-
Notifications
You must be signed in to change notification settings - Fork 114
Commits on Jul 6, 2018
-
Configuration menu - View commit details
-
Copy full SHA for 3c49f14 - Browse repository at this point
Copy the full SHA 3c49f14View commit details -
Configuration menu - View commit details
-
Copy full SHA for 3c4b47b - Browse repository at this point
Copy the full SHA 3c4b47bView commit details -
Configuration menu - View commit details
-
Copy full SHA for 207975d - Browse repository at this point
Copy the full SHA 207975dView commit details -
Make sure tor process is launched before finishing browser context
construciton. There will be a utility process responsible for launching tor and monitor it by mojo tor launcher service
Configuration menu - View commit details
-
Copy full SHA for f4b2b29 - Browse repository at this point
Copy the full SHA f4b2b29View commit details -
Use pipe hack to notify browser process that tor process has terminated
When browser process receives notification, it will relaunch tor process
Configuration menu - View commit details
-
Copy full SHA for 3a37921 - Browse repository at this point
Copy the full SHA 3a37921View commit details -
Only handle child core dump or be terminated by signal or exit.
Also set read pipe socket to blocking mode
Configuration menu - View commit details
-
Copy full SHA for 06873bb - Browse repository at this point
Copy the full SHA 06873bbView commit details -
Configuration menu - View commit details
-
Copy full SHA for 4ca20e9 - Browse repository at this point
Copy the full SHA 4ca20e9View commit details -
Configuration menu - View commit details
-
Copy full SHA for a9dec23 - Browse repository at this point
Copy the full SHA a9dec23View commit details -
Configuration menu - View commit details
-
Copy full SHA for a06ff8d - Browse repository at this point
Copy the full SHA a06ff8dView commit details -
Configuration menu - View commit details
-
Copy full SHA for 6e5096f - Browse repository at this point
Copy the full SHA 6e5096fView commit details -
Configuration menu - View commit details
-
Copy full SHA for ed092ca - Browse repository at this point
Copy the full SHA ed092caView commit details -
Configuration menu - View commit details
-
Copy full SHA for a0c005f - Browse repository at this point
Copy the full SHA a0c005fView commit details -
Configuration menu - View commit details
-
Copy full SHA for 80a8283 - Browse repository at this point
Copy the full SHA 80a8283View commit details -
Configuration menu - View commit details
-
Copy full SHA for bb6efb2 - Browse repository at this point
Copy the full SHA bb6efb2View commit details -
Inherits web requests handlers from default parition
fix brave/browser-laptop#14021 Auditors: @bridiver, @jumde
Configuration menu - View commit details
-
Copy full SHA for 579d7d2 - Browse repository at this point
Copy the full SHA 579d7d2View commit details -
Configuration menu - View commit details
-
Copy full SHA for 9b7ab85 - Browse repository at this point
Copy the full SHA 9b7ab85View commit details -
Configuration menu - View commit details
-
Copy full SHA for b79be43 - Browse repository at this point
Copy the full SHA b79be43View commit details -
Configuration menu - View commit details
-
Copy full SHA for ee12072 - Browse repository at this point
Copy the full SHA ee12072View commit details -
Configuration menu - View commit details
-
Copy full SHA for 92cc9e2 - Browse repository at this point
Copy the full SHA 92cc9e2View commit details -
Configuration menu - View commit details
-
Copy full SHA for 3a07530 - Browse repository at this point
Copy the full SHA 3a07530View commit details -
Configuration menu - View commit details
-
Copy full SHA for bc12974 - Browse repository at this point
Copy the full SHA bc12974View commit details -
Put the control auth cookie in the watch directory too.
This is necessary because there is an unfortunate ordering issue with tor startup: it writes the control port first, and then the auth cookie, but we need both in order to connect to the control port. And it doesn't delete the auth cookie, so it can get stale. Hence we need to monitor writes to the auth cookie too.
Configuration menu - View commit details
-
Copy full SHA for bef8c90 - Browse repository at this point
Copy the full SHA bef8c90View commit details -
Configuration menu - View commit details
-
Copy full SHA for 1d26b72 - Browse repository at this point
Copy the full SHA 1d26b72View commit details -
Use network delegate to intercept every requests and apply proxy config
fix brave/browser-laptop#14390 Auditors: @bridiver, @riastradh-brave
Configuration menu - View commit details
-
Copy full SHA for 1588b13 - Browse repository at this point
Copy the full SHA 1588b13View commit details -
Propagate off-the-recordness to URL request context.
This is necessary because we use `persist:tor' since for hysterical raisins there's only one normal `private' partition with in_memory_ = true. We use the virtual method IsOffTheRecord() to discriminate instead. Fixes #608. Fixes brave/browser-laptop#14392. Auditors: @darkdh
Configuration menu - View commit details
-
Copy full SHA for 756c3ca - Browse repository at this point
Copy the full SHA 756c3caView commit details -
Configuration menu - View commit details
-
Copy full SHA for 982d067 - Browse repository at this point
Copy the full SHA 982d067View commit details -
Export Session.relaunchTor API which will terminate current tor process
and launch new one with same arguments Auditors: @riastradh-brave, @diracdeltas
Configuration menu - View commit details
-
Copy full SHA for 86b4d81 - Browse repository at this point
Copy the full SHA 86b4d81View commit details -
Export Session.setTorLauncherCallback((result, pid) =>{...}) and Sess…
…ion.getTorPid() NOTE: Use setTorLauncherCallback right after Session.fromPartition for tor browser context if you want to get pid after launch Auditors: @riastradh-brave, @diracdeltas
Configuration menu - View commit details
-
Copy full SHA for 53efe51 - Browse repository at this point
Copy the full SHA 53efe51View commit details -
Retire tor circuit isolation key only when it is about to be used
because we don't want to spend extra cycles to keep track of expired keys fix #611 Auditors: @riastradh-brave
Configuration menu - View commit details
-
Copy full SHA for 5657527 - Browse repository at this point
Copy the full SHA 5657527View commit details -
Use a priority queue to expire all >10min-old tor circuit records.
Don't just expire any old entries for the site we're browsing -- that may leave lots of other ones around in memory.
Configuration menu - View commit details
-
Copy full SHA for fbf2a29 - Browse repository at this point
Copy the full SHA fbf2a29View commit details -
Use a timer to expire circuits promptly.
The timer is scheduled to run ten minutes after the last circuit that was created. This way, the last ten minutes of circuits are not guaranteed to stick around in memory indefinitely. Caveat: This doesn't _zero_ the memory, so it may still appear in `strings /proc/N/mem`. But it does make the memory available to be recycled, so it's not _guaranteed_ to still appear in `strings /proc/N/mem`. Also, timestamp the map entries. If we explicitly create a new map entry for a site by requesting a new identity, the old expiry queue entry will not delete it, but a new expiry queue entry will delete it. This way, circuits created by requesting a new identity are not shorter-lived than other circuits. We leave the old entries in the priority queue because there's no convenient way to delete them with std::priority_queue. In principle, this might leak space if you repeatedly request a new identity, but it can only leak as much space as you use by repeatedly requesting a new identity for a maximum of ten minutes. fix #611 real good this time Auditors: @darkdh Test Plan: 1. Search DDG for `what is my ip address'. 2. Record the IP address it reports. 3. Reload. 4. Confirm it's the same IP address. 5. Full-reload. 6. Confirm it's a different IP address. Record the new IP address. 7. Wait >10min. 8. Reload. 9. Confirm it's a different IP address again.
Configuration menu - View commit details
-
Copy full SHA for c59eec1 - Browse repository at this point
Copy the full SHA c59eec1View commit details
Commits on Jul 12, 2018
-
Configuration menu - View commit details
-
Copy full SHA for 1ee6a7f - Browse repository at this point
Copy the full SHA 1ee6a7fView commit details -
Prevent
SuicideOnChannelErrorFilter
to be added to tor_launcher uti……lity process fix brave/browser-laptop#14636 SuicideOnChannelErrorFilter calls exit in OnChannelError() this will cause other endpoints listener can't finish their cleanup when pipe error happens(browser process crashed or be killed) and SuicideOnChannelErrorFilter::OnChannelError happens to be called before others. This should be fine for most of the cases but not tor_launcher service. `TorLauncher` requires StrongBinding::OnConnectionError to delete itself so that `~TorLauncher` will get called and terminate tor process. This should only happens on MacOS, SuicideOnChannelErrorFilter is guarded by OS_POSIX and Linux has `prctl(PR_SET_PDEATHSIG, SIGKILL)` so tor process will receive SIGKILL when tor_launcher utility process terminates prematurely Auditors: @riastradh-brave, @bridiver, @bbondy
Configuration menu - View commit details
-
Copy full SHA for 24d5346 - Browse repository at this point
Copy the full SHA 24d5346View commit details
Commits on Jul 14, 2018
-
Use new site instance for SessionStorageNamespaceImpl clone when open…
…er_suppressed(noopener) specified because WebContentsImpl::CreateNewWindow will use target_url as new site instance The problem was cloning original site instance cause the inconsistency between original partition and target partition because tor browser context enforce isolation storage so every different site has its own storage partition fix brave/browser-laptop#14392 Test Plan: 1. Open tor tab 2. Visit site contains rel="noopener" href (https://jsfiddle.net/dqokhmsg/) 3. Click the link 4. Brave shouldn't crash Auditors: @bridiver, @bbondy
Configuration menu - View commit details
-
Copy full SHA for 65872a4 - Browse repository at this point
Copy the full SHA 65872a4View commit details
Commits on Jul 17, 2018
-
Merge pull request #631 from brave/tor_cleanup
Prevent `SuicideOnChannelErrorFilter` to be added to tor_launcher utility process
Configuration menu - View commit details
-
Copy full SHA for fb9327a - Browse repository at this point
Copy the full SHA fb9327aView commit details
Commits on Jul 18, 2018
-
Merge pull request #632 from brave/noopener_check
Use new site instance for SessionStorageNamespaceImpl clone when opener_suppressed(noopener) specified
Configuration menu - View commit details
-
Copy full SHA for 0ef0d3c - Browse repository at this point
Copy the full SHA 0ef0d3cView commit details