[Tails-l10n] Build failed in Jenkins: check_PO_master #127

Delete this message

Reply to this message
Autor: tails-sysadmins
Data:  
Para: tails-l10n
Tópicos Antigos: [Tails-l10n] Build failed in Jenkins: check_PO_master #126
Novos Tópicos: [Tails-l10n] Jenkins build is back to normal : check_PO_master #128
Assunto: [Tails-l10n] Build failed in Jenkins: check_PO_master #127
See <https://jenkins.tails.boum.org/job/check_PO_master/127/changes>

Changes:

[amnesia] batch of translation and tor browser specific translation

[amnesia] translation fixe

[amnesia] [fr] update of bridge_mode.fr.po

[amnesia] [fr] Fix translation

[amnesia] doc: update documentation for i18nspector

[amnesia] [fr] keeping the documentation up-to-date (4)

[amnesia] reviews and fixes

------------------------------------------
[...truncated 26 lines...]
W: ./wiki/src/doc/encryption_and_privacy/truecrypt.fr.po: stray-previous-msgid msgid '[[!meta title="Opening TrueCrypt volumes using cryptsetup"]]
'
W: ./wiki/src/doc/encryption_and_privacy/truecrypt.fr.po: stray-previous-msgid msgid 'On 28 May 2014, the [*TrueCrypt* website](http://truecrypt.sourceforge.net/) announced that the project was no longer maintained and recommended users to find alternate solutions. That website now reads:'
W: ./wiki/src/doc/encryption_and_privacy/truecrypt.fr.po: stray-previous-msgid msgid '<p>We recommend that you use [[Tails encrypted persistence|doc/first_steps/persistence]] or [[LUKS encrypted
volumes|/doc/encryption_and_privacy/encrypted_volumes]] instead of <span class="application">TrueCrypt</span>
volumes.</p>
'
W: ./wiki/src/doc/encryption_and_privacy/truecrypt.fr.po: stray-previous-msgid msgid 'Still, you can open standard and hidden *TrueCrypt* volumes in Tails using the `cryptsetup` command line tool.'
W: ./wiki/src/press.fr.po: stray-previous-msgid msgid 'We sometimes publish press releases but they are not archived on
the website. Write us an email at <tails-press@???> if you want 
to receive future press releases, or if you have a press inquiry.
'
W: ./wiki/src/press.fr.po: stray-previous-msgid msgid '[Tor overview](https://www.torproject.org/about/overview.html.en)'
W: ./wiki/src/press.fr.po: stray-previous-msgid msgid 'Tails is mentioned regularly in the press and in research papers. This list is not comprehensive, but illustrates some of the significant articles that have been published about Tails.'
W: ./wiki/src/bugs.fr.po: stray-previous-msgid msgid '[[!meta title="Bugs"]]
'
W: ./wiki/src/bugs.fr.po: stray-previous-msgid msgid "If you've found a bug in Tails, please read [[doc/first_steps/bug_reporting]]."
W: ./wiki/src/bugs.fr.po: stray-previous-msgid msgid "We don't use this section anymore, see [[contribute/working_together/Redmine]] instead."
W: ./wiki/src/download.fr.po: stray-previous-msgid msgid 'Additionally, you can verify the <a href=[[!inline pages="inc/stable_i386_torrent_sig_url" raw="yes"]]>signature of the Torrent file</a> itself before downloading the ISO image.'
W: ./wiki/src/doc/encryption_and_privacy/manage_passwords.fr.po: stray-previous-msgid msgid 'When using <span class="application">OpenPGP</span> with <span
class="application">Claws Mail</span> or <span class="application">OpenPGP
Applet</span> for example, you need to enter a password in a <span
class="application">Pinentry</span> dialog box. But you cannot copy and
paste into it. This is a security feature of <span
class="application">Pinentry</span> based on the fact that otherwise the
data in the clipboard could be accessed by another application against
your will.
'
W: ./wiki/src/doc/encryption_and_privacy/manage_passwords.fr.po: stray-previous-msgid msgid '0. Use <span class="application">OpenPGP</span> with <span
class="application">Claws Mail</span> or <span class="application">OpenPGP
Applet</span> until the <span class="application">Pinentry</span> dialog
box appears.
'
W: ./wiki/src/doc/first_steps/start_tails.fr.po: stray-previous-msgid msgid 'Shutdown the computer, plug your device, start the computer, and
immediately press-and-hold <span class="keycap">Option</span> until a boot menu
appears. In that boot menu, choose the entry that reads <span class="guimenuitem">Boot EFI</span> and
looks like a USB stick.
'
W: ./wiki/src/doc/first_steps/startup_options.fr.po: stray-previous-msgid msgid '<span class="command">i2p</span>, to enable [[I2P|anonymous_internet/I2P]]'
W: ./wiki/src/doc/encryption_and_privacy.index.fr.po: stray-previous-msgid msgid '  - [[!traillink
    Opening_<span_class="application">TrueCrypt</span>_volumes_using_<span_class="code">cryptsetup</span>|encryption_and_privacy/truecrypt]]
  - [[!traillink Encrypt,_decrypt,_sign,_and_verify_text_using_OpenPGP_and_<span_class="application">Tails_OpenPGP_Applet</span>|encryption_and_privacy/gpgapplet]]
    - [[!traillink Encrypt_text_with_a_passphrase|encryption_and_privacy/gpgapplet/passphrase_encryption]]
    - [[!traillink Encrypt_and_sign_text_using_public-key_cryptography|encryption_and_privacy/gpgapplet/public-key_cryptography]]
    - [[!traillink Decrypt_and_verify_text|encryption_and_privacy/gpgapplet/decrypt_verify]]
  - [[!traillink Securely_delete_files_and_clean_diskspace_using_Nautilus_Wipe|encryption_and_privacy/secure_deletion]]
  - [[!traillink Manage_passwords_using_<span_class="application">KeePassX</span>|encryption_and_privacy/manage_passwords]]
  - [[!traillink Calculating_checksums_using_<span_class="application">GtkHash</span>|encryption_and_privacy/checksums]]
'
W: ./wiki/src/doc/about/warning.fr.po: stray-previous-msgid msgid 'The documents that you might save on storage devices will not be encrypted by default, except in the [[encrypted persistent volume|doc/first_steps/persistence]]. But Tails provides you with tools to encrypt your documents, such as GnuPG, or encrypt your storage device, such as LUKS. It is likely that the files you may create will keep tracks that they were created using Tails.'
W: ./wiki/src/doc/first_steps/persistence/configure.fr.po: stray-previous-msgid msgid 'When this feature is activated, changes to the bookmarks in
<span class="application">Tor Browser</span> are saved in the persistent
volume. This does not apply to the Unsafe web browser.
'
W: ./wiki/src/about.fr.po: stray-previous-msgid msgid 'our [[design document|contribute/design]] about Tails specification, threat model and implementation,'
W: ./wiki/src/about.fr.po: stray-previous-msgid msgid '<a id="related-projects"></a>
'
W: ./wiki/src/about.fr.po: stray-previous-msgid msgid 'Similar projects
'
W: ./wiki/src/about.fr.po: stray-previous-msgid msgid '[Freepto](http://www.freepto.mx/)'
W: ./wiki/src/doc/advanced_topics/cold_boot_attacks.fr.po: stray-previous-msgid msgid 'As far as we know, cold boot attacks are not a common procedure for data recovery, but it might still be good to be prepared. If no cold boot attack happens directly after shutdown, the RAM empties itself in minutes, and all data disappears.'
W: ./wiki/src/doc/anonymous_internet/Tor_Browser.fr.po: stray-previous-msgid msgid '<span class="application">[Tor Browser](https://www.torproject.org/projects/torbrowser.html.en)</span> is a web
browser based on [Mozilla Firefox](http://getfirefox.com) and configured to
protect your anonymity. Given the popularity of Firefox, you might have used it
before and its user interface is like any other modern web browser.
'
W: ./wiki/src/doc/anonymous_internet/Tor_Browser.fr.po: stray-previous-msgid msgid 'For example, here is how the browser looks like when we try to log in an email account at [riseup.net](https://riseup.net/), using their [webmail interface](https://mail.riseup.net/):'
W: ./wiki/src/doc/anonymous_internet/Tor_Browser.fr.po: stray-previous-msgid msgid '[[!img doc/anonymous_internet/Tor_Browser/riseup.png link=no alt="Tor Browser"]]
'
W: ./wiki/src/doc/anonymous_internet/Tor_Browser.fr.po: stray-previous-msgid msgid 'Notice the padlock icon on the left of the address bar saying "mail.riseup.net" and the address beginning with "https://" (instead of "http://"). These are the indicators that an encrypted connection using [[!wikipedia HTTPS]] is being used.'
W: ./wiki/src/doc/anonymous_internet/Tor_Browser.fr.po: stray-previous-msgid msgid '[HTTPS Everywhere](https://www.eff.org/https-everywhere) is a Firefox extension
included in <span class="application">Tor Browser</span> and produced as a collaboration between [The Tor
Project](https://torproject.org/) and the [Electronic Frontier
Foundation](https://eff.org/). It encrypts your communications with a number of
major websites. Many sites on the web offer some limited support for encryption
over HTTPS, but make it difficult to use. For instance, they may default to
unencrypted HTTP, or fill encrypted pages with links that go back to the
unencrypted site. The HTTPS Everywhere extension fixes these problems by
rewriting all requests to these sites to HTTPS.
'
W: ./wiki/src/doc/anonymous_internet/Tor_Browser.fr.po: stray-previous-msgid msgid 'In <span class="application">Tor Browser</span> all such features are handled from inside the browser by an extension
called [Torbutton](https://www.torproject.org/torbutton/) which does all sorts
of things to prevent the above type of attacks. But that comes at a price: since
this will disable some functionalities and some sites might not work as
intended.
'
W: ./wiki/src/doc/anonymous_internet/Tor_Browser.fr.po: stray-previous-msgid msgid 'That\'s why **JavaScript is enabled by default** in <span class="application">Tor Browser</span>.
'
W: ./wiki/src/doc/anonymous_internet/Tor_Browser.fr.po: stray-previous-msgid msgid 'To allow more control over JavaScript, for example to disable JavaScript
completely, <span class="application">Tor Browser</span> includes the <span class="application">NoScript</span>
extension.
'
W: ./wiki/src/doc/anonymous_internet/vidalia.fr.po: stray-previous-msgid msgid 'The <span class="application">Vidalia</span> onion icon sometimes stays yellow
even if Tor is already started. If the <span class="guilabel">Tor is
ready</span> notification appears or if you can browse the Internet using
<span class="application">Tor Browser</span>, then Tor is started correctly.
'
W: ./wiki/src/doc/about/fingerprint.fr.po: stray-previous-msgid msgid '[[As explained on our warning page|warning#fingerprint]], when using
Tails it is possible to know that you are using Tor. But Tails tries to
**make it as difficult as possible to distinguish Tails users from other
Tor users**, especially users of <span class="application">Tor Browser</span> outside of Tails. If it is
possible to determine whether you are a user of <span class="application">Tor Browser</span> inside or outside of Tails, this
provides more information about you and in consequence reduces your
anonymity.
'
W: ./wiki/src/doc/about/fingerprint.fr.po: stray-previous-msgid msgid 'To make it difficult to distinguish Tails users,
**<span class="application">Tor Browser</span> in Tails tries to provide the same information as <span class="application">Tor Browser</span> on other operating systems** in
order to have similar fingerprints.
'
W: ./wiki/src/doc/about/fingerprint.fr.po: stray-previous-msgid msgid 'See the [[fingerprint section of known issues
page|support/known_issues#fingerprint]] for a list of known differences
between the fingerprints of <span class="application">Tor Browser</span> inside and outside of Tails.
'
W: ./wiki/src/doc/about/fingerprint.fr.po: stray-previous-msgid msgid 'Apart from that, **some of the <span class="application">Tor Browser</span> extensions included in Tails are
specific to Tails**. More sophisticated
attacks can use those differences to distinguish Tails users.
'
W: ./wiki/src/doc/about/fingerprint.fr.po: stray-previous-msgid msgid 'A Tails system is **almost exclusively generating Tor activity** on the network. Usually users of <span class="application">Tor Browser</span> on other operating systems also have network activity outside of Tor, either from another web browser or other applications. So the proportion of Tor activity could be used to determine whether a user of <span class="application">Tor Browser</span> is using Tails or not. If you are sharing your Internet connection with other users that are not using Tails it is probably harder for your ISP to determine whether a single user is generating only Tor traffic and so maybe using Tails.'
W: ./wiki/src/doc/about/fingerprint.fr.po: stray-previous-msgid msgid 'Tails **does not use the entry guards mechanism of Tor**. With the [entry guard mechanism](https://www.torproject.org/docs/faq#EntryGuards), a Tor user always uses the same few relays as first hops. As Tails does not store any Tor information between separate working sessions, it does not store the entry guards information either. This behaviour could be used to distinguish Tails users across several working sessions.'
W: ./wiki/src/doc/about/fingerprint.fr.po: stray-previous-msgid msgid 'When starting, Tails synchronizes the system clock to make sure it is accurate. While doing this, if the time is set too much in the past or in the future, Tor is shut down and started again. This behavior could be used to distinguish Tails users, especially this happens every time Tails starts.'
W: ./wiki/src/doc/about/features.fr.po: stray-previous-msgid msgid '* [Tor](https://www.torproject.org) with:
  - [[stream isolation|contribute/design/stream_isolation]]
  - regular and obfsproxy bridges support
  - the [Vidalia](https://www.torproject.org/projects/vidalia) graphical frontend
* [NetworkManager](http://projects.gnome.org/NetworkManager/) for easy
  network configuration
* [Tor Browser](https://www.torproject.org/projects/torbrowser.html.en), a web
  browser based on [Mozilla Firefox](http://getfirefox.com) and modified to protect your anonymity with:
  - [Torbutton](https://www.torproject.org/torbutton) for anonymity
    and protection against evil JavaScript
  - all cookies are treated as session cookies by default;
  - [HTTPS Everywhere](https://www.eff.org/https-everywhere)
    transparently enables SSL-encrypted connections to a great number
    of major websites
  - [NoScript](http://noscript.net/) to have even more control over JavaScript.
  - [AdBlock Plus](https://adblockplus.org/en/firefox) to remove advertisements.
* [Pidgin](http://www.pidgin.im/) preconfigured with
  [OTR](http://www.cypherpunks.ca/otr/index.php) for Off-the-Record
  Messaging
* [Claws Mail](http://www.claws-mail.org/) e-mail client, with
  GnuPG support
* [Liferea](http://liferea.sourceforge.net/) feed aggregator
* [Gobby](http://gobby.0x539.de/trac/) for collaborative text writing
* [Aircrack-ng](http://aircrack-ng.org/) for wireless networks auditing
* [I2P](https://geti2p.net/) an anonymizing network
'
W: ./wiki/src/doc/first_steps/persistence/copy.fr.po: stray-previous-msgid msgid '[[Create a persistent volume|configure]] on this new device. We advise you to use a different passphrase to protect this new persistent volume.'
W: ./wiki/src/doc/about/openpgp_keys.fr.po: stray-previous-msgid msgid 'Private mailing-list key
'
W: ./wiki/src/doc/about/openpgp_keys.fr.po: stray-previous-msgid msgid '    pub   4096R/0x1D2975EDF93E735F 2009-08-14 [expires: 2016-12-27]
          Key fingerprint = 09F6 BC8F EEC9 D8EE 005D  BAA4 1D29 75ED F93E 735F
    uid                  Tails developers (Schleuder mailing-list) <tails@???>
    uid                  Tails list (schleuder list) <tails-request@???>
    uid                  Tails list (schleuder list) <tails-owner@???>
    sub   4096R/0xD843C2F5E89382EB 2009-08-14 [expires: 2016-12-27]
'
W: ./wiki/src/doc/about/openpgp_keys.fr.po: stray-previous-msgid msgid '    pub   4096R/0x1202821CBE2CD9C1 2010-10-07 [expires: 2015-04-30]
          Key fingerprint = 0D24 B36A A9A2 A651 7878  7645 1202 821C BE2C D9C1
    uid                  Tails developers (signing key) <tails@???>
'
W: ./wiki/src/doc/about/openpgp_keys.fr.po: stray-previous-msgid msgid '    pub   4096R/EC57B56EF0C43132 2013-07-24 [expires: 2018-07-23]
          Key fingerprint = 1F56 EDD3 0741 0480 35DA  C1C5 EC57 B56E F0C4 3132
    uid                          Tails bug squad <tails-bugs@???>
    uid                          Tails bug squad (schleuder list) <tails-bugs-owner@???>
    uid                          Tails bug squad (schleuder list) <tails-bugs-request@???>
    uid                          Tails private user support <tails-support-private@???>
    sub   4096R/9D6D6472AFC1AD77 2013-07-24 [expires: 2018-07-23]
'
W: ./wiki/src/doc/anonymous_internet/unsafe_browser.fr.po: stray-previous-msgid msgid 'The <span class="application">Unsafe Browser</span> has a red and yellow theme
to differentiate it from [[<span class="application">Tor Browser</span>|Tor_Browser]].
'
W: ./wiki/src/doc/anonymous_internet/unsafe_browser.fr.po: stray-previous-msgid msgid '<div class="note">
'
W: ./wiki/src/doc/anonymous_internet/unsafe_browser.fr.po: stray-previous-msgid msgid '<p>As a consequence, if you download files using the <span
class="application">Unsafe Browser</span> it is not possible to access
them outside of the <span class="application">Unsafe Browser</span>
itself.</p>
'
W: ./wiki/src/doc/anonymous_internet/unsafe_browser.fr.po: stray-previous-msgid msgid 'Do not run this browser at the same time as the anonymous [[<span class="application">Tor Browser</span>|Tor_Browser]]. This makes it easy to not mistake one browser for the other, which could have catastrophic consequences.'
W: ./wiki/src/doc/anonymous_internet.index.fr.po: stray-previous-msgid msgid '[[!traillink Browsing_the_web_with_<span_class="application">Tor_Browser</span>|anonymous_internet/tor_browser]]'
W: ./wiki/src/doc/first_steps/startup_options/bridge_mode.fr.po: stray-previous-msgid msgid '<div class="tip">
'
W: ./wiki/src/doc/first_steps/accessibility.fr.po: stray-previous-msgid msgid 'The screen reading functionality of <span class="application">GNOME
Orca</span> works neither with <span
class="application">Tor Browser</span> nor with the <span
class="application">Unsafe Web Browser</span>.
'
W: ./wiki/src/inc/stable_i386_date.fr.po: stray-previous-msgid msgid 'January 14, 2015'
W: ./wiki/src/support/known_issues.fr.po: stray-previous-msgid msgid 'Dell Inc. Latitude E6430 and E6230
'
W: ./wiki/src/support/known_issues.fr.po: stray-previous-msgid msgid 'With BIOS versions A03 06/03/2012 (and A09, A11, and A12)'
W: ./wiki/src/support/known_issues.fr.po: stray-previous-msgid msgid 'Workaround (at least with BIOS versions A09, A11, and A12): just hit enter and it will continue with the boot.'
W: ./wiki/src/support/known_issues.fr.po: stray-previous-msgid msgid 'Mac Pro Tower and MacBook Pro 4,1 (both from early 2008) and MacBookPro late 2011 (8,2) fail to boot from a USB stick created by Tails Installer.'
W: ./wiki/src/support/known_issues.fr.po: stray-previous-msgid msgid '  - Apple when booting from a USB stick:
    - MacBook Air 5,1
    - MacBook Pro 7,1, 13-inch mid 2010
    - MacBook Pro 9,2, 13-inch mid 2012
    - MacBook Pro 8,1, 13-inch late 2011
    - MacBook Pro 10,2
    - MacBook Pro Retina 11,1, late 2013
  - Hewlett-Packard HP Pavilion dv6 Notebook PC
  - Lenovo ThinkPad X61, only on emergency shutdown when pulling out the
    USB stick
  - Toshiba Satellite C855D
  - Dell Inc. Studio 1458
  - Fujitsu Lifebook AH531/GFO, only on regular shutdown, emergency
    shutdown works
  - Samsung N150P
'
W: ./wiki/src/support/known_issues.fr.po: stray-previous-msgid msgid '<a id="i2p_browser"></a>
'
W: ./wiki/src/support/known_issues.fr.po: stray-previous-msgid msgid 'Tor Browser takes too long to shutdown
'
W: ./wiki/src/support/known_issues.fr.po: stray-previous-msgid msgid '<a id="browser_languages"></a>
'
W: ./wiki/src/support/faq.fr.po: stray-previous-msgid msgid 'Why is JavaScript enabled by default in <span class="application">Tor Browser</span>?
'
W: ./wiki/src/support/faq.fr.po: stray-previous-msgid msgid 'Can I install other add-ons in <span class="application">Tor Browser</span>?
'
W: ./wiki/src/support/faq.fr.po: stray-previous-msgid msgid 'Installing add-ons in <span class="application">Tor Browser</span> might break the security built in Tails.
'
W: ./wiki/src/support/faq.fr.po: stray-previous-msgid msgid '<div class="next">
  <ul>
    <li>[[Warnings about persistence|doc/first_steps/persistence/warnings#index3h1]]</li>
    <li>[[Browsing the web with <span class="application">Tor Browser</span>|doc/anonymous_internet/Tor_browser]]</li>
    <li>[[Can I hide the fact that I am using Tails?|doc/about/fingerprint/]]</li>
  </ul>
</div>
'
W: ./wiki/src/support/faq.fr.po: stray-previous-msgid msgid 'But you can already watch HTML5 videos with <span class="application">Tor Browser</span>.
'
W: ./wiki/src/support/faq.fr.po: stray-previous-msgid msgid 'As explained in our documentation about
[[fingerprinting|doc/about/fingerprint]], Tails provides anonymity on the web by
making it difficult to distinguish a particular user amongst all the users of
<span class="application">Tor Browser</span> (either in Tails or on other operating systems).
'
W: ./wiki/src/support/faq.fr.po: stray-previous-msgid msgid 'So, the information retrieved by such fingerprinting websites is not harmful for
anonymity in itself, as long as it is the same for all users of <span class="application">Tor Browser</span>.
'
W: ./wiki/src/support/faq.fr.po: stray-previous-msgid msgid 'For example, the user-agent property of the browser was set to `Mozilla/5.0
(Windows; U; Windows NT 6.1; en-US; rv:1.9.2.3) Gecko/20100401 Firefox/3.6.3`,
as of Tails 0.21 and <span class="application">Tor Browser</span> 2.3.25-13. This value preserves your anonymity even if
the operating system installed on the computer is Windows NT and you usually run
Firefox. On the other hand, changing this value makes you distinguishable from
others users of <span class="application">Tor Browser</span> and breaks your anonymity.
'
W: ./wiki/src/support/talk.fr.po: stray-previous-msgid msgid 'This is a public mailing list, so <strong>be careful with what you are sending</strong>. Give only the necessary informations about yourself, and if possible use Tails or [[<span class="application">Tor Browser</span>|https://torproject.org/torbrowser/]] to hide your IP address.'
W: ./wiki/src/support/talk.fr.po: stray-previous-msgid msgid '[[tails-support-private@???|mailto:tails-support-private@boum.org]]'
W: ./wiki/src/support/talk.fr.po: stray-previous-msgid msgid 'Encrypting your emails with our [[OpenPGP key|doc/about/openpgp_keys#support]] is the only way to achieve end-to-end encryption.'Build step 'Execute shell' marked build as failure