- 24 Jun, 2022 1 commit
-
-
shelikhoo authored
-
- 16 Jun, 2022 1 commit
-
-
shelikhoo authored
-
- 24 Mar, 2022 2 commits
-
-
- 23 Mar, 2022 1 commit
-
-
- 19 Mar, 2022 2 commits
- 27 Jan, 2022 2 commits
-
-
Cecylia Bocovich authored
-
Cecylia Bocovich authored
Make sure we close the data channel and peer connection created for our NAT check, regardless of the outcome.
-
- 03 Nov, 2021 2 commits
-
-
Arlo Breault authored
For the chrome://extensions page. Fixes #33
-
Arlo Breault authored
This used to be required for Chrome and Firefox to interoperate a long time but is deprecated and being removed, https://bugs.chromium.org/p/chromium/issues/detail?id=804275 Chrome was complaining, "The constraint "DtlsSrtpKeyAgreement" will be removed. You have specified a "true" value for this constraint, which has no effect, but you can remove this constraint for tidiness."
-
- 14 Oct, 2021 1 commit
-
-
Cecylia Bocovich authored
It's still the case that torproject.net can be blocked on residential or public networks, so we're going with the safer freehaven.net domain.
-
- 06 Aug, 2021 3 commits
-
-
Arlo Breault authored
`window` isn't defined in service workers
-
Arlo Breault authored
They've been removed, https://www.chromestatus.com/feature/6485681910054912 Chrome was raising a warning, "RTP data channels are no longer supported. The "RtpDataChannels" constraint is currently ignored, and may cause an error at a later date."
-
Arlo Breault authored
Addresses vulns in subdependencies that `npm audit` was complaining about, https://github.com/npm/node-tar/security/advisories/GHSA-r628-mhmh-qjhw
-
- 30 Jul, 2021 1 commit
-
-
Cecylia Bocovich authored
It looks like there have been several browser security improvements to prevent CSRF attacks. Chrome and Firefox now require cross-site cookies to have the secure and samesite attributes set. https://developer.mozilla.org/en-US/docs/Web/HTTP/Cookies#samesite_attribute https://www.chromium.org/updates/same-site
-
- 21 Jul, 2021 2 commits
-
-
meskio authored
This clients variable was never updated. The actual counter of clients is the length of Snowflake.proxyPairs, wich is used in other places to check that we are not exceeding the maximum number of clients.
-
meskio authored
Client number is rounded down to 8. Currently the webextension doesn't support more than one client, and the client counter is actually never updated internally. So this code effectively always returns 0. Related to snowflake#40048
-
- 15 Jul, 2021 2 commits
-
-
Arlo Breault authored
From https://github.com/advisories/GHSA-6fc8-4gx4-v693 Only affects ws servers, which aren't used here so a release isn't necessary. The breaking changes between major versions 3 - 5 seem fine.
-
Arlo Breault authored
For https://github.com/advisories/GHSA-ww39-953v-wcq6 Only affects a dev dependency.
-
- 14 Jul, 2021 1 commit
-
-
Cecylia Bocovich authored
-
- 14 May, 2021 3 commits
-
-
Arlo Breault authored
There's a low severity vuln in one of cldr's deps that needs updating. The major version bump of cldr is because it drops support for node.js v8, which is EOL.
-
Arlo Breault authored
The dependencies are packages used in the shim while the node version of the proxy is running. cldr is only used when running the build script. This was done with `npm i cldr --save-dev`
-
Arlo Breault authored
-
- 12 Apr, 2021 1 commit
-
-
Cecylia Bocovich authored
-
- 19 Mar, 2021 1 commit
-
-
Cecylia Bocovich authored
-
- 12 Feb, 2021 1 commit
-
-
Arlo Breault authored
Part of #7
-
- 05 Feb, 2021 6 commits
-
-
Arlo Breault authored
On the next line 'en_US' is pushed unconditionally. Part of #12 We can always remove this if transifex is ever updated to stop producing these unnecessary translations.
-
Arlo Breault authored
This consolidates it from either a Set or an object literal to just a Map in all cases.
-
Arlo Breault authored
-
Arlo Breault authored
-
Arlo Breault authored
Fixes #21
-
David Fifield authored
-
- 27 Jan, 2021 1 commit
-
-
Cecylia Bocovich authored
-
- 25 Jan, 2021 1 commit
-
-
Cecylia Bocovich authored
-
- 21 Jan, 2021 4 commits
-
-
Cecylia Bocovich authored
This fixes two bugs in the NAT update process: - one bug wasn't updating the NAT type we advertize to the broker - one bug passed an already evaluated function to setTimeout
-
Cecylia Bocovich authored
-
Cecylia Bocovich authored
Only set the NAT type to restricted after we fail to connect to a restricted client 3 times in a row.
-
Cecylia Bocovich authored
If a previous NAT check has succeeded and we fail to contact the probe server, do not set the NAT type to unknown. Most proxies will probably not change their NAT type frequently, so this will prevent an outage of the probe service from wiping out our unrestricted proxy pool.
-
- 14 Jan, 2021 1 commit
-
-
Arlo Breault authored
Fixes #18
-