On 11/01/15 20:07, Jurre van Bergen wrote:
https://tails.boum.org/blueprint/automated_builds_and_tests/autobuild_specs/
Sorry for joining in so late. All looks good, and I only have minor
concerns.
Developers should be able to trigger automatic builds for a branch
whose build was dropped (eg.
On 24/02/15 13:54, goupille wrote:
Hi !
there was no address to reply, so I supposed that confirming the
reception here was the idea ?
Good enough for me. Thanks!
Cheers!
___
Tails-dev mailing list
Tails-dev@boum.org
On 21/02/15 17:24, intrigeri wrote:
Also, if you're Alan, anonym, bertagaz or sajolida, look for your name
on that blueprint: there are a few branches I need your opinion about
= please move them to the appropriate section.
I've deal with my section now. I had completely forgotten about
On 19/02/15 22:38, anonym wrote:
Hi,
See the ticket for details, in particular from comment #16 and on.
Please review and merge into devel and testing.
I withdraw this merge request. See the ticket for details.
Cheers!
___
Tails-dev mailing list
Hi,
Please review'n'merge into testing and devel.
Cheers!
___
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to
tails-dev-unsubscr...@boum.org.
Hi,
See the ticket for details, in particular from comment #16 and on.
Please review and merge into devel and testing.
Cheers!
___
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send
On 17/02/15 16:12, intrigeri wrote:
anonym wrote (17 Feb 2015 15:03:29 GMT) :
I'm gonna test you instructions right now to import the previous Tor
Browser release. To be continued...
I'd say skip it, save some time, and test then at 1.3 time.
For the record, I've tested them by importing
On 07/02/15 15:04, intrigeri wrote:
Hi,
that branch reintroduces hybrid ISO images. Please test the Vagrant
bits, that I've not tested myself.
Vagrant works fine after a:
rake vm:provision
Note that the corresponding changes
were pushed to our tails Puppet module and deployed on our
On 10/02/15 20:40, intrigeri wrote:
Hi,
see the ticket and especially note-2 for details. Candidate for 1.3.
It now fails when I set HTTPS_CA_FILE to something bogus, or unset it
but remove the default bundle. Merged!
Cheers!
___
Tails-dev mailing
On 11/02/15 00:25, intrigeri wrote:
Hi,
while testing an unrelated branch, I've discovered that the AppArmor
confinement that we now apply to Tor Browser... breaks Tor Launcher.
I'm astonished that both I and the reviewer forgot to test this.
Ooops.
Oops indeed! This makes me feel sad
On 11/02/15 00:28, intrigeri wrote:
Hi,
this branch introduces a custom Tor package that's built with seccomp
support. I've tested it very lightly, but I will trigger a full
automated test suite run shortly on lizard. At least I've checked that
it doesn't break Tor Launcher and obfs3 ;)
I
On 10/02/15 13:33, intrigeri wrote:
Hi,
please review'n'merge feature/7980-obfs4 for Tails 1.3. It replaces
obfsproxy with obfs4proxy, which adds support for obfs4 bridges.
Works fine (for normal, obfs2, obfs3 and obfs4 bridges) so I've merged
this branch.
Cheers!
On 21/01/15 18:32, intrigeri wrote:
hi,
this fixes a bug identified by Alan on
https://labs.riseup.net/code/issues/8724#note-12
I was able to install my favorite package, cowsay, by using the local
filesystem repo. Merged!
Cheers!
___
Tails-dev
On 08/02/15 20:27, intrigeri wrote:
Hi,
this branch completes the first step towards switching to our new
signing key: it includes that new signing key (in a different file,
so that our current documentation isn't broken), and makes it so Tails
Upgrader trusts both the old (to be used for
On 04/02/15 11:36, intrigeri wrote:
[...]
Good enough? Shall we try that and see? I've implemented #3 already,
and can do #1 and #2 for Tails 1.3.1.
I'm convinced and have nothing more to add than well done!. :)
Cheers!
___
Tails-dev mailing list
Hi,
This branch intends to automate the rest of the tests of untrusted
partitions, i.e. #7822. It also closes #8673 - Use ruby-guestfs
wherever it's worth it in the automated test suite, at least at my
current understanding of #8671 - List the usecases we could have for
libguestfs in the
On 23/01/15 12:16, intrigeri wrote:
hi,
anonym wrote (23 Jan 2015 10:34:47 GMT) :
This kills the bootstrap stage caching feature in our Vagrant setup,
which is considered harmful. Please review and merge into devel!
The code looks good to me. Who in here still has a working
Vagrant-based
On 26/01/15 12:31, intrigeri wrote:
Hi,
please review'n'merge:
1. feature/8726-use-homogenous-Debian-mirrors-at-build-time (main Git
repo) into all branches we build automatically, namely stable,
devel, experimental and feature/jessie = that's for the RM,
unless he
On 19/01/15 14:16, intrigeri wrote:
Hi,
since the .{src,bin}pkgs stuff was merged, our build system is leaving
.{start,end}.timestamp files around, which are useless in most cases.
anonym has complained about it, so here's a branch that only generates
these files when building from Jenkins
On 26/01/15 20:04, intrigeri wrote:
anonym wrote (26 Jan 2015 13:56:44 GMT) :
Merged!
I think you forgot to push stable, experimental and feature/jessie
after merging into these branches as requested.
Sorry, I completely forgot about stable and feature/jessie, and hadn't
pushed my
On 27/11/14 22:35, intrigeri wrote:
hi,
I've noticed that bug thanks to the Journal capturing such error
output on Tails/Jessie, but it affects Wheezy too. We're using the
affected function in tor-has-bootstrapped, that some users can run
with passwordless sudo, so better make it more
On 23/01/15 20:50, intrigeri wrote:
Hi,
I'm working on #5525 (Sandbox the web browser), and have an AppArmor
profile that works locally for most basic use cases. Now, I'm
wondering how to integrate it into Tails and I need your input.
This profile was derived from the one I've worked a
Hi,
This kills the bootstrap stage caching feature in our Vagrant setup,
which is considered harmful. Please review and merge into devel!
Cheers!
___
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe
Hi,
I've just reset experimental, since that was last done back in
September. These are the branches that are merged into experimental but
not in devel:
origin/bugfix/8257-more-robust-tor_bootstrap_progress
origin/bugfix/8680-git-without-polipo
Hi,
I'll be the release manager for Tails 1.3, scheduled to be released on
2015-02-24. For the list of tickets targeting Tails 1.3, have a look at:
https://labs.riseup.net/code/projects/tails/issues?query_id=155
That's 108 tickets that are still open... :)
Here's the preliminary release
On 31/10/14 14:49, intrigeri wrote:
Hi,
I could not find this pull request in the list's archives, so let's
emulate it.
[Off-topic: note that we still have *not* made it so we can reasonably
skip sending pull requests here (namely: providing, documenting and
advertising a way to follow
On 01/12/14 20:05, intrigeri wrote:
Hi,
I've had this usability issue on my personal todo list for (at least)
months, along with a tentative patch. Now properly tested (by
live-patching the code in a running Tails 1.2), so here we go =
candidate for 1.2.2. I've described the steps to
On 06/01/15 11:13, intrigeri wrote:
hi,
* bugfix/handle-website-CA-change branch in main Git repo now creates
the CA bundle without the CA that signed the old certificate, and
names the bundle file in a more generic way
* bugfix/handle-website-CA-change in the IUK Git repo has the
On 05/12/14 23:32, intrigeri wrote:
Hi,
in the same vein as #8360, here's now PO checking in our automated
test suite, so that we check PO files in other branches than
master too. One small commit, only adds stuff to the test suite
= candidate for 1.2.2.
Merged!
Cheers!
On 06/01/15 18:41, anonym wrote:
Hi,
Apparently our MAC spoofing feature's panic mode is quite broken. Please
review and merge the bugfix/8571-fix-mac-spoof-panic-mode branch into
stable and devel. Before that you may want to have a look at comment 1
in the ticket and agree that commit
On 02/12/14 21:27, Kill Your TV wrote:
On Mon, 1 Dec 2014 14:29:38 + (UTC)
anonym ano...@riseup.net wrote:
Any takers? KillYourTV?
This branch worked fine. I wholeheartedly agree with merging.
Merged! Thanks for testing!
Cheers!
___
Tails
On 03/01/15 22:35, matsa wrote:
intrigeri intrig...@boum.org a écrit :
matsa wrote (24 Dec 2014 05:32:33 GMT) :
please review the following branch, which aim to fix the bug #8071:
matsa/bugfix/8071-Do-not-suspend-to-RAM-when-closing-lid
Mangled the ticket as needed = candidate for 1.2.3.
On 03/01/15 22:26, matsa wrote:
Hi,
please review the following branch, which aims to fix the bug #8087:
matsa/bugfix/8087-gnome-screenshot-save-to-home-folder
Merged, thanks!
Cheers!
___
Tails-dev mailing list
Tails-dev@boum.org
Hi,
Apparently our MAC spoofing feature's panic mode is quite broken. Please
review and merge the bugfix/8571-fix-mac-spoof-panic-mode branch into
stable and devel. Before that you may want to have a look at comment 1
in the ticket and agree that commit 54a80db is a good idea.
Cheers!
On 28/12/14 10:21, intrigeri wrote:
hi,
as usual, we should enable stable-proposed-updates ASAP, and disable
it again once the point-release is out. anonym, will you take care
of it?
I updated the old feature/Debian-proposed-updates by merging in stable
and resurrecting your two previous
Hi,
All tests looking for UnsafeBrowserTorCheckFail.png fail due to some
minor change in how the Sorry. You are not using Tor. text on
check.torproject.org is rendered, introduced recently.
This branch fixes that (hopefully once and for all) by making the tests
look for the crossed-over onion
emergency release). I apologize as well.
When we discussed it initially, both anonym and Alan were available on
the 18th at noon CET. Works for me. anonym, Alan, does that still work
for you?
Unfortunately I now have pretty full day scheduled for tomorrow but I
can squeeze in a meeting between 12:00
On 14/12/14 04:39, Austin Hartzheim wrote:
Also, if you would like some help with extracting the torrent files
from the Git repository, I should have some time Tuesday/Wednesday
(UTC) to grab those. Let me know if you want help with that.
This should make the process pretty short:
mkdir
On 13/12/14 11:43, intrigeri wrote:
Hi,
anonym wrote (30 Nov 2014 20:42:02 GMT) :
On 31/10/14 13:55, intrigeri wrote:
The design doc should be updated, at least to point to the new shell
library file.
Indeed.
I see some good progress in the branch.
How about pointing to i2p.sh
On 16/12/14 08:24, intrigeri wrote:
anonym wrote (16 Dec 2014 01:48:56 GMT) :
The relevant features pass:
* features/torified_browsing.feature
* features/unsafe_browser.feature
* features/firewall_leaks.feature
Windows camouflage might be impacted too, somehow.
Ah, true.
May you
On 04/12/14 21:16, Oliver-Tobias Ripka wrote:
According to anonym on Thu, Dec 04 2014:
FWIW I experienced no issues during my tests with *only* ESTABLISHED in
both the INPUT and OUTPUT chains so neither NEW nor RELATED seems
essential for the basic usage I tested. And of course the above
On 11/12/14 12:51, u wrote:
was it intentional that this has not been sent to tails-testers@b.o ?
Yes. The testing I'm talking about here is internal testing of a final
stable release, with trusted participants only. We ask for help from
tails-testers@ by announcing release candidates there, and
Hi,
I'll be the release manager for Tails 1.2.2, scheduled to be released on
2015-01-14 (or maybe even 2015-01-13, see below).
Here's the preliminary release schedule:
2015-01-06: - Please try to have all branches aimed at 1.2.2 ready
by this date!
2015-01-13: - Tor Browser
On 06/12/14 12:33, intrigeri wrote:
Given that the semantics of the fields are pretty different in the
Greeter compared to in t-p-s, please provide a detailed description of
how you think the Greeter should be changed in case you still think it's
desirable.
What I had in mind is:
a. I
On 08/12/14 05:30, Jacob Appelbaum wrote:
How are IUK files verified? The JSON descriptors don't appear to
contain a signature, merely a hash:
https://tails.boum.org/upgrade/v1/Tails/1.2/i386/stable/upgrades.yml
All upgrades.yml files are signed with the Tails signing key, for instance:
On 03/12/14 18:22, Jacob Appelbaum wrote:
I propose that we change the rule to be:
mod state state (NEW ESTABLISHED) ACCEPT;
The reason is pretty simple - RELATED makes the kernel do a lot of
extra lifting that is not needed by using the conntrack kernel code:
While I think we
On 02/12/14 23:38, intrigeri wrote:
hi,
Kill Your TV wrote (02 Dec 2014 20:49:59 GMT) :
Perhaps apply the following?
[...]
-sudo tee /etc/apt/preferences.d/vagrant-1.4.3 EOF
+sudo tee /etc/apt/preferences.d/vagrant-143 EOF
I would even drop the version number from the filename:
On 01/12/14 20:15, intrigeri wrote:
Hi,
so, we wanted to have that meeting in the 2nd half of September, and
then we failed. Anyway, since then, we've made good progress, and
things are starting to look quite good!
I think it's time to meet, talk and adjust our plans. I hereby propose
a
On 03/11/14 23:42, Jurre van Bergen wrote:
On 11/02/2014 12:48 AM, intrigeri wrote:
Hi,
Jacob Appelbaum wrote (24 Jul 2014 01:16:26 GMT) :
I've waited a while for folks to read it and I think at this point,
we're at year two or so of waiting. It seems like the easy thing is to
simply give
Hi, translating team!
Please translate the following PO files in the 'stable' branch:
* wiki/src/news/version_1.2.1.*.po
* wiki/src/security/Numerous_security_holes_in_1.2.*.po
Cheers!
___
Tails-dev mailing list
Tails-dev@boum.org
On 18/11/14 11:11, anonym wrote:
So here is the new tentative release schedule for Tails 1.2.1:
2014-12-01 TBB 4.x based on Firefox 31.3.0esr is *hopefully* out
Tag 1.2.1 in Git
Build and upload 1.2.1 ISO and IUKs
2014-12-02 Test (early CEST
On 01/12/14 06:24, intrigeri wrote:
anonym wrote (30 Nov 2014 20:42:04 GMT) :
On 31/10/14 16:02, intrigeri wrote:
Ooops, I forgot this one. Obviously the test fails, so I think I've
fixed it in e44f97c.
No big deal, but it makes me question how much trust I can put, as
a reviewer, into I've
On 01/12/14 08:09, intrigeri wrote:
anonym wrote (30 Nov 2014 21:19:35 GMT) :
A working Vagrant can be installed from snapshot.d.o. Perhaps the
attached patch against master would be a decent way to address this
problem until either Tails' vagrant setup is updated (or replaced?).
Thanks! I
Hi,
I've uploaded a new Vagrant basebox which fixes the tiny issue described
in #7644. It's just a hacked version of the old basebox -- see the
message in commit 2a0ca9e for details. One result is that the version
reported inside the VM, e.g. in the hostname, stays the same as the old
buildbox,
On 31/10/14 16:02, intrigeri wrote:
Hi,
intrigeri wrote (31 Oct 2014 12:55:44 GMT) :
+ when the I2P Browser
+user = i2pbrowesr
XXX
Ooops, I forgot this one. Obviously the test fails, so I think I've
fixed it in e44f97c.
No big deal, but it makes me question how much trust I
On 24/11/14 17:03, intrigeri wrote:
Hi,
the proposed branch makes the Pidgin tests a bit more reliable.
Looks good, merged!
The only change outside the test suite is that it installs xdotool,
which is now needed in the test suite (and I suspect we'll want to use
it in a few other similar
On 25/11/14 16:16, anonym wrote:
On 17/10/14 18:16, intrigeri wrote:
Hi,
this branch implements the very last step on the incremental path
toward removing TrueCrypt. The doc was already reviewed and improved
by sajolida.
[...]
I'm currently looking into this one, and have assigned
On 26/11/14 19:19, anonym wrote:
Hi,
If you build Tails on Debian Wheezy you may want to add wheezy-backports
to your sources and install `gettext` from it (= 0.18.3 is now required):
apt-get install gettext/wheezy-backports
It will actually only be relevant if you try to build
On 17/10/14 18:16, intrigeri wrote:
Hi,
this branch implements the very last step on the incremental path
toward removing TrueCrypt. The doc was already reviewed and improved
by sajolida.
Problem is, I've merged the devel branch by mistake into this one
a few days ago, so it has
On 23/11/14 19:23, intrigeri wrote:
Hi,
anonym wrote (21 Nov 2014 14:22:58 GMT) :
Please review'n'merge into stable and devel. I've already merged it into
feature/jessie since the old workaround didn't work there due to (I
think) GUI unresponsiveness, but this branch works reliably
Hi,
Please review'n'merge into stable and devel. I've already merged it into
feature/jessie since the old workaround didn't work there due to (I
think) GUI unresponsiveness, but this branch works reliably.
Cheers!
___
Tails-dev mailing list
On 22/10/14 14:10, anonym wrote:
Hi,
I'll be the release manager for Tails 1.2.1, scheduled to be released on
2014-11-25. I'll start with the schedule part for the preparation of the
final release:
2014-11-24 TBB 4.x based on Firefox 31.3.0esr is *hopefully* out
Tag
On 12/11/14 22:13, intrigeri wrote:
Hi,
anonym wrote (12 Nov 2014 14:12:35 GMT) :
Please review'n'merge this kernel bump into stable and devel, which will
close ticket #8249.
I've taken care of it, as part of the LHF session = passes some basic
manual tests, and a couple features
On 12/11/14 20:54, intrigeri wrote:
anonym wrote (12 Nov 2014 16:15:00 GMT) :
When merging, please revert commit b010387 first so we'll install all
related packages from unstable again.
Any reason not to include this revert as part of the proposed branch?
No. I branched off stable before
On 05/11/14 14:58, intrigeri wrote:
Hi,
bugfix/7945-directories-in-boot-profile fixes the issue identified by
anonym in #7945, by filtering directories out in process_IN_ACCESS,
just like we did already in process_IN_OPEN. The resulting boot
profile is not substantially larger than the old
Hi,
Please review'n'merge this kernel bump into stable and devel, which will
close ticket #8249. This has to be done relatively soon since the
current kernel we install will be removed in about four days (~2014-11-16).
A notable change in this kernel upgrade is that the -486 packages are
renamed
On 12/11/14 15:12, anonym wrote:
Hi,
Please review'n'merge this kernel bump into stable and devel, which will
close ticket #8249. This has to be done relatively soon since the
current kernel we install will be removed in about four days (~2014-11-16).
When merging, please revert commit
On 10/11/14 17:28, intrigeri wrote:
Hi,
it seems (#7912) that our way to add the US keyboard layout as an
alternative to the chosen one is racy, and sometimes makes it selected
as the default layout instead of the chosen one. As indicated on the
ticket (and one can see much more related
Hi,
This branch re-introduces the extra, localized browser search plugins we
earlier had when installing the Iceweasel l10n packages. Well, it only
installs them for the languages we install langpacks for, but once we
ship more langpacks this fix will install the Iceweasel search plugins
for them
Whoops, sorry for the typo in the branch name. I've already merged it
into experimental, so I guess I'll just leave it like that...
___
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list,
31/10/14 16:11, intrigeri wrote:
Hi,
this branch makes our test suite more robust. Please review'n'merge
into stable and devel.
Kill Your TV: you might want to take this one too.
Too late; merged!
___
Tails-dev mailing list
Tails-dev@boum.org
30/10/14 18:37, intrigeri wrote:
Hi,
bugfix/8186-pidgin-http-links tweaks the AppArmor profile for Pidgin
to allow it to run Tor Browser (and hence, open links). Tested on top
of current stable branch. Please review'n'merge into stable and
devel.
Merged!
02/11/14 16:45, intrigeri wrote:
Hi,
feature/7416-gnupg-socks is a follow-up on the proposed branch for
#7512, and is blocked by it. It makes GnuPG directly use the Tor SOCKS
port for communicating with keyservers, instead of going through
Polipo.
Tested with gpg on the command-line and
31/10/14 15:29, intrigeri wrote:
Hi,
this branch makes our Windows camouflage automated tests more robust.
Please review'n'merge into stable and devel.
Kill Your TV, want to take it?
anonym: unless Kill Your TV takes it promptly, please review'n'merge
it soon, as these false positives
Hi,
See the ticket [1] for details. Please review'n'merge into stable and devel.
Cheers!
[1] https://labs.riseup.net/code/issues/8153
___
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this
30/10/14 16:34, intrigeri wrote:
Hi,
intrigeri wrote (30 Oct 2014 13:01:58 GMT) :
anonym wrote (30 Oct 2014 11:56:45 GMT) :
See the ticket [1] for details. Please review'n'merge into stable and devel.
[1] https://labs.riseup.net/code/issues/8153
The ticket reads This has been reported
30/10/14 16:50, intrigeri wrote:
anonym wrote (22 Oct 2014 12:10:59 GMT) :
Next up, the preliminary release schedule for the 1.2.1 release
candidate, *if* we feel we need one:
2014-11-05 Feature freeze
2014-11-12 Tag 1.2.1~rc1 in Git
Build and upload 1.2.1~rc1 ISO
23/10/14 11:08, Georg Koppen wrote:
Hi,
anonym:
Hi,
For years Tails has shipped with an Iceweasel with the (relevant) Tor
Browser patches applied. It has worked ok, but it's been high
maintenance, and keeping the preferences synced with TBB was a bit of a
chore, among other issues. Since
Hi,
For years Tails has shipped with an Iceweasel with the (relevant) Tor
Browser patches applied. It has worked ok, but it's been high
maintenance, and keeping the preferences synced with TBB was a bit of a
chore, among other issues. Since Tails 1.2 we've migrated to installing
the Tor Browser
Hi,
I'll be the release manager for Tails 1.2.1, scheduled to be released on
2014-11-25. I'll start with the schedule part for the preparation of the
final release:
2014-11-24 TBB 4.x based on Firefox 31.3.0esr is *hopefully* out
Tag 1.2.1 in Git
Build and
Hi,
This branch fixes bugs #8152 and #8158 and is based on a patch
contributed by sanic (Thanks again!). Since I had to re-write the patch
a bit I suppose it should be review'n'merged by someone else, so please
review'n'merge into stable and devel!
As for testing, see #8158 (comment 13) for what
Hi,
This branch is fairly big at 55 commits, netting 622 insertions and 552
deletions compared to the stable branch. Beyond getting the chroot
browsers code into a much better, factorized shape, it also brings some
nice improvements. As you may have noticed, there's still more
insertions than
13/10/14 13:19, intrigeri wrote:
Hi,
no Git change, only the bugfix-7426-scrolling-in-spice-vm APT suite to
review and merge (you'll want to get the source package, and debdiff
it against the one currently in Wheezy).
Please test both in a libvirt+KVM+Spice guest and on bare metal.
Works
20/10/14 11:16, intrigeri wrote:
Hi,
this branch fixes a regression in Tails 1.2, caused by isohybrid
moving around packages.
Merged into stable and devel.
Cheers!
___
Tails-dev mailing list
Tails-dev@boum.org
20/10/14 09:53, intrigeri wrote:
Hi,
Why is Torbutton in DEBUG mode, spewing info about the sites you visit
into amnesia user's .xsession-errors file and where can I turn this
Torbutton DEBUG setting OFF?
Thanks, filed as #8160.
I pushed a fix. Please review and merge into stable and
17/10/14 18:04, intrigeri wrote:
Hi,
this branch makes it easier for members of various Tails core teams to
respect the corresponding security policy, if they're using Tails to
contribute. Thanks to Emma Peel and Kill Your TV for the initial
version of this branch, that I have built upon.
13/10/14 22:33, intrigeri wrote:
anonym wrote (13 Oct 2014 15:53:54 GMT) :
* #8058 - Upgrade to Torbutton 1.7.0.1 final
I think you forgot to push to our Torbutton Git repo, so I cannot
review this part yet.
Sorry, done now.
Cheers!
___
Tails
13/10/14 22:17, intrigeri wrote:
Hi,
anonym wrote (13 Oct 2014 15:54:06 GMT) :
11/10/14 12:40, intrigeri wrote:
1. install_debian_extensions() could take the list of packaged
extensions as arguments (after the tbb_install one); sure,
that's cosmetic.
Done in commit a41768b
14/10/14 00:57, intrigeri wrote:
anonym wrote (13 Oct 2014 15:54:06 GMT) :
Please merge feature/8031-refactor-10-rbb-hook into devel and testing if
everything looks good!
Also:
--- a/wiki/src/contribute/release_process/tor-browser.mdwn
+++ b/wiki/src/contribute/release_process/tor
13/10/14 22:18, intrigeri wrote:
anonym wrote (13 Oct 2014 19:47:19 GMT) :
See the note in `wiki/src/contribute/release_process/tor-browser.mdwn`
of that branch. Basically, when using https://;, apt-cacher-ng will
break, which e.g. Vagrant uses by default.
I thought this was fixed
14/10/14 11:28, intrigeri wrote:
anonym wrote (13 Oct 2014 15:53:54 GMT) :
Please review and merge (Git and APT) into devel and testing.
Merged, congrats! Please in turn merge into the refactoring branch,
and resolve conflicts there.
However, there are still a bunch of serious unaddressed
14/10/14 14:16, anonym wrote:
14/10/14 11:28, intrigeri wrote:
anonym wrote (13 Oct 2014 15:53:54 GMT) :
Please review and merge (Git and APT) into devel and testing.
Merged, congrats! Please in turn merge into the refactoring branch,
and resolve conflicts there.
However, there are still
11/10/14 13:04, intrigeri wrote:
Hi,
also, the current overall state of how we install and configure the
browser at install time is currently spread over these hooks (at
least):
* 10-tbb
* 12-remove_unwanted_browser_searchplugins
* 13-override-tbb-branding
*
11/10/14 12:40, intrigeri wrote:
Hi,
for the record, I've already reviewed and merged the branches that fix
#8057 and #8035.
Now, reviewing the branch for #8031.
0. The script looks much better and understandable to me, congrats!
\o/
1. install_debian_extensions() could take the list
13/10/14 20:14, sajol...@pimienta.org wrote:
I haven't followed this thread at all, but while building Tails Jessie
with that branch in it failed because of the redirection from
http://people.torproject.org/ to https://people.torproject.org/.
So why not using https:// instead of http:// in
Hi,
Optimistically assigned to alant, the bug reporter. If you won't do the
review'n'merge, please unassign yourself and let us know in this thread.
Cheers!
___
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To
06/10/14 14:44, intrigeri wrote:
Hi,
please review'n'merge feature/apparmor for Tails 1.2.
Tickets that it covers:
* #8004 and its various sub-tasks
* #8003 (Automatic tests for IRC in Pidgin)
Looks very good! Some off-list discussion about an issue resulted in
commit a8ace8a. Now
06/10/14 16:48, intrigeri wrote:
intrigeri wrote (06 Oct 2014 13:54:10 GMT) :
intrigeri wrote (06 Oct 2014 13:49:57 GMT) :
anonym, shall we try using tor_bootstrap_progress in tor_is_working,
instead of relying on cached-microdescs* files appearing on
the filesystem?
Just to avoid
02/10/14 04:24, Kill Your TV wrote:
On Wed, 1 Oct 2014 00:45:10 + (UTC)
anonym ano...@riseup.net wrote:
27/09/14 12:53, Kill Your TV wrote:
On Fri, 26 Sep 2014 16:25:16 + (UTC)
Would you merge this? :) BTW, I've personally
tested this branch according to the new manual test steps
02/10/14 04:24, Kill Your TV wrote:
On Wed, 1 Oct 2014 01:08:00 + (UTC)
anonym ano...@riseup.net wrote:
29/09/14 04:31, anonym wrote:
I think the changes requested have been addressed. Please see the
latest pushed commits.
After these things are fixed, and the user documentation has
301 - 400 of 891 matches
Mail list logo