Gentoo Archives: gentoo-commits

From: Andrew Savchenko <bircoph@×××××.com>
To: gentoo-commits@l.g.o
Subject: [gentoo-commits] dev/bircoph:master commit in: www-client/torbrowser/files/, www-client/torbrowser/, profiles/
Date: Fri, 27 Feb 2015 05:57:20
Message-Id: 1425016555.b581323f51ecfad67cd7288f45944a5c28bf6101.bircoph@gentoo
1 commit: b581323f51ecfad67cd7288f45944a5c28bf6101
2 Author: Andrew Savchenko <bircoph <AT> gentoo <DOT> org>
3 AuthorDate: Fri Feb 27 05:55:55 2015 +0000
4 Commit: Andrew Savchenko <bircoph <AT> gmail <DOT> com>
5 CommitDate: Fri Feb 27 05:55:55 2015 +0000
6 URL: http://sources.gentoo.org/gitweb/?p=dev/bircoph.git;a=commit;h=b581323f
7
8 torbrowser: version bump, github issue #11
9
10 ---
11 profiles/categories | 1 +
12 www-client/torbrowser/ChangeLog | 264 +++++++++++++
13 www-client/torbrowser/Manifest | 10 +
14 www-client/torbrowser/files/README.tor-launcher | 37 ++
15 ...-bccc144c21f6069a294038a6559ba46ceb8da2a2.patch | 430 +++++++++++++++++++++
16 .../files/torbrowser-24.3.0-allow-lightspark.patch | 14 +
17 www-client/torbrowser/metadata.xml | 22 ++
18 www-client/torbrowser/torbrowser-31.5.0.ebuild | 308 +++++++++++++++
19 8 files changed, 1086 insertions(+)
20
21 diff --git a/profiles/categories b/profiles/categories
22 index 2c93c54..7a7d434 100644
23 --- a/profiles/categories
24 +++ b/profiles/categories
25 @@ -27,4 +27,5 @@ sys-cluster
26 sys-devel
27 sys-kernel
28 sys-libs
29 +www-client
30 x11-misc
31
32 diff --git a/www-client/torbrowser/ChangeLog b/www-client/torbrowser/ChangeLog
33 new file mode 100644
34 index 0000000..e3691da
35 --- /dev/null
36 +++ b/www-client/torbrowser/ChangeLog
37 @@ -0,0 +1,264 @@
38 +# ChangeLog for www-client/torbrowser
39 +# Copyright 1999-2015 Gentoo Foundation; Distributed under the GPL v2
40 +# $Header: $
41 +
42 +*torbrowser-31.4.0 (14 Jan 2015)
43 +
44 + 14 Jan 2015; Poncho <poncho@××××××.ch> +torbrowser-31.4.0.ebuild,
45 + -torbrowser-31.3.0.ebuild:
46 + www-client/torbrowser: Tor Browser 4.0.3 is released
47 +
48 +*torbrowser-31.3.0 (04 Dec 2014)
49 +
50 + 04 Dec 2014; Poncho <poncho@××××××.ch> +torbrowser-31.3.0.ebuild,
51 + -torbrowser-31.2.0.ebuild:
52 + www-client/torbrowser: Tor Browser 4.0.2 is released see
53 + https://blog.torproject.org/blog/tor-browser-402-released
54 +
55 + 04 Dec 2014; Poncho <poncho@××××××.ch>
56 + -files/tor-browser.git-6662aae388094c7cca535e34f24ef01af7d51481.patch,
57 + -torbrowser-24.8.1.ebuild:
58 + www-client/torbrowser: remove old version
59 +
60 + 01 Nov 2014; Poncho <poncho@××××××.ch> torbrowser-31.2.0.ebuild:
61 + www-client/torbrowser: switch to using new tor project dist url
62 +
63 +*torbrowser-31.2.0 (18 Oct 2014)
64 +
65 + 18 Oct 2014; Poncho <poncho@××××××.ch> +files/README.tor-launcher,
66 + +files/tor-browser.git-bccc144c21f6069a294038a6559ba46ceb8da2a2.patch,
67 + +torbrowser-31.2.0.ebuild, metadata.xml:
68 + www-client/torbrowser: Tor Browser 4.0 is released
69 + https://blog.torproject.org/blog/tor-browser-40-released
70 +
71 +*torbrowser-24.8.1 (26 Sep 2014)
72 +
73 + 26 Sep 2014; Poncho <poncho@××××××.ch> +torbrowser-24.8.1.ebuild,
74 + -torbrowser-24.8.0.ebuild:
75 + www-client/torbrowser: version bump see https://blog.torproject.org/blog/tor-
76 + browser-366-released
77 +
78 +*torbrowser-24.8.0 (04 Sep 2014)
79 +
80 + 04 Sep 2014; Poncho <poncho@××××××.ch> +torbrowser-24.8.0.ebuild,
81 + -torbrowser-24.7.0-r1.ebuild:
82 + www-client/torbrowser: version bump
83 +
84 +*torbrowser-24.7.0-r1 (13 Aug 2014)
85 +
86 + 13 Aug 2014; Poncho <poncho@××××××.ch> +torbrowser-24.7.0-r1.ebuild,
87 + -torbrowser-24.7.0.ebuild:
88 + www-client/torbrowser: 3.6.4 is released
89 +
90 + 27 Jul 2014; Poncho <poncho@××××××.ch> torbrowser-24.7.0.ebuild:
91 + www-client/torbrowser: update comments and links
92 +
93 +*torbrowser-24.7.0 (27 Jul 2014)
94 +
95 + 27 Jul 2014; Poncho <poncho@××××××.ch> +torbrowser-24.7.0.ebuild,
96 + -torbrowser-24.6.0.ebuild:
97 + www-client/torbrowser: 3.6.3 is released fix https://github.com/MeisterP
98 + /torbrowser-overlay/pull/8 by hasufell
99 +
100 + 12 Jul 2014; Poncho <poncho@××××××.ch> torbrowser-24.6.0.ebuild:
101 + www-client/torbrowser: don't compress the tor-launcher extension
102 +
103 +*torbrowser-24.6.0 (12 Jun 2014)
104 +
105 + 12 Jun 2014; Poncho <poncho@××××××.ch> +torbrowser-24.6.0.ebuild,
106 + -torbrowser-24.5.0-r1.ebuild:
107 + www-client/torbrowser: version bump
108 +
109 +*torbrowser-24.5.0-r1 (10 May 2014)
110 +
111 + 10 May 2014; Poncho <poncho@××××××.ch> +torbrowser-24.5.0-r1.ebuild,
112 + -torbrowser-24.5.0.ebuild:
113 + www-client/torbrowser: version bump
114 +
115 +*torbrowser-24.5.0 (30 Apr 2014)
116 +
117 + 30 Apr 2014; Poncho <poncho@××××××.ch> +torbrowser-24.5.0.ebuild,
118 + -torbrowser-24.4.0-r1.ebuild:
119 + www-client/torbrowser: version bump see https://blog.torproject.org/blog/tor-
120 + browser-36-released
121 +
122 + 09 Apr 2014; Poncho <poncho@××××××.ch> -torbrowser-24.3.0-r1.ebuild,
123 + -torbrowser-24.3.0-r2.ebuild, -torbrowser-24.4.0.ebuild:
124 + www-client/torbrowser: remove old, sources are no longer available at
125 + https://www.torproject.org/dist/torbrowser/
126 +
127 +*torbrowser-24.4.0-r1 (09 Apr 2014)
128 +
129 + 09 Apr 2014; Poncho <poncho@××××××.ch> +torbrowser-24.4.0-r1.ebuild:
130 + www-client/torbrowser: bump for 3.5.4 release see
131 + https://blog.torproject.org/blog/tor-browser-354-released
132 +
133 + 30 Mar 2014; Julian Ospald <hasufell@g.o> torbrowser-24.3.0-r1.ebuild,
134 + torbrowser-24.3.0-r2.ebuild, torbrowser-24.4.0.ebuild:
135 + fix Tor spelling
136 +
137 + 22 Mar 2014; Poncho <poncho@××××××.ch> torbrowser-24.4.0.ebuild:
138 + www-client/torbrowser: sync with firefox
139 +
140 + 22 Mar 2014; Poncho <poncho@××××××.ch> torbrowser-24.3.0-r2.ebuild,
141 + torbrowser-24.4.0.ebuild:
142 + www-client/torbrowser: add comments
143 +
144 +*torbrowser-24.4.0 (20 Mar 2014)
145 +
146 + 20 Mar 2014; Julian Ospald <hasufell@g.o> +torbrowser-24.4.0.ebuild:
147 + version bump
148 +
149 +*torbrowser-24.3.0-r2 (16 Feb 2014)
150 +
151 + 16 Feb 2014; Julian Ospald <hasufell@g.o>
152 + +torbrowser-24.3.0-r2.ebuild,
153 + +files/torbrowser-24.3.0-allow-lightspark.patch:
154 + fix license, add lightspark support, bump gentoo patchset
155 +
156 +*torbrowser-10.0.11 (08 Dez 2012)
157 +
158 + 11 Dez 2012; Poncho <poncho@××××××.ch> torbrowser-10.0.11.ebuild:
159 + use stable firefox, move to torbrowser-overlay
160 + https://github.com/MeisterP/torbrowser-overlay/commits/master
161 +
162 + 28 Aug 2012; Julian Ospald <hasufell@g.o> metadata.xml:
163 + add mozilla herd
164 +
165 + 14 Jul 2012; Julian Ospald <hasufell@g.o> torbrowser-13.0-r1.ebuild:
166 + rename icon to avoid possible issues with mirrors
167 +
168 +*torbrowser-13.0-r1 (14 Jul 2012)
169 +
170 + 14 Jul 2012; Julian Ospald <hasufell@g.o> -torbrowser-13.0.ebuild,
171 + +torbrowser-13.0-r1.ebuild:
172 + split profile stuff into www-misc/torbrowser-profile
173 +
174 +*torbrowser-13.0 (30 Jun 2012)
175 +
176 + 30 Jun 2012; Julian Ospald <hasufell@g.o>
177 + +files/torbrowser-patches/0007-Disable-SSL-Session-ID-tracking.patch,
178 + +files/torbrowser-patches/0008-Provide-an-observer-event-to-close-persistent-
179 + connec.patch,
180 + +files/torbrowser-patches/0009-Limit-device-and-system-specific-CSS-Media-Que
181 + ries.patch,
182 + +files/torbrowser-patches/0010-Rebrand-Firefox-to-TorBrowser.patch,
183 + +files/torbrowser-patches/0011-Make-Download-manager-memory-only.patch,
184 + +files/torbrowser-patches/0012-Add-DDG-and-StartPage-to-Omnibox.patch,
185 + +files/torbrowser-patches/0013-Make-nsICacheService.EvictEntries-synchronous.
186 + patch, +files/torbrowser-patches/0014-Prevent-WebSocket-DNS-leak.patch,
187 + +files/torbrowser-patches/0015-Make-Tor-Browser-exit-when-not-launched-from-V
188 + idalia.patch,
189 + +files/torbrowser-patches/0016-Limit-the-number-of-fonts-per-document.patch,
190 + +files/torbrowser-patches/0018-Adapt-Steven-Michaud-s-Mac-crashfix-patch.patc
191 + h,
192 + +files/torbrowser-patches/0020-Fix-internal-compile-error-for-sub-ancient-GCC
193 + s.patch,
194 + -files/torbrowser-patches/0007-Make-Tor-Browser-exit-when-not-launched-from-V
195 + idalia.patch,
196 + -files/torbrowser-patches/0008-Disable-SSL-Session-ID-tracking.patch,
197 + -files/torbrowser-patches/0009-Provide-an-observer-event-to-close-persistent-
198 + connec.patch,
199 + -files/torbrowser-patches/0010-Provide-client-values-only-to-CSS-Media-Querie
200 + s.patch,
201 + -files/torbrowser-patches/0011-Limit-the-number-of-fonts-per-document.patch,
202 + -files/torbrowser-patches/0012-Rebrand-Firefox-to-TorBrowser.patch,
203 + -files/torbrowser-patches/0013-Make-Download-manager-memory-only.patch,
204 + -files/torbrowser-patches/0014-Add-DDG-and-StartPage-to-Omnibox.patch,
205 + -files/torbrowser-patches/0015-Make-nsICacheService.EvictEntries-synchronous.
206 + patch, -files/torbrowser-patches/0016-Prevent-WebSocket-DNS-leak.patch,
207 + -files/torbrowser-patches/0018-Add-HTTP-auth-headers-before-the-modify-reques
208 + t-obse.patch,
209 + files/torbrowser-patches/0001-Block-Components.interfaces-lookupMethod-from-c
210 + onten.patch,
211 + files/torbrowser-patches/0002-Make-Permissions-Manager-memory-only.patch,
212 + -torbrowser-10.0.5.ebuild,
213 + files/torbrowser-patches/0003-Make-Intermediate-Cert-Store-memory-only.patch,
214 + files/torbrowser-patches/0004-Add-a-string-based-cacheKey.patch,
215 + files/torbrowser-patches/0005-Block-all-plugins-except-flash.patch,
216 + files/torbrowser-patches/0006-Make-content-pref-service-memory-only-clearable
217 + .patch,
218 + files/torbrowser-patches/0017-Randomize-HTTP-request-order-and-pipeline-depth
219 + .patch, +torbrowser-13.0.ebuild,
220 + +files/torbrowser-patches/0019-Fix-Firefox-13-build-process.patch:
221 + version bump, also fixes bug #423343
222 +
223 +*torbrowser-10.0.5 (06 Jun 2012)
224 +
225 + 06 Jun 2012; Julian Ospald <hasufell@g.o>
226 + +files/torbrowser-patches/0001-Block-Components.interfaces-lookupMethod-from-
227 + conten.patch,
228 + +files/torbrowser-patches/0002-Make-Permissions-Manager-memory-only.patch,
229 + +files/torbrowser-patches/0003-Make-Intermediate-Cert-Store-memory-only.patch
230 + , +files/torbrowser-patches/0004-Add-a-string-based-cacheKey.patch,
231 + +files/torbrowser-patches/0005-Block-all-plugins-except-flash.patch,
232 + +files/torbrowser-patches/0006-Make-content-pref-service-memory-only-clearabl
233 + e.patch,
234 + +files/torbrowser-patches/0007-Make-Tor-Browser-exit-when-not-launched-from-V
235 + idalia.patch,
236 + +files/torbrowser-patches/0008-Disable-SSL-Session-ID-tracking.patch,
237 + +files/torbrowser-patches/0009-Provide-an-observer-event-to-close-persistent-
238 + connec.patch,
239 + +files/torbrowser-patches/0010-Provide-client-values-only-to-CSS-Media-Querie
240 + s.patch,
241 + +files/torbrowser-patches/0011-Limit-the-number-of-fonts-per-document.patch,
242 + +files/torbrowser-patches/0012-Rebrand-Firefox-to-TorBrowser.patch,
243 + +files/torbrowser-patches/0013-Make-Download-manager-memory-only.patch,
244 + +files/torbrowser-patches/0014-Add-DDG-and-StartPage-to-Omnibox.patch,
245 + +files/torbrowser-patches/0015-Make-nsICacheService.EvictEntries-synchronous.
246 + patch, +files/torbrowser-patches/0016-Prevent-WebSocket-DNS-leak.patch,
247 + +files/torbrowser-patches/0017-Randomize-HTTP-request-order-and-pipeline-dept
248 + h.patch,
249 + +files/torbrowser-patches/0018-Add-HTTP-auth-headers-before-the-modify-reques
250 + t-obse.patch,
251 + -files/12.0/0001-Block-Components.interfaces-lookupMethod-from-conten.patch,
252 + -files/12.0/0002-Make-Permissions-Manager-memory-only.patch,
253 + -files/12.0/0003-Make-Intermediate-Cert-Store-memory-only.patch,
254 + -files/12.0/0004-Add-a-string-based-cacheKey.patch,
255 + -files/12.0/0005-Block-all-plugins-except-flash.patch,
256 + -files/12.0/0006-Make-content-pref-service-memory-only-clearable.patch,
257 + -files/12.0/0008-Disable-SSL-Session-ID-tracking.patch,
258 + -files/12.0/0009-Provide-an-observer-event-to-close-persistent-connec.patch,
259 + -files/12.0/0010-Provide-client-values-only-to-CSS-Media-Queries.patch,
260 + -files/12.0/0011-Limit-the-number-of-fonts-per-document.patch,
261 + -files/12.0/0012-Randomize-HTTP-request-order-and-pipeline-depth.patch,
262 + -files/12.0/0013-Rebrand-Firefox-to-TorBrowser.patch,
263 + -files/12.0/0014-Make-Download-manager-memory-only.patch,
264 + -files/12.0/0015-Add-DDG-and-StartPage-to-Omnibox.patch,
265 + -files/12.0/0016-Adapt-Steven-Michaud-s-Mac-crashfix-patch-for-FF12.patch,
266 + -files/12.0/0017-Make-nsICacheService.EvictEntries-synchronous.patch,
267 + -files/12.0/0018-Prevent-WebSocket-DNS-leak.patch, +torbrowser-10.0.5.ebuild,
268 + -torbrowser-12.0-r2.ebuild:
269 + version bump/dump... tor upstream switched to ESR
270 +
271 + 01 Jun 2012; Julian Ospald <hasufell@g.o> torbrowser-12.0-r2.ebuild:
272 + bump profile-folder version
273 +
274 +*torbrowser-12.0-r2 (01 Jun 2012)
275 +
276 + 01 Jun 2012; Julian Ospald <hasufell@g.o> -torbrowser-12.0.ebuild,
277 + +torbrowser-12.0-r2.ebuild:
278 + sync with firefox ebuild
279 +
280 +*torbrowser-12.0 (12 May 2012)
281 +
282 + 12 May 2012; Julian Ospald <hasufell@g.o>
283 + +files/12.0/0001-Block-Components.interfaces-lookupMethod-from-conten.patch,
284 + +files/12.0/0002-Make-Permissions-Manager-memory-only.patch,
285 + +files/12.0/0003-Make-Intermediate-Cert-Store-memory-only.patch,
286 + +files/12.0/0004-Add-a-string-based-cacheKey.patch,
287 + +files/12.0/0005-Block-all-plugins-except-flash.patch,
288 + +files/12.0/0006-Make-content-pref-service-memory-only-clearable.patch,
289 + +files/12.0/0008-Disable-SSL-Session-ID-tracking.patch,
290 + +files/12.0/0009-Provide-an-observer-event-to-close-persistent-connec.patch,
291 + +files/12.0/0010-Provide-client-values-only-to-CSS-Media-Queries.patch,
292 + +files/12.0/0011-Limit-the-number-of-fonts-per-document.patch,
293 + +files/12.0/0012-Randomize-HTTP-request-order-and-pipeline-depth.patch,
294 + +files/12.0/0013-Rebrand-Firefox-to-TorBrowser.patch,
295 + +files/12.0/0014-Make-Download-manager-memory-only.patch,
296 + +files/12.0/0015-Add-DDG-and-StartPage-to-Omnibox.patch,
297 + +files/12.0/0016-Adapt-Steven-Michaud-s-Mac-crashfix-patch-for-FF12.patch,
298 + +files/12.0/0017-Make-nsICacheService.EvictEntries-synchronous.patch,
299 + +torbrowser-12.0.ebuild, +files/12.0/0018-Prevent-WebSocket-DNS-leak.patch,
300 + +metadata.xml:
301 + initial import with help from Poncho wrt #406361
302
303 diff --git a/www-client/torbrowser/Manifest b/www-client/torbrowser/Manifest
304 new file mode 100644
305 index 0000000..c095ef6
306 --- /dev/null
307 +++ b/www-client/torbrowser/Manifest
308 @@ -0,0 +1,10 @@
309 +AUX README.tor-launcher 1594 SHA256 f344dd89d39a7330eb8303f80e89d9a015b3b70e4bc52649e0c8c1cde52a5ec6 SHA512 9faeba83e0910438e9267a203c50d60f69860ab8765b3a6b1f38c153e3578645daf196133923597d2d8b00228b884250b0fb0cc5020978b22386510c6e6559b1 WHIRLPOOL c7d0e9fa5b390d308524f5ac41249acbe6c612ac01ec960e1152c14dd1de1d520c1b52948315995df82a0a524dbcf4371b0466841acd6471c52a5baa8d9aac4b
310 +AUX tor-browser.git-bccc144c21f6069a294038a6559ba46ceb8da2a2.patch 15904 SHA256 890f5b981533541f091ae9c159623107c823804a13afd421e39b664873dc7d65 SHA512 1d7b1633c2424dcfb24ea84ae443c04578ed55dd539b9a606fd98033027e8eba0c743e198db385f6e3a27e4676d5f4d0830f050d8ba1fb1dec50652f26e4f715 WHIRLPOOL f8cedc44db5e80b532e1db351a1438c96f7ed8e84799ed84084d275757fe40c20399d37d7a73e376875590482d2235024c1ac99e4ee31e726d17bd7a5c38213b
311 +AUX torbrowser-24.3.0-allow-lightspark.patch 615 SHA256 904a090199d82d3fea3f96c2e077a08ea7e28ef46a4f4d1e7e6da936b08bafd1 SHA512 35772c3c716fe5004d3306591b9ab1612a78644cb272de473fbf0da91a19075e6a166bb97a8365065828de829dc3b68618a31820f3b0eb7399e2bfe008f797d8 WHIRLPOOL 75ed0e691d9bfb877a368b0946f3cf8007e3201456a47e6d2ddd9b3d295cf782347a8cac45f63242d1bf6cea3a1acdead3b9494d26f52387253fe490be6a598d
312 +DIST firefox-31.0-patches-0.2.tar.xz 4636 SHA256 fdcd4e68093fb905af06cd89aad7042f8a4e695dea9c184351945fcb5872a062 SHA512 2fee84ac6027a1e1317470112df54fef411596a522bca756f82c525b13ba952015e71f2aa05a807fec04c3bd092e8cbebd0c2349e0dc4950b329a88811b00151 WHIRLPOOL 59dc5f3457dc2a0c0c83a0128063da00d127cee13487b112064368de7d98438b7ffeb1dfe362080eca6a82af4834f3e27c6bd887e51b5d59c728ae124b26114d
313 +DIST tor-browser-31.5.0esr-4.0-1-build1.tar.gz 170142149 SHA256 75c39110209cb20d9b83782114edbf3d94e77fa4bf9c2ef0b79ebe8bc6100375 SHA512 d9b692cd5678ea96c3b62f630017057c07a9976fb11102d9f1bb489cf495e6ab890ebc36b756e6efc39b1837804c32efa72c76621bbad563ecb9954bcd61771b WHIRLPOOL d9432bb1dee8e39ba8bdaac252315f83d645cf2374789b2f7eb3f4453bb87b5a67422c3e6f92a81c007db17f6f9069e7f9023051073123c07178fc3fca3e9b5b
314 +DIST tor-browser-linux32-4.0.4_en-US.tar.xz 42884008 SHA256 f527b85a057ae402fa1dc84e6c175071e6448300cd2ebdd0d50494e1dd605185 SHA512 f5846b01d9b6bcac69c188bdb1d2d2fade86aec37c9f2216a6efcb8e95286cee9558acb5d2acf8fb1d36c11540ab460c3159d7f66f36d386d4c5e47e1da4fe16 WHIRLPOOL ae293d1fa156058b0f475c230723d8b3a7844ba50c98e3a21e0251d2e634802fde8facb56e28c8168e023d33dc75278e8421429de42bf9b7e8b06db8dd659e8c
315 +DIST tor-browser-linux64-4.0.4_en-US.tar.xz 42068548 SHA256 0f0a07905daaf714322bc54cf25ed0e3b8ef91aeb937ab0df2d39010c9ee7b82 SHA512 8dbed4d037ad4927811089ce05c0411c71d6f7fb6614d9131a4554c00630a397b9c88ea31c0389ffb813297ed77a69ed158a2cc5186a7df8b0d8728b35e480ba WHIRLPOOL 40f93d1fb610095dd8762ffb41d5d989d5e357c7ddb8dd8a07b3dd87962988e25fe07de8fa5bbe995f8ca2f368f395dd6a0e0bcb12a43fe4a8cd8f48feeb51b2
316 +EBUILD torbrowser-31.5.0.ebuild 10052 SHA256 57cb554dc22d90436c55ba023b19d692de2614f01d143b5462317f27083b6e1d SHA512 2f694fa48a28bcaee673112640f46c47298e846ec06fb052fe740be86e5d69323376ab9e2612f982039243ddbfce595a6ff51480b2ae40bff18fb341c5b32e89 WHIRLPOOL ab435f4cb6fad6052a982a339886d34a3b0399db6611f57deed0222007dcc8ca9eb30962249578d4c72a119d5002b73761fbb296729a30208c7ad419c5f02d08
317 +MISC ChangeLog 11827 SHA256 d56642e383f443000bda2a5cd9904e91e7eece21eaaef493ef8abdbe6009c437 SHA512 7ca4a034beef7c3a55bf55e61a8e309937a0833e3d0fd93d2ed7789c93cd78c27486124f20209b21d72ee8d5f07cd259fc61cec45e8dfd7a9b64d47dd9f9773f WHIRLPOOL 6ff2cb2698c54f7fceb2ed38b3fd4a0ee7b2c0d99673eabade3a2e82b04fea4e5ef750ccde5048cbb0f194ae3e75ee7eae63b889d8321090a46c435d3d5ae9c2
318 +MISC metadata.xml 889 SHA256 f1d80c79dbd97040f9839b0dddcda0cb292cefe0c80294f6fc36706cc2904795 SHA512 285c5690a2779d778669a645b93c76227a84a7f7df1dc7044b0e642de4ade79da6fef0b067adbd9c8be959e13dd0fcc5412293d39129ee94be97bc826c9b1dab WHIRLPOOL 29a7a249f4a22c67b842c01accbf12263657e9ac798dda37246eb8f07e58cda6159c281502f53b2e14f7c6124a0257927af158164a3a4d1cc768484a67888d47
319
320 diff --git a/www-client/torbrowser/files/README.tor-launcher b/www-client/torbrowser/files/README.tor-launcher
321 new file mode 100644
322 index 0000000..5edc01e
323 --- /dev/null
324 +++ b/www-client/torbrowser/files/README.tor-launcher
325 @@ -0,0 +1,37 @@
326 +Using a system-installed Tor process with Tor Browser:
327 +~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
328 +The Tor ControlPort password should be given inside double quotes, inside
329 +single quotes, i.e. if the ControlPort password is “secret” (without
330 +curly quotes) then we must set the environment variable *exactly* like
331 +this:
332 +
333 +TOR_CONTROL_PASSWD='"secret"'
334 +
335 +Yes, the variable MUST be double-quoted, then single-quoted, exactly as
336 +shown. This is used by TorButtom to authenticate to Tor's ControlPort, and
337 +is necessary for using TBB with a with a system-installed Tor.
338 +
339 +Additionally, if using a system-installed Tor, the following about:config
340 +options should be set (values in <> mean they are the value taken from your
341 +torrc):
342 +
343 +SETTING NAME VALUE
344 +extensions.torbutton.banned_ports [...],<SocksPort>,<ControlPort>
345 +extensions.torbutton.block_disk false
346 +extensions.torbutton.custom.socks_host 127.0.0.1
347 +extensions.torbutton.custom.socks_port <SocksPort>
348 +extensions.torbutton.inserted_button true
349 +extensions.torbutton.launch_warning false
350 +extensions.torbutton.loglevel 2
351 +extensions.torbutton.logmethod 0
352 +extensions.torbutton.settings_method custom
353 +extensions.torbutton.socks_port <SocksPort>
354 +extensions.torbutton.use_privoxy false
355 +extensions.torlauncher.control_port <ControlPort>
356 +extensions.torlauncher.loglevel 2
357 +extensions.torlauncher.logmethod 0
358 +extensions.torlauncher.prompt_at_startup false
359 +extensions.torlauncher.start_tor false
360 +
361 +where the '[...]' in the banned_ports option means "leave anything that was
362 +already in the preference alone, just append the things specified after it".
363
364 diff --git a/www-client/torbrowser/files/tor-browser.git-bccc144c21f6069a294038a6559ba46ceb8da2a2.patch b/www-client/torbrowser/files/tor-browser.git-bccc144c21f6069a294038a6559ba46ceb8da2a2.patch
365 new file mode 100644
366 index 0000000..de2fe2d
367 --- /dev/null
368 +++ b/www-client/torbrowser/files/tor-browser.git-bccc144c21f6069a294038a6559ba46ceb8da2a2.patch
369 @@ -0,0 +1,430 @@
370 +From bccc144c21f6069a294038a6559ba46ceb8da2a2 Mon Sep 17 00:00:00 2001
371 +From: Kathy Brade <brade@×××××××××××××.com>
372 +Date: Fri, 18 Oct 2013 15:20:06 -0400
373 +Subject: [PATCH] Bug #9173: Change the default Firefox profile directory to
374 + be TBB-relative.
375 +
376 +This should eliminate our need to rely on a wrapper script that sets $HOME and
377 +launches Firefox with -profile.
378 +---
379 + toolkit/xre/nsXREDirProvider.cpp | 153 +++++++-------------------------
380 + toolkit/xre/nsXREDirProvider.h | 10 +--
381 + xpcom/io/moz.build | 4 +
382 + xpcom/io/nsAppFileLocationProvider.cpp | 81 ++++++++---------
383 + 4 files changed, 81 insertions(+), 167 deletions(-)
384 +
385 +diff --git a/toolkit/xre/nsXREDirProvider.cpp b/toolkit/xre/nsXREDirProvider.cpp
386 +index 88a4348..4835541 100644
387 +--- a/toolkit/xre/nsXREDirProvider.cpp
388 ++++ b/toolkit/xre/nsXREDirProvider.cpp
389 +@@ -30,6 +30,7 @@
390 + #include "nsArrayEnumerator.h"
391 + #include "nsEnumeratorUtils.h"
392 + #include "nsReadableUtils.h"
393 ++#include "nsXPCOMPrivate.h" // for XPCOM_FILE_PATH_SEPARATOR
394 + #include "mozilla/Services.h"
395 + #include "mozilla/Omnijar.h"
396 + #include "mozilla/Preferences.h"
397 +@@ -188,9 +189,6 @@ nsXREDirProvider::GetUserProfilesRootDir(nsIFile** aResult,
398 + aProfileName, aAppName, aVendorName);
399 +
400 + if (NS_SUCCEEDED(rv)) {
401 +-#if !defined(XP_UNIX) || defined(XP_MACOSX)
402 +- rv = file->AppendNative(NS_LITERAL_CSTRING("Profiles"));
403 +-#endif
404 + // We must create the profile directory here if it does not exist.
405 + nsresult tmp = EnsureDirectoryExists(file);
406 + if (NS_FAILED(tmp)) {
407 +@@ -213,9 +211,6 @@ nsXREDirProvider::GetUserProfilesLocalDir(nsIFile** aResult,
408 + aProfileName, aAppName, aVendorName);
409 +
410 + if (NS_SUCCEEDED(rv)) {
411 +-#if !defined(XP_UNIX) || defined(XP_MACOSX)
412 +- rv = file->AppendNative(NS_LITERAL_CSTRING("Profiles"));
413 +-#endif
414 + // We must create the profile directory here if it does not exist.
415 + nsresult tmp = EnsureDirectoryExists(file);
416 + if (NS_FAILED(tmp)) {
417 +@@ -1143,82 +1138,45 @@ nsresult
418 + nsXREDirProvider::GetUserDataDirectoryHome(nsIFile** aFile, bool aLocal)
419 + {
420 + // Copied from nsAppFileLocationProvider (more or less)
421 +- nsresult rv;
422 ++ NS_ENSURE_ARG_POINTER(aFile);
423 + nsCOMPtr<nsIFile> localDir;
424 +
425 +-#if defined(XP_MACOSX)
426 +- FSRef fsRef;
427 +- OSType folderType;
428 +- if (aLocal) {
429 +- folderType = kCachedDataFolderType;
430 +- } else {
431 +-#ifdef MOZ_THUNDERBIRD
432 +- folderType = kDomainLibraryFolderType;
433 +-#else
434 +- folderType = kApplicationSupportFolderType;
435 +-#endif
436 +- }
437 +- OSErr err = ::FSFindFolder(kUserDomain, folderType, kCreateFolder, &fsRef);
438 +- NS_ENSURE_FALSE(err, NS_ERROR_FAILURE);
439 +-
440 +- rv = NS_NewNativeLocalFile(EmptyCString(), true, getter_AddRefs(localDir));
441 ++ nsresult rv = GetAppDir()->Clone(getter_AddRefs(localDir));
442 + NS_ENSURE_SUCCESS(rv, rv);
443 +
444 +- nsCOMPtr<nsILocalFileMac> dirFileMac = do_QueryInterface(localDir);
445 +- NS_ENSURE_TRUE(dirFileMac, NS_ERROR_UNEXPECTED);
446 ++ int levelsToRemove = 1; // In FF21+, appDir points to browser subdirectory.
447 ++#if defined(XP_MACOSX)
448 ++ levelsToRemove += 2;
449 ++#endif
450 ++ while (localDir && (levelsToRemove > 0)) {
451 ++ // When crawling up the hierarchy, components named "." do not count.
452 ++ nsAutoCString removedName;
453 ++ rv = localDir->GetNativeLeafName(removedName);
454 ++ NS_ENSURE_SUCCESS(rv, rv);
455 ++ bool didRemove = !removedName.Equals(".");
456 +
457 +- rv = dirFileMac->InitWithFSRef(&fsRef);
458 +- NS_ENSURE_SUCCESS(rv, rv);
459 ++ // Remove a directory component.
460 ++ nsCOMPtr<nsIFile> parentDir;
461 ++ rv = localDir->GetParent(getter_AddRefs(parentDir));
462 ++ NS_ENSURE_SUCCESS(rv, rv);
463 ++ localDir = parentDir;
464 +
465 +- localDir = do_QueryInterface(dirFileMac, &rv);
466 +-#elif defined(XP_WIN)
467 +- nsString path;
468 +- if (aLocal) {
469 +- rv = GetShellFolderPath(CSIDL_LOCAL_APPDATA, path);
470 +- if (NS_FAILED(rv))
471 +- rv = GetRegWindowsAppDataFolder(aLocal, path);
472 ++ if (didRemove)
473 ++ --levelsToRemove;
474 + }
475 +- if (!aLocal || NS_FAILED(rv)) {
476 +- rv = GetShellFolderPath(CSIDL_APPDATA, path);
477 +- if (NS_FAILED(rv)) {
478 +- if (!aLocal)
479 +- rv = GetRegWindowsAppDataFolder(aLocal, path);
480 +- }
481 +- }
482 +- NS_ENSURE_SUCCESS(rv, rv);
483 +
484 +- rv = NS_NewLocalFile(path, true, getter_AddRefs(localDir));
485 +-#elif defined(MOZ_WIDGET_GONK)
486 +- rv = NS_NewNativeLocalFile(NS_LITERAL_CSTRING("/data/b2g"), true,
487 +- getter_AddRefs(localDir));
488 +-#elif defined(XP_UNIX)
489 +- const char* homeDir = getenv("HOME");
490 +- if (!homeDir || !*homeDir)
491 ++ if (!localDir)
492 + return NS_ERROR_FAILURE;
493 +
494 +-#ifdef ANDROID /* We want (ProfD == ProfLD) on Android. */
495 +- aLocal = false;
496 +-#endif
497 ++ rv = localDir->AppendRelativeNativePath(NS_LITERAL_CSTRING("TorBrowser"
498 ++ XPCOM_FILE_PATH_SEPARATOR "Data"
499 ++ XPCOM_FILE_PATH_SEPARATOR "Browser"));
500 ++ NS_ENSURE_SUCCESS(rv, rv);
501 +
502 + if (aLocal) {
503 +- // If $XDG_CACHE_HOME is defined use it, otherwise use $HOME/.cache.
504 +- const char* cacheHome = getenv("XDG_CACHE_HOME");
505 +- if (cacheHome && *cacheHome) {
506 +- rv = NS_NewNativeLocalFile(nsDependentCString(cacheHome), true,
507 +- getter_AddRefs(localDir));
508 +- } else {
509 +- rv = NS_NewNativeLocalFile(nsDependentCString(homeDir), true,
510 +- getter_AddRefs(localDir));
511 +- if (NS_SUCCEEDED(rv))
512 +- rv = localDir->AppendNative(NS_LITERAL_CSTRING(".cache"));
513 +- }
514 +- } else {
515 +- rv = NS_NewNativeLocalFile(nsDependentCString(homeDir), true,
516 +- getter_AddRefs(localDir));
517 ++ rv = localDir->AppendNative(NS_LITERAL_CSTRING("Caches"));
518 ++ NS_ENSURE_SUCCESS(rv, rv);
519 + }
520 +-#else
521 +-#error "Don't know how to get product dir on your platform"
522 +-#endif
523 +
524 + NS_IF_ADDREF(*aFile = localDir);
525 + return rv;
526 +@@ -1431,48 +1389,25 @@ nsXREDirProvider::AppendProfilePath(nsIFile* aFile,
527 + }
528 +
529 + nsAutoCString profile;
530 +- nsAutoCString appName;
531 +- nsAutoCString vendor;
532 + if (aProfileName && !aProfileName->IsEmpty()) {
533 + profile = *aProfileName;
534 +- } else if (aAppName) {
535 +- appName = *aAppName;
536 +- if (aVendorName) {
537 +- vendor = *aVendorName;
538 +- }
539 + } else if (gAppData->profile) {
540 + profile = gAppData->profile;
541 +- } else {
542 +- appName = gAppData->name;
543 +- vendor = gAppData->vendor;
544 + }
545 +
546 +- nsresult rv;
547 ++ nsresult rv = NS_ERROR_FAILURE;
548 +
549 + #if defined (XP_MACOSX)
550 + if (!profile.IsEmpty()) {
551 + rv = AppendProfileString(aFile, profile.get());
552 ++ NS_ENSURE_SUCCESS(rv, rv);
553 + }
554 +- else {
555 +- // Note that MacOS ignores the vendor when creating the profile hierarchy -
556 +- // all application preferences directories live alongside one another in
557 +- // ~/Library/Application Support/
558 +- rv = aFile->AppendNative(appName);
559 +- }
560 +- NS_ENSURE_SUCCESS(rv, rv);
561 +
562 + #elif defined(XP_WIN)
563 + if (!profile.IsEmpty()) {
564 + rv = AppendProfileString(aFile, profile.get());
565 ++ NS_ENSURE_SUCCESS(rv, rv);
566 + }
567 +- else {
568 +- if (!vendor.IsEmpty()) {
569 +- rv = aFile->AppendNative(vendor);
570 +- NS_ENSURE_SUCCESS(rv, rv);
571 +- }
572 +- rv = aFile->AppendNative(appName);
573 +- }
574 +- NS_ENSURE_SUCCESS(rv, rv);
575 +
576 + #elif defined(ANDROID)
577 + // The directory used for storing profiles
578 +@@ -1484,12 +1419,6 @@ nsXREDirProvider::AppendProfilePath(nsIFile* aFile,
579 + rv = aFile->AppendNative(nsDependentCString("mozilla"));
580 + NS_ENSURE_SUCCESS(rv, rv);
581 + #elif defined(XP_UNIX)
582 +- nsAutoCString folder;
583 +- // Make it hidden (by starting with "."), except when local (the
584 +- // profile is already under ~/.cache or XDG_CACHE_HOME).
585 +- if (!aLocal)
586 +- folder.Assign('.');
587 +-
588 + if (!profile.IsEmpty()) {
589 + // Skip any leading path characters
590 + const char* profileStart = profile.get();
591 +@@ -1498,31 +1427,17 @@ nsXREDirProvider::AppendProfilePath(nsIFile* aFile,
592 +
593 + // On the off chance that someone wanted their folder to be hidden don't
594 + // let it become ".."
595 +- if (*profileStart == '.' && !aLocal)
596 ++ if (*profileStart == '.')
597 + profileStart++;
598 +
599 ++ // Make it hidden (by starting with ".").
600 ++ nsAutoCString folder(".");
601 + folder.Append(profileStart);
602 + ToLowerCase(folder);
603 +
604 + rv = AppendProfileString(aFile, folder.BeginReading());
605 ++ NS_ENSURE_SUCCESS(rv, rv);
606 + }
607 +- else {
608 +- if (!vendor.IsEmpty()) {
609 +- folder.Append(vendor);
610 +- ToLowerCase(folder);
611 +-
612 +- rv = aFile->AppendNative(folder);
613 +- NS_ENSURE_SUCCESS(rv, rv);
614 +-
615 +- folder.Truncate();
616 +- }
617 +-
618 +- folder.Append(appName);
619 +- ToLowerCase(folder);
620 +-
621 +- rv = aFile->AppendNative(folder);
622 +- }
623 +- NS_ENSURE_SUCCESS(rv, rv);
624 +
625 + #else
626 + #error "Don't know how to get profile path on your platform"
627 +diff --git a/toolkit/xre/nsXREDirProvider.h b/toolkit/xre/nsXREDirProvider.h
628 +index 4a9f9a0..054075c 100644
629 +--- a/toolkit/xre/nsXREDirProvider.h
630 ++++ b/toolkit/xre/nsXREDirProvider.h
631 +@@ -56,16 +56,16 @@ public:
632 +
633 + nsresult GetProfileDefaultsDir(nsIFile* *aResult);
634 +
635 +- static nsresult GetUserAppDataDirectory(nsIFile* *aFile) {
636 ++ nsresult GetUserAppDataDirectory(nsIFile* *aFile) {
637 + return GetUserDataDirectory(aFile, false, nullptr, nullptr, nullptr);
638 + }
639 +- static nsresult GetUserLocalDataDirectory(nsIFile* *aFile) {
640 ++ nsresult GetUserLocalDataDirectory(nsIFile* *aFile) {
641 + return GetUserDataDirectory(aFile, true, nullptr, nullptr, nullptr);
642 + }
643 +
644 + // By default GetUserDataDirectory gets profile path from gAppData,
645 + // but that can be overridden by using aProfileName/aAppName/aVendorName.
646 +- static nsresult GetUserDataDirectory(nsIFile** aFile, bool aLocal,
647 ++ nsresult GetUserDataDirectory(nsIFile** aFile, bool aLocal,
648 + const nsACString* aProfileName,
649 + const nsACString* aAppName,
650 + const nsACString* aVendorName);
651 +@@ -101,8 +101,8 @@ public:
652 +
653 + protected:
654 + nsresult GetFilesInternal(const char* aProperty, nsISimpleEnumerator** aResult);
655 +- static nsresult GetUserDataDirectoryHome(nsIFile* *aFile, bool aLocal);
656 +- static nsresult GetSysUserExtensionsDirectory(nsIFile* *aFile);
657 ++ nsresult GetUserDataDirectoryHome(nsIFile* *aFile, bool aLocal);
658 ++ nsresult GetSysUserExtensionsDirectory(nsIFile* *aFile);
659 + #if defined(XP_UNIX) || defined(XP_MACOSX)
660 + static nsresult GetSystemExtensionsDirectory(nsIFile** aFile);
661 + #endif
662 +diff --git a/xpcom/io/moz.build b/xpcom/io/moz.build
663 +index cc467f9..609068b 100644
664 +--- a/xpcom/io/moz.build
665 ++++ b/xpcom/io/moz.build
666 +@@ -126,4 +126,8 @@ FINAL_LIBRARY = 'xpcom_core'
667 + if CONFIG['OS_ARCH'] == 'Linux' and 'lib64' in CONFIG['libdir']:
668 + DEFINES['HAVE_USR_LIB64_DIR'] = True
669 +
670 ++LOCAL_INCLUDES += [
671 ++ '../build'
672 ++]
673 ++
674 + GENERATED_INCLUDES += ['..']
675 +diff --git a/xpcom/io/nsAppFileLocationProvider.cpp b/xpcom/io/nsAppFileLocationProvider.cpp
676 +index 1a38589..83f9836 100644
677 +--- a/xpcom/io/nsAppFileLocationProvider.cpp
678 ++++ b/xpcom/io/nsAppFileLocationProvider.cpp
679 +@@ -13,6 +13,7 @@
680 + #include "nsISimpleEnumerator.h"
681 + #include "prenv.h"
682 + #include "nsCRT.h"
683 ++#include "nsXPCOMPrivate.h" // for XPCOM_FILE_PATH_SEPARATOR
684 +
685 + #if defined(MOZ_WIDGET_COCOA)
686 + #include <Carbon/Carbon.h>
687 +@@ -284,9 +285,8 @@ NS_METHOD nsAppFileLocationProvider::CloneMozBinDirectory(nsIFile **aLocalFile)
688 + //----------------------------------------------------------------------------------------
689 + // GetProductDirectory - Gets the directory which contains the application data folder
690 + //
691 +-// UNIX : ~/.mozilla/
692 +-// WIN : <Application Data folder on user's machine>\Mozilla
693 +-// Mac : :Documents:Mozilla:
694 ++// UNIX and WIN : <App Folder>/TorBrowser/Data/Browser
695 ++// Mac : <App Folder>/../../TorBrowser/Data/Browser
696 + //----------------------------------------------------------------------------------------
697 + NS_METHOD nsAppFileLocationProvider::GetProductDirectory(nsIFile **aLocalFile, bool aLocal)
698 + {
699 +@@ -297,32 +297,43 @@ NS_METHOD nsAppFileLocationProvider::GetProductDirectory(nsIFile **aLocalFile, b
700 + bool exists;
701 + nsCOMPtr<nsIFile> localDir;
702 +
703 +-#if defined(MOZ_WIDGET_COCOA)
704 +- FSRef fsRef;
705 +- OSType folderType = aLocal ? (OSType) kCachedDataFolderType : (OSType) kDomainLibraryFolderType;
706 +- OSErr err = ::FSFindFolder(kUserDomain, folderType, kCreateFolder, &fsRef);
707 +- if (err) return NS_ERROR_FAILURE;
708 +- NS_NewLocalFile(EmptyString(), true, getter_AddRefs(localDir));
709 +- if (!localDir) return NS_ERROR_FAILURE;
710 +- nsCOMPtr<nsILocalFileMac> localDirMac(do_QueryInterface(localDir));
711 +- rv = localDirMac->InitWithFSRef(&fsRef);
712 +- if (NS_FAILED(rv)) return rv;
713 +-#elif defined(XP_WIN)
714 +- nsCOMPtr<nsIProperties> directoryService =
715 +- do_GetService(NS_DIRECTORY_SERVICE_CONTRACTID, &rv);
716 +- if (NS_FAILED(rv)) return rv;
717 +- const char* prop = aLocal ? NS_WIN_LOCAL_APPDATA_DIR : NS_WIN_APPDATA_DIR;
718 +- rv = directoryService->Get(prop, NS_GET_IID(nsIFile), getter_AddRefs(localDir));
719 +- if (NS_FAILED(rv)) return rv;
720 +-#elif defined(XP_UNIX)
721 +- rv = NS_NewNativeLocalFile(nsDependentCString(PR_GetEnv("HOME")), true, getter_AddRefs(localDir));
722 +- if (NS_FAILED(rv)) return rv;
723 +-#else
724 +-#error dont_know_how_to_get_product_dir_on_your_platform
725 ++ rv = CloneMozBinDirectory(getter_AddRefs(localDir));
726 ++ NS_ENSURE_SUCCESS(rv, rv);
727 ++
728 ++ int levelsToRemove = 1; // In FF21+, bin dir points to browser subdirectory.
729 ++#if defined(XP_MACOSX)
730 ++ levelsToRemove += 2;
731 + #endif
732 ++ while (localDir && (levelsToRemove > 0)) {
733 ++ // When crawling up the hierarchy, components named "." do not count.
734 ++ nsAutoCString removedName;
735 ++ rv = localDir->GetNativeLeafName(removedName);
736 ++ NS_ENSURE_SUCCESS(rv, rv);
737 ++ bool didRemove = !removedName.Equals(".");
738 ++
739 ++ // Remove a directory component.
740 ++ nsCOMPtr<nsIFile> parentDir;
741 ++ rv = localDir->GetParent(getter_AddRefs(parentDir));
742 ++ NS_ENSURE_SUCCESS(rv, rv);
743 ++ localDir = parentDir;
744 ++
745 ++ if (didRemove)
746 ++ --levelsToRemove;
747 ++ }
748 ++
749 ++ if (!localDir)
750 ++ return NS_ERROR_FAILURE;
751 ++
752 ++ rv = localDir->AppendRelativeNativePath(NS_LITERAL_CSTRING("TorBrowser"
753 ++ XPCOM_FILE_PATH_SEPARATOR "Data"
754 ++ XPCOM_FILE_PATH_SEPARATOR "Browser"));
755 ++ NS_ENSURE_SUCCESS(rv, rv);
756 ++
757 ++ if (aLocal) {
758 ++ rv = localDir->AppendNative(NS_LITERAL_CSTRING("Caches"));
759 ++ NS_ENSURE_SUCCESS(rv, rv);
760 ++ }
761 +
762 +- rv = localDir->AppendRelativeNativePath(DEFAULT_PRODUCT_DIR);
763 +- if (NS_FAILED(rv)) return rv;
764 + rv = localDir->Exists(&exists);
765 +
766 + if (NS_SUCCEEDED(rv) && !exists)
767 +@@ -339,10 +350,6 @@ NS_METHOD nsAppFileLocationProvider::GetProductDirectory(nsIFile **aLocalFile, b
768 +
769 + //----------------------------------------------------------------------------------------
770 + // GetDefaultUserProfileRoot - Gets the directory which contains each user profile dir
771 +-//
772 +-// UNIX : ~/.mozilla/
773 +-// WIN : <Application Data folder on user's machine>\Mozilla\Profiles
774 +-// Mac : :Documents:Mozilla:Profiles:
775 + //----------------------------------------------------------------------------------------
776 + NS_METHOD nsAppFileLocationProvider::GetDefaultUserProfileRoot(nsIFile **aLocalFile, bool aLocal)
777 + {
778 +@@ -355,18 +362,6 @@ NS_METHOD nsAppFileLocationProvider::GetDefaultUserProfileRoot(nsIFile **aLocalF
779 + rv = GetProductDirectory(getter_AddRefs(localDir), aLocal);
780 + if (NS_FAILED(rv)) return rv;
781 +
782 +-#if defined(MOZ_WIDGET_COCOA) || defined(XP_WIN)
783 +- // These 3 platforms share this part of the path - do them as one
784 +- rv = localDir->AppendRelativeNativePath(NS_LITERAL_CSTRING("Profiles"));
785 +- if (NS_FAILED(rv)) return rv;
786 +-
787 +- bool exists;
788 +- rv = localDir->Exists(&exists);
789 +- if (NS_SUCCEEDED(rv) && !exists)
790 +- rv = localDir->Create(nsIFile::DIRECTORY_TYPE, 0775);
791 +- if (NS_FAILED(rv)) return rv;
792 +-#endif
793 +-
794 + *aLocalFile = localDir;
795 + NS_ADDREF(*aLocalFile);
796 +
797 +--
798 +1.7.10.4
799 +
800
801 diff --git a/www-client/torbrowser/files/torbrowser-24.3.0-allow-lightspark.patch b/www-client/torbrowser/files/torbrowser-24.3.0-allow-lightspark.patch
802 new file mode 100644
803 index 0000000..7228f16
804 --- /dev/null
805 +++ b/www-client/torbrowser/files/torbrowser-24.3.0-allow-lightspark.patch
806 @@ -0,0 +1,14 @@
807 +From: Julian Ospald <hasufell@g.o>
808 +Date: Sun Feb 16 17:11:39 UTC 2014
809 +Subject: allow lightspark
810 +
811 +--- tor-browser/dom/plugins/base/nsPluginHost.cpp
812 ++++ tor-browser/dom/plugins/base/nsPluginHost.cpp
813 +@@ -1821,6 +1821,7 @@
814 + // libgnashplugin.so, libflashplayer.so, Flash Player-10.4-10.5.plugin,
815 + // NPSWF32.dll, NPSWF64.dll
816 + if (strstr(leafStr, "libgnashplugin") == leafStr ||
817 ++ strstr(leafStr, "liblightsparkplugin") == leafStr ||
818 + strstr(leafStr, "libflashplayer") == leafStr ||
819 + strstr(leafStr, "Flash Player") == leafStr ||
820 + strstr(leafStr, "NPSWF") == leafStr) {
821
822 diff --git a/www-client/torbrowser/metadata.xml b/www-client/torbrowser/metadata.xml
823 new file mode 100644
824 index 0000000..dcb9d0b
825 --- /dev/null
826 +++ b/www-client/torbrowser/metadata.xml
827 @@ -0,0 +1,22 @@
828 +<?xml version="1.0" encoding="UTF-8"?>
829 +<!DOCTYPE pkgmetadata SYSTEM "http://www.gentoo.org/dtd/metadata.dtd">
830 +<pkgmetadata>
831 +<maintainer>
832 + <email>poncho@××××××.ch</email>
833 + <name>Poncho</name>
834 +</maintainer>
835 +<use>
836 + <flag name="custom-optimization">Fine-tune custom compiler
837 + optimizations, setting this is not recommended.</flag>
838 + <flag name="system-cairo">Use the system-wide <pkg>x11-libs/cairo</pkg>
839 + instead of bundled.</flag>
840 + <flag name="system-icu">Use the system-wide <pkg>dev-libs/icu</pkg>
841 + instead of bundled.</flag>
842 + <flag name="system-jpeg">Use the system-wide <pkg>media-libs/libjpeg-turbo</pkg>
843 + instead of bundled.</flag>
844 + <flag name="system-libvpx">Use the system-wide <pkg>media-libs/libvpx</pkg>
845 + instead of bundled.</flag>
846 + <flag name="system-sqlite">Use the system-wide <pkg>dev-db/sqlite</pkg>
847 + installation with secure-delete enabled</flag>
848 +</use>
849 +</pkgmetadata>
850
851 diff --git a/www-client/torbrowser/torbrowser-31.5.0.ebuild b/www-client/torbrowser/torbrowser-31.5.0.ebuild
852 new file mode 100644
853 index 0000000..2e54652
854 --- /dev/null
855 +++ b/www-client/torbrowser/torbrowser-31.5.0.ebuild
856 @@ -0,0 +1,308 @@
857 +# Copyright 1999-2015 Gentoo Foundation
858 +# Distributed under the terms of the GNU General Public License v2
859 +# $Header: $
860 +
861 +EAPI="5"
862 +WANT_AUTOCONF="2.1"
863 +MOZ_ESR="1"
864 +
865 +MY_PN="firefox"
866 +if [[ ${MOZ_ESR} == 1 ]]; then
867 + # ESR releases have slightly version numbers
868 + MOZ_PV="${PV}esr"
869 +fi
870 +
871 +# see https://gitweb.torproject.org/builders/tor-browser-bundle.git/tree/gitian/versions?h=maint-4.0
872 +TOR_PV="4.0.4"
873 +GIT_TAG="tor-browser-${MOZ_PV}-4.0-1-build1"
874 +
875 +# Patch version
876 +PATCH="${MY_PN}-31.0-patches-0.2"
877 +
878 +MOZCONFIG_OPTIONAL_WIFI=1
879 +MOZCONFIG_OPTIONAL_JIT="enabled"
880 +
881 +inherit check-reqs flag-o-matic toolchain-funcs eutils gnome2-utils mozconfig-v5.31 multilib pax-utils autotools
882 +
883 +DESCRIPTION="The Tor Browser"
884 +HOMEPAGE="https://www.torproject.org/projects/torbrowser.html
885 + https://gitweb.torproject.org/tor-browser.git"
886 +
887 +KEYWORDS="~amd64 ~x86"
888 +SLOT="0"
889 +# BSD license applies to torproject-related code like the patches
890 +# icons are under CCPL-Attribution-3.0
891 +LICENSE="BSD CC-BY-3.0 MPL-2.0 GPL-2 LGPL-2.1"
892 +IUSE="hardened test"
893 +
894 +BASE_SRC_URI="https://dist.torproject.org/${PN}/${TOR_PV}"
895 +SRC_URI="https://gitweb.torproject.org/tor-browser.git/snapshot/${GIT_TAG}.tar.gz -> ${GIT_TAG}.tar.gz
896 + http://dev.gentoo.org/~anarchy/mozilla/patchsets/${PATCH}.tar.xz
897 + http://dev.gentoo.org/~axs/distfiles/${PATCH}.tar.xz
898 + x86? ( ${BASE_SRC_URI}/tor-browser-linux32-${TOR_PV}_en-US.tar.xz )
899 + amd64? ( ${BASE_SRC_URI}/tor-browser-linux64-${TOR_PV}_en-US.tar.xz )"
900 +
901 +ASM_DEPEND=">=dev-lang/yasm-1.1"
902 +
903 +CDEPEND=">=dev-libs/nss-3.17.1
904 + >=dev-libs/nspr-4.10.6"
905 +
906 +DEPEND="${CDEPEND}
907 + amd64? ( ${ASM_DEPEND}
908 + virtual/opengl )
909 + x86? ( ${ASM_DEPEND}
910 + virtual/opengl )"
911 +
912 +QA_PRESTRIPPED="usr/$(get_libdir)/${PN}/${MY_PN}/firefox"
913 +
914 +S="${WORKDIR}/${GIT_TAG}"
915 +
916 +# See mozcoreconf-2.eclass
917 +mozversion_is_new_enough() {
918 + if [[ $(get_version_component_range 1) -ge 17 ]] ; then
919 + return 0
920 + fi
921 + return 1
922 +}
923 +
924 +pkg_setup() {
925 + moz_pkgsetup
926 +
927 + # These should *always* be cleaned up anyway
928 + unset DBUS_SESSION_BUS_ADDRESS \
929 + DISPLAY \
930 + ORBIT_SOCKETDIR \
931 + SESSION_MANAGER \
932 + XDG_SESSION_COOKIE \
933 + XAUTHORITY
934 +}
935 +
936 +pkg_pretend() {
937 + # Ensure we have enough disk space to compile
938 + if use debug || use test ; then
939 + CHECKREQS_DISK_BUILD="8G"
940 + else
941 + CHECKREQS_DISK_BUILD="4G"
942 + fi
943 + check-reqs_pkg_setup
944 +
945 + if use jit && [[ -n ${PROFILE_IS_HARDENED} ]]; then
946 + ewarn "You are emerging this package on a hardened profile with USE=jit enabled."
947 + ewarn "This is horribly insecure as it disables all PAGEEXEC restrictions."
948 + ewarn "Please ensure you know what you are doing. If you don't, please consider"
949 + ewarn "emerging the package with USE=-jit"
950 + fi
951 +}
952 +
953 +src_prepare() {
954 + # Apply gentoo firefox patches
955 + EPATCH_SUFFIX="patch" \
956 + EPATCH_FORCE="yes" \
957 + epatch "${WORKDIR}/firefox"
958 +
959 + # Revert "Change the default Firefox profile directory to be TBB-relative"
960 + epatch -R "${FILESDIR}/tor-browser.git-bccc144c21f6069a294038a6559ba46ceb8da2a2.patch"
961 +
962 + # FIXME: https://trac.torproject.org/projects/tor/ticket/10925
963 + # Except lightspark-plugin from blocklist
964 + epatch "${FILESDIR}"/${PN}-24.3.0-allow-lightspark.patch
965 +
966 + # Allow user to apply any additional patches without modifing ebuild
967 + epatch_user
968 +
969 + # Enable gnomebreakpad
970 + if use debug ; then
971 + sed -i -e "s:GNOME_DISABLE_CRASH_DIALOG=1:GNOME_DISABLE_CRASH_DIALOG=0:g" \
972 + "${S}"/build/unix/run-mozilla.sh || die "sed failed!"
973 + fi
974 +
975 + # Ensure that our plugins dir is enabled as default
976 + sed -i -e "s:/usr/lib/mozilla/plugins:/usr/lib/nsbrowser/plugins:" \
977 + "${S}"/xpcom/io/nsAppFileLocationProvider.cpp || die "sed failed to replace plugin path for 32bit!"
978 + sed -i -e "s:/usr/lib64/mozilla/plugins:/usr/lib64/nsbrowser/plugins:" \
979 + "${S}"/xpcom/io/nsAppFileLocationProvider.cpp || die "sed failed to replace plugin path for 64bit!"
980 +
981 + # Fix sandbox violations during make clean, bug 372817
982 + sed -e "s:\(/no-such-file\):${T}\1:g" \
983 + -i "${S}"/config/rules.mk \
984 + -i "${S}"/nsprpub/configure{.in,} \
985 + || die
986 +
987 + # Don't exit with error when some libs are missing which we have in
988 + # system.
989 + sed '/^MOZ_PKG_FATAL_WARNINGS/s@= 1@= 0@' \
990 + -i "${S}"/browser/installer/Makefile.in || die
991 +
992 + # Don't error out when there's no files to be removed:
993 + sed 's@\(xargs rm\)$@\1 -f@' \
994 + -i "${S}"/toolkit/mozapps/installer/packager.mk || die
995 +
996 + eautoreconf
997 +
998 + # Must run autoconf in js/src
999 + cd "${S}"/js/src || die
1000 + eautoconf
1001 +}
1002 +
1003 +src_configure() {
1004 + MOZILLA_FIVE_HOME="${EPREFIX}"/usr/$(get_libdir)/${PN}/${MY_PN}
1005 + MEXTENSIONS="default"
1006 +
1007 + ####################################
1008 + #
1009 + # mozconfig, CFLAGS and CXXFLAGS setup
1010 + #
1011 + ####################################
1012 +
1013 + mozconfig_init
1014 + mozconfig_config
1015 +
1016 + # Add full relro support for hardened
1017 + use hardened && append-ldflags "-Wl,-z,relro,-z,now"
1018 +
1019 + mozconfig_annotate '' --enable-extensions="${MEXTENSIONS}"
1020 + mozconfig_annotate '' --disable-mailnews
1021 +
1022 + # Other ff-specific settings
1023 + mozconfig_annotate '' --with-default-mozilla-five-home=${MOZILLA_FIVE_HOME}
1024 +
1025 + # Rename the install directory and the executable
1026 + mozconfig_annotate 'torbrowser' --libdir="${EPREFIX}"/usr/$(get_libdir)/${PN}
1027 + mozconfig_annotate 'torbrowser' --with-app-name=torbrowser
1028 + mozconfig_annotate 'torbrowser' --with-app-basename=torbrowser
1029 + # see https://gitweb.torproject.org/tor-browser.git/tree/configure.in?h=tor-browser-31.3.0esr-4.0-1#n6401
1030 + mozconfig_annotate 'torbrowser' --disable-tor-browser-update
1031 + mozconfig_annotate 'torbrowser' --with-tor-browser-version=${TOR_PV}
1032 +
1033 + # Finalize and report settings
1034 + mozconfig_final
1035 +
1036 + if [[ $(gcc-major-version) -lt 4 ]]; then
1037 + append-cxxflags -fno-stack-protector
1038 + elif [[ $(gcc-major-version) -gt 4 || $(gcc-minor-version) -gt 3 ]]; then
1039 + if use amd64 || use x86; then
1040 + append-flags -mno-avx
1041 + fi
1042 + fi
1043 +}
1044 +
1045 +src_compile() {
1046 + CC="$(tc-getCC)" CXX="$(tc-getCXX)" LD="$(tc-getLD)" \
1047 + MOZ_MAKE_FLAGS="${MAKEOPTS}" SHELL="${SHELL}" \
1048 + emake -f client.mk
1049 +}
1050 +
1051 +src_install() {
1052 + MOZILLA_FIVE_HOME="${EPREFIX}"/usr/$(get_libdir)/${PN}/${MY_PN}
1053 + DICTPATH="\"${EPREFIX}/usr/share/myspell\""
1054 +
1055 + # MOZ_BUILD_ROOT, and hence OBJ_DIR change depending on arch, compiler etc.
1056 + local obj_dir="$(echo */config.log)"
1057 + obj_dir="${obj_dir%/*}"
1058 + cd "${S}/${obj_dir}" || die
1059 +
1060 + # Pax mark xpcshell for hardened support, only used for startupcache creation.
1061 + pax-mark m "${S}/${obj_dir}"/dist/bin/xpcshell
1062 +
1063 + # Add an emty default prefs for mozconfig-3.eclass
1064 + touch "${S}/${obj_dir}/dist/bin/browser/defaults/preferences/all-gentoo.js" \
1065 + || die
1066 +
1067 + # Set default path to search for dictionaries.
1068 + echo "pref(\"spellchecker.dictionary_path\", ${DICTPATH});" \
1069 + >> "${S}/${obj_dir}/dist/bin/browser/defaults/preferences/all-gentoo.js" \
1070 + || die
1071 +
1072 + # Disable adobe-flash by default
1073 + sed -i -e 's:pref("plugin.state.flash", 1);:pref("plugin.state.flash", 0);:g' \
1074 + "${S}/${obj_dir}/dist/bin/browser/defaults/preferences/000-tor-browser.js" \
1075 + || die
1076 +
1077 + # see: https://gitweb.torproject.org/builders/tor-browser-bundle.git/tree/gitian/descriptors/linux/gitian-bundle.yml?h=maint-4.0#n148
1078 + echo "pref(\"general.useragent.locale\", \"en-US\");" \
1079 + >> "${S}/${obj_dir}/dist/bin/browser/defaults/preferences/000-tor-browser.js" \
1080 + || die
1081 +
1082 + MOZ_MAKE_FLAGS="${MAKEOPTS}" \
1083 + emake DESTDIR="${D}" install
1084 +
1085 + # Install icons and .desktop for menu entry
1086 + local size sizes icon_path
1087 + sizes="16 24 32 48 256"
1088 + icon_path="${S}/browser/branding/official"
1089 + for size in ${sizes}; do
1090 + newicon -s ${size} "${icon_path}/default${size}.png" ${PN}.png
1091 + done
1092 + # The 128x128 icon has a different name
1093 + newicon -s 128 "${icon_path}/mozicon128.png" ${PN}.png
1094 + make_desktop_entry ${PN} "TorBrowser" ${PN} "Network;WebBrowser"
1095 +
1096 + # Add StartupNotify=true bug 237317
1097 + if use startup-notification ; then
1098 + echo "StartupNotify=true" \
1099 + >> "${ED}/usr/share/applications/${PN}-${PN}.desktop" \
1100 + || die
1101 + fi
1102 +
1103 + # Required in order to use plugins and even run torbrowser on hardened.
1104 + pax-mark m "${ED}"${MOZILLA_FIVE_HOME}/plugin-container
1105 + # Required in order for jit to work on hardened, as of torbroser-31
1106 + use jit && pax-mark pm "${ED}"${MOZILLA_FIVE_HOME}/{torbrowser,torbrowser-bin}
1107 +
1108 + # We dont want development files
1109 + rm -r "${ED}"/usr/include "${ED}${MOZILLA_FIVE_HOME}"/{idl,include,lib,sdk} \
1110 + || die "Failed to remove sdk and headers"
1111 +
1112 + # revdep-rebuild entry
1113 + insinto /etc/revdep-rebuild
1114 + echo "SEARCH_DIRS_MASK=${MOZILLA_FIVE_HOME}" >> ${T}/10${PN}
1115 + doins "${T}"/10${PN} || die
1116 +
1117 + # Profile without the tor-launcher extension
1118 + # see: https://trac.torproject.org/projects/tor/ticket/10160
1119 + local profile_dir="${WORKDIR}/tor-browser_en-US/Browser/TorBrowser/Data/Browser/profile.default"
1120 +
1121 + docompress -x "${EROOT}/usr/share/doc/${PF}/tor-launcher@××××××××××××××.xpi"
1122 + dodoc "${profile_dir}/extensions/tor-launcher@××××××××××××××.xpi"
1123 + rm "${profile_dir}/extensions/tor-launcher@××××××××××××××.xpi" || die "Failed to remove torlauncher extension"
1124 +
1125 + # Force remote Tor check since the control port might not be available
1126 + echo "pref(\"extensions.torbutton.local_tor_check\", false);" \
1127 + >> "${profile_dir}/preferences/extension-overrides.js" \
1128 + || die
1129 +
1130 + insinto ${MOZILLA_FIVE_HOME}/browser/defaults/profile
1131 + doins -r "${profile_dir}"/{extensions,preferences,bookmarks.html}
1132 +
1133 + # see: https://gitweb.torproject.org/builders/tor-browser-bundle.git/tree/RelativeLink/RelativeLink.sh?h=maint-4.0#n248
1134 + dodoc "${FILESDIR}/README.tor-launcher"
1135 + dodoc "${WORKDIR}/tor-browser_en-US/Browser/TorBrowser/Docs/ChangeLog.txt"
1136 +}
1137 +
1138 +pkg_preinst() {
1139 + gnome2_icon_savelist
1140 +}
1141 +
1142 +pkg_postinst() {
1143 + echo
1144 + ewarn "This patched firefox build is _NOT_ recommended by Tor upstream but uses"
1145 + ewarn "the exact same sources. Use this only if you know what you are doing!"
1146 + echo
1147 + elog "Torbrowser uses port 9150 to connect to Tor. You can change the port"
1148 + elog "in the connection settings to match your setup."
1149 + echo
1150 +
1151 + if [[ "${REPLACING_VERSIONS}" ]] && [[ "${REPLACING_VERSIONS}" < "31.2.0" ]]; then
1152 + echo
1153 + ewarn "Since this is a major upgrade, you need to start with a fresh profile."
1154 + ewarn "Either move or remove your profile in \"~/.mozilla/torbrowser/\""
1155 + ewarn "and let Torbrowser generate a new one."
1156 + echo
1157 + fi
1158 +
1159 + gnome2_icon_cache_update
1160 +}
1161 +
1162 +pkg_postrm() {
1163 + gnome2_icon_cache_update
1164 +}