Re: [Tails-dev] Automated builds specification

2015-02-26 Thread anonym
On 11/01/15 20:07, Jurre van Bergen wrote: https://tails.boum.org/blueprint/automated_builds_and_tests/autobuild_specs/ Sorry for joining in so late. All looks good, and I only have minor concerns. Developers should be able to trigger automatic builds for a branch whose build was dropped (eg.

Re: [Tails-dev] Bug report: e0e6a99c98adbf8861419d36ab54a9fe

2015-02-24 Thread anonym
On 24/02/15 13:54, goupille wrote: Hi ! there was no address to reply, so I supposed that confirming the reception here was the idea ? Good enough for me. Thanks! Cheers! ___ Tails-dev mailing list Tails-dev@boum.org

Re: [Tails-dev] Git branches to delete: review needed

2015-02-22 Thread anonym
On 21/02/15 17:24, intrigeri wrote: Also, if you're Alan, anonym, bertagaz or sajolida, look for your name on that blueprint: there are a few branches I need your opinion about = please move them to the appropriate section. I've deal with my section now. I had completely forgotten about

Re: [Tails-dev] [review'n'merge: 1.3] bugfix/5394-time_syncing_in_bridge_mode

2015-02-22 Thread anonym
On 19/02/15 22:38, anonym wrote: Hi, See the ticket for details, in particular from comment #16 and on. Please review and merge into devel and testing. I withdraw this merge request. See the ticket for details. Cheers! ___ Tails-dev mailing list

[Tails-dev] [review'n'merge: 1.3] feature/tor-browser-4.0.4 (#8938)

2015-02-22 Thread anonym
Hi, Please review'n'merge into testing and devel. Cheers! ___ Tails-dev mailing list Tails-dev@boum.org https://mailman.boum.org/listinfo/tails-dev To unsubscribe from this list, send an empty email to tails-dev-unsubscr...@boum.org.

[Tails-dev] [review'n'merge: 1.3] bugfix/5394-time_syncing_in_bridge_mode

2015-02-19 Thread anonym
Hi, See the ticket for details, in particular from comment #16 and on. Please review and merge into devel and testing. Cheers! ___ Tails-dev mailing list Tails-dev@boum.org https://mailman.boum.org/listinfo/tails-dev To unsubscribe from this list, send

Re: [Tails-dev] [review'n'merge:1.3] feature/8125-self-hosted-tor-browser-tarballs

2015-02-17 Thread anonym
On 17/02/15 16:12, intrigeri wrote: anonym wrote (17 Feb 2015 15:03:29 GMT) : I'm gonna test you instructions right now to import the previous Tor Browser release. To be continued... I'd say skip it, save some time, and test then at 1.3 time. For the record, I've tested them by importing

Re: [Tails-dev] [review'n'merge:1.3] #8510 - feature/hybrid-iso-strikes-back

2015-02-11 Thread anonym
On 07/02/15 15:04, intrigeri wrote: Hi, that branch reintroduces hybrid ISO images. Please test the Vagrant bits, that I've not tested myself. Vagrant works fine after a: rake vm:provision Note that the corresponding changes were pushed to our tails Puppet module and deployed on our

Re: [Tails-dev] [review'n'merge:1.3] bugfix/8536-security-check-CA-pinning

2015-02-11 Thread anonym
On 10/02/15 20:40, intrigeri wrote: Hi, see the ticket and especially note-2 for details. Candidate for 1.3. It now fails when I set HTTPS_CA_FILE to something bogus, or unset it but remove the default bundle. Merged! Cheers! ___ Tails-dev mailing

Re: [Tails-dev] [review'n'merge:1.3] bugfix/8887-tor-launcher-vs-apparmor

2015-02-11 Thread anonym
On 11/02/15 00:25, intrigeri wrote: Hi, while testing an unrelated branch, I've discovered that the AppArmor confinement that we now apply to Tor Browser... breaks Tor Launcher. I'm astonished that both I and the reviewer forgot to test this. Ooops. Oops indeed! This makes me feel sad

Re: [Tails-dev] [review'n'merge:1.3] feature/8174-tor-with-seccomp

2015-02-11 Thread anonym
On 11/02/15 00:28, intrigeri wrote: Hi, this branch introduces a custom Tor package that's built with seccomp support. I've tested it very lightly, but I will trigger a full automated test suite run shortly on lizard. At least I've checked that it doesn't break Tor Launcher and obfs3 ;) I

Re: [Tails-dev] [review'n'merge:1.3] feature/7980-obfs4

2015-02-10 Thread anonym
On 10/02/15 13:33, intrigeri wrote: Hi, please review'n'merge feature/7980-obfs4 for Tails 1.3. It replaces obfsproxy with obfs4proxy, which adds support for obfs4 bridges. Works fine (for normal, obfs2, obfs3 and obfs4 bridges) so I've merged this branch. Cheers!

Re: [Tails-dev] [review'n'merge:1.3] bugfix/8756-repair-local-packages

2015-02-10 Thread anonym
On 21/01/15 18:32, intrigeri wrote: hi, this fixes a bug identified by Alan on https://labs.riseup.net/code/issues/8724#note-12 I was able to install my favorite package, cowsay, by using the local filesystem repo. Merged! Cheers! ___ Tails-dev

Re: [Tails-dev] [review'n'merge:1.3] feature/8739-new-signing-key-phase-1

2015-02-10 Thread anonym
On 08/02/15 20:27, intrigeri wrote: Hi, this branch completes the first step towards switching to our new signing key: it includes that new signing key (in a different file, so that our current documentation isn't broken), and makes it so Tails Upgrader trusts both the old (to be used for

Re: [Tails-dev] Sandboxing Tor Browser: strategy for tracking upstream AppArmor profile

2015-02-04 Thread anonym
On 04/02/15 11:36, intrigeri wrote: [...] Good enough? Shall we try that and see? I've implemented #3 already, and can do #1 and #2 for Tails 1.3.1. I'm convinced and have nothing more to add than well done!. :) Cheers! ___ Tails-dev mailing list

[Tails-dev] [review'n'merge: 1.3] test/7822-untrusted-partitions

2015-01-30 Thread anonym
Hi, This branch intends to automate the rest of the tests of untrusted partitions, i.e. #7822. It also closes #8673 - Use ruby-guestfs wherever it's worth it in the automated test suite, at least at my current understanding of #8671 - List the usecases we could have for libguestfs in the

Re: [Tails-dev] [review'n'merge: 1.3] feature/8725-remove-vagrant-bootstrap-cache

2015-01-26 Thread anonym
On 23/01/15 12:16, intrigeri wrote: hi, anonym wrote (23 Jan 2015 10:34:47 GMT) : This kills the bootstrap stage caching feature in our Vagrant setup, which is considered harmful. Please review and merge into devel! The code looks good to me. Who in here still has a working Vagrant-based

Re: [Tails-dev] [review'n'merge:1.3] feature/8726-use-homogenous-Debian-mirrors-at-build-time [Was: RFC: Use homogenous Debian mirrors at build time (#8726)]

2015-01-26 Thread anonym
On 26/01/15 12:31, intrigeri wrote: Hi, please review'n'merge: 1. feature/8726-use-homogenous-Debian-mirrors-at-build-time (main Git repo) into all branches we build automatically, namely stable, devel, experimental and feature/jessie = that's for the RM, unless he

Re: [Tails-dev] [review'n'merge:1.3] bugfix/8699-only-create-timestamps-in-Jenkins

2015-01-26 Thread anonym
On 19/01/15 14:16, intrigeri wrote: Hi, since the .{src,bin}pkgs stuff was merged, our build system is leaving .{start,end}.timestamp files around, which are useless in most cases. anonym has complained about it, so here's a branch that only generates these files when building from Jenkins

Re: [Tails-dev] [review'n'merge:1.3] feature/8726-use-homogenous-Debian-mirrors-at-build-time [

2015-01-26 Thread anonym
On 26/01/15 20:04, intrigeri wrote: anonym wrote (26 Jan 2015 13:56:44 GMT) : Merged! I think you forgot to push stable, experimental and feature/jessie after merging into these branches as requested. Sorry, I completely forgot about stable and feature/jessie, and hadn't pushed my

Re: [Tails-dev] [review'n'merge:1.3] bugfix/8257-more-robust-tor_bootstrap_progress

2015-01-26 Thread anonym
On 27/11/14 22:35, intrigeri wrote: hi, I've noticed that bug thanks to the Journal capturing such error output on Tails/Jessie, but it affects Wheezy too. We're using the affected function in tor-has-bootstrapped, that some users can run with passwordless sudo, so better make it more

Re: [Tails-dev] Sandboxing Tor Browser: strategy for tracking upstream AppArmor profile

2015-01-26 Thread anonym
On 23/01/15 20:50, intrigeri wrote: Hi, I'm working on #5525 (Sandbox the web browser), and have an AppArmor profile that works locally for most basic use cases. Now, I'm wondering how to integrate it into Tails and I need your input. This profile was derived from the one I've worked a

[Tails-dev] [review'n'merge: 1.3] feature/8725-remove-vagrant-bootstrap-cache

2015-01-23 Thread anonym
Hi, This kills the bootstrap stage caching feature in our Vagrant setup, which is considered harmful. Please review and merge into devel! Cheers! ___ Tails-dev mailing list Tails-dev@boum.org https://mailman.boum.org/listinfo/tails-dev To unsubscribe

[Tails-dev] The experimental branch has been reset

2015-01-23 Thread anonym
Hi, I've just reset experimental, since that was last done back in September. These are the branches that are merged into experimental but not in devel: origin/bugfix/8257-more-robust-tor_bootstrap_progress origin/bugfix/8680-git-without-polipo

[Tails-dev] Release schedule for Tails 1.3

2015-01-23 Thread anonym
Hi, I'll be the release manager for Tails 1.3, scheduled to be released on 2015-02-24. For the list of tickets targeting Tails 1.3, have a look at: https://labs.riseup.net/code/projects/tails/issues?query_id=155 That's 108 tickets that are still open... :) Here's the preliminary release

Re: [Tails-dev] [review'n'merge:1.3] #8091 -- Support automated testing of old ISO images with different set of persistence presets

2015-01-22 Thread anonym
On 31/10/14 14:49, intrigeri wrote: Hi, I could not find this pull request in the list's archives, so let's emulate it. [Off-topic: note that we still have *not* made it so we can reasonably skip sending pull requests here (namely: providing, documenting and advertising a way to follow

Re: [Tails-dev] [review'n'merge:1.2.2] liveusb-creator:bugfix/8353-update-status-when-device-appears

2015-01-13 Thread anonym
On 01/12/14 20:05, intrigeri wrote: Hi, I've had this usability issue on my personal todo list for (at least) months, along with a tentative patch. Now properly tested (by live-patching the code in a running Tails 1.2), so here we go = candidate for 1.2.2. I've described the steps to

Re: [Tails-dev] [review'n'merge:1.2.3] #8404 -- bugfix/handle-website-CA-change

2015-01-13 Thread anonym
On 06/01/15 11:13, intrigeri wrote: hi, * bugfix/handle-website-CA-change branch in main Git repo now creates the CA bundle without the CA that signed the old certificate, and names the bundle file in a more generic way * bugfix/handle-website-CA-change in the IUK Git repo has the

Re: [Tails-dev] [review'n'merge:1.2.2] test/8359-check-po

2015-01-13 Thread anonym
On 05/12/14 23:32, intrigeri wrote: Hi, in the same vein as #8360, here's now PO checking in our automated test suite, so that we check PO files in other branches than master too. One small commit, only adds stuff to the test suite = candidate for 1.2.2. Merged! Cheers!

Re: [Tails-dev] [review'n'merge: 1.2.3] bugfix/8571-fix-mac-spoof-panic-mode

2015-01-11 Thread anonym
On 06/01/15 18:41, anonym wrote: Hi, Apparently our MAC spoofing feature's panic mode is quite broken. Please review and merge the bugfix/8571-fix-mac-spoof-panic-mode branch into stable and devel. Before that you may want to have a look at comment 1 in the ticket and agree that commit

Re: [Tails-dev] [review'n'merge: 1.2.2] bugfix/7644-remove-mounted-image-from-vagrant-build-box

2015-01-06 Thread anonym
On 02/12/14 21:27, Kill Your TV wrote: On Mon, 1 Dec 2014 14:29:38 + (UTC) anonym ano...@riseup.net wrote: Any takers? KillYourTV? This branch worked fine. I wholeheartedly agree with merging. Merged! Thanks for testing! Cheers! ___ Tails

Re: [Tails-dev] Please review bugfix/8071-Do-not-suspend-to-RAM-when-closing-lid

2015-01-06 Thread anonym
On 03/01/15 22:35, matsa wrote: intrigeri intrig...@boum.org a écrit : matsa wrote (24 Dec 2014 05:32:33 GMT) : please review the following branch, which aim to fix the bug #8071: matsa/bugfix/8071-Do-not-suspend-to-RAM-when-closing-lid Mangled the ticket as needed = candidate for 1.2.3.

Re: [Tails-dev] Please review bugfix/8087-gnome-screenshot-save-to-home-folder

2015-01-06 Thread anonym
On 03/01/15 22:26, matsa wrote: Hi, please review the following branch, which aims to fix the bug #8087: matsa/bugfix/8087-gnome-screenshot-save-to-home-folder Merged, thanks! Cheers! ___ Tails-dev mailing list Tails-dev@boum.org

[Tails-dev] [review'n'merge: 1.2.3] bugfix/8571-fix-mac-spoof-panic-mode

2015-01-06 Thread anonym
Hi, Apparently our MAC spoofing feature's panic mode is quite broken. Please review and merge the bugfix/8571-fix-mac-spoof-panic-mode branch into stable and devel. Before that you may want to have a look at comment 1 in the ticket and agree that commit 54a80db is a good idea. Cheers!

Re: [Tails-dev] Fwd: Upcoming stable point release (7.8)

2015-01-05 Thread anonym
On 28/12/14 10:21, intrigeri wrote: hi, as usual, we should enable stable-proposed-updates ASAP, and disable it again once the point-release is out. anonym, will you take care of it? I updated the old feature/Debian-proposed-updates by merging in stable and resurrecting your two previous

[Tails-dev] [review'n'merge:1.2.3] test/8533-fix-tor-check-image

2015-01-05 Thread anonym
Hi, All tests looking for UnsafeBrowserTorCheckFail.png fail due to some minor change in how the Sorry. You are not using Tor. text on check.torproject.org is rendered, introduced recently. This branch fixes that (hopefully once and for all) by making the tests look for the crossed-over onion

Re: [Tails-dev] Meeting: our Tails/Jessie progress and plans

2014-12-17 Thread anonym
emergency release). I apologize as well. When we discussed it initially, both anonym and Alan were available on the 18th at noon CET. Works for me. anonym, Alan, does that still work for you? Unfortunately I now have pretty full day scheduled for tomorrow but I can squeeze in a meeting between 12:00

Re: [Tails-dev] Tails and forensics

2014-12-15 Thread anonym
On 14/12/14 04:39, Austin Hartzheim wrote: Also, if you would like some help with extracting the torrent files from the Git repository, I should have some time Tuesday/Wednesday (UTC) to grab those. Let me know if you want help with that. This should make the process pretty short: mkdir

Re: [Tails-dev] [review'n'merge: 1.3] bugfix/7951-refactor-chroot-browsers

2014-12-15 Thread anonym
On 13/12/14 11:43, intrigeri wrote: Hi, anonym wrote (30 Nov 2014 20:42:02 GMT) : On 31/10/14 13:55, intrigeri wrote: The design doc should be updated, at least to point to the new shell library file. Indeed. I see some good progress in the branch. How about pointing to i2p.sh

Re: [Tails-dev] [review'n'merge: 1.3] bugfix/7951-refactor-chroot-browsers

2014-12-15 Thread anonym
On 16/12/14 08:24, intrigeri wrote: anonym wrote (16 Dec 2014 01:48:56 GMT) : The relevant features pass: * features/torified_browsing.feature * features/unsafe_browser.feature * features/firewall_leaks.feature Windows camouflage might be impacted too, somehow. Ah, true. May you

Re: [Tails-dev] Reducing attack surface of kernel and tightening firewall/sysctls

2014-12-11 Thread anonym
On 04/12/14 21:16, Oliver-Tobias Ripka wrote: According to anonym on Thu, Dec 04 2014: FWIW I experienced no issues during my tests with *only* ESTABLISHED in both the INPUT and OUTPUT chains so neither NEW nor RELATED seems essential for the basic usage I tested. And of course the above

Re: [Tails-dev] Release schedule for Tails 1.2.2

2014-12-11 Thread anonym
On 11/12/14 12:51, u wrote: was it intentional that this has not been sent to tails-testers@b.o ? Yes. The testing I'm talking about here is internal testing of a final stable release, with trusted participants only. We ask for help from tails-testers@ by announcing release candidates there, and

[Tails-dev] Release schedule for Tails 1.2.2

2014-12-10 Thread anonym
Hi, I'll be the release manager for Tails 1.2.2, scheduled to be released on 2015-01-14 (or maybe even 2015-01-13, see below). Here's the preliminary release schedule: 2015-01-06: - Please try to have all branches aimed at 1.2.2 ready by this date! 2015-01-13: - Tor Browser

Re: [Tails-dev] #5594: tails-greeter: better administration password UI

2014-12-08 Thread anonym
On 06/12/14 12:33, intrigeri wrote: Given that the semantics of the fields are pretty different in the Greeter compared to in t-p-s, please provide a detailed description of how you think the Greeter should be changed in case you still think it's desirable. What I had in mind is: a. I

Re: [Tails-dev] Tails and forensics

2014-12-08 Thread anonym
On 08/12/14 05:30, Jacob Appelbaum wrote: How are IUK files verified? The JSON descriptors don't appear to contain a signature, merely a hash: https://tails.boum.org/upgrade/v1/Tails/1.2/i386/stable/upgrades.yml All upgrades.yml files are signed with the Tails signing key, for instance:

Re: [Tails-dev] Reducing attack surface of kernel and tightening firewall/sysctls

2014-12-04 Thread anonym
On 03/12/14 18:22, Jacob Appelbaum wrote: I propose that we change the rule to be: mod state state (NEW ESTABLISHED) ACCEPT; The reason is pretty simple - RELATED makes the kernel do a lot of extra lifting that is not needed by using the conntrack kernel code: While I think we

Re: [Tails-dev] Building with Vagrant (doc update)

2014-12-03 Thread anonym
On 02/12/14 23:38, intrigeri wrote: hi, Kill Your TV wrote (02 Dec 2014 20:49:59 GMT) : Perhaps apply the following? [...] -sudo tee /etc/apt/preferences.d/vagrant-1.4.3 EOF +sudo tee /etc/apt/preferences.d/vagrant-143 EOF I would even drop the version number from the filename:

Re: [Tails-dev] Meeting: our Tails/Jessie progress and plans

2014-12-02 Thread anonym
On 01/12/14 20:15, intrigeri wrote: Hi, so, we wanted to have that meeting in the 2nd half of September, and then we failed. Anyway, since then, we've made good progress, and things are starting to look quite good! I think it's time to meet, talk and adjust our plans. I hereby propose a

Re: [Tails-dev] vpwned + greeter

2014-12-02 Thread anonym
On 03/11/14 23:42, Jurre van Bergen wrote: On 11/02/2014 12:48 AM, intrigeri wrote: Hi, Jacob Appelbaum wrote (24 Jul 2014 01:16:26 GMT) : I've waited a while for folks to read it and I think at this point, we're at year two or so of waiting. It seems like the easy thing is to simply give

[Tails-dev] Call for translations: Tails 1.2.1 release notes and 1.2 security announce

2014-12-02 Thread anonym
Hi, translating team! Please translate the following PO files in the 'stable' branch: * wiki/src/news/version_1.2.1.*.po * wiki/src/security/Numerous_security_holes_in_1.2.*.po Cheers! ___ Tails-dev mailing list Tails-dev@boum.org

Re: [Tails-dev] Release schedule for Tails 1.2.1

2014-12-01 Thread anonym
On 18/11/14 11:11, anonym wrote: So here is the new tentative release schedule for Tails 1.2.1: 2014-12-01 TBB 4.x based on Firefox 31.3.0esr is *hopefully* out Tag 1.2.1 in Git Build and upload 1.2.1 ISO and IUKs 2014-12-02 Test (early CEST

Re: [Tails-dev] [review'n'merge: 1.3] bugfix/7951-refactor-chroot-browsers

2014-12-01 Thread anonym
On 01/12/14 06:24, intrigeri wrote: anonym wrote (30 Nov 2014 20:42:04 GMT) : On 31/10/14 16:02, intrigeri wrote: Ooops, I forgot this one. Obviously the test fails, so I think I've fixed it in e44f97c. No big deal, but it makes me question how much trust I can put, as a reviewer, into I've

Re: [Tails-dev] Building with Vagrant (doc update)

2014-12-01 Thread anonym
On 01/12/14 08:09, intrigeri wrote: anonym wrote (30 Nov 2014 21:19:35 GMT) : A working Vagrant can be installed from snapshot.d.o. Perhaps the attached patch against master would be a decent way to address this problem until either Tails' vagrant setup is updated (or replaced?). Thanks! I

[Tails-dev] [review'n'merge: 1.2.2] bugfix/7644-remove-mounted-image-from-vagrant-build-box

2014-12-01 Thread anonym
Hi, I've uploaded a new Vagrant basebox which fixes the tiny issue described in #7644. It's just a hacked version of the old basebox -- see the message in commit 2a0ca9e for details. One result is that the version reported inside the VM, e.g. in the hostname, stays the same as the old buildbox,

Re: [Tails-dev] [review'n'merge: 1.3] bugfix/7951-refactor-chroot-browsers

2014-11-30 Thread anonym
On 31/10/14 16:02, intrigeri wrote: Hi, intrigeri wrote (31 Oct 2014 12:55:44 GMT) : + when the I2P Browser +user = i2pbrowesr XXX Ooops, I forgot this one. Obviously the test fails, so I think I've fixed it in e44f97c. No big deal, but it makes me question how much trust I

Re: [Tails-dev] [review'n'merge:1.2.1] test/8161-more-robust-pidgin-connected

2014-11-30 Thread anonym
On 24/11/14 17:03, intrigeri wrote: Hi, the proposed branch makes the Pidgin tests a bit more reliable. Looks good, merged! The only change outside the test suite is that it installs xdotool, which is now needed in the test suite (and I suspect we'll want to use it in a few other similar

Re: [Tails-dev] [review'n'merge:1.2.1] feature/7740-remove-truecrypt

2014-11-30 Thread anonym
On 25/11/14 16:16, anonym wrote: On 17/10/14 18:16, intrigeri wrote: Hi, this branch implements the very last step on the incremental path toward removing TrueCrypt. The doc was already reviewed and improved by sajolida. [...] I'm currently looking into this one, and have assigned

Re: [Tails-dev] Heads up: updated build dependencies for Tails

2014-11-26 Thread anonym
On 26/11/14 19:19, anonym wrote: Hi, If you build Tails on Debian Wheezy you may want to add wheezy-backports to your sources and install `gettext` from it (= 0.18.3 is now required): apt-get install gettext/wheezy-backports It will actually only be relevant if you try to build

Re: [Tails-dev] [review'n'merge:1.2.1] feature/7740-remove-truecrypt

2014-11-25 Thread anonym
On 17/10/14 18:16, intrigeri wrote: Hi, this branch implements the very last step on the incremental path toward removing TrueCrypt. The doc was already reviewed and improved by sajolida. Problem is, I've merged the devel branch by mistake into this one a few days ago, so it has

Re: [Tails-dev] [review'n'merge: 1.2.1] feature/8028-remove-unsafe-browser-test-menu-workaround

2014-11-24 Thread anonym
On 23/11/14 19:23, intrigeri wrote: Hi, anonym wrote (21 Nov 2014 14:22:58 GMT) : Please review'n'merge into stable and devel. I've already merged it into feature/jessie since the old workaround didn't work there due to (I think) GUI unresponsiveness, but this branch works reliably

[Tails-dev] [review'n'merge: 1.2.1] feature/8028-remove-unsafe-browser-test-menu-workaround

2014-11-21 Thread anonym
Hi, Please review'n'merge into stable and devel. I've already merged it into feature/jessie since the old workaround didn't work there due to (I think) GUI unresponsiveness, but this branch works reliably. Cheers! ___ Tails-dev mailing list

Re: [Tails-dev] Release schedule for Tails 1.2.1

2014-11-18 Thread anonym
On 22/10/14 14:10, anonym wrote: Hi, I'll be the release manager for Tails 1.2.1, scheduled to be released on 2014-11-25. I'll start with the schedule part for the preparation of the final release: 2014-11-24 TBB 4.x based on Firefox 31.3.0esr is *hopefully* out Tag

Re: [Tails-dev] [review'n'merge: 1.2.1] feature/linux-3.16.0-4

2014-11-13 Thread anonym
On 12/11/14 22:13, intrigeri wrote: Hi, anonym wrote (12 Nov 2014 14:12:35 GMT) : Please review'n'merge this kernel bump into stable and devel, which will close ticket #8249. I've taken care of it, as part of the LHF session = passes some basic manual tests, and a couple features

Re: [Tails-dev] [review'n'merge: 1.2.1] feature/linux-3.16.0-4

2014-11-13 Thread anonym
On 12/11/14 20:54, intrigeri wrote: anonym wrote (12 Nov 2014 16:15:00 GMT) : When merging, please revert commit b010387 first so we'll install all related packages from unstable again. Any reason not to include this revert as part of the proposed branch? No. I branched off stable before

Re: [Tails-dev] [review'n'merge:1.2.1] bugfix/7945-directories-in-boot-profile

2014-11-13 Thread anonym
On 05/11/14 14:58, intrigeri wrote: Hi, bugfix/7945-directories-in-boot-profile fixes the issue identified by anonym in #7945, by filtering directories out in process_IN_ACCESS, just like we did already in process_IN_OPEN. The resulting boot profile is not substantially larger than the old

[Tails-dev] [review'n'merge: 1.2.1] feature/linux-3.16.0-4

2014-11-12 Thread anonym
Hi, Please review'n'merge this kernel bump into stable and devel, which will close ticket #8249. This has to be done relatively soon since the current kernel we install will be removed in about four days (~2014-11-16). A notable change in this kernel upgrade is that the -486 packages are renamed

Re: [Tails-dev] [review'n'merge: 1.2.1] feature/linux-3.16.0-4

2014-11-12 Thread anonym
On 12/11/14 15:12, anonym wrote: Hi, Please review'n'merge this kernel bump into stable and devel, which will close ticket #8249. This has to be done relatively soon since the current kernel we install will be removed in about four days (~2014-11-16). When merging, please revert commit

Re: [Tails-dev] Dropping the alternate US keyboard layout? (#7912)

2014-11-11 Thread anonym
On 10/11/14 17:28, intrigeri wrote: Hi, it seems (#7912) that our way to add the US keyboard layout as an alternative to the chosen one is racy, and sometimes makes it selected as the default layout instead of the chosen one. As indicated on the ticket (and one can see much more related

[Tails-dev] [review'n'merge:1.2.1] bugfix/8139-install-more-loxalized-searchplugins

2014-11-06 Thread anonym
Hi, This branch re-introduces the extra, localized browser search plugins we earlier had when installing the Iceweasel l10n packages. Well, it only installs them for the languages we install langpacks for, but once we ship more langpacks this fix will install the Iceweasel search plugins for them

Re: [Tails-dev] [review'n'merge:1.2.1] bugfix/8139-install-more-loxalized-searchplugins

2014-11-06 Thread anonym
Whoops, sorry for the typo in the branch name. I've already merged it into experimental, so I guess I'll just leave it like that... ___ Tails-dev mailing list Tails-dev@boum.org https://mailman.boum.org/listinfo/tails-dev To unsubscribe from this list,

Re: [Tails-dev] [review'n'merge:1.2.1] test/8140-more-robust-apps-menu

2014-11-05 Thread anonym
31/10/14 16:11, intrigeri wrote: Hi, this branch makes our test suite more robust. Please review'n'merge into stable and devel. Kill Your TV: you might want to take this one too. Too late; merged! ___ Tails-dev mailing list Tails-dev@boum.org

Re: [Tails-dev] [review'n'merge:1.2.1] bugfix/8186-pidgin-http-links

2014-11-05 Thread anonym
30/10/14 18:37, intrigeri wrote: Hi, bugfix/8186-pidgin-http-links tweaks the AppArmor profile for Pidgin to allow it to run Tor Browser (and hence, open links). Tested on top of current stable branch. Please review'n'merge into stable and devel. Merged!

Re: [Tails-dev] [review'n'merge:1.2.1] feature/7416-gnupg-socks

2014-11-05 Thread anonym
02/11/14 16:45, intrigeri wrote: Hi, feature/7416-gnupg-socks is a follow-up on the proposed branch for #7512, and is blocked by it. It makes GnuPG directly use the Tor SOCKS port for communicating with keyservers, instead of going through Polipo. Tested with gpg on the command-line and

Re: [Tails-dev] [review'n'merge:1.2.1] test/8059-more-robust-windows-systray

2014-11-05 Thread anonym
31/10/14 15:29, intrigeri wrote: Hi, this branch makes our Windows camouflage automated tests more robust. Please review'n'merge into stable and devel. Kill Your TV, want to take it? anonym: unless Kill Your TV takes it promptly, please review'n'merge it soon, as these false positives

[Tails-dev] [review'n'merge: 1.2.1] bugfix/8153-set-gnome-browser-mime-types

2014-10-30 Thread anonym
Hi, See the ticket [1] for details. Please review'n'merge into stable and devel. Cheers! [1] https://labs.riseup.net/code/issues/8153 ___ Tails-dev mailing list Tails-dev@boum.org https://mailman.boum.org/listinfo/tails-dev To unsubscribe from this

Re: [Tails-dev] [review'n'merge: 1.2.1] bugfix/8153-set-gnome-browser-mime-types

2014-10-30 Thread anonym
30/10/14 16:34, intrigeri wrote: Hi, intrigeri wrote (30 Oct 2014 13:01:58 GMT) : anonym wrote (30 Oct 2014 11:56:45 GMT) : See the ticket [1] for details. Please review'n'merge into stable and devel. [1] https://labs.riseup.net/code/issues/8153 The ticket reads This has been reported

Re: [Tails-dev] Release schedule for Tails 1.2.1

2014-10-30 Thread anonym
30/10/14 16:50, intrigeri wrote: anonym wrote (22 Oct 2014 12:10:59 GMT) : Next up, the preliminary release schedule for the 1.2.1 release candidate, *if* we feel we need one: 2014-11-05 Feature freeze 2014-11-12 Tag 1.2.1~rc1 in Git Build and upload 1.2.1~rc1 ISO

Re: [Tails-dev] [tbb-dev] TBB in Tails: Release timing in general

2014-10-23 Thread anonym
23/10/14 11:08, Georg Koppen wrote: Hi, anonym: Hi, For years Tails has shipped with an Iceweasel with the (relevant) Tor Browser patches applied. It has worked ok, but it's been high maintenance, and keeping the preferences synced with TBB was a bit of a chore, among other issues. Since

[Tails-dev] TBB in Tails: Release timing in general

2014-10-22 Thread anonym
Hi, For years Tails has shipped with an Iceweasel with the (relevant) Tor Browser patches applied. It has worked ok, but it's been high maintenance, and keeping the preferences synced with TBB was a bit of a chore, among other issues. Since Tails 1.2 we've migrated to installing the Tor Browser

[Tails-dev] Release schedule for Tails 1.2.1

2014-10-22 Thread anonym
Hi, I'll be the release manager for Tails 1.2.1, scheduled to be released on 2014-11-25. I'll start with the schedule part for the preparation of the final release: 2014-11-24 TBB 4.x based on Firefox 31.3.0esr is *hopefully* out Tag 1.2.1 in Git Build and

[Tails-dev] [review'n'merge: 1.2.1] bugfix/8158-stacked-rootfs-vs-chroot-browsers

2014-10-21 Thread anonym
Hi, This branch fixes bugs #8152 and #8158 and is based on a patch contributed by sanic (Thanks again!). Since I had to re-write the patch a bit I suppose it should be review'n'merged by someone else, so please review'n'merge into stable and devel! As for testing, see #8158 (comment 13) for what

[Tails-dev] [review'n'merge: 1.3] bugfix/7951-refactor-chroot-browsers

2014-10-21 Thread anonym
Hi, This branch is fairly big at 55 commits, netting 622 insertions and 552 deletions compared to the stable branch. Beyond getting the chroot browsers code into a much better, factorized shape, it also brings some nice improvements. As you may have noticed, there's still more insertions than

Re: [Tails-dev] [review'n'merge:1.2.1] bugfix/7426-scrolling-in-Spice-VM

2014-10-20 Thread anonym
13/10/14 13:19, intrigeri wrote: Hi, no Git change, only the bugfix-7426-scrolling-in-spice-vm APT suite to review and merge (you'll want to get the source package, and debdiff it against the one currently in Wheezy). Please test both in a libvirt+KVM+Spice guest and on bare metal. Works

Re: [Tails-dev] [review'n'merge:1.2.1] bugfix/8155-get-isohybrid-back

2014-10-20 Thread anonym
20/10/14 11:16, intrigeri wrote: Hi, this branch fixes a regression in Tails 1.2, caused by isohybrid moving around packages. Merged into stable and devel. Cheers! ___ Tails-dev mailing list Tails-dev@boum.org

[Tails-dev] [review'n'merge: 1.2.1] bugfix/8160-restrict-tor-browser-logging [Was: Torbutton in crazy DEBUG mode dumping ALL history to ~/.xsession-errors]

2014-10-20 Thread anonym
20/10/14 09:53, intrigeri wrote: Hi, Why is Torbutton in DEBUG mode, spewing info about the sites you visit into amnesia user's .xsession-errors file and where can I turn this Torbutton DEBUG setting OFF? Thanks, filed as #8160. I pushed a fix. Please review and merge into stable and

Re: [Tails-dev] [review'n'merge:1.2.1] feature/7512-Make-GnuPG-config-closer-to-duraconf-reworked

2014-10-20 Thread anonym
17/10/14 18:04, intrigeri wrote: Hi, this branch makes it easier for members of various Tails core teams to respect the corresponding security policy, if they're using Tails to contribute. Thanks to Emma Peel and Kill Your TV for the initial version of this branch, that I have built upon.

Re: [Tails-dev] [review'n'merge:1.2] feature/tor-browser-4.0

2014-10-14 Thread anonym
13/10/14 22:33, intrigeri wrote: anonym wrote (13 Oct 2014 15:53:54 GMT) : * #8058 - Upgrade to Torbutton 1.7.0.1 final I think you forgot to push to our Torbutton Git repo, so I cannot review this part yet. Sorry, done now. Cheers! ___ Tails

Re: [Tails-dev] Migrating to (something closer to) the regular Tor Browser

2014-10-14 Thread anonym
13/10/14 22:17, intrigeri wrote: Hi, anonym wrote (13 Oct 2014 15:54:06 GMT) : 11/10/14 12:40, intrigeri wrote: 1. install_debian_extensions() could take the list of packaged extensions as arguments (after the tbb_install one); sure, that's cosmetic. Done in commit a41768b

Re: [Tails-dev] Migrating to (something closer to) the regular Tor Browser

2014-10-14 Thread anonym
14/10/14 00:57, intrigeri wrote: anonym wrote (13 Oct 2014 15:54:06 GMT) : Please merge feature/8031-refactor-10-rbb-hook into devel and testing if everything looks good! Also: --- a/wiki/src/contribute/release_process/tor-browser.mdwn +++ b/wiki/src/contribute/release_process/tor

Re: [Tails-dev] Migrating to (something closer to) the regular Tor Browser

2014-10-14 Thread anonym
13/10/14 22:18, intrigeri wrote: anonym wrote (13 Oct 2014 19:47:19 GMT) : See the note in `wiki/src/contribute/release_process/tor-browser.mdwn` of that branch. Basically, when using https://;, apt-cacher-ng will break, which e.g. Vagrant uses by default. I thought this was fixed

Re: [Tails-dev] [review'n'merge:1.2] feature/tor-browser-4.0

2014-10-14 Thread anonym
14/10/14 11:28, intrigeri wrote: anonym wrote (13 Oct 2014 15:53:54 GMT) : Please review and merge (Git and APT) into devel and testing. Merged, congrats! Please in turn merge into the refactoring branch, and resolve conflicts there. However, there are still a bunch of serious unaddressed

[Tails-dev] [review'n'merge:1.2] several browser localization fixes [Was: [review'n'merge:1.2] feature/tor-browser-4.0]

2014-10-14 Thread anonym
14/10/14 14:16, anonym wrote: 14/10/14 11:28, intrigeri wrote: anonym wrote (13 Oct 2014 15:53:54 GMT) : Please review and merge (Git and APT) into devel and testing. Merged, congrats! Please in turn merge into the refactoring branch, and resolve conflicts there. However, there are still

Re: [Tails-dev] Migrating to (something closer to) the regular Tor Browser

2014-10-13 Thread anonym
11/10/14 13:04, intrigeri wrote: Hi, also, the current overall state of how we install and configure the browser at install time is currently spread over these hooks (at least): * 10-tbb * 12-remove_unwanted_browser_searchplugins * 13-override-tbb-branding *

Re: [Tails-dev] Migrating to (something closer to) the regular Tor Browser

2014-10-13 Thread anonym
11/10/14 12:40, intrigeri wrote: Hi, for the record, I've already reviewed and merged the branches that fix #8057 and #8035. Now, reviewing the branch for #8031. 0. The script looks much better and understandable to me, congrats! \o/ 1. install_debian_extensions() could take the list

Re: [Tails-dev] Migrating to (something closer to) the regular Tor Browser

2014-10-13 Thread anonym
13/10/14 20:14, sajol...@pimienta.org wrote: I haven't followed this thread at all, but while building Tails Jessie with that branch in it failed because of the redirection from http://people.torproject.org/ to https://people.torproject.org/. So why not using https:// instead of http:// in

[Tails-dev] [review'n'merge: 1.2] bugfix/8038-remove-useless-iceweasel-apt-pinning

2014-10-10 Thread anonym
Hi, Optimistically assigned to alant, the bug reporter. If you won't do the review'n'merge, please unassign yourself and let us know in this thread. Cheers! ___ Tails-dev mailing list Tails-dev@boum.org https://mailman.boum.org/listinfo/tails-dev To

Re: [Tails-dev] [review'n'merge:1.2] feature/apparmor (#8004) [Was: AppArmor support: status update]

2014-10-08 Thread anonym
06/10/14 14:44, intrigeri wrote: Hi, please review'n'merge feature/apparmor for Tails 1.2. Tickets that it covers: * #8004 and its various sub-tasks * #8003 (Automatic tests for IRC in Pidgin) Looks very good! Some off-list discussion about an issue resulted in commit a8ace8a. Now

Re: [Tails-dev] [review'n'merge:1.2] feature/tor-0.2.5.x-alpha (#7907)

2014-10-08 Thread anonym
06/10/14 16:48, intrigeri wrote: intrigeri wrote (06 Oct 2014 13:54:10 GMT) : intrigeri wrote (06 Oct 2014 13:49:57 GMT) : anonym, shall we try using tor_bootstrap_progress in tor_is_working, instead of relying on cached-microdescs* files appearing on the filesystem? Just to avoid

Re: [Tails-dev] [review'n'merge:1.2] feature/7732-i2p-network-manager-hook

2014-10-08 Thread anonym
02/10/14 04:24, Kill Your TV wrote: On Wed, 1 Oct 2014 00:45:10 + (UTC) anonym ano...@riseup.net wrote: 27/09/14 12:53, Kill Your TV wrote: On Fri, 26 Sep 2014 16:25:16 + (UTC) Would you merge this? :) BTW, I've personally tested this branch according to the new manual test steps

Re: [Tails-dev] [review'n'merge 1.2] feature/7725-i2p-browser

2014-10-08 Thread anonym
02/10/14 04:24, Kill Your TV wrote: On Wed, 1 Oct 2014 01:08:00 + (UTC) anonym ano...@riseup.net wrote: 29/09/14 04:31, anonym wrote: I think the changes requested have been addressed. Please see the latest pushed commits. After these things are fixed, and the user documentation has

<    1   2   3   4   5   6   7   8   9   >