[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #9868 [EFF-HTTPS Everywhere]: Stop bundling rulesets with extension, download separately instead (like ABP)
#9868: Stop bundling rulesets with extension, download separately instead (like
ABP)
--------------------------------------+-------------------
     Reporter:  micahlee              |      Owner:  pde
         Type:  enhancement           |     Status:  new
     Priority:  normal                |  Milestone:
    Component:  EFF-HTTPS Everywhere  |    Version:
   Resolution:                        |   Keywords:
Actual Points:                        |  Parent ID:  #9769
       Points:                        |
--------------------------------------+-------------------
Comment (by micahlee):
 Here's how I'm thinking of implementing this.
 I will add a new pref called
 extensions.https_everywhere.rulesets_updated_ts that contains the
 timestamp of the last ruleset update, defaulting to 0.
 I'll define a function an update_rulesets function with an optional force
 argument. If it's been either 24 hours since an update or force is true,
 it will:
 * Download the new default.rulesets file
 * Download the detached sig, default.rulesets.sig
 * Verify if the sig
 * If the sig checks out, save default.rulesets to disk and load it into
 memory
 I'll run the update_rulesets function when HTTPS Everywhere initializes,
 and also set it to run every 24 hours. If there's no default_rulesets file
 on disk I'll run it with force set to true.
 I also want to build some more UI around this. The UI should say the last
 date that the rulesets were updated with a button to force an update now.
 This could either be in the current "Enable / Disable Rules" dialog, or in
 a more generic HTTPS Everywhere preferences dialog that doesn't exist yet.
-- 
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/9868#comment:1>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs