The TorBrowser.app directory is distributed in the macOS disk image with permissions set to 0750. When it is copied to /Applications, the Finder sets the user to the admin user that did the copy, and the group to 'admin'.
This means that non-admin users can't read or execute Tor Browser.
Historically, this was a feature, because potentially sensitive Tor Browser data was stored in the application bundle. But now that data is stored in ~/Library/Application Support or next to the app, it's a bug.
To upload designs, you'll need to enable LFS and have an admin enable hashed storage. More information
Child items ...
Show closed items
Linked items 0
Link issues together to show that they're related.
Learn more.
Kathy and I were able to reproduce this bug. As you point out, it should be fine to allow rx permission to "other." Doing something like:
chmod -R o+rX TorBrowser.app
during our packaging should fix this problem.
Kathy and I were able to reproduce this bug. As you point out, it should be fine to allow rx permission to "other." Doing something like:
chmod -R o+rX TorBrowser.app
during our packaging should fix this problem.
I am fine taking a fix for the next alpha (alpha because I'd like to test it with an update first and see what is happening).
Unfortunately, we could not reproduce the original problem in the test builds that Kathy and I made. We are not sure why not. Is it possible that a repackaging step that occurs after the initial dmg is produced is changing file permissions somehow, e.g., during OSX code signing?
Trac: Status: assigned to needs_review Keywords: TorBrowserTeam201705 deleted, TorBrowserTeam201705R added
Hm, maybe. The patch looks good to me, though, and I took it for master (commit f27d2cab4ed80a4c7b4f594b593b6b90f6148a82). I'll close the ticket for now and keep an eye on this while signing. I doubt I get to a test signature before building the alphas. If there is indeed an issue with the signing setup I hope I can fix it ad hoc.
Trac: Status: needs_review to closed Resolution: N/Ato fixed
Unfortunately, the file permissions in the final 7.0a4 disk images are still incorrect:
ls -ld /Volumes/Tor\ Browser/TorBrowser.appdrwxr-x--- 3 user staff 2048 Apr 19 05:15 /Volumes/Tor Browser/TorBrowser.app/ls -l /Volumes//Tor\ Browser/TorBrowser.app/Contents/MacOS/firefox-rwxr-x--- 1 user staff 28256 May 15 04:27 /Volumes//Tor Browser/TorBrowser.app/Contents/MacOS/firefox*
Interestingly, the files within the complete mar do have the correct mode, e.g., 755 for Contents/MacOS/firefox. Where are the post-gitian build release procedures documented? I cannot find the page.
Trac: Status: closed to reopened Resolution: fixed toN/A
As I implied in comment:6, files within the disk images produced by my own gitian-based build have the correct mode. But maybe you are suggesting that ddmg.sh is run a second time (e.g., during the code signing process) without DATA_OUTSIDE_APP_DIR=1.
As I implied in comment:6, files within the disk images produced by my own gitian-based build have the correct mode. But maybe you are suggesting that ddmg.sh is run a second time (e.g., during the code signing process) without DATA_OUTSIDE_APP_DIR=1.
That's indeed what is happening and the culprit here. I'll fix that in my signing script. Do we want to keep the tor-browser-bundle patch in, though?
Trac: Cc: brade, mcs, gk to brade, mcs, gk, boklm Status: reopened to needs_information
Done with commit 082738a4bd83943d97e084fa04045e481772b998 on master. The problem was I only did export DATA_OUTSIDE_APP_DIR. :( boklm: if you need to adapt your scripts, now would be a properly fine time to do so. :)
Trac: Resolution: N/Ato fixed Status: needs_revision to closed