Skip to content
GitLab
Projects
Groups
Snippets
Help
Loading...
Help
Help
Support
Community forum
Keyboard shortcuts
?
Submit feedback
Contribute to GitLab
Sign in / Register
Toggle navigation
T
tails
Project overview
Project overview
Details
Activity
Releases
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Issues
947
Issues
947
List
Boards
Labels
Service Desk
Milestones
Merge Requests
8
Merge Requests
8
CI / CD
CI / CD
Pipelines
Jobs
Schedules
Operations
Operations
Incidents
Environments
Analytics
Analytics
CI / CD
Repository
Value Stream
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Create a new issue
Jobs
Commits
Issue Boards
Open sidebar
tails
tails
Commits
552fffcd
Commit
552fffcd
authored
Oct 21, 2014
by
Tails developers
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
Separate data from unsafe-browser script.
parent
051e9e9b
Changes
4
Hide whitespace changes
Inline
Side-by-side
Showing
4 changed files
with
24 additions
and
26 deletions
+24
-26
config/chroot_local-includes/usr/local/sbin/unsafe-browser
config/chroot_local-includes/usr/local/sbin/unsafe-browser
+3
-26
config/chroot_local-includes/usr/share/tails/unsafe-browser/unsafe-browser-theme.js
...es/usr/share/tails/unsafe-browser/unsafe-browser-theme.js
+2
-0
config/chroot_local-includes/usr/share/tails/unsafe-browser/unsafe-browser.js
...includes/usr/share/tails/unsafe-browser/unsafe-browser.js
+10
-0
config/chroot_local-includes/usr/share/tails/unsafe-browser/userChrome.css
...al-includes/usr/share/tails/unsafe-browser/userChrome.css
+9
-0
No files found.
config/chroot_local-includes/usr/local/sbin/unsafe-browser
View file @
552fffcd
...
...
@@ -90,22 +90,12 @@ configure_chroot () {
BROWSER_PREFS
=
"
${
BROWSER_PROFILE
}
"
/preferences/prefs.js
mkdir
-p
"
$(
dirname
"
${
BROWSER_PREFS
}
"
)
"
cp
/usr/share/tails/unsafe-browser/unsafe-browser.js
"
${
BROWSER_PREFS
}
"
# Localization
BEST_LOCALE
=
"
$(
guess_best_tor_browser_locale
)
"
configure_xulrunner_app_locale
"
${
BROWSER_PROFILE
}
"
"
${
BEST_LOCALE
}
"
# Disable proxying in the chroot
echo
'pref("network.proxy.type", 0);'
>>
"
${
BROWSER_PREFS
}
"
echo
'pref("network.proxy.socks_remote_dns", false);'
>>
"
${
BROWSER_PREFS
}
"
# Prevent File -> Print or CTRL+P from causing the browser to hang
# for several minutes while trying to communicate with CUPS, since
# access to port 631 isn't allowed through.
echo
'pref("print.postscript.cups.enabled", false);'
>>
"
${
BROWSER_PREFS
}
"
# Hide "Get Addons" in Add-ons manager
echo
'user_pref("extensions.getAddons.showPane", false);'
>>
"
${
BROWSER_PREFS
}
"
# Set the name (e.g. window title) of the browser
set_chroot_browser_name
${
CHROOT
}
"
`
gettext
\"
Unsafe Browser
\"
`
"
"
${
BEST_LOCALE
}
"
...
...
@@ -114,17 +104,7 @@ configure_chroot () {
"
${
BROWSER_PREFS
}
"
BROWSER_CHROME
=
"
${
BROWSER_PROFILE
}
/chrome/userChrome.css"
mkdir
-p
"
$(
dirname
"
${
BROWSER_CHROME
}
"
)
"
cat
>
${
BROWSER_CHROME
}
<<
EOF
/* Required, do not remove */
@namespace url("http://www.mozilla.org/keymaster/gatekeeper/there.is.only.xul");
/* Hide TorBrowser Health Report and its configuration option */
#appmenu_healthReport,
#dataChoicesTab,
#healthReport
{display: none !important}
EOF
cp
/usr/share/tails/unsafe-browser/userChrome.css
${
BROWSER_CHROME
}
# Remove all bookmarks
rm
-f
${
CHROOT
}
/
"
${
TBB_PROFILE
}
"
/bookmarks.html
...
...
@@ -138,10 +118,7 @@ EOF
# we may run below requires that the browser profile is writable
# by the user running the script (i.e. clearnet).
if
[
-z
"
${
CAMOUFLAGE
}
"
]
;
then
cat
>>
"
${
BROWSER_PREFS
}
"
<<
EOF
pref("lightweightThemes.isThemeSelected", true);
pref("lightweightThemes.usedThemes", "[{
\"
id
\"
:
\"
1
\"
,
\"
name
\"
:
\"
Unsafe Browser
\"
,
\"
headerURL
\"
:
\"
file:///usr/share/pixmaps/red_dot.png
\"
,
\"
footerURL
\"
:
\"
file:///usr/share/pixmaps/red_dot.png
\"
,
\"
textcolor
\"
:
\"
#FFFFFF
\"
,
\"
accentcolor
\"
:
\"
#CC0000
\"
,
\"
updateDate
\"
:0,
\"
installDate
\"
:0}]");
EOF
cat
/usr/share/tails/unsafe-browser/unsafe-browser-theme.js
>>
"
${
BROWSER_PREFS
}
"
else
# The camouflage activation script requires a dbus server for
# properly configuring GNOME, so we start one in the chroot
...
...
config/chroot_local-includes/usr/share/tails/unsafe-browser/unsafe-browser-theme.js
0 → 100644
View file @
552fffcd
pref
(
"
lightweightThemes.isThemeSelected
"
,
true
);
pref
(
"
lightweightThemes.usedThemes
"
,
"
[{
\"
id
\"
:
\"
1
\"
,
\"
name
\"
:
\"
Unsafe Browser
\"
,
\"
headerURL
\"
:
\"
file:///usr/share/pixmaps/red_dot.png
\"
,
\"
footerURL
\"
:
\"
file:///usr/share/pixmaps/red_dot.png
\"
,
\"
textcolor
\"
:
\"
#FFFFFF
\"
,
\"
accentcolor
\"
:
\"
#CC0000
\"
,
\"
updateDate
\"
:0,
\"
installDate
\"
:0}]
"
);
config/chroot_local-includes/usr/share/tails/unsafe-browser/unsafe-browser.js
0 → 100644
View file @
552fffcd
// Disable proxying in the chroot
pref
(
"
network.proxy.type
"
,
0
);
pref
(
"
network.proxy.socks_remote_dns
"
,
false
);
/* Prevent File -> Print or CTRL+P from causing the browser to hang
for several minutes while trying to communicate with CUPS, since
access to port 631 isn't allowed through. */
pref
(
"
print.postscript.cups.enabled
"
,
false
);
// Hide "Get Addons" in Add-ons manager
user_pref
(
"
extensions.getAddons.showPane
"
,
false
);
config/chroot_local-includes/usr/share/tails/unsafe-browser/userChrome.css
0 → 100644
View file @
552fffcd
/* Required, do not remove */
@namespace
url("http://www.mozilla.org/keymaster/gatekeeper/there.is.only.xul")
;
/* Hide TorBrowser Health Report and its configuration option */
#appmenu_healthReport
,
#dataChoicesTab
,
#healthReport
{
display
:
none
!important
}
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
.
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment