------------------------------+------------------------
Changes (by gk):

 * status:  needs_review => closed
 * resolution:   => fixed


Comment:

 Replying to [comment:11 sysrqb]:
 > After #25980 is merged, I have a branch ready for this.
 >
 > The top commit on branch `bug25980+bug25603` is the update, the branch
 is based on the fix for #25980.
 >
 > I wish we had a better way of providing the source for the bundled
 https-everywhere xpi in Orfox. I can create a public repo somewhere. The
 steps documented in comment:10 are exactly how I created this xpi. The
 most important step is deleting the updateURL (but leaving the
 <em:updateURL> tags). We must delete the manifest because the signature is
 no longer valid. I know, this is sad.

 I think we should not spend our time fixing this problem as this is
 supposed to go away with transitioning to Tor Browser for Android.

 The patch looks good. I cherry-picked it onto `tor-
 browser-52.7.3esr-8.0-1` (commit
 e3effb933616512282e0047d56ed0087cce702a6).

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/25603#comment:13>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list