summaryrefslogtreecommitdiffstats
path: root/wiki/src/contribute/release_process/tor-browser.mdwn
Commit message (Collapse)AuthorAgeFilesLines
* Tor Browser release process: feature/stretch is now 64-bit.anonym2016-11-301-1/+1
|
* Tor Browser release process: bring back the improvement I made yesterday in ↵intrigeri2016-11-161-1/+1
| | | | commit:d97b830, that was since overwritten by mistake with commit:2b205d5.
* Unify namespace for Tor Browser related variables in the release process.bertagaz2016-11-161-21/+21
| | | | E.g we already use '$VERSION' for the Tails release version.
* Tor Browser import doc: use full version number, to avoid issues when we ↵intrigeri2016-11-151-1/+1
| | | | | | | replace a given build with another one. E.g. apt-cacher-ng won't check if the tarball it has already cached is still current, unless we bother configuring it more precisely.
* Tor Browser "release" process: also import 64-bit tarballs.intrigeri2016-08-261-10/+40
| | | | refs: #8183
* Release process: fix title.intrigeri2016-07-311-1/+1
| | | | We don't really "release" the Tor Browser ourselves.
* Release process: don't point to URL before it is valid.intrigeri2016-07-311-10/+10
|
* Release process: support retrying Tor Browser tarballs download.intrigeri2016-07-311-1/+2
|
* Release process: assume that the release manager is running Jessie or newer.intrigeri2016-07-311-1/+1
|
* Release process: fix formatting and filename.intrigeri2016-07-311-1/+1
|
* Release process: add another potential location for the Tor Browser tarballs.intrigeri2016-07-311-0/+1
|
* Fix indentation.anonym2016-02-121-1/+1
|
* Let's only copy the new tarballs.anonym2016-02-121-1/+1
| | | | | Verifying that all other tarballs match on the client and server takes quite a bit of time these days.
* Do the fontconfig dance with all browsers.anonym2016-02-111-2/+4
| | | | | | | | | I.e. also the Unsafe and I2P Browser's. The main reason is so we do not need different images for these and the Tor browser in the automated test suite. One may argue, though, that for the Unsafe Browser this list of fonts would be fingerprintable, but I would be surprised if it already isn't so due to the Tor Browser Firefox patches.
* Add step to synch with the start-tor-browser script.anonym2016-01-261-0/+14
| | | | | | So we won't repeat mistakes like #11000 again. Refs: #11000
* Fix typo.anonym2015-08-101-1/+1
|
* Tor Browser's sha256sums.txt has changed name.anonym2015-08-031-3/+3
| | | | | | To sha256sums-unsigned-build.txt (also the .asc, of course). See: https://trac.torproject.org/projects/tor/ticket/15864
* Generate correct URL for the Tor Browser tarballs dir.anonym2015-05-111-1/+1
|
* Store complete URL in tbb-dist-url.txt.anonym2015-04-281-4/+4
| | | | | | | | | | | | | | | | Our installation script determines the Tor Browser version from the tarball filenames and then looks in "$(cat tbb-dist-url.txt)/$VERSION", which isn't very flexible. For instance, for the pre-release of Tor Browser 4.5 our script looks in: http://people.torproject.org/~mikeperry/builds/4.5/ when they in fact were stored in http://people.torproject.org/~mikeperry/builds/4.5-build5/ So let's just store the full URL to the directory storing the tarballs.
* Fix git annex import command.intrigeri2015-03-221-1/+1
|
* Download the Tor Browser tarballs over HTTPS.intrigeri2015-03-221-1/+1
| | | | | | We check their hashes anyway, but hey, why not. And anyway, otherwise this curl command doesn't work (unless one adds --location to honor redirect — to HTTPS — headers).
* Add gk's build directory to the list of candidate source locations for the ↵intrigeri2015-03-221-0/+1
| | | | Tor Browser.
* Add optimization hint.intrigeri2015-03-071-0/+3
|
* Document how to import Tor Browser tarballs by content, instead of by (URL) ↵intrigeri2015-03-071-8/+33
| | | | | | reference. Closes: #9020
* Minor rephrasing.intrigeri2015-03-071-2/+2
|
* Document the new release process for Tor Browser.Tails developers2015-02-151-0/+111
| | | | Will-fix: #8125
* Improve style and phrasing.Tails developers2015-02-151-4/+8
|
* Remove obsolete explanation.Tails developers2015-02-151-4/+3
|
* Typos and vocabulary fixes in the existing doc.Tails developers2015-02-151-4/+4
|
* Avoid getting colored grep output into our tbb-sha256sums.txt file.Tails developers2015-01-261-1/+1
|
* Don't use unsafe convenience mode for verifying detached OpenPGP signatures.Tails developers2014-12-051-1/+1
| | | | It's going away for good reasons: https://bugs.debian.org/771992
* Drop TOC, there are no sections in there.Tails developers2014-10-311-2/+0
|
* Fix formatting.Tails developers2014-10-311-4/+4
|
* Fix command.Tails developers2014-10-141-1/+1
|
* Typography fix.Tails developers2014-10-141-1/+1
|
* Automate release process for the Tor Browser.Tails developers2014-10-141-10/+24
| | | | | We also instruct the RM to check the url with https for some added authentication.
* Separate data from TBB installation script.Tails developers2014-10-131-8/+16
|
* Add one more potential TBB tarball source URL.Tails developers2014-10-081-0/+1
|
* Upgrade documentation for the TBB migration.Tails developers2014-09-291-0/+22