Commit d55acd79 authored by anonym's avatar anonym

Rename tor-controlport-filter to onion-grater.

Refs: #12173
parent 2e7bf0d8
......@@ -45,7 +45,7 @@ systemctl enable tails-set-wireless-devices-state.service
systemctl enable tails-tor-has-bootstrapped.target
systemctl enable tails-wait-until-tor-has-bootstrapped.service
systemctl enable tails-tor-has-bootstrapped-flag-file.service
systemctl enable tor-controlport-filter.service
systemctl enable onion-grater.service
# Enable our own systemd user unit files
systemctl --global enable tails-add-GNOME-bookmarks.service
......
......@@ -4,7 +4,7 @@ Documentation=https://tails.boum.org/contribute/design/
[Service]
Type=simple
ExecStart=/usr/local/lib/tor-controlport-filter
ExecStart=/usr/local/lib/onion-grater
CapabilityBoundingSet=CAP_DAC_OVERRIDE CAP_SYS_PTRACE
PrivateDevices=yes
PrivateTmp=yes
......
......@@ -4,7 +4,7 @@
# (and their argunents) and events on a per-application basis, stored
# in:
#
# /etc/tor-controlport-filter.d/
# /etc/onion-grater.d/
#
# that are pretty self-explanatory as long as you understand the Tor
# ControlPort language. The format is expressed in YAML where the
......@@ -478,7 +478,7 @@ class FilteredControlPortProxyHandler(socketserver.StreamRequestHandler):
self.restrict_stream_events = False
self.server_address = self.server.server_address
self.subscribed_event_listeners = []
for filter_file in glob.glob('/etc/tor-controlport-filter.d/*.yml'):
for filter_file in glob.glob('/etc/onion-grater.d/*.yml'):
try:
with open(filter_file, "rb") as fh:
filters = yaml.safe_load(fh.read())
......
......@@ -406,6 +406,6 @@ python-qt4
# Provide gnome-open (used to open e.g. URLs in KeePassX, Icedove, Electrum...)
libgnome2-bin
# tor-controlport-filter
# onion-grater
python3-psutil
python3-yaml
......@@ -860,9 +860,9 @@ providers recommend and even enforce StartTLS on these ports, the effect
of these warnings were most of the time counterproductive as people had
to click through needlessly scary security warnings.
- [[!tails_gitweb_dir config/chroot_local-includes/etc/tor-controlport-filter.d/]]
- [[!tails_gitweb config/chroot_local-includes/lib/systemd/system/tor-controlport-filter.service]]
- [[!tails_gitweb config/chroot_local-includes/usr/local/lib/tor-controlport-filter]]
- [[!tails_gitweb_dir config/chroot_local-includes/etc/onion-grater.d/]]
- [[!tails_gitweb config/chroot_local-includes/lib/systemd/system/onion-grater.service]]
- [[!tails_gitweb config/chroot_local-includes/usr/local/lib/onion-grater]]
- [[!tails_gitweb config/chroot_local-includes/etc/tor/torrc]]
[[!tails_gitweb_repo onioncircuits desc="Onion Circuits"]] allows the
......
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment