[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#771588: marked as done (unblock: https-everywhere/4.0.2-3)



Your message dated Sun, 30 Nov 2014 23:25:51 +0100
with message-id <547B996F.5070302@thykier.net>
and subject line Re: Bug#771588: unblock: https-everywhere/4.0.2-3
has caused the Debian Bug report #771588,
regarding unblock: https-everywhere/4.0.2-3
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
771588: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=771588
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Package: release.debian.org
Severity: normal
User: release.debian.org@packages.debian.org
Usertags: unblock

Please unblock package https-everywhere

https-everywhere (4.0.2-3) unstable; urgency=medium

  * forgotten bug closer in previous changelog entry
  * add Bug-Debian to no-unconditional-FAQ-load.patch description

 -- Damyan Ivanov <dmn@debian.org>  Fri, 28 Nov 2014 09:59:35 +0000

https-everywhere (4.0.2-2) unstable; urgency=medium

  * Team upload

  * Patch src/chrome/content/toolbar_button.js to make loading of the FAQ
    require user action.
    When run for the first time, the addon shows a notification bar.
    Closing that bar loads the HTTPS-everywhere FAQ from the authors' site.
    This is a privacy breach. This patch requires pressing a 'FAQ…' button
    before loading the remote page.
    Closes: #771286

 -- Damyan Ivanov <dmn@debian.org>  Fri, 28 Nov 2014 09:31:54 +0000

This is similar in spirit with the unblock for greasemonkey/2.2-2, tracked in 
#771242.

The changes add a patch requires that the user presses a button in order to 
load the remote page, and just cdismissing the notification does nothing.

Patch attached, as well as a debdiff against 4.0.2-1 in Jessie.

unblock https-everywhere/4.0.2-3


Thanks,
    dam

-- System Information:
Debian Release: jessie/sid
  APT prefers stable-updates
  APT policy: (500, 'stable-updates'), (500, 'unstable'), (500, 'stable'), (1, 'experimental')
Architecture: amd64 (x86_64)

Kernel: Linux 3.16.0-4-amd64 (SMP w/4 CPU cores)
Locale: LANG=bg_BG.UTF-8, LC_CTYPE=bg_BG.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Description: load FAQ after install only if requested
 The first time the browser is started after installing 
 xul-ext-https-everywhere, a notification bar is shown, informing of 
 the fact that some https enforcement is active and pointing to the 
 toolbar button for options.
 .
 What is bad about that is that when the notification is dismissed, the 
 browser is forced to open https://www.eff.org/https-everywhere/faq
 .
 This is a privacy breach, as it informs the authors (and user's ISP) 
 that there is a new installation of https-everywhere.
 .
 The attached patch adds a dedicated button to the notification bar. 
 Pressing that button loads the FAQ page as before, and just dismissing 
 the notification bar does nothing. In other words, it makes the user 
 *request* the FAQ before loading it.
Author: Damyan Ivanov <dmn@debian.org>
Forwarded: https://github.com/EFForg/https-everywhere/issues/769
Bug-Debian: https://bugs.debian.org/771286

--- a/src/chrome/content/toolbar_button.js
+++ b/src/chrome/content/toolbar_button.js
@@ -122,11 +122,15 @@ httpsEverywhere.toolbarButton = {
         'https-everywhere', 
         'chrome://https-everywhere/skin/https-everywhere-24.png', 
         nBox.PRIORITY_WARNING_MEDIUM,
-	[],
-	function(action) {
-	  // see https://developer.mozilla.org/en-US/docs/XUL/Method/appendNotification#Notification_box_events
-	  gBrowser.selectedTab = gBrowser.addTab(faqURL);
-	}
+        [
+            {   accessKey: 'F',
+                callback: function(ntf, btn) {
+                    // see https://developer.mozilla.org/en-US/docs/XUL/Method/appendNotification#Notification_box_events
+                    gBrowser.selectedTab = gBrowser.addTab(faqURL);
+                },
+                label: 'FAQ…',
+            }
+        ]
       );
     }
     gBrowser.removeEventListener("DOMContentLoaded", tb.handleShowHint, true);
diff -Nru https-everywhere-4.0.2/debian/changelog https-everywhere-4.0.2/debian/changelog
--- https-everywhere-4.0.2/debian/changelog	2014-10-17 01:29:13.000000000 +0300
+++ https-everywhere-4.0.2/debian/changelog	2014-11-28 12:00:13.000000000 +0200
@@ -1,3 +1,24 @@
+https-everywhere (4.0.2-3) unstable; urgency=medium
+
+  * forgotten bug closer in previous changelog entry
+  * add Bug-Debian to no-unconditional-FAQ-load.patch description
+
+ -- Damyan Ivanov <dmn@debian.org>  Fri, 28 Nov 2014 09:59:35 +0000
+
+https-everywhere (4.0.2-2) unstable; urgency=medium
+
+  * Team upload
+
+  * Patch src/chrome/content/toolbar_button.js to make loading of the FAQ
+    require user action.
+    When run for the first time, the addon shows a notification bar.
+    Closing that bar loads the HTTPS-everywhere FAQ from the authors' site.
+    This is a privacy breach. This patch requires pressing a 'FAQ…' button
+    before loading the remote page.
+    Closes: #771286
+
+ -- Damyan Ivanov <dmn@debian.org>  Fri, 28 Nov 2014 09:31:54 +0000
+
 https-everywhere (4.0.2-1) unstable; urgency=low
 
   * New upstream release.
diff -Nru https-everywhere-4.0.2/debian/patches/no-unconditional-FAQ-load.patch https-everywhere-4.0.2/debian/patches/no-unconditional-FAQ-load.patch
--- https-everywhere-4.0.2/debian/patches/no-unconditional-FAQ-load.patch	1970-01-01 02:00:00.000000000 +0200
+++ https-everywhere-4.0.2/debian/patches/no-unconditional-FAQ-load.patch	2014-11-28 11:58:21.000000000 +0200
@@ -0,0 +1,43 @@
+Description: load FAQ after install only if requested
+ The first time the browser is started after installing 
+ xul-ext-https-everywhere, a notification bar is shown, informing of 
+ the fact that some https enforcement is active and pointing to the 
+ toolbar button for options.
+ .
+ What is bad about that is that when the notification is dismissed, the 
+ browser is forced to open https://www.eff.org/https-everywhere/faq
+ .
+ This is a privacy breach, as it informs the authors (and user's ISP) 
+ that there is a new installation of https-everywhere.
+ .
+ The attached patch adds a dedicated button to the notification bar. 
+ Pressing that button loads the FAQ page as before, and just dismissing 
+ the notification bar does nothing. In other words, it makes the user 
+ *request* the FAQ before loading it.
+Author: Damyan Ivanov <dmn@debian.org>
+Forwarded: https://github.com/EFForg/https-everywhere/issues/769
+Bug-Debian: https://bugs.debian.org/771286
+
+--- a/src/chrome/content/toolbar_button.js
++++ b/src/chrome/content/toolbar_button.js
+@@ -122,11 +122,15 @@ httpsEverywhere.toolbarButton = {
+         'https-everywhere', 
+         'chrome://https-everywhere/skin/https-everywhere-24.png', 
+         nBox.PRIORITY_WARNING_MEDIUM,
+-	[],
+-	function(action) {
+-	  // see https://developer.mozilla.org/en-US/docs/XUL/Method/appendNotification#Notification_box_events
+-	  gBrowser.selectedTab = gBrowser.addTab(faqURL);
+-	}
++        [
++            {   accessKey: 'F',
++                callback: function(ntf, btn) {
++                    // see https://developer.mozilla.org/en-US/docs/XUL/Method/appendNotification#Notification_box_events
++                    gBrowser.selectedTab = gBrowser.addTab(faqURL);
++                },
++                label: 'FAQ…',
++            }
++        ]
+       );
+     }
+     gBrowser.removeEventListener("DOMContentLoaded", tb.handleShowHint, true);
diff -Nru https-everywhere-4.0.2/debian/patches/series https-everywhere-4.0.2/debian/patches/series
--- https-everywhere-4.0.2/debian/patches/series	2014-10-17 01:29:13.000000000 +0300
+++ https-everywhere-4.0.2/debian/patches/series	2014-11-28 10:17:31.000000000 +0200
@@ -3,3 +3,4 @@
 use-newer-timestamp-date.patch
 make-clean.patch
 use-recorded-upstream-commit-id.patch
+no-unconditional-FAQ-load.patch

--- End Message ---
--- Begin Message ---
On 2014-11-30 22:56, Damyan Ivanov wrote:
> Package: release.debian.org
> Severity: normal
> User: release.debian.org@packages.debian.org
> Usertags: unblock
> 
> Please unblock package https-everywhere
> 
> [...]
> 
> This is similar in spirit with the unblock for greasemonkey/2.2-2, tracked in 
> #771242.
> 
> The changes add a patch requires that the user presses a button in order to 
> load the remote page, and just cdismissing the notification does nothing.
> 
> Patch attached, as well as a debdiff against 4.0.2-1 in Jessie.
> 
> unblock https-everywhere/4.0.2-3
> 
> 
> Thanks,
>     dam
> 
> [...]

Unblocked, thanks.

~Niels

--- End Message ---

Reply to: