Re: [Tails-dev] Fwd: openssl security update

2014-06-06 Thread anonym
05/06/14 22:11, intrigeri wrote: Likely we want this into 1.0.1. Anyone up to add the LTS repo to APT sources, with proper pinning? (I would suggest picking only selected packages from there, since it's a free-for-all archive, so stuff may not have seen the same amount of QA than regular

[Tails-dev] [review'n'merge:1.0.1] feature/squeeze-lts-updates

2014-06-06 Thread anonym
Hi, Branch: feature/squeeze-lts-updates Ticket: None Please merge this branch into stable before the 1.0.1 freeze on Sunday, 2014-06-08. The purpose of this branch is to install openssl and GnuTLS security updates from Squeeze LTS. Hence the only difference compared to a current stable build

Re: [Tails-dev] [review'n'merge:1.0.1] feature/squeeze-lts-updates

2014-06-06 Thread anonym
06/06/14 14:35, intrigeri wrote: anonym wrote (06 Jun 2014 12:21:11 GMT) : Branch: feature/squeeze-lts-updates I'll take it. Please file a ticket so I don't forget. Done, assigned to you: https://labs.riseup.net/code/issues/7374 I'll also replace http.debian.net with the ftp.us.debian.org

[Tails-dev] Tor 0.2.4.22 in 1.0.1

2014-06-06 Thread anonym
Hi, I have just removed Tor 0.2.4.21-1+tails1~d60.squeeze+1 [1] packages from the stable APT suite, so the 0.2.4.22 ones will installed from now on and, hence, be in Tails 1.0.1. (For the record I did the same for devel in time for the 1.1~beta1 freeze; see my last comment on #7342.) I have run

Re: [Tails-dev] Camouflage: left to do [was: Please review and merge feature/6342-update-camouflage-for-gnome3]

2014-06-03 Thread anonym
29/05/14 19:09, Alan wrote: I've looked at all these tickets, closed/updated them as necessary, and created a few new ones. These tickets describe my vision of what the theme should look like in 1.1: #7316: Fix system tray icon size in camouflage mode I worked on this several hours. There

Re: [Tails-dev] Heads up: update your build environment

2014-05-28 Thread anonym
28/05/14 10:44, intrigeri wrote: Hi, intrigeri wrote (11 May 2014 19:45:19 GMT) : tl;dr: * If you are maintaining your Tails build VM manually, please upgrade your Tails build VM to Wheezy, and install our custom live-build package as documented on

Re: [Tails-dev] Please review and merge feature/6342-update-camouflage-for-gnome3

2014-05-28 Thread anonym
everything to anonym but I think they would welcome help! I've looked at all these tickets, closed/updated them as necessary, and created a few new ones. These tickets describe my vision of what the theme should look like in 1.1: #7316: Fix system tray icon size in camouflage mode #7325: Fix application

[Tails-dev] Release schedule for Tails 1.0.1 and 1.1

2014-05-28 Thread anonym
Hi, As was decided during the last few days, Tails 1.1 will be postponed [1]. Ignore the old release schedule for Tails 1.1 [2]! Just to be clear, Tails 1.0.1 will be a point-release of 1.0 that's still based on Debian Squeeze, and all the different 1.1 releases will be based on Debian Wheezy.

Re: [Tails-dev] [review'n'merge] feature/torbrowser-24.5.0esr-1+tails1

2014-05-27 Thread anonym
27/05/14 09:08, intrigeri wrote: anonym wrote (26 May 2014 18:14:27 GMT) : I pinged the ticket and now Mike Perry seems to want to revert those prefs [1] although the follow-ups makes it look like it's not decided yet. ... so it seems unclear what we should do for RC1. My take

Re: [Tails-dev] [review'n'merge:1.1] #6559, #7062, #6275: test/6559-adapt-test-suite-for-Wheezy

2014-05-27 Thread anonym
13/05/14 22:12, intrigeri wrote: anonym wrote (13 May 2014 15:53:17 GMT) : My suggestion would be that we don't use the emergency shitdown, and simply sends a `halt`, which we did before, and which was much more reliable. I know you want us to the same ways we except our users to use, and I

Re: [Tails-dev] [Was: [review'n'merge:1.1] #6559, #7062, #6275: test/6559-adapt-test-suite-for-Wheezy]

2014-05-27 Thread anonym
13/05/14 22:48, intrigeri wrote: anonym wrote (13 May 2014 15:54:22 GMT) : Regarding the removal of test suite steps that look at notifications: [...] 2. These steps were also useful to... actually test that we're displaying these notifications. In the context of the test suite

Re: [Tails-dev] Please review and merge feature/6342-update-camouflage-for-gnome3

2014-05-27 Thread anonym
27/05/14 20:03, intrigeri wrote: Alan wrote (27 May 2014 17:36:04 GMT) : - gnome-theme-windows8 (@git.tails.boum.org) - gnome-panel-applet-window-picker (@git.tails.boum.org). I'm happy to review the packaging once it's Lintian-clean (with lintian --info --display-info --pedantic run on the

Re: [Tails-dev] Postponing 1.1?

2014-05-27 Thread anonym
27/05/14 18:29, intrigeri wrote: Hi, anonym wrote (09 May 2014 10:38:41 GMT) : I'll be release manager for the Tails 1.1 release. Here's the preliminary release schedule: 2014-05-28 Feature freeze. Tag 1.1-rc1 in Git. Build and upload 1.1-rc1 ISO/IUKs

Re: [Tails-dev] 1.1 merge review

2014-05-26 Thread anonym
26/05/14 13:30, intrigeri wrote: Alan wrote (12 Apr 2014 10:47:24 GMT) : Created https://labs.riseup.net/code/issues/7013 for it, with hopefully all the needed information. Anonym, please assign me a subtask of this if you want and notify me by personal email. anonym, alan: how's

Re: [Tails-dev] 1.1 merge review

2014-05-26 Thread anonym
26/05/14 14:31, intrigeri wrote: anonym wrote (26 May 2014 12:24:44 GMT) : Any way, I guess not removing python2.6 any more is a mistake? Nice catch! Yes, this does look like a mistake. I can safely remove it from a runnig Tails/devel. I'll drop it directly in devel, if you don't mind

Re: [Tails-dev] [review'n'merge:1.1] bugfix/7065-keyboard-localization

2014-05-26 Thread anonym
26/05/14 15:14, intrigeri wrote: Hi, anonym wrote (20 May 2014 11:42:18 GMT) : Luckily I found a proper fix, now ready for review in bugfix/7065-keyboard-localization. It's in both Tails' and the Greeter's Git, and a new Greeter snapshot has been uploaded to the feature branch's APT suite

Re: [Tails-dev] Please review and merge feature/5711-liferea-persistence-preset

2014-05-26 Thread anonym
26/05/14 15:23, intrigeri wrote: Hi, anonym wrote (26 May 2014 12:38:40 GMT) : In other words, a s/usewithtor/torsocks/ is all that's needed, right? That would be my guess too, but I did not test it. Given your two responses to this pull request, should I take it that you reviewed

Re: [Tails-dev] [review'n'merge:1.1] feature/tor-launcher-0.2.5.4

2014-05-26 Thread anonym
26/05/14 11:40, intrigeri wrote: Hi, anonym wrote (18 May 2014 22:33:47 GMT) : This branch imports Tor Launcher 0.2.5.4 (from 0.2.5.3) + a few fixes from master (see commit message). With this package, our delta against upstream has only decreased since upstream has fixed several things we

Re: [Tails-dev] [review'n'merge:1.1] #7097 feature/torbutton-1.6.9.0

2014-05-26 Thread anonym
26/05/14 11:07, intrigeri wrote: Hi, merged, thanks. Congrats! Thanks! Other (non-blocking) comments: The entry in debian/changelog for 1.6.9.0 seems to lack everything that can be found in the 1.6.7.0 and 1.6.8.0 upstream changelog sections, that hence don't appear anywhere in

Re: [Tails-dev] [review'n'merge] feature/torbrowser-24.5.0esr-1+tails1

2014-05-26 Thread anonym
26/05/14 11:19, intrigeri wrote: Hi, intrigeri wrote (12 May 2014 14:45:05 GMT) : I'll let you follow-up with the Tor ticket, and nag the TBB team if needed. I'm curious (and would like our browser in 1.1~rc1 to be as close as possible to the one we'll ship in the final 1.1): any news on

Re: [Tails-dev] Please review and merge feature/6763-include-nautilus-gtkhash into devel

2014-05-26 Thread anonym
think it's now ready for a final review and merge. I assigned the ticket back to anonym as this should go pretty fast. Merged! Cheers! ___ Tails-dev mailing list Tails-dev@boum.org https://mailman.boum.org/listinfo/tails-dev To unsubscribe from

Re: [Tails-dev] [review'n'merge:1.1] bugfix/7279-Florence-font

2014-05-26 Thread anonym
26/05/14 14:57, intrigeri wrote: Hi, bugfix/7279-Florence-font workarounds #7279. Please merge for 1.1. Assigned to anonym. Reported to Debian as https://bugs.debian.org/749326. I can confirm the bug and the fix. Merged! Cheers! ___ Tails-dev

Re: [Tails-dev] [review'n'merge:1.1] doc/7280-VirtualBox-vs-syslinux-6 [Was: UEFI vs. VirtualBox]

2014-05-26 Thread anonym
, and the known workarounds, in doc/7280-VirtualBox-vs-syslinux-6. Please review'n'merge for 1.1. Assigned to anonym. Merged. And thanks for adding it to the 1.1~rc1 announcement! :) Cheers! ___ Tails-dev mailing list Tails-dev@boum.org https

Re: [Tails-dev] Camouflage status for 1.1

2014-05-26 Thread anonym
26/05/14 01:06, Alan wrote: Hi, This looks like a mix of Windows 8 and 8.1: * the color theme is like the default in 8 * the background image is the default from 8 * the start button is only present in 8.1 Some screencasts of 8.0 seemd to have it. Perhaps is it an option? I think there

Re: [Tails-dev] [review'n'merge:1.1] bugfix/7248-bg-color-vs-display-settings-change

2014-05-26 Thread anonym
interesting years ahead of us! :S Please review'n'merge for 1.1. Assigned to anonym. Works like charm. Merged! Cheers! ___ Tails-dev mailing list Tails-dev@boum.org https://mailman.boum.org/listinfo/tails-dev To unsubscribe from this list, send

Re: [Tails-dev] [review'n'merge:1.1] bugfix/7065-keyboard-localization

2014-05-20 Thread anonym
14/05/14 15:57, anonym wrote: 09/05/14 17:36, intrigeri wrote: However, even if I'd prefer a solution without a static sleep, I prefer shipping this in 1.1 compared to our other options. Luckily I found a proper fix, now ready for review in bugfix/7065-keyboard-localization. It's in both Tails

Re: [Tails-dev] Help needed on #5972: Fix virtualbox guest modules build

2014-05-19 Thread anonym
19/05/14 00:57, sajol...@pimienta.org wrote: anonym: 16/05/14 09:52, sajol...@pimienta.org wrote: Anyway, I'm absolutely not sure I'll be able to fix that before the freeze. I'd rather concentrate on the documentation upgrades. So if any VirtualBox user want to have a look... I haven't done

Re: [Tails-dev] Help needed on #5972: Fix virtualbox guest modules build

2014-05-19 Thread anonym
19/05/14 14:36, sajol...@pimienta.org wrote: anonym: Reading this, I get the impression that *all* guest features are broken, but at least Shared folders work (but not auto-mounting since `VBoxService` is broken). This exception may be worth mentioning, but I won't block on it... Ah shit

Re: [Tails-dev] Please review and merge bugfix/7251-orca

2014-05-19 Thread anonym
19/05/14 16:51, sajol...@pimienta.org wrote: GNOME Orca was broken in Tails 1.1, this branch fixes it. Ticket: #7251 - ORCA screen reader fails to start Branch: bugfix/7251-orca → devel Merged! Cheers! ___ Tails-dev mailing list

Re: [Tails-dev] [review'n'merge:1.1] bugfix/looser-memory-requirements-for-upgrades-check (#7235)

2014-05-19 Thread anonym
14/05/14 00:35, intrigeri wrote: Hi, please review'n'merge bugfix/looser-memory-requirements-for-upgrades-check into devel, for Tails 1.1. As explained on the ticket, this allows us to avoid bumping the hardware requirements, and to avoid having to implement #5502 right now. Tested in a 1

Re: [Tails-dev] Fix for Bug #5673 - Wheezy: way too small fonts in Tails Installer

2014-05-19 Thread anonym
24/04/14 23:43, Andres Gomez Ramirez wrote: Hello, Attached I send a patch for Bug #5673 - Wheezy: way too small fonts in Tails Installer https://labs.riseup.net/code/issues/5673. Looks good! Merged and a new liveusb-creator package has been built an uploaded to devel and experimental.

[Tails-dev] [review'n'merge:1.1] #7097 feature/torbutton-1.6.9.0

2014-05-18 Thread anonym
Hi, Branch:feature/torbutton-1.6.9.0 APT suite: feature-torbutton-1.6.9.0 Ticket:https://labs.riseup.net/code/issues/7097 This branch imports Torbutton 1.6.9.0 and (by necessity) fixes #7097. Note that bot a Git and APT level merge are needed. Normally I suppose intrigeri would take

[Tails-dev] [review'n'merge:1.1] feature/tor-launcher-0.2.5.4

2014-05-18 Thread anonym
Hi, Branch: feature/tor-launcher-0.2.5.4 Ticket: None This branch imports Tor Launcher 0.2.5.4 (from 0.2.5.3) + a few fixes from master (see commit message). With this package, our delta against upstream has only decreased since upstream has fixed several things we patched in our Tor Launcher.

Re: [Tails-dev] Help needed on #5972: Fix virtualbox guest modules build

2014-05-16 Thread anonym
16/05/14 09:52, sajol...@pimienta.org wrote: Anyway, I'm absolutely not sure I'll be able to fix that before the freeze. I'd rather concentrate on the documentation upgrades. So if any VirtualBox user want to have a look... I haven't done a code review yet, but it looks very promising to me

Re: [Tails-dev] [review'n'merge:1.1] feature/6608-OpenPGP-signature-verification-in-Nautilus

2014-05-16 Thread anonym
11/05/14 11:55, intrigeri wrote: Hi, I have uploaded shared-mime-info 1.2-1~bpo70+1.tails1 to the APT suite corresponding to this branch, since 1.3 won't make its way into Debian sid-testing-wheezy-backports in time for Tails 1.1 (see Debian #743942). This package cherry-picks the commit we

Re: [Tails-dev] General Comments on Download/Installation Documents

2014-05-15 Thread anonym
15/05/14 06:23, John Olsen wrote: Gentlemen: I regard myself as a power windows user and program in pascal, php, basic, a couple variations of assembly and write MySQL stored procedures. Yet, I have been unable to navigate through to the point where I have an operating USB stick. Why?

Re: [Tails-dev] tor-launcher... without xulrunner

2014-05-15 Thread anonym
14/05/14 01:57, intrigeri wrote: Hi, xulrunner is being phased out. Iceweasel 30 betas in Debian don't ship it anymore. We use it to run tor-launcher. We have to migrate away from it before we move to Firefox 31 ESR. Details: https://labs.riseup.net/code/issues/7236 Sorry for the bad

Re: [Tails-dev] Please review and merge whisperback:bugfix/filter_more_serial_nos

2014-05-15 Thread anonym
07/03/14 16:20, Alan wrote: Hi, Alan wrote (07 Mar 2014 13:51:02 GMT) : * HACKING has not been updated to document that one should run the test suite before releasing (fixed in c31f5a5) This was kind of intended, as it is far from complete and the refactoring it is supposed to test

Re: [Tails-dev] [tor-talk] Upcoming stable release: 0.2.4.22. Please test?

2014-05-15 Thread anonym
15/05/14 02:28, Nick Mathewson wrote: On Wed, May 14, 2014 at 4:55 PM, anonym ano...@riseup.net wrote: 14/05/14 21:46, Nick Mathewson wrote: Hi, all! We're going to be releasing Tor 0.2.4.22 soon. I have a candidate source bundle at [...] Unless there's a lot of unexpected problems, am I

Re: [Tails-dev] Help needed on #5972: Fix virtualbox guest modules build

2014-05-15 Thread anonym
15/05/14 20:35, sajol...@pimienta.org wrote: I've been working on fixing the build of the VirtualBox guest modules in Tails 1.1. ticket: 5972 branch: bugfix/fix_virtualbox_dkms_build Summary: - Good news: The build is fixed, way less hackish, and that was easy. - Bad news: The

Re: [Tails-dev] #5594: tails-greeter: better administration password UI

2014-05-14 Thread anonym
14/05/14 11:00, Andres Gomez Ramirez wrote: But the patch is compound of two parts: one for obligatory password and other that checks for admin password matching. I think this last part could be keep. Sorry, but I don't get it. I've looked as best I can on the patch, and the only other thing

Re: [Tails-dev] [review'n'merge:1.1] bugfix/7065-keyboard-localization

2014-05-14 Thread anonym
09/05/14 17:36, intrigeri wrote: Hi, bugfix/7065-keyboard-localization fixes issue #7065 for me. Assigned to the RM (anonym) for review. The solution I've found to this problem is partly implemented in the greeter, and partly in the main Git repo, so it'll require two Git merges + an APT

Re: [Tails-dev] [review'n'merge:1.1] bugfix/7065-keyboard-localization

2014-05-14 Thread anonym
14/05/14 15:57, anonym wrote: However, even if I'd prefer a solution without a static sleep, I prefer shipping this in 1.1 compared to our other options. Well, something also should be done so we don't get ['us', 'us'] when 'us' is the selected layout, which my current (simplistic) patch does

Re: [Tails-dev] Please review and merge tails-greeter:bugfix/6959-persistent_printers

2014-05-14 Thread anonym
04/04/14 14:47, Alan wrote: Please review and merge into tails-greeter:master tails-greeter:bugfix/6959-persistent_printers. I believe it fixes https://labs.riseup.net/code/issues/6959 Persistence of printer broken in Tails 0.23 Please also merge bugfix/6959-persistent_printers-wheezy

[Tails-dev] #7250 Bring back keyboard layout switch on presing Alt+Shift [Was: [review'n'merge:1.1] bugfix/7065-keyboard-localization]

2014-05-14 Thread anonym
09/05/14 17:36, intrigeri wrote: bugfix/7065-keyboard-localization fixes issue #7065 for me. While testing this branch I noticed that Alt+Shift doesn't switch layout any more. Apparently GNOME nowadays expects grp\tgrp:alt_shift_toggle so that should be fixed in tails-greeter. However, we

Re: [Tails-dev] [tor-talk] Upcoming stable release: 0.2.4.22. Please test?

2014-05-14 Thread anonym
14/05/14 21:46, Nick Mathewson wrote: Hi, all! We're going to be releasing Tor 0.2.4.22 soon. I have a candidate source bundle at [...] Unless there's a lot of unexpected problems, am I right to assume that there's a good probability for 0.2.4.22 to be released before 8th of June (the day

Re: [Tails-dev] Which I2P in Tails 1.1?

2014-05-14 Thread anonym
15/05/14 00:59, Kill Your TV wrote: On Sun, 11 May 2014 09:20:59 + (UTC) intrigeri intrig...@boum.org wrote: Hi Kill Your TV, I'm wondering what version of I2P you want to see in Tails 1.1. In the devel branch, we're currently installing 0.9.12-1~deb7u+1 from your APT repo. If you

Re: [Tails-dev] [review'n'merge:1.1] feature/uefi (#5739)

2014-05-13 Thread anonym
13/05/14 13:58, intrigeri wrote: anonym wrote (13 May 2014 11:23:56 GMT) : As the RM, I agree with all this. [...] I trust you'll deal with the rest in time for the release. Thanks a lot. I'd like to start merging now (for the super-quick resolution), but I have issues building liveusb

Re: [Tails-dev] [review'n'merge:1.1] feature/uefi (#5739)

2014-05-13 Thread anonym
13/05/14 15:17, intrigeri wrote: anonym wrote (13 May 2014 12:42:35 GMT) : and --git-no-pristine-tar doesn't help (and ../liveusb-creator_3.11.6.orig.tar.gz exists) FTR, we don't use pristine-tar for this package. I just did what the building instructions said one should do when

Re: [Tails-dev] [review'n'merge:1.1] #6559, #7062, #6275: test/6559-adapt-test-suite-for-Wheezy

2014-05-13 Thread anonym
11/05/14 13:50, intrigeri wrote: Hi, intrigeri wrote (10 May 2014 15:22:54 GMT) : Test suite run in progress, I'll inspect results and report back later (likely tomorrow). Here we go! I think my first failure may be a blocker, as it's a regression. For the others, I don't know. So,

Re: [Tails-dev] Release schedule for Tails 1.1

2014-05-12 Thread anonym
09/05/14 12:38, anonym wrote: The dates in June are pretty much set in stone as far as I'm concerned, but the freeze and RC dates may be moved a couple days (so this time the release schedule is indeed very preliminary) since I have other commitments that may collide. More precisely, the May

Re: [Tails-dev] #6400: upstreaming our rjb support

2014-05-12 Thread anonym
10/05/14 14:08, intrigeri wrote: anonym wrote (09 May 2014 14:24:40 GMT) : Because of all this I've finally concluded that I would prefer to keep on maintaining our sikuli/rjb adapter for the time being, and possibly return to this upstreaming process if Rukuli shows promise to at least stay

Re: [Tails-dev] #5594: tails-greeter: better administration password UI

2014-05-12 Thread anonym
30/03/14 19:22, Andres Gomez Ramirez wrote: Hi, Do you think you could rebase your patch on top of the wheezy branch of the greeter, and test it in an (experimental) Wheezy-based ISO? You can download such an ISO on http://nightly.tails.boum.org/build_Tails_ISO_feature-wheezy/ yes,

[Tails-dev] Release schedule for Tails 1.1

2014-05-09 Thread anonym
Hi, I'll be release manager for the Tails 1.1 release. Here's the preliminary release schedule: 2014-05-28 Feature freeze. Tag 1.1-rc1 in Git. Build and upload 1.1-rc1 ISO/IUKs. 2014-05-29 Test 1.1-rc1. 2014-05-30 Officially release 1.1-rc1.

Re: [Tails-dev] status of the experimental branch

2014-05-09 Thread anonym
01/05/14 12:20, intrigeri wrote: hi, anonym: our experimental APT suite has e.g. an oldish tails-perl5lib compared to the devel and stable ones. I suspect something went wrong with this part of the release process. Woah, I had completely missed this email. I've now (AFAICT) fixed the state

Re: [Tails-dev] #6400: upstreaming our rjb support [Was: Please review'n'merge test/rjb-migration]

2014-05-09 Thread anonym
, a few commits every month). [1] https://github.com/chaslemley/sikuli_ruby [2] https://github.com/andreanastacio/Rukuli anonym, bertagaz: want to have a(nother) look, and decide if you prefer to do the upstreaming work now, or to commit to maintain our own sikuli/rjb adapter on the long

[Tails-dev] [review'n'merge] feature/torbrowser-24.5.0esr-1+tails1

2014-05-09 Thread anonym
Hi, Branch:feature/torbrowser-24.5.0esr-1+tails1 APT suite: feature-torbrowser-24.5.0esr-1-tails1 Ticket:No Please review and merge (both Git and APT suite wise) into devel. I'ts already been merged into experimental. I've run features/torified_browsing.feature in the automated test

Re: [Tails-dev] [review'n'merge:1.1] #7150: feature/linux-3.14

2014-05-07 Thread anonym
merged it myself, as 3.13 has indeed disappeared from sid, and all the builds we care about are broken. I'm leaving the ticket as ready for QA, so that anonym can review it when he's back. Looks good. My short tests didn't detect any immediate regressions on two bare metal systems, and in KVM

Re: [Tails-dev] UEFI vs. VirtualBox

2014-05-07 Thread anonym
06/05/14 18:46, intrigeri wrote: hi, a core developer added some VirtualBox/UEFI compatibility notes in commit 349ebfe82. Thanks! That was me. The thing is, these reports are about an ISO built from a commit I made on May 3rd; and, I only uploaded on the very same day a version of

Re: [Tails-dev] UEFI vs. VirtualBox

2014-05-07 Thread anonym
07/05/14 18:35, intrigeri wrote: anonym wrote (07 May 2014 16:00:14 GMT) : However, I don't think that's relevant as I was testing *DVD* boot from the image I built. Ah, OK. I've added this (very important) info to the test reports page. This was what I though the known issue was about

Re: [Tails-dev] Help needed/wished for 1.1 (Wheezy) tasks

2014-05-07 Thread anonym
01/05/14 13:14, intrigeri wrote: anonym wrote (02 Apr 2014 14:37:19 GMT) : Test suite == * Adapt test suite for Wheezy https://labs.riseup.net/code/issues/6559 I've started already, and will try to complete this ASAP, to help evaluate how much stuff is still broken

[Tails-dev] [review'n'merge] #7166: bugfix/7166-vagrant-memory-checks

2014-05-06 Thread anonym
Hi, Please review and merge the branch bugfix/7166-vagrant-memory-checks into the devel branch, which fixes #7166 [1]. I've optimistically assigned the ticket to Kill Your TV since s/he did the previous testing. This time, a successful test means that you can build Tails in RAM like this, which

Re: [Tails-dev] [review'n'merge:1.0] feature/tor-0.2.4.21-1+tails1_{d60.squeeze, d70.wheezy}+1

2014-04-26 Thread anonym
26/04/14 11:54, intrigeri wrote: Hi, anonym wrote (24 Apr 2014 17:53:16 GMT) : For the code review it may be useful to have a look at the (rather trivial) backporting work I did, which can be found in our 'tor' Git repo. The backporting to 0.2.4.21 can be found in isolation

[Tails-dev] [review'n'merge] bugfix/vagrant-ram-bump-for-wheezy

2014-04-25 Thread anonym
Hi, Please review and merge into devel: Tails Git branch: bugfix/vagrant-ram-bump-for-wheezy This branch simply bumps the Vagrant builder's RAM by 512 MiB (from 6.5 GiB to 7 GiB), which is necessary to complete builds due to Wheezy's increased size on disk. Note that in order to have these

Re: [Tails-dev] Please review and merge feature/logo into stable

2014-04-25 Thread anonym
25/04/14 11:46, sajol...@pimienta.org wrote: Sorry for the short delay, but here is the branch that integrates the logo in the most critical places: - SVG source for the logo in different forms - website - splash screen Branch: feature/logo Tickets: - #7088: Integrate the new

Re: [Tails-dev] Please review and merge feature/logo into stable

2014-04-25 Thread anonym
25/04/14 14:52, anonym wrote: 25/04/14 11:46, sajol...@pimienta.org wrote: Sorry for the short delay, but here is the branch that integrates the logo in the most critical places: - SVG source for the logo in different forms - website - splash screen Branch: feature/logo Tickets

Re: [Tails-dev] [review'n'merge:1.1] feature/6608-OpenPGP-signature-verification-in-Nautilus

2014-04-25 Thread anonym
13/04/14 12:54, intrigeri wrote: Hi, feature/6608-OpenPGP-signature-verification-in-Nautilus completes the steps to have seahorse-nautilus fully replace seahorse-plugins in Wheezy. It therefore will solve #6608, #5516 and #7039. Please review'n'merge in devel for Tails 1.1. I tested it,

Re: [Tails-dev] [review'n'merge:1.1] bugfix/use-Wheezy-repo-for-debian-mozilla

2014-04-25 Thread anonym
11/04/14 14:27, intrigeri wrote: Hi, bugfix/use-Wheezy-repo-for-debian-mozilla fixes #7063: we were still using the squeeze-backports APT suite from mozilla.debian.net. Candidate for 1.1, assigned to anonym for review, but again, if someone else is faster, I guess he won't mind. Luckily

[Tails-dev] [review'n'merge:1.0] feature/tor-0.2.4.21-1+tails1_{d60.squeeze, d70.wheezy}+1

2014-04-24 Thread anonym
Hi, Please review and merge into 'stable': Tails Git branch: feature/tor-0.2.4.21-1+tails1_d60.squeeze+1 APT suite:feature-tor-0.2.4.21-1-tails1-d60.squeeze-1 No code was changed in Tails' Git repo, so only an APT suite merge is needed. This will simply install Tor 0.2.4.21 with the

Re: [Tails-dev] [tor-talk] heartbleed: ETA for tor release(s) that blacklist affected directory authority keys? (#11464)

2014-04-23 Thread anonym
21/04/14 12:27, Nusenu wrote: Hi, the code to blacklist heartbleed affected tor directory authority keys has been merged about a week ago [1]. Do you have an ETA on when you are going to release it (tor and TBB packages)? As the release manager for the Tails 1.0 release I'm also

Re: [Tails-dev] [tor-talk] heartbleed: ETA for tor release(s) that blacklist affected directory authority keys? (#11464)

2014-04-23 Thread anonym
23/04/14 16:51, Nick Mathewson wrote: On Wed, Apr 23, 2014 at 10:28 AM, anonym ano...@riseup.net wrote: 21/04/14 12:27, Nusenu wrote: Hi, the code to blacklist heartbleed affected tor directory authority keys has been merged about a week ago [1]. Do you have an ETA on when you are going

Re: [Tails-dev] About #5929 (Create encrypted TailsData by default)

2014-04-16 Thread anonym
of this feature would not be a blocker. For what it's worth, to me the feature parity with Incognito goal has felt very arbitrary for years. Each feature should be evaluated in itself, IMHO, and I think we've done a good job at that, including with this one. anonym: unless there are objections

Re: [Tails-dev] [review'n'merge:1.0] feature/tor-launcher-0.2.5.3 (issue #6934 and more)

2014-04-15 Thread anonym
15/04/14 12:43, intrigeri wrote: anonym wrote (14 Apr 2014 15:33:33 GMT) : Please review and merge feature/tor-launcher-0.2.5.3 into stable (for the 1.0 release) and devel branches. It seems that you forgot to push your changes to our Tor Launcher repo, so I can't review this branch yet

Re: [Tails-dev] Release schedule for Tails 1.0

2014-04-15 Thread anonym
08/04/14 22:49, intrigeri wrote: Hi, anonym wrote (08 Apr 2014 20:18:23 GMT) : I'll be release manager for the Tails 1.0 release. Here's the preliminary release schedule: Thanks a lot! Which Tails core people are available for testing on 2014-04-17 and 2014-04-28? I can dedicate

Re: [Tails-dev] [review'n'merge:1.0] bugfix/i2p_incoming (issue #7070)

2014-04-14 Thread anonym
11/04/14 19:20, Kill Your TV wrote: Tails devs, Please review and merge the following change for the upcoming Tails 1.0 git://repo.or.cz/tails/kytv.git bugfix/i2p_incoming It's a small but important change, setting I2P to disable inbound connections. Inbound connections are already

[Tails-dev] [review'n'merge:1.0] feature/tor-launcher-0.2.5.3 (issue #6934 and more)

2014-04-14 Thread anonym
Hi, Please review and merge feature/tor-launcher-0.2.5.3 into stable (for the 1.0 release) and devel branches. It bases the bundled Tor Launcher on version 0.2.5.3 (from 0.2.5.0) which brings several upstream fixes and new translations. It also contains the following new not-yet-upstreamed

[Tails-dev] [review'n'merge:1.0] doc/bridge-mode-design (#6843)

2014-04-14 Thread anonym
Hi, Please review and merge doc/bridge-mode-design into master for the Tails 1.0 release. The branch simply adds a design document for of the bridge mode feature, or Tor network configuration as I ended up calling it. Cheers! ___ Tails-dev mailing

Re: [Tails-dev] [review'n'merge:1.0] bugfix/7022-use-stable-APT-suite-when-building-from-stable-branch

2014-04-11 Thread anonym
04/04/14 16:38, intrigeri wrote: Hi, please review'n'merge bugfix/7022-use-stable-APT-suite-when-building-from-stable-branch into stable, so that our builds from the stable branch use the right APT suite. Candidate for 1.0 (otherwise the build from stable is broken, anyway, so it's not as

Re: [Tails-dev] Upgrading the Linux kernel for 1.0?

2014-04-11 Thread anonym
09/04/14 20:24, intrigeri wrote: Hi, David Goulet wrote (09 Apr 2014 17:51:22 GMT) : Here is my analysis of CVE-2014-2568 and CVE-2014-0131 in terms of security severity for Tails. Thanks a lot! My temporary conclusion is: not worth taking the risk of introducing regressions with a

[Tails-dev] Release schedule for Tails 1.0

2014-04-08 Thread anonym
Hi, I'll be release manager for the Tails 1.0 release. Here's the preliminary release schedule: 2014-04-16 Feature freeze. Tag 1.0-rc1 in Git. Build and upload 1.0-rc1 ISO and IUK. 2014-04-17 Test 1.0-rc1. 2014-04-18 Officially release 1.0-rc1.

Re: [Tails-dev] Help needed/wished for 1.1 (Wheezy) tasks

2014-04-02 Thread anonym
20/03/14 11:24, intrigeri wrote: Code * NetworkManager does not auto-connect when MAC spoofing is enabled https://labs.riseup.net/code/issues/6911 @anonym: do you want to take care of it? For the record, this one has been fixed. * Unusable documentation window

Re: [Tails-dev] Upgrading the Linux kernel for 1.0?

2014-04-02 Thread anonym
20/03/14 12:07, intrigeri wrote: Hi, (stealing the RM hat for a short while, by initiating this discussion. anonym, I'll let you take care of bringing this to a conclusion.) if we don't do anything special, then we'll release Tails 1.0 with the same kernel (3.12) as 0.23. Given 1.0

Re: [Tails-dev] Branches usage until 1.1 is out

2014-04-02 Thread anonym
like it), let's *not* do it for e.g. the Tails Greeter Git repo, only for the Tails Git repo. Otherwise there will be complications for the work on the 1.0 release. I've got two additional questions, mainly for anonym (with his RM hat): * do you think you can take care, in a timely manner

[Tails-dev] When to EOL incremental upgrade paths and clean up IUKs?

2014-03-18 Thread anonym
Hi, When generating the upgrade-description files for 0.23 I issued the following command: VERSION=0.23 PREVIOUS_VERSION=0.22.1 NEXT_VERSION=1.0 MAJOR_RELEASE=1 ( cd $IUK_CHECKOUT \ ./bin/tails-iuk-generate-upgrade-description-files \

[Tails-dev] Please review and merge bugfix/6885-tor-launcher-localisation

2014-03-14 Thread anonym
Hi, Ticket: https://labs.riseup.net/code/issues/6885 Branch: bugfix/6885-tor-launcher-localisation This fixes the bug which broke Tor Launcher in all non-English locales. See ticket for details. Please review and merge! Cheers! ___ Tails-dev mailing

Re: [Tails-dev] Broken build due to (expected) migration of 3.13.5-1 to testing

2014-03-14 Thread anonym
14/03/14 12:02, intrigeri wrote: Hi, as expected, Linux 3.13.5-1 has migrated to testing, which breaks most of our builds, and prevents me from doing the reviewing job I've been assigned. Dear RM, what's your ETA for proposing a fix? Sorry, I have them downloaded and ready. It slipped my

[Tails-dev] Please review and merge feature/linux-3.12 [Was: Broken build due to (expected) migration of 3.13.5-1 to testing]

2014-03-14 Thread anonym
14/03/14 15:07, anonym wrote: 14/03/14 12:02, intrigeri wrote: Hi, as expected, Linux 3.13.5-1 has migrated to testing, which breaks most of our builds, and prevents me from doing the reviewing job I've been assigned. Dear RM, what's your ETA for proposing a fix? Sorry, I have them

Re: [Tails-dev] Wrong translation imported for perl5lib

2014-03-08 Thread anonym
08/03/14 12:47, winterfa...@riseup.net wrote: Commit aba712d6156 in Tails main repo devel branch can't be right. It is checking out tails-iuk_completed for perl5lib. It seems the IUK translation actually was errorneously commited to perl5lib repo too. Thanks for notifying us! Yeah, this was

[Tails-dev] Delayed 0.23-rc but translations can start now [was: Updated release schedule for Tails 0.23]

2014-03-06 Thread anonym
20/02/14 17:04, anonym wrote: 13/02/14 01:22, anonym wrote: I'll be release manager for the Tails 0.23 release. Here's the preliminary release schedule: Here's an updated release schedule for Tails 0.23: 2014-03-05 Feature freeze. Tag 0.23-rc1 in Git

Re: [Tails-dev] Please review'n'merge feature/better-iso-cleanup (#6425)

2014-03-05 Thread anonym
05/03/14 20:10, intrigeri wrote: Hi, preamble: I'd like to see this in Tails 0.23, since this will be the first release when most users see incremental upgrades in action, and it would be good for them if the IUK download time was a bit shorter. I'm now running most of our automated test

Re: [Tails-dev] Please review and test feature/bridge-mode

2014-03-04 Thread anonym
03/03/14 14:23, intrigeri wrote: Hi, I've had a look at the rewritten branch, at commit 7d0ea0b. rootALL = (tor-launcher)NOPASSWD: /usr/bin/tor-launcher What is this useful for? root can already run any command as any user without password, no? Woops, indeed. Removed. amnesia

Re: [Tails-dev] Please review and test feature/bridge-mode

2014-03-04 Thread anonym
28/02/14 14:08, intrigeri wrote: Hi, I've had a look at the branch, and here's a first set of comments and questions. I'll test an ISO later. First, congrats, this generally looks very good! anonym wrote (27 Feb 2014 05:35:18 GMT) : It also removes Vidalia. Why? Last time we

Re: [Tails-dev] Please review and test feature/bridge-mode

2014-03-04 Thread anonym
04/03/14 21:25, anonym wrote: In the long run we probably want to convince upstream that this is a valid use case and have the description changed/complemented. Agreed. I think a ticket about it should be created in the Tor Launcher's Trac. I have this on my personal TODO. Done: https

Re: [Tails-dev] Please review and test feature/bridge-mode

2014-03-04 Thread anonym
28/02/14 15:02, intrigeri wrote: Hi, intrigeri wrote (28 Feb 2014 13:08:57 GMT) : I'll test an ISO later. The Tor Launcher says The Tor Browser will open after a Tor network connection is established, which is untrue. Perhaps this string could be parameterized by whatever environment

Re: [Tails-dev] Please review and test feature/bridge-mode

2014-03-04 Thread anonym
28/02/14 14:27, intrigeri wrote: Hi, intrigeri wrote (28 Feb 2014 13:08:57 GMT) : I've had a look at the branch, and here's a first set of comments and questions. I'll test an ISO later. Also, I'd love to see the test suite updated accordingly, so that we can check that no too obvious

Re: [Tails-dev] Please review'n'merge bugfix/6592-fix-races-with-check-for-upgrades

2014-03-04 Thread anonym
04/03/14 19:06, intrigeri wrote: Hi, bugfix/6592-fix-races-with-check-for-upgrades fixes #6592 for me. Candidate for 0.23, so that we suffer less when running the test suite in a few days. It was a bit difficult to follow the commits back and forth so I instead reviewd the diff against

Re: [Tails-dev] Please review MAC address spoofing documentation

2014-03-02 Thread anonym
02/03/14 10:39, intrigeri wrote: Hi, Matsa wrote (01 Mar 2014 21:18:04 GMT) : We are looking forward to translate it in french, could the RM tell us when we can start, the deadline and, above all, the place to find the strings to translate the UI? There's still potential for changes, so

Re: [Tails-dev] Please review'n'merge test/5959-antitest-memory-erasure

2014-03-02 Thread anonym
01/03/14 19:58, intrigeri wrote: Hi, anonym wrote (28 Feb 2014 14:44:00 GMT) : 28/12/13 23:50, intrigeri wrote: For whatever reason, the TailsToaster (i.e. `@domain_name`) domain isn't present for me (also checked with `virsh list`), [...] Fixed by commit 0caac4a2, thanks. Ah

Re: [Tails-dev] Made New Identity work again, please review

2014-03-01 Thread anonym
28/02/14 13:56, winterfa...@riseup.net wrote: +TOR_CONTROL_PASSWD='passwd' Why do we set this? Iceweasel (as amnesia) does not have access to the authentication cookie, and shouldn't. If Torbutton cannot read the authentication cookie, it refuses to talk to the control port, even when

Re: [Tails-dev] undefined method `uuid' for #Vagrant::Machine:0x000000025afd00

2014-02-28 Thread anonym
27/02/14 17:17, Andreas Kuckartz wrote: Any ideas? In case you are using vagrant = 1.2, I'm aware of this issue. If you use an older vagrant than that it's new to me. Which version are you using? While I have an unpublished fix that seems to work, I want to take a closer look before pushing it

<    1   2   3   4   5   6   7   8   9   >