~swem/ubiquity/+git/ubiquity:lp1772374.bionic

Last commit made on 2018-05-21
Get this branch:
git clone -b lp1772374.bionic https://git.launchpad.net/~swem/ubiquity/+git/ubiquity
Only Chen-Han Hsiao (Stanley) can upload to this branch. If you are Chen-Han Hsiao (Stanley) please log in for upload directions.

Branch merges

Branch information

Name:
lp1772374.bionic
Repository:
lp:~swem/ubiquity/+git/ubiquity

Recent commits

5b4db4c... by Chen-Han Hsiao (Stanley) on 2018-05-21

add mount point (LP: #1772374)

58af441... by Iain Lane on 2018-05-08

releasing package ubiquity version 18.04.14.1

359f6ae... by Iain Lane on 2018-05-08

Remove .gladep file which was resurrected by mistake in the git conversion.

(cherry picked from commit d8e6c5a9f47d245bd7eca16a0db3701a9c1bd52c)

3e81e0e... by Iain Lane on 2018-05-08

Update Vcs-* for git migration

(cherry picked from commit 9cf6960844eec914c8609d6ec2a76a46c6825a3a)

(modified: s/master/bionic/, deconflict debian/changelog)

1d716a3... by Iain Lane on 2018-05-08

Update changelog for Andrea's last commit

(cherry picked from commit 600c3d16d230749da2c69e2ad166785c95686787)

(modified to not conflict)

d93d74f... by Andrea Azzarone on 2018-05-03

misc.py: Restore the corrent euid in regain_privileges_save

Calling regain_privileges_save should restore the effective user-id to the one
before the call to drop_privileges_save. We need to call os.setresuid and
os.setresgid twice to avoid permission issues when calling os.setgroups.

Fixes LP: #1751252

(cherry picked from commit 87e14f5399dbc3616889cf0ea6b34563c3793068)

8f367d9... by Iain Lane on 2018-04-26

releasing package ubiquity version 18.04.14

7e91052... by Iain Lane on 2018-04-26

rewrap

24b8f8f... by Iain Lane on 2018-04-26

Accuratify the comment

1bb2b44... by Iain Lane on 2018-04-26

Move the Gio.Settings code into the constructor of the wizard

This runs with dropped privileges (uid = 0, euid = 999) whereas run() runs as
root (uid = 0, euid = 0). When run as 0 / 0, dconf creates its
XDG_RUNTIME_DIR/dconf/user database as root. We need to ensure that it runs in
a context with dropped privileges. (LP: #1767067)