Source-Changes-HG archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
[pkgsrc/trunk]: pkgsrc/security/tor-browser tor-browser: update to 9.0.9nb2.
details: https://anonhg.NetBSD.org/pkgsrc/rev/95718207b2d2
branches: trunk
changeset: 430216:95718207b2d2
user: wiz <wiz%pkgsrc.org@localhost>
date: Tue Apr 28 19:38:49 2020 +0000
description:
tor-browser: update to 9.0.9nb2.
Automatically install the noscript extension.
(https-everywhere package is ready, but doesn't work.)
Change the default path in the home directory to ".tor-browser"
to be more similar to other mozilla products.
By default, use the standard tor port. No separate instance
of tor is started for tor-browser from pkgsrc.
diffstat:
security/tor-browser/MESSAGE | 10 +---
security/tor-browser/Makefile | 12 +++--
security/tor-browser/distinfo | 5 +-
security/tor-browser/patches/patch-browser_app_profile_000-tor-browser.js | 22 ++++++++++
security/tor-browser/patches/patch-xpcom_io_TorFileUtils.cpp | 6 +-
5 files changed, 38 insertions(+), 17 deletions(-)
diffs (128 lines):
diff -r 9ab3ed73aa12 -r 95718207b2d2 security/tor-browser/MESSAGE
--- a/security/tor-browser/MESSAGE Tue Apr 28 19:35:19 2020 +0000
+++ b/security/tor-browser/MESSAGE Tue Apr 28 19:38:49 2020 +0000
@@ -1,19 +1,13 @@
===========================================================================
-$NetBSD: MESSAGE,v 1.2 2019/05/27 12:55:38 wiz Exp $
+$NetBSD: MESSAGE,v 1.3 2020/04/28 19:38:49 wiz Exp $
This package provides the Tor Browser.
-Be sure to start the Tor daemon before you start Tor Browser.
You should install the following extensions to ensure secure Tor connections:
HTTPS Everywhere
https://addons.mozilla.org/en-US/firefox/addon/https-everywhere/
-NoScript Security Suite
-https://addons.mozilla.org/en-US/firefox/addon/noscript/
-
-net/tor provides a socks proxy at localhost:9050. However, Tor Browser
-assumes a sock proxy at localhost:9150. Be sure to change the port
-number in the Tor Browser preferences.
+Be sure to start the Tor daemon before you start Tor Browser!
===========================================================================
diff -r 9ab3ed73aa12 -r 95718207b2d2 security/tor-browser/Makefile
--- a/security/tor-browser/Makefile Tue Apr 28 19:35:19 2020 +0000
+++ b/security/tor-browser/Makefile Tue Apr 28 19:38:49 2020 +0000
@@ -1,8 +1,8 @@
-# $NetBSD: Makefile,v 1.60 2020/04/12 08:29:11 adam Exp $
+# $NetBSD: Makefile,v 1.61 2020/04/28 19:38:49 wiz Exp $
DISTNAME= src-firefox-tor-browser-68.7.0esr-9.0-2-build1
PKGNAME= tor-browser-9.0.9
-PKGREVISION= 1
+PKGREVISION= 2
CATEGORIES= security www
MASTER_SITES= https://dist.torproject.org/torbrowser/${PKGVERSION_NOREV}/
EXTRACT_SUFX= .tar.xz
@@ -16,13 +16,15 @@
WRKSRC= ${WRKDIR}/${DISTNAME:S/src-//}
DEPENDS+= tor-[0-9]*:../../net/tor
-
-EXTRACT_USING= bsdtar
+#DEPENDS+= tor-browser-https-everywhere-[0-9]*:../../security/tor-browser-https-everywhere
+DEPENDS+= tor-browser-noscript-[0-9]*:../../security/tor-browser-noscript
# How to update this package:
#
# replace all patches with the one from the correspoding www/firefox${ESR_RELEASE}
-# BUT keep patch-xpcom_io_TorFileUtils.cpp! (and if necessary patch-.mozconfig)
+# BUT keep patch-xpcom_io_TorFileUtils.cpp
+# AND keep patch-browser_app_profile_000-tor-browser.js
+# (AND if necessary patch-.mozconfig)
# make the patches apply
#
# when packaged up, read MESSAGE and test by visiting https://check.torproject.org
diff -r 9ab3ed73aa12 -r 95718207b2d2 security/tor-browser/distinfo
--- a/security/tor-browser/distinfo Tue Apr 28 19:35:19 2020 +0000
+++ b/security/tor-browser/distinfo Tue Apr 28 19:38:49 2020 +0000
@@ -1,4 +1,4 @@
-$NetBSD: distinfo,v 1.17 2020/04/10 19:18:00 wiz Exp $
+$NetBSD: distinfo,v 1.18 2020/04/28 19:38:49 wiz Exp $
SHA1 (src-firefox-tor-browser-68.7.0esr-9.0-2-build1.tar.xz) = c9be70c6cbbac9d73d1aee930703ea4d013725df
RMD160 (src-firefox-tor-browser-68.7.0esr-9.0-2-build1.tar.xz) = 6289e342fa8e99c21098331d153beb6d88bc39b2
@@ -6,6 +6,7 @@
Size (src-firefox-tor-browser-68.7.0esr-9.0-2-build1.tar.xz) = 348594032 bytes
SHA1 (patch-.mozconfig) = 66fbb2f113091eee1f022cd656231f845b04b0f8
SHA1 (patch-aa) = 9f7200c411cd2217a80ec10a276c8877bc6b845c
+SHA1 (patch-browser_app_profile_000-tor-browser.js) = 545cf6e80f061a6a58b429d2696046de4e34725f
SHA1 (patch-browser_app_profile_firefox.js) = 076cc2892547bac07fe907533f4e821f13f5738e
SHA1 (patch-dom_base_nsAttrName.h) = ac7ba441a3b27df2855cf2673eea36b1cb44ad49
SHA1 (patch-dom_media_CubebUtils.cpp) = 3cd2c65ab281d802c56216565970450767a3fb24
@@ -38,5 +39,5 @@
SHA1 (patch-toolkit_xre_glxtest.cpp) = 04942938f45f326c7d5c4da3bf8cc2d09b977c69
SHA1 (patch-xpcom_base_nscore.h) = 1ac4d34d3c9e80bc1ac966c6c84cb320bc0fa1ec
SHA1 (patch-xpcom_build_BinaryPath.h) = 92461769d2fee8f015b91a5326247f271afeedea
-SHA1 (patch-xpcom_io_TorFileUtils.cpp) = c23d867b5a97a4c169198831b816b1bcef8dc630
+SHA1 (patch-xpcom_io_TorFileUtils.cpp) = 3f5c5490a3e4e0117cca3c558de93f2ffea05405
SHA1 (patch-xpcom_reflect_xptcall_md_unix_moz.build) = 6956c90d4c74c71e7e9a5882e4840ba2673160fa
diff -r 9ab3ed73aa12 -r 95718207b2d2 security/tor-browser/patches/patch-browser_app_profile_000-tor-browser.js
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/security/tor-browser/patches/patch-browser_app_profile_000-tor-browser.js Tue Apr 28 19:38:49 2020 +0000
@@ -0,0 +1,22 @@
+$NetBSD: patch-browser_app_profile_000-tor-browser.js,v 1.1 2020/04/28 19:38:49 wiz Exp $
+
+Despite the warning at the top of this file, we change the default for the socks
+port in pkgsrc from 9150 to 9050.
+
+9150 is used for distributions where tor is bundled with tor-browser, so the
+standard port can't be used because another tor may already be running there.
+
+pkgsrc's tor-browser uses the system-wide installation of tor and thus should use
+its default port to minimize manual setup steps for the end users.
+
+--- browser/app/profile/000-tor-browser.js.orig 2020-04-04 03:09:31.000000000 +0000
++++ browser/app/profile/000-tor-browser.js
+@@ -161,7 +161,7 @@ pref("network.predictor.enabled", false)
+
+ // Proxy and proxy security
+ pref("network.proxy.socks", "127.0.0.1");
+-pref("network.proxy.socks_port", 9150);
++pref("network.proxy.socks_port", 9050);
+ pref("network.proxy.socks_remote_dns", true);
+ pref("network.proxy.no_proxies_on", ""); // For fingerprinting and local service vulns (#10419)
+ pref("network.proxy.allow_hijacking_localhost", true); // Allow proxies for localhost (#31065)
diff -r 9ab3ed73aa12 -r 95718207b2d2 security/tor-browser/patches/patch-xpcom_io_TorFileUtils.cpp
--- a/security/tor-browser/patches/patch-xpcom_io_TorFileUtils.cpp Tue Apr 28 19:35:19 2020 +0000
+++ b/security/tor-browser/patches/patch-xpcom_io_TorFileUtils.cpp Tue Apr 28 19:38:49 2020 +0000
@@ -1,4 +1,6 @@
-$NetBSD: patch-xpcom_io_TorFileUtils.cpp,v 1.2 2019/02/25 15:32:24 wiz Exp $
+$NetBSD: patch-xpcom_io_TorFileUtils.cpp,v 1.3 2020/04/28 19:38:49 wiz Exp $
+
+Set default directory for configuration files and profiles to $HOME/.tor-browser
--- xpcom/io/TorFileUtils.cpp.orig 2019-02-23 20:01:00.000000000 +0000
+++ xpcom/io/TorFileUtils.cpp
@@ -14,7 +16,7 @@
+ nsresult rv = NS_NewNativeLocalFile(nsDependentCString(homeDir), true,
+ getter_AddRefs(tbDataDir));
+ NS_ENSURE_SUCCESS(rv, rv);
-+ nsAutoCString leafSubdir(NS_LITERAL_CSTRING("TorBrowser-Data"));
++ nsAutoCString leafSubdir(NS_LITERAL_CSTRING(".tor-browser"));
+ rv = tbDataDir->AppendNative(leafSubdir);
+ NS_ENSURE_SUCCESS(rv, rv);
+#elif TOR_BROWSER_DATA_OUTSIDE_APP_DIR
Home |
Main Index |
Thread Index |
Old Index