1 |
commit: b581323f51ecfad67cd7288f45944a5c28bf6101 |
2 |
Author: Andrew Savchenko <bircoph <AT> gentoo <DOT> org> |
3 |
AuthorDate: Fri Feb 27 05:55:55 2015 +0000 |
4 |
Commit: Andrew Savchenko <bircoph <AT> gmail <DOT> com> |
5 |
CommitDate: Fri Feb 27 05:55:55 2015 +0000 |
6 |
URL: http://sources.gentoo.org/gitweb/?p=dev/bircoph.git;a=commit;h=b581323f |
7 |
|
8 |
torbrowser: version bump, github issue #11 |
9 |
|
10 |
--- |
11 |
profiles/categories | 1 + |
12 |
www-client/torbrowser/ChangeLog | 264 +++++++++++++ |
13 |
www-client/torbrowser/Manifest | 10 + |
14 |
www-client/torbrowser/files/README.tor-launcher | 37 ++ |
15 |
...-bccc144c21f6069a294038a6559ba46ceb8da2a2.patch | 430 +++++++++++++++++++++ |
16 |
.../files/torbrowser-24.3.0-allow-lightspark.patch | 14 + |
17 |
www-client/torbrowser/metadata.xml | 22 ++ |
18 |
www-client/torbrowser/torbrowser-31.5.0.ebuild | 308 +++++++++++++++ |
19 |
8 files changed, 1086 insertions(+) |
20 |
|
21 |
diff --git a/profiles/categories b/profiles/categories |
22 |
index 2c93c54..7a7d434 100644 |
23 |
--- a/profiles/categories |
24 |
+++ b/profiles/categories |
25 |
@@ -27,4 +27,5 @@ sys-cluster |
26 |
sys-devel |
27 |
sys-kernel |
28 |
sys-libs |
29 |
+www-client |
30 |
x11-misc |
31 |
|
32 |
diff --git a/www-client/torbrowser/ChangeLog b/www-client/torbrowser/ChangeLog |
33 |
new file mode 100644 |
34 |
index 0000000..e3691da |
35 |
--- /dev/null |
36 |
+++ b/www-client/torbrowser/ChangeLog |
37 |
@@ -0,0 +1,264 @@ |
38 |
+# ChangeLog for www-client/torbrowser |
39 |
+# Copyright 1999-2015 Gentoo Foundation; Distributed under the GPL v2 |
40 |
+# $Header: $ |
41 |
+ |
42 |
+*torbrowser-31.4.0 (14 Jan 2015) |
43 |
+ |
44 |
+ 14 Jan 2015; Poncho <poncho@××××××.ch> +torbrowser-31.4.0.ebuild, |
45 |
+ -torbrowser-31.3.0.ebuild: |
46 |
+ www-client/torbrowser: Tor Browser 4.0.3 is released |
47 |
+ |
48 |
+*torbrowser-31.3.0 (04 Dec 2014) |
49 |
+ |
50 |
+ 04 Dec 2014; Poncho <poncho@××××××.ch> +torbrowser-31.3.0.ebuild, |
51 |
+ -torbrowser-31.2.0.ebuild: |
52 |
+ www-client/torbrowser: Tor Browser 4.0.2 is released see |
53 |
+ https://blog.torproject.org/blog/tor-browser-402-released |
54 |
+ |
55 |
+ 04 Dec 2014; Poncho <poncho@××××××.ch> |
56 |
+ -files/tor-browser.git-6662aae388094c7cca535e34f24ef01af7d51481.patch, |
57 |
+ -torbrowser-24.8.1.ebuild: |
58 |
+ www-client/torbrowser: remove old version |
59 |
+ |
60 |
+ 01 Nov 2014; Poncho <poncho@××××××.ch> torbrowser-31.2.0.ebuild: |
61 |
+ www-client/torbrowser: switch to using new tor project dist url |
62 |
+ |
63 |
+*torbrowser-31.2.0 (18 Oct 2014) |
64 |
+ |
65 |
+ 18 Oct 2014; Poncho <poncho@××××××.ch> +files/README.tor-launcher, |
66 |
+ +files/tor-browser.git-bccc144c21f6069a294038a6559ba46ceb8da2a2.patch, |
67 |
+ +torbrowser-31.2.0.ebuild, metadata.xml: |
68 |
+ www-client/torbrowser: Tor Browser 4.0 is released |
69 |
+ https://blog.torproject.org/blog/tor-browser-40-released |
70 |
+ |
71 |
+*torbrowser-24.8.1 (26 Sep 2014) |
72 |
+ |
73 |
+ 26 Sep 2014; Poncho <poncho@××××××.ch> +torbrowser-24.8.1.ebuild, |
74 |
+ -torbrowser-24.8.0.ebuild: |
75 |
+ www-client/torbrowser: version bump see https://blog.torproject.org/blog/tor- |
76 |
+ browser-366-released |
77 |
+ |
78 |
+*torbrowser-24.8.0 (04 Sep 2014) |
79 |
+ |
80 |
+ 04 Sep 2014; Poncho <poncho@××××××.ch> +torbrowser-24.8.0.ebuild, |
81 |
+ -torbrowser-24.7.0-r1.ebuild: |
82 |
+ www-client/torbrowser: version bump |
83 |
+ |
84 |
+*torbrowser-24.7.0-r1 (13 Aug 2014) |
85 |
+ |
86 |
+ 13 Aug 2014; Poncho <poncho@××××××.ch> +torbrowser-24.7.0-r1.ebuild, |
87 |
+ -torbrowser-24.7.0.ebuild: |
88 |
+ www-client/torbrowser: 3.6.4 is released |
89 |
+ |
90 |
+ 27 Jul 2014; Poncho <poncho@××××××.ch> torbrowser-24.7.0.ebuild: |
91 |
+ www-client/torbrowser: update comments and links |
92 |
+ |
93 |
+*torbrowser-24.7.0 (27 Jul 2014) |
94 |
+ |
95 |
+ 27 Jul 2014; Poncho <poncho@××××××.ch> +torbrowser-24.7.0.ebuild, |
96 |
+ -torbrowser-24.6.0.ebuild: |
97 |
+ www-client/torbrowser: 3.6.3 is released fix https://github.com/MeisterP |
98 |
+ /torbrowser-overlay/pull/8 by hasufell |
99 |
+ |
100 |
+ 12 Jul 2014; Poncho <poncho@××××××.ch> torbrowser-24.6.0.ebuild: |
101 |
+ www-client/torbrowser: don't compress the tor-launcher extension |
102 |
+ |
103 |
+*torbrowser-24.6.0 (12 Jun 2014) |
104 |
+ |
105 |
+ 12 Jun 2014; Poncho <poncho@××××××.ch> +torbrowser-24.6.0.ebuild, |
106 |
+ -torbrowser-24.5.0-r1.ebuild: |
107 |
+ www-client/torbrowser: version bump |
108 |
+ |
109 |
+*torbrowser-24.5.0-r1 (10 May 2014) |
110 |
+ |
111 |
+ 10 May 2014; Poncho <poncho@××××××.ch> +torbrowser-24.5.0-r1.ebuild, |
112 |
+ -torbrowser-24.5.0.ebuild: |
113 |
+ www-client/torbrowser: version bump |
114 |
+ |
115 |
+*torbrowser-24.5.0 (30 Apr 2014) |
116 |
+ |
117 |
+ 30 Apr 2014; Poncho <poncho@××××××.ch> +torbrowser-24.5.0.ebuild, |
118 |
+ -torbrowser-24.4.0-r1.ebuild: |
119 |
+ www-client/torbrowser: version bump see https://blog.torproject.org/blog/tor- |
120 |
+ browser-36-released |
121 |
+ |
122 |
+ 09 Apr 2014; Poncho <poncho@××××××.ch> -torbrowser-24.3.0-r1.ebuild, |
123 |
+ -torbrowser-24.3.0-r2.ebuild, -torbrowser-24.4.0.ebuild: |
124 |
+ www-client/torbrowser: remove old, sources are no longer available at |
125 |
+ https://www.torproject.org/dist/torbrowser/ |
126 |
+ |
127 |
+*torbrowser-24.4.0-r1 (09 Apr 2014) |
128 |
+ |
129 |
+ 09 Apr 2014; Poncho <poncho@××××××.ch> +torbrowser-24.4.0-r1.ebuild: |
130 |
+ www-client/torbrowser: bump for 3.5.4 release see |
131 |
+ https://blog.torproject.org/blog/tor-browser-354-released |
132 |
+ |
133 |
+ 30 Mar 2014; Julian Ospald <hasufell@g.o> torbrowser-24.3.0-r1.ebuild, |
134 |
+ torbrowser-24.3.0-r2.ebuild, torbrowser-24.4.0.ebuild: |
135 |
+ fix Tor spelling |
136 |
+ |
137 |
+ 22 Mar 2014; Poncho <poncho@××××××.ch> torbrowser-24.4.0.ebuild: |
138 |
+ www-client/torbrowser: sync with firefox |
139 |
+ |
140 |
+ 22 Mar 2014; Poncho <poncho@××××××.ch> torbrowser-24.3.0-r2.ebuild, |
141 |
+ torbrowser-24.4.0.ebuild: |
142 |
+ www-client/torbrowser: add comments |
143 |
+ |
144 |
+*torbrowser-24.4.0 (20 Mar 2014) |
145 |
+ |
146 |
+ 20 Mar 2014; Julian Ospald <hasufell@g.o> +torbrowser-24.4.0.ebuild: |
147 |
+ version bump |
148 |
+ |
149 |
+*torbrowser-24.3.0-r2 (16 Feb 2014) |
150 |
+ |
151 |
+ 16 Feb 2014; Julian Ospald <hasufell@g.o> |
152 |
+ +torbrowser-24.3.0-r2.ebuild, |
153 |
+ +files/torbrowser-24.3.0-allow-lightspark.patch: |
154 |
+ fix license, add lightspark support, bump gentoo patchset |
155 |
+ |
156 |
+*torbrowser-10.0.11 (08 Dez 2012) |
157 |
+ |
158 |
+ 11 Dez 2012; Poncho <poncho@××××××.ch> torbrowser-10.0.11.ebuild: |
159 |
+ use stable firefox, move to torbrowser-overlay |
160 |
+ https://github.com/MeisterP/torbrowser-overlay/commits/master |
161 |
+ |
162 |
+ 28 Aug 2012; Julian Ospald <hasufell@g.o> metadata.xml: |
163 |
+ add mozilla herd |
164 |
+ |
165 |
+ 14 Jul 2012; Julian Ospald <hasufell@g.o> torbrowser-13.0-r1.ebuild: |
166 |
+ rename icon to avoid possible issues with mirrors |
167 |
+ |
168 |
+*torbrowser-13.0-r1 (14 Jul 2012) |
169 |
+ |
170 |
+ 14 Jul 2012; Julian Ospald <hasufell@g.o> -torbrowser-13.0.ebuild, |
171 |
+ +torbrowser-13.0-r1.ebuild: |
172 |
+ split profile stuff into www-misc/torbrowser-profile |
173 |
+ |
174 |
+*torbrowser-13.0 (30 Jun 2012) |
175 |
+ |
176 |
+ 30 Jun 2012; Julian Ospald <hasufell@g.o> |
177 |
+ +files/torbrowser-patches/0007-Disable-SSL-Session-ID-tracking.patch, |
178 |
+ +files/torbrowser-patches/0008-Provide-an-observer-event-to-close-persistent- |
179 |
+ connec.patch, |
180 |
+ +files/torbrowser-patches/0009-Limit-device-and-system-specific-CSS-Media-Que |
181 |
+ ries.patch, |
182 |
+ +files/torbrowser-patches/0010-Rebrand-Firefox-to-TorBrowser.patch, |
183 |
+ +files/torbrowser-patches/0011-Make-Download-manager-memory-only.patch, |
184 |
+ +files/torbrowser-patches/0012-Add-DDG-and-StartPage-to-Omnibox.patch, |
185 |
+ +files/torbrowser-patches/0013-Make-nsICacheService.EvictEntries-synchronous. |
186 |
+ patch, +files/torbrowser-patches/0014-Prevent-WebSocket-DNS-leak.patch, |
187 |
+ +files/torbrowser-patches/0015-Make-Tor-Browser-exit-when-not-launched-from-V |
188 |
+ idalia.patch, |
189 |
+ +files/torbrowser-patches/0016-Limit-the-number-of-fonts-per-document.patch, |
190 |
+ +files/torbrowser-patches/0018-Adapt-Steven-Michaud-s-Mac-crashfix-patch.patc |
191 |
+ h, |
192 |
+ +files/torbrowser-patches/0020-Fix-internal-compile-error-for-sub-ancient-GCC |
193 |
+ s.patch, |
194 |
+ -files/torbrowser-patches/0007-Make-Tor-Browser-exit-when-not-launched-from-V |
195 |
+ idalia.patch, |
196 |
+ -files/torbrowser-patches/0008-Disable-SSL-Session-ID-tracking.patch, |
197 |
+ -files/torbrowser-patches/0009-Provide-an-observer-event-to-close-persistent- |
198 |
+ connec.patch, |
199 |
+ -files/torbrowser-patches/0010-Provide-client-values-only-to-CSS-Media-Querie |
200 |
+ s.patch, |
201 |
+ -files/torbrowser-patches/0011-Limit-the-number-of-fonts-per-document.patch, |
202 |
+ -files/torbrowser-patches/0012-Rebrand-Firefox-to-TorBrowser.patch, |
203 |
+ -files/torbrowser-patches/0013-Make-Download-manager-memory-only.patch, |
204 |
+ -files/torbrowser-patches/0014-Add-DDG-and-StartPage-to-Omnibox.patch, |
205 |
+ -files/torbrowser-patches/0015-Make-nsICacheService.EvictEntries-synchronous. |
206 |
+ patch, -files/torbrowser-patches/0016-Prevent-WebSocket-DNS-leak.patch, |
207 |
+ -files/torbrowser-patches/0018-Add-HTTP-auth-headers-before-the-modify-reques |
208 |
+ t-obse.patch, |
209 |
+ files/torbrowser-patches/0001-Block-Components.interfaces-lookupMethod-from-c |
210 |
+ onten.patch, |
211 |
+ files/torbrowser-patches/0002-Make-Permissions-Manager-memory-only.patch, |
212 |
+ -torbrowser-10.0.5.ebuild, |
213 |
+ files/torbrowser-patches/0003-Make-Intermediate-Cert-Store-memory-only.patch, |
214 |
+ files/torbrowser-patches/0004-Add-a-string-based-cacheKey.patch, |
215 |
+ files/torbrowser-patches/0005-Block-all-plugins-except-flash.patch, |
216 |
+ files/torbrowser-patches/0006-Make-content-pref-service-memory-only-clearable |
217 |
+ .patch, |
218 |
+ files/torbrowser-patches/0017-Randomize-HTTP-request-order-and-pipeline-depth |
219 |
+ .patch, +torbrowser-13.0.ebuild, |
220 |
+ +files/torbrowser-patches/0019-Fix-Firefox-13-build-process.patch: |
221 |
+ version bump, also fixes bug #423343 |
222 |
+ |
223 |
+*torbrowser-10.0.5 (06 Jun 2012) |
224 |
+ |
225 |
+ 06 Jun 2012; Julian Ospald <hasufell@g.o> |
226 |
+ +files/torbrowser-patches/0001-Block-Components.interfaces-lookupMethod-from- |
227 |
+ conten.patch, |
228 |
+ +files/torbrowser-patches/0002-Make-Permissions-Manager-memory-only.patch, |
229 |
+ +files/torbrowser-patches/0003-Make-Intermediate-Cert-Store-memory-only.patch |
230 |
+ , +files/torbrowser-patches/0004-Add-a-string-based-cacheKey.patch, |
231 |
+ +files/torbrowser-patches/0005-Block-all-plugins-except-flash.patch, |
232 |
+ +files/torbrowser-patches/0006-Make-content-pref-service-memory-only-clearabl |
233 |
+ e.patch, |
234 |
+ +files/torbrowser-patches/0007-Make-Tor-Browser-exit-when-not-launched-from-V |
235 |
+ idalia.patch, |
236 |
+ +files/torbrowser-patches/0008-Disable-SSL-Session-ID-tracking.patch, |
237 |
+ +files/torbrowser-patches/0009-Provide-an-observer-event-to-close-persistent- |
238 |
+ connec.patch, |
239 |
+ +files/torbrowser-patches/0010-Provide-client-values-only-to-CSS-Media-Querie |
240 |
+ s.patch, |
241 |
+ +files/torbrowser-patches/0011-Limit-the-number-of-fonts-per-document.patch, |
242 |
+ +files/torbrowser-patches/0012-Rebrand-Firefox-to-TorBrowser.patch, |
243 |
+ +files/torbrowser-patches/0013-Make-Download-manager-memory-only.patch, |
244 |
+ +files/torbrowser-patches/0014-Add-DDG-and-StartPage-to-Omnibox.patch, |
245 |
+ +files/torbrowser-patches/0015-Make-nsICacheService.EvictEntries-synchronous. |
246 |
+ patch, +files/torbrowser-patches/0016-Prevent-WebSocket-DNS-leak.patch, |
247 |
+ +files/torbrowser-patches/0017-Randomize-HTTP-request-order-and-pipeline-dept |
248 |
+ h.patch, |
249 |
+ +files/torbrowser-patches/0018-Add-HTTP-auth-headers-before-the-modify-reques |
250 |
+ t-obse.patch, |
251 |
+ -files/12.0/0001-Block-Components.interfaces-lookupMethod-from-conten.patch, |
252 |
+ -files/12.0/0002-Make-Permissions-Manager-memory-only.patch, |
253 |
+ -files/12.0/0003-Make-Intermediate-Cert-Store-memory-only.patch, |
254 |
+ -files/12.0/0004-Add-a-string-based-cacheKey.patch, |
255 |
+ -files/12.0/0005-Block-all-plugins-except-flash.patch, |
256 |
+ -files/12.0/0006-Make-content-pref-service-memory-only-clearable.patch, |
257 |
+ -files/12.0/0008-Disable-SSL-Session-ID-tracking.patch, |
258 |
+ -files/12.0/0009-Provide-an-observer-event-to-close-persistent-connec.patch, |
259 |
+ -files/12.0/0010-Provide-client-values-only-to-CSS-Media-Queries.patch, |
260 |
+ -files/12.0/0011-Limit-the-number-of-fonts-per-document.patch, |
261 |
+ -files/12.0/0012-Randomize-HTTP-request-order-and-pipeline-depth.patch, |
262 |
+ -files/12.0/0013-Rebrand-Firefox-to-TorBrowser.patch, |
263 |
+ -files/12.0/0014-Make-Download-manager-memory-only.patch, |
264 |
+ -files/12.0/0015-Add-DDG-and-StartPage-to-Omnibox.patch, |
265 |
+ -files/12.0/0016-Adapt-Steven-Michaud-s-Mac-crashfix-patch-for-FF12.patch, |
266 |
+ -files/12.0/0017-Make-nsICacheService.EvictEntries-synchronous.patch, |
267 |
+ -files/12.0/0018-Prevent-WebSocket-DNS-leak.patch, +torbrowser-10.0.5.ebuild, |
268 |
+ -torbrowser-12.0-r2.ebuild: |
269 |
+ version bump/dump... tor upstream switched to ESR |
270 |
+ |
271 |
+ 01 Jun 2012; Julian Ospald <hasufell@g.o> torbrowser-12.0-r2.ebuild: |
272 |
+ bump profile-folder version |
273 |
+ |
274 |
+*torbrowser-12.0-r2 (01 Jun 2012) |
275 |
+ |
276 |
+ 01 Jun 2012; Julian Ospald <hasufell@g.o> -torbrowser-12.0.ebuild, |
277 |
+ +torbrowser-12.0-r2.ebuild: |
278 |
+ sync with firefox ebuild |
279 |
+ |
280 |
+*torbrowser-12.0 (12 May 2012) |
281 |
+ |
282 |
+ 12 May 2012; Julian Ospald <hasufell@g.o> |
283 |
+ +files/12.0/0001-Block-Components.interfaces-lookupMethod-from-conten.patch, |
284 |
+ +files/12.0/0002-Make-Permissions-Manager-memory-only.patch, |
285 |
+ +files/12.0/0003-Make-Intermediate-Cert-Store-memory-only.patch, |
286 |
+ +files/12.0/0004-Add-a-string-based-cacheKey.patch, |
287 |
+ +files/12.0/0005-Block-all-plugins-except-flash.patch, |
288 |
+ +files/12.0/0006-Make-content-pref-service-memory-only-clearable.patch, |
289 |
+ +files/12.0/0008-Disable-SSL-Session-ID-tracking.patch, |
290 |
+ +files/12.0/0009-Provide-an-observer-event-to-close-persistent-connec.patch, |
291 |
+ +files/12.0/0010-Provide-client-values-only-to-CSS-Media-Queries.patch, |
292 |
+ +files/12.0/0011-Limit-the-number-of-fonts-per-document.patch, |
293 |
+ +files/12.0/0012-Randomize-HTTP-request-order-and-pipeline-depth.patch, |
294 |
+ +files/12.0/0013-Rebrand-Firefox-to-TorBrowser.patch, |
295 |
+ +files/12.0/0014-Make-Download-manager-memory-only.patch, |
296 |
+ +files/12.0/0015-Add-DDG-and-StartPage-to-Omnibox.patch, |
297 |
+ +files/12.0/0016-Adapt-Steven-Michaud-s-Mac-crashfix-patch-for-FF12.patch, |
298 |
+ +files/12.0/0017-Make-nsICacheService.EvictEntries-synchronous.patch, |
299 |
+ +torbrowser-12.0.ebuild, +files/12.0/0018-Prevent-WebSocket-DNS-leak.patch, |
300 |
+ +metadata.xml: |
301 |
+ initial import with help from Poncho wrt #406361 |
302 |
|
303 |
diff --git a/www-client/torbrowser/Manifest b/www-client/torbrowser/Manifest |
304 |
new file mode 100644 |
305 |
index 0000000..c095ef6 |
306 |
--- /dev/null |
307 |
+++ b/www-client/torbrowser/Manifest |
308 |
@@ -0,0 +1,10 @@ |
309 |
+AUX README.tor-launcher 1594 SHA256 f344dd89d39a7330eb8303f80e89d9a015b3b70e4bc52649e0c8c1cde52a5ec6 SHA512 9faeba83e0910438e9267a203c50d60f69860ab8765b3a6b1f38c153e3578645daf196133923597d2d8b00228b884250b0fb0cc5020978b22386510c6e6559b1 WHIRLPOOL c7d0e9fa5b390d308524f5ac41249acbe6c612ac01ec960e1152c14dd1de1d520c1b52948315995df82a0a524dbcf4371b0466841acd6471c52a5baa8d9aac4b |
310 |
+AUX tor-browser.git-bccc144c21f6069a294038a6559ba46ceb8da2a2.patch 15904 SHA256 890f5b981533541f091ae9c159623107c823804a13afd421e39b664873dc7d65 SHA512 1d7b1633c2424dcfb24ea84ae443c04578ed55dd539b9a606fd98033027e8eba0c743e198db385f6e3a27e4676d5f4d0830f050d8ba1fb1dec50652f26e4f715 WHIRLPOOL f8cedc44db5e80b532e1db351a1438c96f7ed8e84799ed84084d275757fe40c20399d37d7a73e376875590482d2235024c1ac99e4ee31e726d17bd7a5c38213b |
311 |
+AUX torbrowser-24.3.0-allow-lightspark.patch 615 SHA256 904a090199d82d3fea3f96c2e077a08ea7e28ef46a4f4d1e7e6da936b08bafd1 SHA512 35772c3c716fe5004d3306591b9ab1612a78644cb272de473fbf0da91a19075e6a166bb97a8365065828de829dc3b68618a31820f3b0eb7399e2bfe008f797d8 WHIRLPOOL 75ed0e691d9bfb877a368b0946f3cf8007e3201456a47e6d2ddd9b3d295cf782347a8cac45f63242d1bf6cea3a1acdead3b9494d26f52387253fe490be6a598d |
312 |
+DIST firefox-31.0-patches-0.2.tar.xz 4636 SHA256 fdcd4e68093fb905af06cd89aad7042f8a4e695dea9c184351945fcb5872a062 SHA512 2fee84ac6027a1e1317470112df54fef411596a522bca756f82c525b13ba952015e71f2aa05a807fec04c3bd092e8cbebd0c2349e0dc4950b329a88811b00151 WHIRLPOOL 59dc5f3457dc2a0c0c83a0128063da00d127cee13487b112064368de7d98438b7ffeb1dfe362080eca6a82af4834f3e27c6bd887e51b5d59c728ae124b26114d |
313 |
+DIST tor-browser-31.5.0esr-4.0-1-build1.tar.gz 170142149 SHA256 75c39110209cb20d9b83782114edbf3d94e77fa4bf9c2ef0b79ebe8bc6100375 SHA512 d9b692cd5678ea96c3b62f630017057c07a9976fb11102d9f1bb489cf495e6ab890ebc36b756e6efc39b1837804c32efa72c76621bbad563ecb9954bcd61771b WHIRLPOOL d9432bb1dee8e39ba8bdaac252315f83d645cf2374789b2f7eb3f4453bb87b5a67422c3e6f92a81c007db17f6f9069e7f9023051073123c07178fc3fca3e9b5b |
314 |
+DIST tor-browser-linux32-4.0.4_en-US.tar.xz 42884008 SHA256 f527b85a057ae402fa1dc84e6c175071e6448300cd2ebdd0d50494e1dd605185 SHA512 f5846b01d9b6bcac69c188bdb1d2d2fade86aec37c9f2216a6efcb8e95286cee9558acb5d2acf8fb1d36c11540ab460c3159d7f66f36d386d4c5e47e1da4fe16 WHIRLPOOL ae293d1fa156058b0f475c230723d8b3a7844ba50c98e3a21e0251d2e634802fde8facb56e28c8168e023d33dc75278e8421429de42bf9b7e8b06db8dd659e8c |
315 |
+DIST tor-browser-linux64-4.0.4_en-US.tar.xz 42068548 SHA256 0f0a07905daaf714322bc54cf25ed0e3b8ef91aeb937ab0df2d39010c9ee7b82 SHA512 8dbed4d037ad4927811089ce05c0411c71d6f7fb6614d9131a4554c00630a397b9c88ea31c0389ffb813297ed77a69ed158a2cc5186a7df8b0d8728b35e480ba WHIRLPOOL 40f93d1fb610095dd8762ffb41d5d989d5e357c7ddb8dd8a07b3dd87962988e25fe07de8fa5bbe995f8ca2f368f395dd6a0e0bcb12a43fe4a8cd8f48feeb51b2 |
316 |
+EBUILD torbrowser-31.5.0.ebuild 10052 SHA256 57cb554dc22d90436c55ba023b19d692de2614f01d143b5462317f27083b6e1d SHA512 2f694fa48a28bcaee673112640f46c47298e846ec06fb052fe740be86e5d69323376ab9e2612f982039243ddbfce595a6ff51480b2ae40bff18fb341c5b32e89 WHIRLPOOL ab435f4cb6fad6052a982a339886d34a3b0399db6611f57deed0222007dcc8ca9eb30962249578d4c72a119d5002b73761fbb296729a30208c7ad419c5f02d08 |
317 |
+MISC ChangeLog 11827 SHA256 d56642e383f443000bda2a5cd9904e91e7eece21eaaef493ef8abdbe6009c437 SHA512 7ca4a034beef7c3a55bf55e61a8e309937a0833e3d0fd93d2ed7789c93cd78c27486124f20209b21d72ee8d5f07cd259fc61cec45e8dfd7a9b64d47dd9f9773f WHIRLPOOL 6ff2cb2698c54f7fceb2ed38b3fd4a0ee7b2c0d99673eabade3a2e82b04fea4e5ef750ccde5048cbb0f194ae3e75ee7eae63b889d8321090a46c435d3d5ae9c2 |
318 |
+MISC metadata.xml 889 SHA256 f1d80c79dbd97040f9839b0dddcda0cb292cefe0c80294f6fc36706cc2904795 SHA512 285c5690a2779d778669a645b93c76227a84a7f7df1dc7044b0e642de4ade79da6fef0b067adbd9c8be959e13dd0fcc5412293d39129ee94be97bc826c9b1dab WHIRLPOOL 29a7a249f4a22c67b842c01accbf12263657e9ac798dda37246eb8f07e58cda6159c281502f53b2e14f7c6124a0257927af158164a3a4d1cc768484a67888d47 |
319 |
|
320 |
diff --git a/www-client/torbrowser/files/README.tor-launcher b/www-client/torbrowser/files/README.tor-launcher |
321 |
new file mode 100644 |
322 |
index 0000000..5edc01e |
323 |
--- /dev/null |
324 |
+++ b/www-client/torbrowser/files/README.tor-launcher |
325 |
@@ -0,0 +1,37 @@ |
326 |
+Using a system-installed Tor process with Tor Browser: |
327 |
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
328 |
+The Tor ControlPort password should be given inside double quotes, inside |
329 |
+single quotes, i.e. if the ControlPort password is “secret” (without |
330 |
+curly quotes) then we must set the environment variable *exactly* like |
331 |
+this: |
332 |
+ |
333 |
+TOR_CONTROL_PASSWD='"secret"' |
334 |
+ |
335 |
+Yes, the variable MUST be double-quoted, then single-quoted, exactly as |
336 |
+shown. This is used by TorButtom to authenticate to Tor's ControlPort, and |
337 |
+is necessary for using TBB with a with a system-installed Tor. |
338 |
+ |
339 |
+Additionally, if using a system-installed Tor, the following about:config |
340 |
+options should be set (values in <> mean they are the value taken from your |
341 |
+torrc): |
342 |
+ |
343 |
+SETTING NAME VALUE |
344 |
+extensions.torbutton.banned_ports [...],<SocksPort>,<ControlPort> |
345 |
+extensions.torbutton.block_disk false |
346 |
+extensions.torbutton.custom.socks_host 127.0.0.1 |
347 |
+extensions.torbutton.custom.socks_port <SocksPort> |
348 |
+extensions.torbutton.inserted_button true |
349 |
+extensions.torbutton.launch_warning false |
350 |
+extensions.torbutton.loglevel 2 |
351 |
+extensions.torbutton.logmethod 0 |
352 |
+extensions.torbutton.settings_method custom |
353 |
+extensions.torbutton.socks_port <SocksPort> |
354 |
+extensions.torbutton.use_privoxy false |
355 |
+extensions.torlauncher.control_port <ControlPort> |
356 |
+extensions.torlauncher.loglevel 2 |
357 |
+extensions.torlauncher.logmethod 0 |
358 |
+extensions.torlauncher.prompt_at_startup false |
359 |
+extensions.torlauncher.start_tor false |
360 |
+ |
361 |
+where the '[...]' in the banned_ports option means "leave anything that was |
362 |
+already in the preference alone, just append the things specified after it". |
363 |
|
364 |
diff --git a/www-client/torbrowser/files/tor-browser.git-bccc144c21f6069a294038a6559ba46ceb8da2a2.patch b/www-client/torbrowser/files/tor-browser.git-bccc144c21f6069a294038a6559ba46ceb8da2a2.patch |
365 |
new file mode 100644 |
366 |
index 0000000..de2fe2d |
367 |
--- /dev/null |
368 |
+++ b/www-client/torbrowser/files/tor-browser.git-bccc144c21f6069a294038a6559ba46ceb8da2a2.patch |
369 |
@@ -0,0 +1,430 @@ |
370 |
+From bccc144c21f6069a294038a6559ba46ceb8da2a2 Mon Sep 17 00:00:00 2001 |
371 |
+From: Kathy Brade <brade@×××××××××××××.com> |
372 |
+Date: Fri, 18 Oct 2013 15:20:06 -0400 |
373 |
+Subject: [PATCH] Bug #9173: Change the default Firefox profile directory to |
374 |
+ be TBB-relative. |
375 |
+ |
376 |
+This should eliminate our need to rely on a wrapper script that sets $HOME and |
377 |
+launches Firefox with -profile. |
378 |
+--- |
379 |
+ toolkit/xre/nsXREDirProvider.cpp | 153 +++++++------------------------- |
380 |
+ toolkit/xre/nsXREDirProvider.h | 10 +-- |
381 |
+ xpcom/io/moz.build | 4 + |
382 |
+ xpcom/io/nsAppFileLocationProvider.cpp | 81 ++++++++--------- |
383 |
+ 4 files changed, 81 insertions(+), 167 deletions(-) |
384 |
+ |
385 |
+diff --git a/toolkit/xre/nsXREDirProvider.cpp b/toolkit/xre/nsXREDirProvider.cpp |
386 |
+index 88a4348..4835541 100644 |
387 |
+--- a/toolkit/xre/nsXREDirProvider.cpp |
388 |
++++ b/toolkit/xre/nsXREDirProvider.cpp |
389 |
+@@ -30,6 +30,7 @@ |
390 |
+ #include "nsArrayEnumerator.h" |
391 |
+ #include "nsEnumeratorUtils.h" |
392 |
+ #include "nsReadableUtils.h" |
393 |
++#include "nsXPCOMPrivate.h" // for XPCOM_FILE_PATH_SEPARATOR |
394 |
+ #include "mozilla/Services.h" |
395 |
+ #include "mozilla/Omnijar.h" |
396 |
+ #include "mozilla/Preferences.h" |
397 |
+@@ -188,9 +189,6 @@ nsXREDirProvider::GetUserProfilesRootDir(nsIFile** aResult, |
398 |
+ aProfileName, aAppName, aVendorName); |
399 |
+ |
400 |
+ if (NS_SUCCEEDED(rv)) { |
401 |
+-#if !defined(XP_UNIX) || defined(XP_MACOSX) |
402 |
+- rv = file->AppendNative(NS_LITERAL_CSTRING("Profiles")); |
403 |
+-#endif |
404 |
+ // We must create the profile directory here if it does not exist. |
405 |
+ nsresult tmp = EnsureDirectoryExists(file); |
406 |
+ if (NS_FAILED(tmp)) { |
407 |
+@@ -213,9 +211,6 @@ nsXREDirProvider::GetUserProfilesLocalDir(nsIFile** aResult, |
408 |
+ aProfileName, aAppName, aVendorName); |
409 |
+ |
410 |
+ if (NS_SUCCEEDED(rv)) { |
411 |
+-#if !defined(XP_UNIX) || defined(XP_MACOSX) |
412 |
+- rv = file->AppendNative(NS_LITERAL_CSTRING("Profiles")); |
413 |
+-#endif |
414 |
+ // We must create the profile directory here if it does not exist. |
415 |
+ nsresult tmp = EnsureDirectoryExists(file); |
416 |
+ if (NS_FAILED(tmp)) { |
417 |
+@@ -1143,82 +1138,45 @@ nsresult |
418 |
+ nsXREDirProvider::GetUserDataDirectoryHome(nsIFile** aFile, bool aLocal) |
419 |
+ { |
420 |
+ // Copied from nsAppFileLocationProvider (more or less) |
421 |
+- nsresult rv; |
422 |
++ NS_ENSURE_ARG_POINTER(aFile); |
423 |
+ nsCOMPtr<nsIFile> localDir; |
424 |
+ |
425 |
+-#if defined(XP_MACOSX) |
426 |
+- FSRef fsRef; |
427 |
+- OSType folderType; |
428 |
+- if (aLocal) { |
429 |
+- folderType = kCachedDataFolderType; |
430 |
+- } else { |
431 |
+-#ifdef MOZ_THUNDERBIRD |
432 |
+- folderType = kDomainLibraryFolderType; |
433 |
+-#else |
434 |
+- folderType = kApplicationSupportFolderType; |
435 |
+-#endif |
436 |
+- } |
437 |
+- OSErr err = ::FSFindFolder(kUserDomain, folderType, kCreateFolder, &fsRef); |
438 |
+- NS_ENSURE_FALSE(err, NS_ERROR_FAILURE); |
439 |
+- |
440 |
+- rv = NS_NewNativeLocalFile(EmptyCString(), true, getter_AddRefs(localDir)); |
441 |
++ nsresult rv = GetAppDir()->Clone(getter_AddRefs(localDir)); |
442 |
+ NS_ENSURE_SUCCESS(rv, rv); |
443 |
+ |
444 |
+- nsCOMPtr<nsILocalFileMac> dirFileMac = do_QueryInterface(localDir); |
445 |
+- NS_ENSURE_TRUE(dirFileMac, NS_ERROR_UNEXPECTED); |
446 |
++ int levelsToRemove = 1; // In FF21+, appDir points to browser subdirectory. |
447 |
++#if defined(XP_MACOSX) |
448 |
++ levelsToRemove += 2; |
449 |
++#endif |
450 |
++ while (localDir && (levelsToRemove > 0)) { |
451 |
++ // When crawling up the hierarchy, components named "." do not count. |
452 |
++ nsAutoCString removedName; |
453 |
++ rv = localDir->GetNativeLeafName(removedName); |
454 |
++ NS_ENSURE_SUCCESS(rv, rv); |
455 |
++ bool didRemove = !removedName.Equals("."); |
456 |
+ |
457 |
+- rv = dirFileMac->InitWithFSRef(&fsRef); |
458 |
+- NS_ENSURE_SUCCESS(rv, rv); |
459 |
++ // Remove a directory component. |
460 |
++ nsCOMPtr<nsIFile> parentDir; |
461 |
++ rv = localDir->GetParent(getter_AddRefs(parentDir)); |
462 |
++ NS_ENSURE_SUCCESS(rv, rv); |
463 |
++ localDir = parentDir; |
464 |
+ |
465 |
+- localDir = do_QueryInterface(dirFileMac, &rv); |
466 |
+-#elif defined(XP_WIN) |
467 |
+- nsString path; |
468 |
+- if (aLocal) { |
469 |
+- rv = GetShellFolderPath(CSIDL_LOCAL_APPDATA, path); |
470 |
+- if (NS_FAILED(rv)) |
471 |
+- rv = GetRegWindowsAppDataFolder(aLocal, path); |
472 |
++ if (didRemove) |
473 |
++ --levelsToRemove; |
474 |
+ } |
475 |
+- if (!aLocal || NS_FAILED(rv)) { |
476 |
+- rv = GetShellFolderPath(CSIDL_APPDATA, path); |
477 |
+- if (NS_FAILED(rv)) { |
478 |
+- if (!aLocal) |
479 |
+- rv = GetRegWindowsAppDataFolder(aLocal, path); |
480 |
+- } |
481 |
+- } |
482 |
+- NS_ENSURE_SUCCESS(rv, rv); |
483 |
+ |
484 |
+- rv = NS_NewLocalFile(path, true, getter_AddRefs(localDir)); |
485 |
+-#elif defined(MOZ_WIDGET_GONK) |
486 |
+- rv = NS_NewNativeLocalFile(NS_LITERAL_CSTRING("/data/b2g"), true, |
487 |
+- getter_AddRefs(localDir)); |
488 |
+-#elif defined(XP_UNIX) |
489 |
+- const char* homeDir = getenv("HOME"); |
490 |
+- if (!homeDir || !*homeDir) |
491 |
++ if (!localDir) |
492 |
+ return NS_ERROR_FAILURE; |
493 |
+ |
494 |
+-#ifdef ANDROID /* We want (ProfD == ProfLD) on Android. */ |
495 |
+- aLocal = false; |
496 |
+-#endif |
497 |
++ rv = localDir->AppendRelativeNativePath(NS_LITERAL_CSTRING("TorBrowser" |
498 |
++ XPCOM_FILE_PATH_SEPARATOR "Data" |
499 |
++ XPCOM_FILE_PATH_SEPARATOR "Browser")); |
500 |
++ NS_ENSURE_SUCCESS(rv, rv); |
501 |
+ |
502 |
+ if (aLocal) { |
503 |
+- // If $XDG_CACHE_HOME is defined use it, otherwise use $HOME/.cache. |
504 |
+- const char* cacheHome = getenv("XDG_CACHE_HOME"); |
505 |
+- if (cacheHome && *cacheHome) { |
506 |
+- rv = NS_NewNativeLocalFile(nsDependentCString(cacheHome), true, |
507 |
+- getter_AddRefs(localDir)); |
508 |
+- } else { |
509 |
+- rv = NS_NewNativeLocalFile(nsDependentCString(homeDir), true, |
510 |
+- getter_AddRefs(localDir)); |
511 |
+- if (NS_SUCCEEDED(rv)) |
512 |
+- rv = localDir->AppendNative(NS_LITERAL_CSTRING(".cache")); |
513 |
+- } |
514 |
+- } else { |
515 |
+- rv = NS_NewNativeLocalFile(nsDependentCString(homeDir), true, |
516 |
+- getter_AddRefs(localDir)); |
517 |
++ rv = localDir->AppendNative(NS_LITERAL_CSTRING("Caches")); |
518 |
++ NS_ENSURE_SUCCESS(rv, rv); |
519 |
+ } |
520 |
+-#else |
521 |
+-#error "Don't know how to get product dir on your platform" |
522 |
+-#endif |
523 |
+ |
524 |
+ NS_IF_ADDREF(*aFile = localDir); |
525 |
+ return rv; |
526 |
+@@ -1431,48 +1389,25 @@ nsXREDirProvider::AppendProfilePath(nsIFile* aFile, |
527 |
+ } |
528 |
+ |
529 |
+ nsAutoCString profile; |
530 |
+- nsAutoCString appName; |
531 |
+- nsAutoCString vendor; |
532 |
+ if (aProfileName && !aProfileName->IsEmpty()) { |
533 |
+ profile = *aProfileName; |
534 |
+- } else if (aAppName) { |
535 |
+- appName = *aAppName; |
536 |
+- if (aVendorName) { |
537 |
+- vendor = *aVendorName; |
538 |
+- } |
539 |
+ } else if (gAppData->profile) { |
540 |
+ profile = gAppData->profile; |
541 |
+- } else { |
542 |
+- appName = gAppData->name; |
543 |
+- vendor = gAppData->vendor; |
544 |
+ } |
545 |
+ |
546 |
+- nsresult rv; |
547 |
++ nsresult rv = NS_ERROR_FAILURE; |
548 |
+ |
549 |
+ #if defined (XP_MACOSX) |
550 |
+ if (!profile.IsEmpty()) { |
551 |
+ rv = AppendProfileString(aFile, profile.get()); |
552 |
++ NS_ENSURE_SUCCESS(rv, rv); |
553 |
+ } |
554 |
+- else { |
555 |
+- // Note that MacOS ignores the vendor when creating the profile hierarchy - |
556 |
+- // all application preferences directories live alongside one another in |
557 |
+- // ~/Library/Application Support/ |
558 |
+- rv = aFile->AppendNative(appName); |
559 |
+- } |
560 |
+- NS_ENSURE_SUCCESS(rv, rv); |
561 |
+ |
562 |
+ #elif defined(XP_WIN) |
563 |
+ if (!profile.IsEmpty()) { |
564 |
+ rv = AppendProfileString(aFile, profile.get()); |
565 |
++ NS_ENSURE_SUCCESS(rv, rv); |
566 |
+ } |
567 |
+- else { |
568 |
+- if (!vendor.IsEmpty()) { |
569 |
+- rv = aFile->AppendNative(vendor); |
570 |
+- NS_ENSURE_SUCCESS(rv, rv); |
571 |
+- } |
572 |
+- rv = aFile->AppendNative(appName); |
573 |
+- } |
574 |
+- NS_ENSURE_SUCCESS(rv, rv); |
575 |
+ |
576 |
+ #elif defined(ANDROID) |
577 |
+ // The directory used for storing profiles |
578 |
+@@ -1484,12 +1419,6 @@ nsXREDirProvider::AppendProfilePath(nsIFile* aFile, |
579 |
+ rv = aFile->AppendNative(nsDependentCString("mozilla")); |
580 |
+ NS_ENSURE_SUCCESS(rv, rv); |
581 |
+ #elif defined(XP_UNIX) |
582 |
+- nsAutoCString folder; |
583 |
+- // Make it hidden (by starting with "."), except when local (the |
584 |
+- // profile is already under ~/.cache or XDG_CACHE_HOME). |
585 |
+- if (!aLocal) |
586 |
+- folder.Assign('.'); |
587 |
+- |
588 |
+ if (!profile.IsEmpty()) { |
589 |
+ // Skip any leading path characters |
590 |
+ const char* profileStart = profile.get(); |
591 |
+@@ -1498,31 +1427,17 @@ nsXREDirProvider::AppendProfilePath(nsIFile* aFile, |
592 |
+ |
593 |
+ // On the off chance that someone wanted their folder to be hidden don't |
594 |
+ // let it become ".." |
595 |
+- if (*profileStart == '.' && !aLocal) |
596 |
++ if (*profileStart == '.') |
597 |
+ profileStart++; |
598 |
+ |
599 |
++ // Make it hidden (by starting with "."). |
600 |
++ nsAutoCString folder("."); |
601 |
+ folder.Append(profileStart); |
602 |
+ ToLowerCase(folder); |
603 |
+ |
604 |
+ rv = AppendProfileString(aFile, folder.BeginReading()); |
605 |
++ NS_ENSURE_SUCCESS(rv, rv); |
606 |
+ } |
607 |
+- else { |
608 |
+- if (!vendor.IsEmpty()) { |
609 |
+- folder.Append(vendor); |
610 |
+- ToLowerCase(folder); |
611 |
+- |
612 |
+- rv = aFile->AppendNative(folder); |
613 |
+- NS_ENSURE_SUCCESS(rv, rv); |
614 |
+- |
615 |
+- folder.Truncate(); |
616 |
+- } |
617 |
+- |
618 |
+- folder.Append(appName); |
619 |
+- ToLowerCase(folder); |
620 |
+- |
621 |
+- rv = aFile->AppendNative(folder); |
622 |
+- } |
623 |
+- NS_ENSURE_SUCCESS(rv, rv); |
624 |
+ |
625 |
+ #else |
626 |
+ #error "Don't know how to get profile path on your platform" |
627 |
+diff --git a/toolkit/xre/nsXREDirProvider.h b/toolkit/xre/nsXREDirProvider.h |
628 |
+index 4a9f9a0..054075c 100644 |
629 |
+--- a/toolkit/xre/nsXREDirProvider.h |
630 |
++++ b/toolkit/xre/nsXREDirProvider.h |
631 |
+@@ -56,16 +56,16 @@ public: |
632 |
+ |
633 |
+ nsresult GetProfileDefaultsDir(nsIFile* *aResult); |
634 |
+ |
635 |
+- static nsresult GetUserAppDataDirectory(nsIFile* *aFile) { |
636 |
++ nsresult GetUserAppDataDirectory(nsIFile* *aFile) { |
637 |
+ return GetUserDataDirectory(aFile, false, nullptr, nullptr, nullptr); |
638 |
+ } |
639 |
+- static nsresult GetUserLocalDataDirectory(nsIFile* *aFile) { |
640 |
++ nsresult GetUserLocalDataDirectory(nsIFile* *aFile) { |
641 |
+ return GetUserDataDirectory(aFile, true, nullptr, nullptr, nullptr); |
642 |
+ } |
643 |
+ |
644 |
+ // By default GetUserDataDirectory gets profile path from gAppData, |
645 |
+ // but that can be overridden by using aProfileName/aAppName/aVendorName. |
646 |
+- static nsresult GetUserDataDirectory(nsIFile** aFile, bool aLocal, |
647 |
++ nsresult GetUserDataDirectory(nsIFile** aFile, bool aLocal, |
648 |
+ const nsACString* aProfileName, |
649 |
+ const nsACString* aAppName, |
650 |
+ const nsACString* aVendorName); |
651 |
+@@ -101,8 +101,8 @@ public: |
652 |
+ |
653 |
+ protected: |
654 |
+ nsresult GetFilesInternal(const char* aProperty, nsISimpleEnumerator** aResult); |
655 |
+- static nsresult GetUserDataDirectoryHome(nsIFile* *aFile, bool aLocal); |
656 |
+- static nsresult GetSysUserExtensionsDirectory(nsIFile* *aFile); |
657 |
++ nsresult GetUserDataDirectoryHome(nsIFile* *aFile, bool aLocal); |
658 |
++ nsresult GetSysUserExtensionsDirectory(nsIFile* *aFile); |
659 |
+ #if defined(XP_UNIX) || defined(XP_MACOSX) |
660 |
+ static nsresult GetSystemExtensionsDirectory(nsIFile** aFile); |
661 |
+ #endif |
662 |
+diff --git a/xpcom/io/moz.build b/xpcom/io/moz.build |
663 |
+index cc467f9..609068b 100644 |
664 |
+--- a/xpcom/io/moz.build |
665 |
++++ b/xpcom/io/moz.build |
666 |
+@@ -126,4 +126,8 @@ FINAL_LIBRARY = 'xpcom_core' |
667 |
+ if CONFIG['OS_ARCH'] == 'Linux' and 'lib64' in CONFIG['libdir']: |
668 |
+ DEFINES['HAVE_USR_LIB64_DIR'] = True |
669 |
+ |
670 |
++LOCAL_INCLUDES += [ |
671 |
++ '../build' |
672 |
++] |
673 |
++ |
674 |
+ GENERATED_INCLUDES += ['..'] |
675 |
+diff --git a/xpcom/io/nsAppFileLocationProvider.cpp b/xpcom/io/nsAppFileLocationProvider.cpp |
676 |
+index 1a38589..83f9836 100644 |
677 |
+--- a/xpcom/io/nsAppFileLocationProvider.cpp |
678 |
++++ b/xpcom/io/nsAppFileLocationProvider.cpp |
679 |
+@@ -13,6 +13,7 @@ |
680 |
+ #include "nsISimpleEnumerator.h" |
681 |
+ #include "prenv.h" |
682 |
+ #include "nsCRT.h" |
683 |
++#include "nsXPCOMPrivate.h" // for XPCOM_FILE_PATH_SEPARATOR |
684 |
+ |
685 |
+ #if defined(MOZ_WIDGET_COCOA) |
686 |
+ #include <Carbon/Carbon.h> |
687 |
+@@ -284,9 +285,8 @@ NS_METHOD nsAppFileLocationProvider::CloneMozBinDirectory(nsIFile **aLocalFile) |
688 |
+ //---------------------------------------------------------------------------------------- |
689 |
+ // GetProductDirectory - Gets the directory which contains the application data folder |
690 |
+ // |
691 |
+-// UNIX : ~/.mozilla/ |
692 |
+-// WIN : <Application Data folder on user's machine>\Mozilla |
693 |
+-// Mac : :Documents:Mozilla: |
694 |
++// UNIX and WIN : <App Folder>/TorBrowser/Data/Browser |
695 |
++// Mac : <App Folder>/../../TorBrowser/Data/Browser |
696 |
+ //---------------------------------------------------------------------------------------- |
697 |
+ NS_METHOD nsAppFileLocationProvider::GetProductDirectory(nsIFile **aLocalFile, bool aLocal) |
698 |
+ { |
699 |
+@@ -297,32 +297,43 @@ NS_METHOD nsAppFileLocationProvider::GetProductDirectory(nsIFile **aLocalFile, b |
700 |
+ bool exists; |
701 |
+ nsCOMPtr<nsIFile> localDir; |
702 |
+ |
703 |
+-#if defined(MOZ_WIDGET_COCOA) |
704 |
+- FSRef fsRef; |
705 |
+- OSType folderType = aLocal ? (OSType) kCachedDataFolderType : (OSType) kDomainLibraryFolderType; |
706 |
+- OSErr err = ::FSFindFolder(kUserDomain, folderType, kCreateFolder, &fsRef); |
707 |
+- if (err) return NS_ERROR_FAILURE; |
708 |
+- NS_NewLocalFile(EmptyString(), true, getter_AddRefs(localDir)); |
709 |
+- if (!localDir) return NS_ERROR_FAILURE; |
710 |
+- nsCOMPtr<nsILocalFileMac> localDirMac(do_QueryInterface(localDir)); |
711 |
+- rv = localDirMac->InitWithFSRef(&fsRef); |
712 |
+- if (NS_FAILED(rv)) return rv; |
713 |
+-#elif defined(XP_WIN) |
714 |
+- nsCOMPtr<nsIProperties> directoryService = |
715 |
+- do_GetService(NS_DIRECTORY_SERVICE_CONTRACTID, &rv); |
716 |
+- if (NS_FAILED(rv)) return rv; |
717 |
+- const char* prop = aLocal ? NS_WIN_LOCAL_APPDATA_DIR : NS_WIN_APPDATA_DIR; |
718 |
+- rv = directoryService->Get(prop, NS_GET_IID(nsIFile), getter_AddRefs(localDir)); |
719 |
+- if (NS_FAILED(rv)) return rv; |
720 |
+-#elif defined(XP_UNIX) |
721 |
+- rv = NS_NewNativeLocalFile(nsDependentCString(PR_GetEnv("HOME")), true, getter_AddRefs(localDir)); |
722 |
+- if (NS_FAILED(rv)) return rv; |
723 |
+-#else |
724 |
+-#error dont_know_how_to_get_product_dir_on_your_platform |
725 |
++ rv = CloneMozBinDirectory(getter_AddRefs(localDir)); |
726 |
++ NS_ENSURE_SUCCESS(rv, rv); |
727 |
++ |
728 |
++ int levelsToRemove = 1; // In FF21+, bin dir points to browser subdirectory. |
729 |
++#if defined(XP_MACOSX) |
730 |
++ levelsToRemove += 2; |
731 |
+ #endif |
732 |
++ while (localDir && (levelsToRemove > 0)) { |
733 |
++ // When crawling up the hierarchy, components named "." do not count. |
734 |
++ nsAutoCString removedName; |
735 |
++ rv = localDir->GetNativeLeafName(removedName); |
736 |
++ NS_ENSURE_SUCCESS(rv, rv); |
737 |
++ bool didRemove = !removedName.Equals("."); |
738 |
++ |
739 |
++ // Remove a directory component. |
740 |
++ nsCOMPtr<nsIFile> parentDir; |
741 |
++ rv = localDir->GetParent(getter_AddRefs(parentDir)); |
742 |
++ NS_ENSURE_SUCCESS(rv, rv); |
743 |
++ localDir = parentDir; |
744 |
++ |
745 |
++ if (didRemove) |
746 |
++ --levelsToRemove; |
747 |
++ } |
748 |
++ |
749 |
++ if (!localDir) |
750 |
++ return NS_ERROR_FAILURE; |
751 |
++ |
752 |
++ rv = localDir->AppendRelativeNativePath(NS_LITERAL_CSTRING("TorBrowser" |
753 |
++ XPCOM_FILE_PATH_SEPARATOR "Data" |
754 |
++ XPCOM_FILE_PATH_SEPARATOR "Browser")); |
755 |
++ NS_ENSURE_SUCCESS(rv, rv); |
756 |
++ |
757 |
++ if (aLocal) { |
758 |
++ rv = localDir->AppendNative(NS_LITERAL_CSTRING("Caches")); |
759 |
++ NS_ENSURE_SUCCESS(rv, rv); |
760 |
++ } |
761 |
+ |
762 |
+- rv = localDir->AppendRelativeNativePath(DEFAULT_PRODUCT_DIR); |
763 |
+- if (NS_FAILED(rv)) return rv; |
764 |
+ rv = localDir->Exists(&exists); |
765 |
+ |
766 |
+ if (NS_SUCCEEDED(rv) && !exists) |
767 |
+@@ -339,10 +350,6 @@ NS_METHOD nsAppFileLocationProvider::GetProductDirectory(nsIFile **aLocalFile, b |
768 |
+ |
769 |
+ //---------------------------------------------------------------------------------------- |
770 |
+ // GetDefaultUserProfileRoot - Gets the directory which contains each user profile dir |
771 |
+-// |
772 |
+-// UNIX : ~/.mozilla/ |
773 |
+-// WIN : <Application Data folder on user's machine>\Mozilla\Profiles |
774 |
+-// Mac : :Documents:Mozilla:Profiles: |
775 |
+ //---------------------------------------------------------------------------------------- |
776 |
+ NS_METHOD nsAppFileLocationProvider::GetDefaultUserProfileRoot(nsIFile **aLocalFile, bool aLocal) |
777 |
+ { |
778 |
+@@ -355,18 +362,6 @@ NS_METHOD nsAppFileLocationProvider::GetDefaultUserProfileRoot(nsIFile **aLocalF |
779 |
+ rv = GetProductDirectory(getter_AddRefs(localDir), aLocal); |
780 |
+ if (NS_FAILED(rv)) return rv; |
781 |
+ |
782 |
+-#if defined(MOZ_WIDGET_COCOA) || defined(XP_WIN) |
783 |
+- // These 3 platforms share this part of the path - do them as one |
784 |
+- rv = localDir->AppendRelativeNativePath(NS_LITERAL_CSTRING("Profiles")); |
785 |
+- if (NS_FAILED(rv)) return rv; |
786 |
+- |
787 |
+- bool exists; |
788 |
+- rv = localDir->Exists(&exists); |
789 |
+- if (NS_SUCCEEDED(rv) && !exists) |
790 |
+- rv = localDir->Create(nsIFile::DIRECTORY_TYPE, 0775); |
791 |
+- if (NS_FAILED(rv)) return rv; |
792 |
+-#endif |
793 |
+- |
794 |
+ *aLocalFile = localDir; |
795 |
+ NS_ADDREF(*aLocalFile); |
796 |
+ |
797 |
+-- |
798 |
+1.7.10.4 |
799 |
+ |
800 |
|
801 |
diff --git a/www-client/torbrowser/files/torbrowser-24.3.0-allow-lightspark.patch b/www-client/torbrowser/files/torbrowser-24.3.0-allow-lightspark.patch |
802 |
new file mode 100644 |
803 |
index 0000000..7228f16 |
804 |
--- /dev/null |
805 |
+++ b/www-client/torbrowser/files/torbrowser-24.3.0-allow-lightspark.patch |
806 |
@@ -0,0 +1,14 @@ |
807 |
+From: Julian Ospald <hasufell@g.o> |
808 |
+Date: Sun Feb 16 17:11:39 UTC 2014 |
809 |
+Subject: allow lightspark |
810 |
+ |
811 |
+--- tor-browser/dom/plugins/base/nsPluginHost.cpp |
812 |
++++ tor-browser/dom/plugins/base/nsPluginHost.cpp |
813 |
+@@ -1821,6 +1821,7 @@ |
814 |
+ // libgnashplugin.so, libflashplayer.so, Flash Player-10.4-10.5.plugin, |
815 |
+ // NPSWF32.dll, NPSWF64.dll |
816 |
+ if (strstr(leafStr, "libgnashplugin") == leafStr || |
817 |
++ strstr(leafStr, "liblightsparkplugin") == leafStr || |
818 |
+ strstr(leafStr, "libflashplayer") == leafStr || |
819 |
+ strstr(leafStr, "Flash Player") == leafStr || |
820 |
+ strstr(leafStr, "NPSWF") == leafStr) { |
821 |
|
822 |
diff --git a/www-client/torbrowser/metadata.xml b/www-client/torbrowser/metadata.xml |
823 |
new file mode 100644 |
824 |
index 0000000..dcb9d0b |
825 |
--- /dev/null |
826 |
+++ b/www-client/torbrowser/metadata.xml |
827 |
@@ -0,0 +1,22 @@ |
828 |
+<?xml version="1.0" encoding="UTF-8"?> |
829 |
+<!DOCTYPE pkgmetadata SYSTEM "http://www.gentoo.org/dtd/metadata.dtd"> |
830 |
+<pkgmetadata> |
831 |
+<maintainer> |
832 |
+ <email>poncho@××××××.ch</email> |
833 |
+ <name>Poncho</name> |
834 |
+</maintainer> |
835 |
+<use> |
836 |
+ <flag name="custom-optimization">Fine-tune custom compiler |
837 |
+ optimizations, setting this is not recommended.</flag> |
838 |
+ <flag name="system-cairo">Use the system-wide <pkg>x11-libs/cairo</pkg> |
839 |
+ instead of bundled.</flag> |
840 |
+ <flag name="system-icu">Use the system-wide <pkg>dev-libs/icu</pkg> |
841 |
+ instead of bundled.</flag> |
842 |
+ <flag name="system-jpeg">Use the system-wide <pkg>media-libs/libjpeg-turbo</pkg> |
843 |
+ instead of bundled.</flag> |
844 |
+ <flag name="system-libvpx">Use the system-wide <pkg>media-libs/libvpx</pkg> |
845 |
+ instead of bundled.</flag> |
846 |
+ <flag name="system-sqlite">Use the system-wide <pkg>dev-db/sqlite</pkg> |
847 |
+ installation with secure-delete enabled</flag> |
848 |
+</use> |
849 |
+</pkgmetadata> |
850 |
|
851 |
diff --git a/www-client/torbrowser/torbrowser-31.5.0.ebuild b/www-client/torbrowser/torbrowser-31.5.0.ebuild |
852 |
new file mode 100644 |
853 |
index 0000000..2e54652 |
854 |
--- /dev/null |
855 |
+++ b/www-client/torbrowser/torbrowser-31.5.0.ebuild |
856 |
@@ -0,0 +1,308 @@ |
857 |
+# Copyright 1999-2015 Gentoo Foundation |
858 |
+# Distributed under the terms of the GNU General Public License v2 |
859 |
+# $Header: $ |
860 |
+ |
861 |
+EAPI="5" |
862 |
+WANT_AUTOCONF="2.1" |
863 |
+MOZ_ESR="1" |
864 |
+ |
865 |
+MY_PN="firefox" |
866 |
+if [[ ${MOZ_ESR} == 1 ]]; then |
867 |
+ # ESR releases have slightly version numbers |
868 |
+ MOZ_PV="${PV}esr" |
869 |
+fi |
870 |
+ |
871 |
+# see https://gitweb.torproject.org/builders/tor-browser-bundle.git/tree/gitian/versions?h=maint-4.0 |
872 |
+TOR_PV="4.0.4" |
873 |
+GIT_TAG="tor-browser-${MOZ_PV}-4.0-1-build1" |
874 |
+ |
875 |
+# Patch version |
876 |
+PATCH="${MY_PN}-31.0-patches-0.2" |
877 |
+ |
878 |
+MOZCONFIG_OPTIONAL_WIFI=1 |
879 |
+MOZCONFIG_OPTIONAL_JIT="enabled" |
880 |
+ |
881 |
+inherit check-reqs flag-o-matic toolchain-funcs eutils gnome2-utils mozconfig-v5.31 multilib pax-utils autotools |
882 |
+ |
883 |
+DESCRIPTION="The Tor Browser" |
884 |
+HOMEPAGE="https://www.torproject.org/projects/torbrowser.html |
885 |
+ https://gitweb.torproject.org/tor-browser.git" |
886 |
+ |
887 |
+KEYWORDS="~amd64 ~x86" |
888 |
+SLOT="0" |
889 |
+# BSD license applies to torproject-related code like the patches |
890 |
+# icons are under CCPL-Attribution-3.0 |
891 |
+LICENSE="BSD CC-BY-3.0 MPL-2.0 GPL-2 LGPL-2.1" |
892 |
+IUSE="hardened test" |
893 |
+ |
894 |
+BASE_SRC_URI="https://dist.torproject.org/${PN}/${TOR_PV}" |
895 |
+SRC_URI="https://gitweb.torproject.org/tor-browser.git/snapshot/${GIT_TAG}.tar.gz -> ${GIT_TAG}.tar.gz |
896 |
+ http://dev.gentoo.org/~anarchy/mozilla/patchsets/${PATCH}.tar.xz |
897 |
+ http://dev.gentoo.org/~axs/distfiles/${PATCH}.tar.xz |
898 |
+ x86? ( ${BASE_SRC_URI}/tor-browser-linux32-${TOR_PV}_en-US.tar.xz ) |
899 |
+ amd64? ( ${BASE_SRC_URI}/tor-browser-linux64-${TOR_PV}_en-US.tar.xz )" |
900 |
+ |
901 |
+ASM_DEPEND=">=dev-lang/yasm-1.1" |
902 |
+ |
903 |
+CDEPEND=">=dev-libs/nss-3.17.1 |
904 |
+ >=dev-libs/nspr-4.10.6" |
905 |
+ |
906 |
+DEPEND="${CDEPEND} |
907 |
+ amd64? ( ${ASM_DEPEND} |
908 |
+ virtual/opengl ) |
909 |
+ x86? ( ${ASM_DEPEND} |
910 |
+ virtual/opengl )" |
911 |
+ |
912 |
+QA_PRESTRIPPED="usr/$(get_libdir)/${PN}/${MY_PN}/firefox" |
913 |
+ |
914 |
+S="${WORKDIR}/${GIT_TAG}" |
915 |
+ |
916 |
+# See mozcoreconf-2.eclass |
917 |
+mozversion_is_new_enough() { |
918 |
+ if [[ $(get_version_component_range 1) -ge 17 ]] ; then |
919 |
+ return 0 |
920 |
+ fi |
921 |
+ return 1 |
922 |
+} |
923 |
+ |
924 |
+pkg_setup() { |
925 |
+ moz_pkgsetup |
926 |
+ |
927 |
+ # These should *always* be cleaned up anyway |
928 |
+ unset DBUS_SESSION_BUS_ADDRESS \ |
929 |
+ DISPLAY \ |
930 |
+ ORBIT_SOCKETDIR \ |
931 |
+ SESSION_MANAGER \ |
932 |
+ XDG_SESSION_COOKIE \ |
933 |
+ XAUTHORITY |
934 |
+} |
935 |
+ |
936 |
+pkg_pretend() { |
937 |
+ # Ensure we have enough disk space to compile |
938 |
+ if use debug || use test ; then |
939 |
+ CHECKREQS_DISK_BUILD="8G" |
940 |
+ else |
941 |
+ CHECKREQS_DISK_BUILD="4G" |
942 |
+ fi |
943 |
+ check-reqs_pkg_setup |
944 |
+ |
945 |
+ if use jit && [[ -n ${PROFILE_IS_HARDENED} ]]; then |
946 |
+ ewarn "You are emerging this package on a hardened profile with USE=jit enabled." |
947 |
+ ewarn "This is horribly insecure as it disables all PAGEEXEC restrictions." |
948 |
+ ewarn "Please ensure you know what you are doing. If you don't, please consider" |
949 |
+ ewarn "emerging the package with USE=-jit" |
950 |
+ fi |
951 |
+} |
952 |
+ |
953 |
+src_prepare() { |
954 |
+ # Apply gentoo firefox patches |
955 |
+ EPATCH_SUFFIX="patch" \ |
956 |
+ EPATCH_FORCE="yes" \ |
957 |
+ epatch "${WORKDIR}/firefox" |
958 |
+ |
959 |
+ # Revert "Change the default Firefox profile directory to be TBB-relative" |
960 |
+ epatch -R "${FILESDIR}/tor-browser.git-bccc144c21f6069a294038a6559ba46ceb8da2a2.patch" |
961 |
+ |
962 |
+ # FIXME: https://trac.torproject.org/projects/tor/ticket/10925 |
963 |
+ # Except lightspark-plugin from blocklist |
964 |
+ epatch "${FILESDIR}"/${PN}-24.3.0-allow-lightspark.patch |
965 |
+ |
966 |
+ # Allow user to apply any additional patches without modifing ebuild |
967 |
+ epatch_user |
968 |
+ |
969 |
+ # Enable gnomebreakpad |
970 |
+ if use debug ; then |
971 |
+ sed -i -e "s:GNOME_DISABLE_CRASH_DIALOG=1:GNOME_DISABLE_CRASH_DIALOG=0:g" \ |
972 |
+ "${S}"/build/unix/run-mozilla.sh || die "sed failed!" |
973 |
+ fi |
974 |
+ |
975 |
+ # Ensure that our plugins dir is enabled as default |
976 |
+ sed -i -e "s:/usr/lib/mozilla/plugins:/usr/lib/nsbrowser/plugins:" \ |
977 |
+ "${S}"/xpcom/io/nsAppFileLocationProvider.cpp || die "sed failed to replace plugin path for 32bit!" |
978 |
+ sed -i -e "s:/usr/lib64/mozilla/plugins:/usr/lib64/nsbrowser/plugins:" \ |
979 |
+ "${S}"/xpcom/io/nsAppFileLocationProvider.cpp || die "sed failed to replace plugin path for 64bit!" |
980 |
+ |
981 |
+ # Fix sandbox violations during make clean, bug 372817 |
982 |
+ sed -e "s:\(/no-such-file\):${T}\1:g" \ |
983 |
+ -i "${S}"/config/rules.mk \ |
984 |
+ -i "${S}"/nsprpub/configure{.in,} \ |
985 |
+ || die |
986 |
+ |
987 |
+ # Don't exit with error when some libs are missing which we have in |
988 |
+ # system. |
989 |
+ sed '/^MOZ_PKG_FATAL_WARNINGS/s@= 1@= 0@' \ |
990 |
+ -i "${S}"/browser/installer/Makefile.in || die |
991 |
+ |
992 |
+ # Don't error out when there's no files to be removed: |
993 |
+ sed 's@\(xargs rm\)$@\1 -f@' \ |
994 |
+ -i "${S}"/toolkit/mozapps/installer/packager.mk || die |
995 |
+ |
996 |
+ eautoreconf |
997 |
+ |
998 |
+ # Must run autoconf in js/src |
999 |
+ cd "${S}"/js/src || die |
1000 |
+ eautoconf |
1001 |
+} |
1002 |
+ |
1003 |
+src_configure() { |
1004 |
+ MOZILLA_FIVE_HOME="${EPREFIX}"/usr/$(get_libdir)/${PN}/${MY_PN} |
1005 |
+ MEXTENSIONS="default" |
1006 |
+ |
1007 |
+ #################################### |
1008 |
+ # |
1009 |
+ # mozconfig, CFLAGS and CXXFLAGS setup |
1010 |
+ # |
1011 |
+ #################################### |
1012 |
+ |
1013 |
+ mozconfig_init |
1014 |
+ mozconfig_config |
1015 |
+ |
1016 |
+ # Add full relro support for hardened |
1017 |
+ use hardened && append-ldflags "-Wl,-z,relro,-z,now" |
1018 |
+ |
1019 |
+ mozconfig_annotate '' --enable-extensions="${MEXTENSIONS}" |
1020 |
+ mozconfig_annotate '' --disable-mailnews |
1021 |
+ |
1022 |
+ # Other ff-specific settings |
1023 |
+ mozconfig_annotate '' --with-default-mozilla-five-home=${MOZILLA_FIVE_HOME} |
1024 |
+ |
1025 |
+ # Rename the install directory and the executable |
1026 |
+ mozconfig_annotate 'torbrowser' --libdir="${EPREFIX}"/usr/$(get_libdir)/${PN} |
1027 |
+ mozconfig_annotate 'torbrowser' --with-app-name=torbrowser |
1028 |
+ mozconfig_annotate 'torbrowser' --with-app-basename=torbrowser |
1029 |
+ # see https://gitweb.torproject.org/tor-browser.git/tree/configure.in?h=tor-browser-31.3.0esr-4.0-1#n6401 |
1030 |
+ mozconfig_annotate 'torbrowser' --disable-tor-browser-update |
1031 |
+ mozconfig_annotate 'torbrowser' --with-tor-browser-version=${TOR_PV} |
1032 |
+ |
1033 |
+ # Finalize and report settings |
1034 |
+ mozconfig_final |
1035 |
+ |
1036 |
+ if [[ $(gcc-major-version) -lt 4 ]]; then |
1037 |
+ append-cxxflags -fno-stack-protector |
1038 |
+ elif [[ $(gcc-major-version) -gt 4 || $(gcc-minor-version) -gt 3 ]]; then |
1039 |
+ if use amd64 || use x86; then |
1040 |
+ append-flags -mno-avx |
1041 |
+ fi |
1042 |
+ fi |
1043 |
+} |
1044 |
+ |
1045 |
+src_compile() { |
1046 |
+ CC="$(tc-getCC)" CXX="$(tc-getCXX)" LD="$(tc-getLD)" \ |
1047 |
+ MOZ_MAKE_FLAGS="${MAKEOPTS}" SHELL="${SHELL}" \ |
1048 |
+ emake -f client.mk |
1049 |
+} |
1050 |
+ |
1051 |
+src_install() { |
1052 |
+ MOZILLA_FIVE_HOME="${EPREFIX}"/usr/$(get_libdir)/${PN}/${MY_PN} |
1053 |
+ DICTPATH="\"${EPREFIX}/usr/share/myspell\"" |
1054 |
+ |
1055 |
+ # MOZ_BUILD_ROOT, and hence OBJ_DIR change depending on arch, compiler etc. |
1056 |
+ local obj_dir="$(echo */config.log)" |
1057 |
+ obj_dir="${obj_dir%/*}" |
1058 |
+ cd "${S}/${obj_dir}" || die |
1059 |
+ |
1060 |
+ # Pax mark xpcshell for hardened support, only used for startupcache creation. |
1061 |
+ pax-mark m "${S}/${obj_dir}"/dist/bin/xpcshell |
1062 |
+ |
1063 |
+ # Add an emty default prefs for mozconfig-3.eclass |
1064 |
+ touch "${S}/${obj_dir}/dist/bin/browser/defaults/preferences/all-gentoo.js" \ |
1065 |
+ || die |
1066 |
+ |
1067 |
+ # Set default path to search for dictionaries. |
1068 |
+ echo "pref(\"spellchecker.dictionary_path\", ${DICTPATH});" \ |
1069 |
+ >> "${S}/${obj_dir}/dist/bin/browser/defaults/preferences/all-gentoo.js" \ |
1070 |
+ || die |
1071 |
+ |
1072 |
+ # Disable adobe-flash by default |
1073 |
+ sed -i -e 's:pref("plugin.state.flash", 1);:pref("plugin.state.flash", 0);:g' \ |
1074 |
+ "${S}/${obj_dir}/dist/bin/browser/defaults/preferences/000-tor-browser.js" \ |
1075 |
+ || die |
1076 |
+ |
1077 |
+ # see: https://gitweb.torproject.org/builders/tor-browser-bundle.git/tree/gitian/descriptors/linux/gitian-bundle.yml?h=maint-4.0#n148 |
1078 |
+ echo "pref(\"general.useragent.locale\", \"en-US\");" \ |
1079 |
+ >> "${S}/${obj_dir}/dist/bin/browser/defaults/preferences/000-tor-browser.js" \ |
1080 |
+ || die |
1081 |
+ |
1082 |
+ MOZ_MAKE_FLAGS="${MAKEOPTS}" \ |
1083 |
+ emake DESTDIR="${D}" install |
1084 |
+ |
1085 |
+ # Install icons and .desktop for menu entry |
1086 |
+ local size sizes icon_path |
1087 |
+ sizes="16 24 32 48 256" |
1088 |
+ icon_path="${S}/browser/branding/official" |
1089 |
+ for size in ${sizes}; do |
1090 |
+ newicon -s ${size} "${icon_path}/default${size}.png" ${PN}.png |
1091 |
+ done |
1092 |
+ # The 128x128 icon has a different name |
1093 |
+ newicon -s 128 "${icon_path}/mozicon128.png" ${PN}.png |
1094 |
+ make_desktop_entry ${PN} "TorBrowser" ${PN} "Network;WebBrowser" |
1095 |
+ |
1096 |
+ # Add StartupNotify=true bug 237317 |
1097 |
+ if use startup-notification ; then |
1098 |
+ echo "StartupNotify=true" \ |
1099 |
+ >> "${ED}/usr/share/applications/${PN}-${PN}.desktop" \ |
1100 |
+ || die |
1101 |
+ fi |
1102 |
+ |
1103 |
+ # Required in order to use plugins and even run torbrowser on hardened. |
1104 |
+ pax-mark m "${ED}"${MOZILLA_FIVE_HOME}/plugin-container |
1105 |
+ # Required in order for jit to work on hardened, as of torbroser-31 |
1106 |
+ use jit && pax-mark pm "${ED}"${MOZILLA_FIVE_HOME}/{torbrowser,torbrowser-bin} |
1107 |
+ |
1108 |
+ # We dont want development files |
1109 |
+ rm -r "${ED}"/usr/include "${ED}${MOZILLA_FIVE_HOME}"/{idl,include,lib,sdk} \ |
1110 |
+ || die "Failed to remove sdk and headers" |
1111 |
+ |
1112 |
+ # revdep-rebuild entry |
1113 |
+ insinto /etc/revdep-rebuild |
1114 |
+ echo "SEARCH_DIRS_MASK=${MOZILLA_FIVE_HOME}" >> ${T}/10${PN} |
1115 |
+ doins "${T}"/10${PN} || die |
1116 |
+ |
1117 |
+ # Profile without the tor-launcher extension |
1118 |
+ # see: https://trac.torproject.org/projects/tor/ticket/10160 |
1119 |
+ local profile_dir="${WORKDIR}/tor-browser_en-US/Browser/TorBrowser/Data/Browser/profile.default" |
1120 |
+ |
1121 |
+ docompress -x "${EROOT}/usr/share/doc/${PF}/tor-launcher@××××××××××××××.xpi" |
1122 |
+ dodoc "${profile_dir}/extensions/tor-launcher@××××××××××××××.xpi" |
1123 |
+ rm "${profile_dir}/extensions/tor-launcher@××××××××××××××.xpi" || die "Failed to remove torlauncher extension" |
1124 |
+ |
1125 |
+ # Force remote Tor check since the control port might not be available |
1126 |
+ echo "pref(\"extensions.torbutton.local_tor_check\", false);" \ |
1127 |
+ >> "${profile_dir}/preferences/extension-overrides.js" \ |
1128 |
+ || die |
1129 |
+ |
1130 |
+ insinto ${MOZILLA_FIVE_HOME}/browser/defaults/profile |
1131 |
+ doins -r "${profile_dir}"/{extensions,preferences,bookmarks.html} |
1132 |
+ |
1133 |
+ # see: https://gitweb.torproject.org/builders/tor-browser-bundle.git/tree/RelativeLink/RelativeLink.sh?h=maint-4.0#n248 |
1134 |
+ dodoc "${FILESDIR}/README.tor-launcher" |
1135 |
+ dodoc "${WORKDIR}/tor-browser_en-US/Browser/TorBrowser/Docs/ChangeLog.txt" |
1136 |
+} |
1137 |
+ |
1138 |
+pkg_preinst() { |
1139 |
+ gnome2_icon_savelist |
1140 |
+} |
1141 |
+ |
1142 |
+pkg_postinst() { |
1143 |
+ echo |
1144 |
+ ewarn "This patched firefox build is _NOT_ recommended by Tor upstream but uses" |
1145 |
+ ewarn "the exact same sources. Use this only if you know what you are doing!" |
1146 |
+ echo |
1147 |
+ elog "Torbrowser uses port 9150 to connect to Tor. You can change the port" |
1148 |
+ elog "in the connection settings to match your setup." |
1149 |
+ echo |
1150 |
+ |
1151 |
+ if [[ "${REPLACING_VERSIONS}" ]] && [[ "${REPLACING_VERSIONS}" < "31.2.0" ]]; then |
1152 |
+ echo |
1153 |
+ ewarn "Since this is a major upgrade, you need to start with a fresh profile." |
1154 |
+ ewarn "Either move or remove your profile in \"~/.mozilla/torbrowser/\"" |
1155 |
+ ewarn "and let Torbrowser generate a new one." |
1156 |
+ echo |
1157 |
+ fi |
1158 |
+ |
1159 |
+ gnome2_icon_cache_update |
1160 |
+} |
1161 |
+ |
1162 |
+pkg_postrm() { |
1163 |
+ gnome2_icon_cache_update |
1164 |
+} |