You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Run the latest code and rulesets in a standalone Chromium profile:
20
24
21
25
bash test/chromium.sh --justrun
22
26
27
+
Run the latest code and rulesets in a standalone Tor Browser profile:
28
+
29
+
bash test/tor path_to_tor_browser.tar.xz
30
+
23
31
Build the Firefox extension as a .xpi package:
24
32
25
33
bash makexpi.sh
@@ -58,58 +66,9 @@ Important directories you might want to know about
58
66
59
67
test/ The tests live here
60
68
69
+
util/ Various utilities
70
+
61
71
Hacking on the Source Code
62
72
--------------------------
63
73
64
-
The current stable release series is 5.2. The maintainers release new versions
65
-
off the current master branch about every two weeks.
66
-
67
-
To submit changes, either use pull requests on GitHub or email patches to
68
-
https-everywhere-rulesets@lists.eff.org (rulesets) or
69
-
https-everywhere@lists.eff.org (code).
70
-
71
-
### Writing rulesets
72
-
73
-
HTTPS Everywhere consists of a large number of rules for switching sites from HTTP to HTTPS. You can read more about how to write these rules here: https://www.eff.org/https-everywhere/rulesets
74
-
75
-
If you want to create new rules to submit to us, we expect them to be in the src/chrome/content/rules directory. That directory also contains a useful script, make-trivial-rule, to create a simple rule for a specified domain. There is also a script called trivial-validate.py, to check all the pending rules for several common errors and oversights. For example, if you wanted to make a rule for the example.com domain, you could run
76
-
77
-
bash ./make-trivial-rule example.com
78
-
79
-
inside the rules directory. This would create Example.com.xml, which you could then take a look at and edit based on your knowledge of any specific URLs at example.com that do or don't work in HTTPS. You should then run
80
-
81
-
bash test.sh
82
-
83
-
to make sure that your rule is free of common mistakes.
84
-
85
-
### Writing translations
86
-
87
-
If you would like to help translate HTTPS Everywhere into your language,
88
-
you can do that through the Tor Project's Transifex page:
89
-
https://www.transifex.com/projects/p/torproject/.
90
-
91
-
### Bug trackers and mailing lists
92
-
93
-
We currently have two bug trackers. The one on GitHub (https://github.com/EFForg/https-everywhere/issues) is recommended because it gets checked more frequently and has a friendlier user interface. The one on trac.torproject.org (https://trac.torproject.org/projects/tor/report/19) has a large backlog of bugs at this point, but it has the advantage of allowing you to post bugs anonymously using the "cypherpunks" / "writecode" account. (Note that you won't see replies unless you put an email address in the CC field.)
94
-
95
-
We have two publicly-archived mailing lists: the https-everywhere list (https://lists.eff.org/mailman/listinfo/https-everywhere) is for discussing the project as a whole, and the https-everywhere-rulesets list (https://lists.eff.org/mailman/listinfo/https-everywhere-rules) is for discussing the rulesets and their contents, including patches and git pull requests.
96
-
97
-
Tests
98
-
-------------
99
-
100
-
There are some very basic unittests under test/. These are run with
101
-
102
-
bash test.sh
103
-
104
-
Please help write more unittests and integration tests!
105
-
106
-
There are also ruleset tests, which aim to find broken rulesets by actually
107
-
loading URLs in a browser and watching for Mixed Content Blocking to fire.
108
-
The easiest way to run ruleset tests is to load a standalone Firefox instance
109
-
with the tests enabled:
110
-
111
-
bash test/firefox.sh --justrun
112
-
113
-
Then click the HTTPS Everywhere icon on the toolbar, and click "Run HTTPS
114
-
Everywhere Ruleset Tests." When you run the tests, be prepared to let your
115
-
computer run them for a really long time.
74
+
Please refer to our [contributing](CONTRIBUTING.md) document to contribute to the project.
Copy file name to clipboardExpand all lines: docs/faq.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -29,7 +29,7 @@ You can also report the problem to the site, since they have the power to fix it
29
29
30
30
### [Why is HTTPS Everywhere preventing me from joining this hotel/school/other wireless network?](#why-is-https-everywhere-preventing-me-from-joining-this-hotelschoolother-wireless-network)
31
31
32
-
Some wireless networks hijack your HTTP connections when you first join them, in order to demand authentication or simply to try to make you agree to terms of use. HTTPS pages are protected against this type of hijacking, which is as it should be. If you go to a website that isn't protected by HTTPS Everywhere (currently, nytimes.com is one such site) that will allow your connection to be captured and redirected to the authentication or terms of use page.
32
+
Some wireless networks hijack your HTTP connections when you first join them, in order to demand authentication or simply to try to make you agree to terms of use. HTTPS pages are protected against this type of hijacking, which is as it should be. If you go to a website that isn't protected by HTTPS Everywhere or by HSTS (currently, example.com is one such site), that will allow your connection to be captured and redirected to the authentication or terms of use page.
33
33
34
34
### [Will there be a version of HTTPS Everywhere for IE, Safari, or some other browser?](#will-there-be-a-version-of-https-everywhere-for-ie-safari-or-some-other-browser)
0 commit comments