tor-browser

The Tor Browser
git clone https://git.dasho.dev/tor-browser.git
Log | Files | Refs | README | LICENSE

index.md (3377B)


Project Administration

This section documents all the information necessary to administer the infrastructure which makes the project possible.

Tooling

.. toctree::
   :titlesonly:

   ../README
   /tools/wptrunner/README.rst
   /tools/wptserve/docs/index.rst
   pywebsocket3

.. toctree::
   :hidden:

   ../tools/wptserve/README
   ../tools/third_party/pywebsocket3/README

Indices and tables

* :ref:`modindex`
* :ref:`genindex`
* :ref:`search`

Secrets

SSL certificates for all HTTPS-enabled domains are retrieved via [Let's Encrypt](https://letsencrypt.org/), so that data does not represent an explicitly-managed secret.

Third-party account owners

- jgraham@hoppipolla.co.uk

- mike@w3.org

- web-human@w3.org

- danielrsmith@google.com - foolip@google.com - jamescscott@google.com - jstenback@google.com

- @foolip - @jgraham - @plehegar - @thejohnjansen - @youennf - @zcorpan

- @plehegar - @sideshowbarker

- danielrsmith@google.com - foolip@google.com - jamescscott@google.com - jstenback@google.com

- danielrsmith@google.com - foolip@chromium.org - jamescscott@google.com - jstenback@google.com - mike@bocoup.com - The DNS for wpt.live, not-wpt.live, wptpr.live, and not-wptpr.live are also managed in this project, while the domains are registered with a Google-internal mechanism.

- danielrsmith@google.com - foolip@google.com - jamescscott@google.com - jstenback@google.com

- jamescscott@google.com - boaz@bocoup.com - mike@bocoup.com

- jamescscott@google.com - boaz@bocoup.com - mike@bocoup.com

Emergency playbook

Lock down write access to the repo

Recommended but not yet verified approach: Create a [new branch protection rule](https://github.com/web-platform-tests/wpt/settings/branchprotectionrules/new) that applies to * (i.e. all branches), and check "Restrict who can push to matching branches". This should prevent everyone except those with the "Maintain" role (currently only the GitHub admins listed above) from pushing to any branch. To lift the limit, delete this branch protection rule.

**Alternative approach proven to work in #21424:** Go to manage access, and change the permission of "reviewers" to "Read". To lift the limit, change it back to "Write". This has the known downside of *resubscribing all reviewers to repo notifications*.