Uploaded agt 0.85-3 (sparc) to ftp-master

2001-09-22 Thread Debian/SPARC Build Daemon
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Fri, 21 Sep 2001 21:30:43 +1000
Source: agt
Binary: agt
Architecture: sparc
Version: 0.85-3
Distribution: unstable
Urgency: low
Maintainer: Debian/sparc Build Daemon [EMAIL PROTECTED]
Changed-By: Steve Kowalik [EMAIL PROTECTED]
Description: 
 agt- Easy, flexible iptables configuration
Changes: 
 agt (0.85-3) unstable; urgency=low
 .
   * Updated Maintainer address.
   * Fix lintian errors.
Files: 
 7cbd5f2180bcea70c745526807245252 12788 net optional agt_0.85-3_sparc.deb
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: Processed by Mailcrypt 3.5.6 and Gnu Privacy Guard 
http://www.gnupg.org/

iEYEARECAAYFAjus1JwACgkQgD/uEicUG7BN9ACgsJo04mPP8ivmiwZm1HqnTN61
AOEAn2DcXLil+kvH9SqLRyWE9RqeH7Ti
=tgNE
-END PGP SIGNATURE-




Uploaded gtkextramm 0.9.1.0cvs20010920-1 (sparc) to ftp-master

2001-09-22 Thread Debian/SPARC Build Daemon
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Thu, 20 Sep 2001 21:45:53 -0700
Source: gtkextramm
Binary: libgtkextramm-dev libgtkextramm10
Architecture: sparc
Version: 0.9.1.0cvs20010920-1
Distribution: unstable
Urgency: low
Maintainer: Debian/sparc Build Daemon [EMAIL PROTECTED]
Changed-By: Bradley Bell [EMAIL PROTECTED]
Description: 
 libgtkextramm-dev - Static library and header files of GtkExtra--
 libgtkextramm10 - Shared library of GtkExtra--
Changes: 
 gtkextramm (0.9.1.0cvs20010920-1) unstable; urgency=low
 .
   * New upstream release (cvs)
Files: 
 ba81e8c8c063ac26e1fe4a156b708b82 188488 devel optional 
libgtkextramm-dev_0.9.1.0cvs20010920-1_sparc.deb
 b64d8a799dcd8acbba6351b426503d92 86506 devel optional 
libgtkextramm10_0.9.1.0cvs20010920-1_sparc.deb
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: Processed by Mailcrypt 3.5.6 and Gnu Privacy Guard 
http://www.gnupg.org/

iEYEARECAAYFAjus1KEACgkQgD/uEicUG7DRqACffjc4bbjdJ3hhsTZ4/en1CVnF
xdwAnj9ciUP6cORNp/fQ9RwDEJ/IZS5t
=i7yy
-END PGP SIGNATURE-




Uploaded battleball 2.0-12 (sparc) to ftp-master

2001-09-22 Thread Debian/SPARC Build Daemon
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Fri, 21 Sep 2001 11:21:10 -0700
Source: battleball
Binary: battleball
Architecture: sparc
Version: 2.0-12
Distribution: unstable
Urgency: low
Maintainer: Debian/sparc Build Daemon [EMAIL PROTECTED]
Changed-By: Chris Waters [EMAIL PROTECTED]
Description: 
 battleball - a soccer game played with tanks or helicopters
Closes: 105942
Changes: 
 battleball (2.0-12) unstable; urgency=low
 .
   * Removed libstdc++-dev from build-dependencies (already in
 build-essential).  Closes: #105942
   * Hacked debian/rules to cope with new xmkmf breakage.
Files: 
 f9060d6765626c322be9c00d8fa24627 111440 games optional 
battleball_2.0-12_sparc.deb
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: Processed by Mailcrypt 3.5.6 and Gnu Privacy Guard 
http://www.gnupg.org/

iEYEARECAAYFAjus1JEACgkQgD/uEicUG7C/ZQCfQQbSwp2UIav0XDnURM9IWVkI
oiIAniA+Jt6TchyBfWu9JSovu1Zht/Ky
=2wlh
-END PGP SIGNATURE-




Uploaded palo 0.94 (sparc) to ftp-master

2001-09-22 Thread Debian/SPARC Build Daemon
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Sat,  8 Sep 2001 12:32:21 -0600
Source: palo
Binary: palo
Architecture: sparc
Version: 0.94
Distribution: unstable
Urgency: low
Maintainer: Debian/sparc Build Daemon [EMAIL PROTECTED]
Changed-By: Paul Bame [EMAIL PROTECTED]
Description: 
 palo   - Linux boot loader for parisc/hppa
Changes: 
 palo (0.94) unstable; urgency=low
 .
   * Add support for symlinks so we can reference /boot/vmlinux in palo.conf
 and not have to rerun palo on every kernel upgrade.
   * Move iplboot into /usr/share/palo.
   * Only generate iplboot if building on hppa machines.  debian-cd needs
 palo, and is likely to be run on i386.
   *-- Richard Hirst [EMAIL PROTECTED]  Wed,  5 Sep 2001 08:48:39 +0100
 .
   * --bootloader now defaults to /usr/share/palo/iplboot so is usually
 not required.  Adjusted documents slightly to accomodate.
   * add postinstall/prerm scripts to handle changed iplboot location
Files: 
 01070fd0b4f3539d6bcb3cda9da46130 211858 base important palo_0.94_sparc.deb
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: Processed by Mailcrypt 3.5.6 and Gnu Privacy Guard 
http://www.gnupg.org/

iEYEARECAAYFAjus1GkACgkQgD/uEicUG7CBCQCfXkHyHyVY9sEEBeSOtOdkQNbn
8twAn0jRQRnaZLVcMyuoKweb9oQ7rZyB
=SNTt
-END PGP SIGNATURE-




Uploaded lvm10 1.0.1rc2-1 (sparc) to ftp-master

2001-09-22 Thread Debian/SPARC Build Daemon
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Fri, 21 Sep 2001 13:55:19 +0200
Source: lvm10
Binary: lvm10
Architecture: sparc
Version: 1.0.1rc2-1
Distribution: unstable
Urgency: low
Maintainer: Debian/sparc Build Daemon [EMAIL PROTECTED]
Changed-By: Robert van der Meulen [EMAIL PROTECTED]
Description: 
 lvm10  - The Logical Volume Manager for Linux
Closes: 110590 79 111425 112627
Changes: 
 lvm10 (1.0.1rc2-1) unstable; urgency=low
 .
   * New upstream version
   * This version should fix version mismatches, and enable 'older' volumes
 again. (Closes: #111425)
   * Removed lvm10-dev package description (Closes: #79)
   * As updating to the new format is not needed in rc2, the upgrade-document
 doesn't need to be present anymore. (Closes: #112627)
   * Fixed error reporting in lvm_user.h (Closes: #110590)
Files: 
 f8ab83c914bf7615a36cba685f8e73a4 2051476 admin optional 
lvm10_1.0.1rc2-1_sparc.deb
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: Processed by Mailcrypt 3.5.6 and Gnu Privacy Guard 
http://www.gnupg.org/

iEYEARECAAYFAjus1JkACgkQgD/uEicUG7BUGgCfed0diUn1D8MMT1zFrfSz/N98
QtYAoINzIOvOvfa2AE54R40BWBNUFAPf
=HJj9
-END PGP SIGNATURE-




Uploaded siag 3.4.10-1 (sparc) to ftp-master

2001-09-22 Thread Debian/SPARC Build Daemon
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Fri, 21 Sep 2001 07:00:00 +0200
Source: siag
Binary: xsiag xpw tsiag siagoffice-plugins egon siag-common siagoffice-common
Architecture: sparc
Version: 3.4.10-1
Distribution: unstable
Urgency: low
Maintainer: Debian/sparc Build Daemon [EMAIL PROTECTED]
Changed-By: peter karlsson [EMAIL PROTECTED]
Description: 
 egon   - The animator program from Siag Office
 siagoffice-common - Common files for Siag Office
 siagoffice-plugins - Plugins for Siag Office
 tsiag  - text version of the SIAG spreadsheet
 xpw- the Pathetic Writer word-processor
 xsiag  - a spreadsheet with an X11 user-interface
Changes: 
 siag (3.4.10-1) unstable; urgency=low
 .
   * New upstream release:
- Updated Russian translation and added Hungarian.
- Bugfixes for filenames with spaces.
- Fixed misspellings in kdelnk files that prevented Mime bindings
  from working.
Files: 
 d6096788cd3bf495b6a45c87a625d4f8 1193214 misc optional 
siagoffice-common_3.4.10-1_sparc.deb
 31f782938dc6585c27f3abd7d61a8d9d 147528 misc optional 
siagoffice-plugins_3.4.10-1_sparc.deb
 3332cfef4646041a8e0be1c9d35a3954 240508 math optional xsiag_3.4.10-1_sparc.deb
 9042a4e40ae1dca44c406b4b09985bad 143546 math optional tsiag_3.4.10-1_sparc.deb
 c6e3fb589cc630968076bc10a469292b 256302 text optional xpw_3.4.10-1_sparc.deb
 f1489f2bbfc95dd5e08a47a6edb2700c 261442 graphics optional 
egon_3.4.10-1_sparc.deb
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: Processed by Mailcrypt 3.5.6 and Gnu Privacy Guard 
http://www.gnupg.org/

iEYEARECAAYFAjus1IAACgkQgD/uEicUG7CfgACg5NXdIP1ElebZSAuEK3Z2PWLm
LyIAn0hl1bMu+bc41Sp8zNEtDWNAP0zA
=1Cau
-END PGP SIGNATURE-




Uploaded patchutils 0.1.2-1 (sparc) to ftp-master

2001-09-22 Thread Debian/SPARC Build Daemon
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Fri, 21 Sep 2001 13:25:57 +0200
Source: patchutils
Binary: patchutils
Architecture: sparc
Version: 0.1.2-1
Distribution: unstable
Urgency: low
Maintainer: Debian/sparc Build Daemon [EMAIL PROTECTED]
Changed-By: Adrian Bunk [EMAIL PROTECTED]
Description: 
 patchutils - Utilities to work with patches
Closes: 110342
Changes: 
 patchutils (0.1.2-1) unstable; urgency=low
 .
   * New upstream release.
 - This release includes the fix to let patchutils compile
   on alpha. (closes: #110342)
Files: 
 f4068d3124a404ee5b48a214a7f9fa4e 20496 text optional 
patchutils_0.1.2-1_sparc.deb
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: Processed by Mailcrypt 3.5.6 and Gnu Privacy Guard 
http://www.gnupg.org/

iEYEARECAAYFAjus1JQACgkQgD/uEicUG7CF0QCgyO+6rDDSRTl1qWXP+uxxyctJ
a8AAn27VrORyNucGObsaZxEzmj/pTt1w
=5Q/f
-END PGP SIGNATURE-




Uploaded sendmail 8.12.0-4 (sparc) to ftp-master

2001-09-22 Thread Debian/SPARC Build Daemon
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Fri, 21 Sep 2001 13:00:00 -0500
Source: sendmail
Binary: sendmail libmilter-dev sendmail-doc
Architecture: sparc
Version: 8.12.0-4
Distribution: unstable
Urgency: low
Maintainer: Debian/sparc Build Daemon [EMAIL PROTECTED]
Changed-By: Richard A Nelson (Rick) [EMAIL PROTECTED]
Description: 
 libmilter-dev - The Sendmail Mail Filter API (Milter).
 sendmail   - A powerful, efficient, and scalable Mail Transport Agent.
Closes: 113044
Changes: 
 sendmail (8.12.0-4) unstable; urgency=low
 .
   * Changes started  Tue, 18 Sep 2001 14:00:00
 .
   * ouch... What happened to /etc/mail/Makefile?!? Its much better now
   * Remove FEATURE(`no_default_msa')dnl from debian-mta, as I'm now using
 the 3rd parm on FEATURE(`msp') to do MSP-MSA submissions.
   * Remove ANONYMOUS from default authentication methods.
   * Remove authentication from sendmail -Ac -bs (/etc/sasldb !o+r)
   * Move setting of filemode from ostype/debian to domain/debian-mta
   * Remove dontblamesendmail for MSP, not needed.
   * Note in submit.mc how to do masquerading.
   * /usr/lib/sm.bin/mail.local needs to run suid because of LMTP mode
 while here, make sensible-mda honour links in /usr/lib/sm.bin when
 looking for available MDAs.
 closes: #113044
Files: 
 a3f9ad7838c8a91ab44cf623fdb874ae 1410464 mail extra sendmail_8.12.0-4_sparc.deb
 e2622fb58192ec932986815ba46213cd 81568 devel extra 
libmilter-dev_8.12.0-4_sparc.deb
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: Processed by Mailcrypt 3.5.6 and Gnu Privacy Guard 
http://www.gnupg.org/

iEYEARECAAYFAjus1HwACgkQgD/uEicUG7BrcQCg78cVRazv7ZbgmNB0xW4Ak1DY
isgAnRpQfJGhMbWGmWkrDWi0fkQJOv3c
=ixSj
-END PGP SIGNATURE-




Uploaded kfilereplace 0.6.1-7.1 (sparc) to ftp-master

2001-09-22 Thread Debian/SPARC Build Daemon
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Wed, 19 Sep 2001 12:10:00 -0700
Source: kfilereplace
Binary: kfilereplace
Architecture: sparc
Version: 0.6.1-7.1
Distribution: unstable
Urgency: low
Maintainer: Debian/sparc Build Daemon [EMAIL PROTECTED]
Changed-By: Ivan E. Moore II [EMAIL PROTECTED]
Description: 
 kfilereplace - Linux/KDE utility to replace strings inside several files
Changes: 
 kfilereplace (0.6.1-7.1) unstable; urgency=low
 .
   * Don't use xinerama or objprelink
   * build with -O0 and with gcc2 for alpha
Files: 
 7a6e688a5c2e24bde71bee94192aa7ae 214486 utils optional 
kfilereplace_0.6.1-7.1_sparc.deb
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: Processed by Mailcrypt 3.5.6 and Gnu Privacy Guard 
http://www.gnupg.org/

iEYEARECAAYFAjus1JsACgkQgD/uEicUG7CPtwCfUuq7FMPVb0mBW+X0GXeiK/Pr
TnYAnR4gCZhVqyqNP3oA/fQZcHMIRv+J
=VMFX
-END PGP SIGNATURE-




Uploaded quantlib 0.2.0-1 (sparc) to ftp-master

2001-09-22 Thread Debian/SPARC Build Daemon
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Thu, 20 Sep 2001 21:21:08 -0500
Source: quantlib
Binary: libquantlib0 libquantlib0-dev
Architecture: sparc
Version: 0.2.0-1
Distribution: unstable
Urgency: low
Maintainer: Debian/sparc Build Daemon [EMAIL PROTECTED]
Changed-By: Dirk Eddelbuettel [EMAIL PROTECTED]
Description: 
 libquantlib0 - Quantitative Finance Library -- development package
 libquantlib0-dev - Quantitative Finance Library -- library package
Closes: 104706
Changes: 
 quantlib (0.2.0-1) unstable; urgency=low
 .
   * Upgraded to new upstream release 0.2.0
   * This new release now builds under gcc/g++ 3.0.1 (Closes: #104706)
   * debian/libquantlib0-dev.links: Link doc dir to libquantlib0
   * debian/libquantlib0-dev.preinst: Delete old doc directory
Files: 
 8ae33d6684ddfe1b99af95114ae37243 1112922 libs optional 
libquantlib0_0.2.0-1_sparc.deb
 e91a1742185817c7cee682fe5e4e18b2 4265092 libs optional 
libquantlib0-dev_0.2.0-1_sparc.deb
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: Processed by Mailcrypt 3.5.6 and Gnu Privacy Guard 
http://www.gnupg.org/

iEYEARECAAYFAjus1J8ACgkQgD/uEicUG7Dy2ACeOXuMlk7O6Esvph3Yd8/xfDDC
LDIAoK2cMJe7nAA2Xs+eRPhkAgscPk3x
=zw6D
-END PGP SIGNATURE-




Uploaded libpaper 1.0.10 (sparc) to ftp-master

2001-09-22 Thread Debian/SPARC Build Daemon
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Fri, 21 Sep 2001 13:51:58 +0200
Source: libpaper
Binary: libpaperg-dev libpaperg
Architecture: sparc
Version: 1.0.10
Distribution: unstable
Urgency: low
Maintainer: Debian/sparc Build Daemon [EMAIL PROTECTED]
Changed-By: Adrian Bunk [EMAIL PROTECTED]
Description: 
 libpaperg  - Library for handling paper characteristics
 libpaperg-dev - Library for handling paper characteristics (development files)
Closes: 112977
Changes: 
 libpaper (1.0.10) unstable; urgency=low
 .
   * Add a || true to the removal of the diversions in the
 preinst of libpaperg. (closes: #112977)
   * Renamed configure.in to configure.ac.
Files: 
 0ddc15ab4ad2f7b154f1e89e63642df8 21416 libs optional libpaperg_1.0.10_sparc.deb
 30e1e31c9d5126b5edcd7be049dedd46 11770 devel optional 
libpaperg-dev_1.0.10_sparc.deb
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: Processed by Mailcrypt 3.5.6 and Gnu Privacy Guard 
http://www.gnupg.org/

iEYEARECAAYFAjus1JYACgkQgD/uEicUG7CgDgCgkEm/sd6+h8aBzr8pwmiCi7ZQ
nJUAoIKtWs/Blw9bqtuqcHk+m0FolQSQ
=ePA/
-END PGP SIGNATURE-




Uploaded csmash 0.6.3-2 (sparc) to ftp-master

2001-09-22 Thread Debian/SPARC Build Daemon
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Thu, 20 Sep 2001 22:40:58 -0400
Source: csmash
Binary: csmash
Architecture: sparc
Version: 0.6.3-2
Distribution: unstable
Urgency: low
Maintainer: Debian/sparc Build Daemon [EMAIL PROTECTED]
Changed-By: Wolfgang Sourdeau [EMAIL PROTECTED]
Description: 
 csmash - CannonSmash, a tabletennis simulation game
Changes: 
 csmash (0.6.3-2) unstable; urgency=low
 .
   * -1 was built against a home-made 1.2.10-2 version of libgtk1.2.
Files: 
 ff552d553f1bf8321d6757c06bad24ba 1234504 games optional 
csmash_0.6.3-2_sparc.deb
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: Processed by Mailcrypt 3.5.6 and Gnu Privacy Guard 
http://www.gnupg.org/

iEYEARECAAYFAjus1IUACgkQgD/uEicUG7DX7QCcCQ4y2NhY3TNFjaokOw0FpFeb
8T4Aniujf3sO8phC3QzcfKH/uT1/5zjC
=lVDK
-END PGP SIGNATURE-




Uploaded oidentd 1.9.9.1+cvs20010921-1 (sparc) to ftp-master

2001-09-22 Thread Debian/SPARC Build Daemon
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Fri, 21 Sep 2001 15:19:27 +0200
Source: oidentd
Binary: oidentd
Architecture: sparc
Version: 1.9.9.1+cvs20010921-1
Distribution: unstable
Urgency: low
Maintainer: Debian/sparc Build Daemon [EMAIL PROTECTED]
Changed-By: Martin Waitz [EMAIL PROTECTED]
Description: 
 oidentd- Replacement ident daemon
Closes: 110540 113043
Changes: 
 oidentd (1.9.9.1+cvs20010921-1) unstable; urgency=low
 .
   * New upstream source taken from cvs
 - fixes port binding, Closes: #113043
 - more masquarade fixes, Closes: #110540 (again ;)
Files: 
 ed9d08d222c8da18d4cec500532e04af 40092 net extra 
oidentd_1.9.9.1+cvs20010921-1_sparc.deb
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: Processed by Mailcrypt 3.5.6 and Gnu Privacy Guard 
http://www.gnupg.org/

iEYEARECAAYFAjus1HQACgkQgD/uEicUG7Aq8gCg5XSs6Irhol5HztfvNCdboOq6
g00Ani48iK5VokljTTOaM9ctD0u65mYQ
=yOzQ
-END PGP SIGNATURE-




Uploaded jazip 0.34-1 (sparc) to ftp-master

2001-09-22 Thread Debian/SPARC Build Daemon
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Fri, 21 Sep 2001 11:08:28 -0400
Source: jazip
Binary: jazip
Architecture: sparc
Version: 0.34-1
Distribution: unstable
Urgency: high
Maintainer: Debian/sparc Build Daemon [EMAIL PROTECTED]
Changed-By: Peter S Galbraith [EMAIL PROTECTED]
Description: 
 jazip  - mount and unmount Iomega Zip and/or Jaz drives.
Closes: 106988
Changes: 
 jazip (0.34-1) unstable; urgency=high
 .
   * Permissions on jazip binary were wrong in 0.33-3 and allowed any user
 access to jazip (and it's devices)! (Version 0.33-3 is only one affected.)
   * New upstream release to fix important bug.
 The umount system call was used with a block device as argument, and
 this is no longer supported in kernel 2.4.  The call was simply
 changed to have the mounted directory as argument.  (closes: #106988).
   * Added debconf support to display the notice at installation rather
 than using an echo in the postinst script.
   * debian/rules: implemented DEB_BUILD_OPTIONS support for building
 with or without debugging info.
   * debian/control: Changed priority to extra (to match override file).
   * debian/control: Standards-Version increased from 3.1.1 to 3.5.6.
Files: 
 e6e93c9329178a02fc26bdc5e4b445ba 134680 contrib/utils extra 
jazip_0.34-1_sparc.deb
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: Processed by Mailcrypt 3.5.6 and Gnu Privacy Guard 
http://www.gnupg.org/

iEYEARECAAYFAjus1GgACgkQgD/uEicUG7AhvwCcDKkAuGsjnB7Dir8ZICMgiXYY
lo8AniAHr4Oij8h1KdoIRhhuoAPKxk3k
=FifM
-END PGP SIGNATURE-




Uploaded aethera 0.9.3-4.1 (sparc) to ftp-master

2001-09-22 Thread Debian/SPARC Build Daemon
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Wed, 19 Sep 2001 12:08:00 -0700
Source: aethera
Binary: aethera
Architecture: sparc
Version: 0.9.3-4.1
Distribution: unstable
Urgency: low
Maintainer: Debian/sparc Build Daemon [EMAIL PROTECTED]
Changed-By: Ivan E. Moore II [EMAIL PROTECTED]
Description: 
 aethera- Email and PIM application for KDE
Changes: 
 aethera (0.9.3-4.1) unstable; urgency=low
 .
   * Don't use objprelink
   * Don't build with xinerama support
   * Dont build with -O2 for alpha, use -O0
   * Update build-depends
Files: 
 1538da4a5c4591cf03243a21d23b247c 2427558 mail optional 
aethera_0.9.3-4.1_sparc.deb
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: Processed by Mailcrypt 3.5.6 and Gnu Privacy Guard 
http://www.gnupg.org/

iEYEARECAAYFAjus1JgACgkQgD/uEicUG7Al3gCgyXTNxpThHcxjg67qCllSR318
eI8AoJh5vovRjltagAX4Gm96IJolObjZ
=ELAN
-END PGP SIGNATURE-




Uploaded nbd 1.2-4 (sparc) to ftp-master

2001-09-22 Thread Debian/SPARC Build Daemon
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Thu, 20 Sep 2001 13:37:34 +0200
Source: nbd
Binary: nbd-client nbd-server
Architecture: sparc
Version: 1:1.2-4
Distribution: unstable
Urgency: low
Maintainer: Debian/sparc Build Daemon [EMAIL PROTECTED]
Changed-By: Wouter Verhelst [EMAIL PROTECTED]
Description: 
 nbd-client - the Network Block Device client
 nbd-server - the Network Block Device server
Closes: 112049
Changes: 
 nbd (1:1.2-4) unstable; urgency=low
 .
   * Changed debian/rules file a bit so that this package should build the
 nbd-server on non-linux ports (currently only The
 Hurd). Unfortunately, I have to sum up each and every linux-port to
 achieve this. Have a look at #112325 to find out why. Since nbd-client
 needs support from the kernel, and since this is a linux-only thing,
 it makes no sense compiling nbd-client on other kernels. Hence, I
 don't try.
   * Created manpages for both nbd-client and nbd-server (Closes: #112049)
   * Now created an initscript for nbd-server too. Works the same way as
 the nbd-client initscript.
Files: 
 0dacd0c57a80a33b76db0dda598f07a3 18952 admin optional 
nbd-server_1.2-4_sparc.deb
 35834261e5dc2fafd8d8db0e702892ec 17144 admin optional 
nbd-client_1.2-4_sparc.deb
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: Processed by Mailcrypt 3.5.6 and Gnu Privacy Guard 
http://www.gnupg.org/

iEYEARECAAYFAjus1J4ACgkQgD/uEicUG7DC4gCfU38N4g3mINoGVHPbYAlshyo7
MM4An1O9zbE6Hj/JkdhzfYN4UvCAmvp/
=TaD9
-END PGP SIGNATURE-




Uploaded snappea 3.0d3-7 (sparc) to ftp-master

2001-09-22 Thread Debian/SPARC Build Daemon
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Fri, 21 Sep 2001 10:41:46 -0500
Source: snappea
Binary: snappea
Architecture: sparc
Version: 3.0d3-7
Distribution: unstable
Urgency: low
Maintainer: Debian/sparc Build Daemon [EMAIL PROTECTED]
Changed-By: Ben Burton [EMAIL PROTECTED]
Description: 
 snappea- A program for creating and studying hyperbolic 3-manifolds.
Changes: 
 snappea (3.0d3-7) unstable; urgency=low
 .
   * Depends on python instead of python-base.
Files: 
 2d1e25a7b7684190eb2bc945910470e2 351656 math extra snappea_3.0d3-7_sparc.deb
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: Processed by Mailcrypt 3.5.6 and Gnu Privacy Guard 
http://www.gnupg.org/

iEYEARECAAYFAjus1G4ACgkQgD/uEicUG7BI7ACdELF3A+jCglVdSv0asYZIFYIa
CM0AoKpOMtSdIWAPTC3k3xADqypKR6Mi
=CDLH
-END PGP SIGNATURE-




Uploaded ktexmaker2 1.5-2 (sparc) to ftp-master

2001-09-22 Thread Debian/SPARC Build Daemon
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Fri, 21 Sep 2001 10:41:46 -0500
Source: ktexmaker2
Binary: ktexmaker2
Architecture: sparc
Version: 1.5-2
Distribution: unstable
Urgency: low
Maintainer: Debian/sparc Build Daemon [EMAIL PROTECTED]
Changed-By: Ben Burton [EMAIL PROTECTED]
Description: 
 ktexmaker2 - LaTeX source editor and TeX shell for KDE
Changes: 
 ktexmaker2 (1.5-2) unstable; urgency=low
 .
   * Oops, added in Recommends: and Suggests: for tools that are used.
Files: 
 68eefdcc60f61c073b4b844352d34220 305424 tex optional ktexmaker2_1.5-2_sparc.deb
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: Processed by Mailcrypt 3.5.6 and Gnu Privacy Guard 
http://www.gnupg.org/

iEYEARECAAYFAjus1JMACgkQgD/uEicUG7BiJQCguEXKgzNdYPIYQXEQkb2zdO7/
cvEAnRAx37TWmHek8jrZN/aDzIxZqsEF
=8B3Y
-END PGP SIGNATURE-




Uploaded gsl 0.9.3-1 (sparc) to ftp-master

2001-09-22 Thread Debian/SPARC Build Daemon
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Thu, 20 Sep 2001 21:22:36 -0500
Source: gsl
Binary: gsl-bin libgsl0 libgsl0-dev
Architecture: sparc
Version: 0.9.3-1
Distribution: unstable
Urgency: low
Maintainer: Debian/sparc Build Daemon [EMAIL PROTECTED]
Changed-By: Dirk Eddelbuettel [EMAIL PROTECTED]
Description: 
 gsl-bin- The GNU Scientific Library (GSL) -- binary package
 libgsl0- The GNU Scientific Library (GSL) -- library package
 libgsl0-dev - The GNU Scientific Library (GSL) -- development package
Changes: 
 gsl (0.9.3-1) unstable; urgency=low
 .
   * Upgraded to new upstream release 0.9.3
   * debian/*.links: Link libgsl0-dev, gsl-bin to /usr/share/doc/libgsl0
   * debian/*.preinst: Delete old doc dir for libgsl0-dev, gsl-bin
Files: 
 2813ccce400b7fd50e0305fb00f49b3b 744230 math optional libgsl0_0.9.3-1_sparc.deb
 d0e7eaccd5abea6a7f13f5f9427ab438 1281332 devel optional 
libgsl0-dev_0.9.3-1_sparc.deb
 989e8c2292845263f59340ad4141a596 10838 math optional gsl-bin_0.9.3-1_sparc.deb
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: Processed by Mailcrypt 3.5.6 and Gnu Privacy Guard 
http://www.gnupg.org/

iEYEARECAAYFAjus1IMACgkQgD/uEicUG7CFpgCgz4z4mTRHAfBvEvJEpL1W115k
djoAoOSHJv1C8zr/5yznZzaGhPCWLpaQ
=P1eC
-END PGP SIGNATURE-




Uploaded xosview 1.7.3-5 (sparc) to ftp-master

2001-09-22 Thread Debian/SPARC Build Daemon
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Thu, 20 Sep 2001 17:30:25 -0500
Source: xosview
Binary: xosview
Architecture: sparc
Version: 1.7.3-5
Distribution: unstable
Urgency: low
Maintainer: Debian/sparc Build Daemon [EMAIL PROTECTED]
Changed-By: Zed Pobre [EMAIL PROTECTED]
Description: 
 xosview- X based system monitor
Closes: 112941
Changes: 
 xosview (1.7.3-5) unstable; urgency=low
 .
   * Section: utils instead of x11
   * Removed debugging message in intmeter.cc left in the -4 patch
   * Added xlibs-dev to Build-Depends (closes: #112941)
Files: 
 8b33714d472320438026410cb0ae328c 67616 utils optional xosview_1.7.3-5_sparc.deb
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: Processed by Mailcrypt 3.5.6 and Gnu Privacy Guard 
http://www.gnupg.org/

iEYEARECAAYFAjus4mcACgkQgD/uEicUG7B4XgCeIF1iX9j7C4v/dC2pLUpmnuvO
w/4AniorNuW0X2T5V5Fwq9GVxzY7imDo
=3jWy
-END PGP SIGNATURE-




Uploaded eiffelfox 0.8.5-2 (sparc) to ftp-master

2001-09-22 Thread Debian/SPARC Build Daemon
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Thu, 20 Sep 2001 20:44:24 -0700
Source: eiffelfox
Binary: eiffelfox-dev eiffelfox
Architecture: sparc
Version: 0.8.5-2
Distribution: unstable
Urgency: low
Maintainer: Debian/sparc Build Daemon [EMAIL PROTECTED]
Changed-By: Brent A. Fulgham [EMAIL PROTECTED]
Description: 
 eiffelfox  - Eiffel Bindings for the FOX GUI Toolkit
 eiffelfox-dev - Eiffel Bindings for the FOX GUI Toolkit
Closes: 112876
Changes: 
 eiffelfox (0.8.5-2) unstable; urgency=low
 .
   * Correct build dependencies.  (Closes:Bug#112876)
Files: 
 365203e6a28ddbf441817827f35ab75a 204558 libs optional 
eiffelfox_0.8.5-2_sparc.deb
 3bee8394503c2193b63147283ca803cd 707758 devel optional 
eiffelfox-dev_0.8.5-2_sparc.deb
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: Processed by Mailcrypt 3.5.6 and Gnu Privacy Guard 
http://www.gnupg.org/

iEYEARECAAYFAjus4l8ACgkQgD/uEicUG7CPrQCeIC0r9Vv2AMU39xLULqmQ4j3p
BCcAn3a0XEXku70fja0Egy++kWFENg4M
=jay5
-END PGP SIGNATURE-




Uploaded thrust 0.89b-2 (sparc) to ftp-master

2001-09-22 Thread Debian/SPARC Build Daemon
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Fri, 21 Sep 2001 20:43:35 +0200
Source: thrust
Binary: thrust
Architecture: sparc
Version: 0.89b-2
Distribution: unstable
Urgency: low
Maintainer: Debian/sparc Build Daemon [EMAIL PROTECTED]
Changed-By: RISKO Gergely [EMAIL PROTECTED]
Description: 
 thrust - a port of the classic Commodore 64 game
Closes: 113039
Changes: 
 thrust (0.89b-2) unstable; urgency=low
 .
   * build-depends fix (closes: Bug#113039)
Files: 
 79613842f21d1ccbec439f65ade2ff15 106832 games optional thrust_0.89b-2_sparc.deb
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: Processed by Mailcrypt 3.5.6 and Gnu Privacy Guard 
http://www.gnupg.org/

iEYEARECAAYFAjus6QcACgkQgD/uEicUG7Cp4QCfSqhcGR1mFfPwrgY27e5hytbq
zNAAn0otgFpP++8ATApbTHd/NITG8Hjq
=1HdX
-END PGP SIGNATURE-




Uploaded libapache-mod-witch 0.0.4-1 (sparc) to ftp-master

2001-09-22 Thread Debian/SPARC Build Daemon
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Thu, 20 Sep 2001 22:00:25 +0200
Source: libapache-mod-witch
Binary: libapache-mod-witch
Architecture: sparc
Version: 0.0.4-1
Distribution: unstable
Urgency: low
Maintainer: Debian/sparc Build Daemon [EMAIL PROTECTED]
Changed-By: Tamas SZERB [EMAIL PROTECTED]
Description: 
 libapache-mod-witch - mod_witch is an Apache module to log the access_log via 
syslog
Closes: 112705
Changes: 
 libapache-mod-witch (0.0.4-1) unstable; urgency=low
 .
   * m68k build failure (closes: #112705)
Files: 
 74b9a8b9323a8dda7c1c8e0f74c86879 8358 web optional 
libapache-mod-witch_0.0.4-1_sparc.deb
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: Processed by Mailcrypt 3.5.6 and Gnu Privacy Guard 
http://www.gnupg.org/

iEYEARECAAYFAjus6jQACgkQgD/uEicUG7DpGACfWhBPDMXJ4lGhbuvS1hxl1LFJ
PMgAoIJdfHQQkp65VJss/3vUIngwyGQY
=4poG
-END PGP SIGNATURE-




Uploaded cyrus-sasl 1.5.24-9 (sparc) to ftp-master

2001-09-22 Thread Debian/SPARC Build Daemon
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Thu, 20 Sep 2001 13:43:18 +0100
Source: cyrus-sasl
Binary: libsasl7 libsasl-dev libsasl-bin libsasl-digestmd5-plain 
libsasl-modules-plain
Architecture: sparc
Version: 1.5.24-9
Distribution: unstable
Urgency: low
Maintainer: Debian/sparc Build Daemon [EMAIL PROTECTED]
Changed-By: Dima Barsky [EMAIL PROTECTED]
Description: 
 libsasl-bin - Programs for manupulating the SASL users database
 libsasl-dev - Development files for authentication abstraction library.
 libsasl-digestmd5-plain - DIGEST-MD5 module for SASL
 libsasl-modules-plain - Basic Pluggable Authentication Modules for SASL
 libsasl7   - Authentication abstraction library.
Changes: 
 cyrus-sasl (1.5.24-9) unstable; urgency=low
 .
   * Removed all Recommends: lines from the control file,
 it was not a good idea.
   * Create only one doc directory (/usr/share/doc/libsasl7), all other
 packages will have symbolic links pointing to it.
Files: 
 a65c13018e59a90fd40ac80a87b6b65d 66856 devel optional 
libsasl-dev_1.5.24-9_sparc.deb
 d2a9c06499064e8a5af782290d5f3d86 13768 devel optional 
libsasl-bin_1.5.24-9_sparc.deb
 b6a9ed463b772824a1b874f987b4612d 15262 devel optional 
libsasl-modules-plain_1.5.24-9_sparc.deb
 8368d8375a5477d90be04a97ea169643 17132 devel optional 
libsasl-digestmd5-plain_1.5.24-9_sparc.deb
 eb8379f185dd4ac57de95cdd8365394e 154006 devel optional 
libsasl7_1.5.24-9_sparc.deb
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: Processed by Mailcrypt 3.5.6 and Gnu Privacy Guard 
http://www.gnupg.org/

iEYEARECAAYFAjus+toACgkQgD/uEicUG7AQBgCgpwN3RMjKLKWHrWKy6vIZ/HXx
318Ania/SeMwcxKAn+W5ERsyTTNAtNyf
=/05y
-END PGP SIGNATURE-




Uploaded fltk 1.0.11-4 (sparc) to ftp-master

2001-09-22 Thread Debian/SPARC Build Daemon
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Fri, 21 Sep 2001 14:25:59 -0500
Source: fltk
Binary: libfltk1-dev libfltk1-dbg fltk-doc libfltk1 libfltk1-example
Architecture: sparc
Version: 1.0.11-4
Distribution: unstable
Urgency: medium
Maintainer: Debian/sparc Build Daemon [EMAIL PROTECTED]
Changed-By: An Thi-Nguyen Le [EMAIL PROTECTED]
Description: 
 libfltk1   - The Fast Light Toolkit, a GUI toolkit inspired by libForms
 libfltk1-dbg - The Fast Light Toolkit, and the Fluid user interface designer
 libfltk1-dev - The Fast Light Toolkit, and the Fluid user interface designer
Closes: 112623
Changes: 
 fltk (1.0.11-4) unstable; urgency=medium
 .
   * Add debian/libfltk1-dev.links, add symlink libfltk.so to versioned
 library (closes: #112623).
   * Removed extraneous files: debian/{rules.new rules.old}
   * Makefile: use 'cd $$dir ' instead of 'cd $$dir;' to catch errors.
   * Updated standards version to 3.5.6.0.
Files: 
 6f3e8287a2e0d5c0e6970184fbe94e23 168258 libs optional 
libfltk1_1.0.11-4_sparc.deb
 87aa3e536d07379c9bb248d14416584c 352358 devel optional 
libfltk1-dev_1.0.11-4_sparc.deb
 edf24a8fd6ca3113535ea62e2ea1d77b 402728 devel extra 
libfltk1-dbg_1.0.11-4_sparc.deb
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: Processed by Mailcrypt 3.5.6 and Gnu Privacy Guard 
http://www.gnupg.org/

iEYEARECAAYFAjutAQwACgkQgD/uEicUG7DZwACg5mlirRvUcKjFTJw8z7wsp3ec
AlgAoOkY8uP9drDNGHQ0lUkpETOEfa7Q
=OEZJ
-END PGP SIGNATURE-




Uploaded gnustep-base 1.0.2-0.4 (sparc) to ftp-master

2001-09-22 Thread Debian/SPARC Build Daemon
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Sat, 22 Sep 2001 10:14:36 +0200
Source: gnustep-base
Binary: gnustep-base1-dbg gnustep-base-examples gnustep-base1 gnustep-base1-dev
Architecture: sparc
Version: 1.0.2-0.4
Distribution: unstable
Urgency: low
Maintainer: Debian/sparc Build Daemon [EMAIL PROTECTED]
Changed-By: Matthias Klose [EMAIL PROTECTED]
Description: 
 gnustep-base1 - The GNUstep Base Library
 gnustep-base1-dbg - Debugging versions for the GNUstep Base Library
 gnustep-base1-dev - Header files and static libraries for the GNUstep Base
Closes: 107940 112484
Changes: 
 gnustep-base (1.0.2-0.4) unstable; urgency=low
 .
   * Lower 'Depends' to 'Recommends' in gnustep-base-examples
 (closes: #107940, #112484).
Files: 
 b24735e6ae24d9f85b18f660924a8e99 950978 libs optional 
gnustep-base1_1.0.2-0.4_sparc.deb
 bf83702136dc418a7e3a23e8ab5bc98f 1237400 devel optional 
gnustep-base1-dev_1.0.2-0.4_sparc.deb
 07888a7f46dcab904b2c83694e6d1773 1582980 devel optional 
gnustep-base1-dbg_1.0.2-0.4_sparc.deb
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: Processed by Mailcrypt 3.5.6 and Gnu Privacy Guard 
http://www.gnupg.org/

iEYEARECAAYFAjutA6IACgkQgD/uEicUG7D3/wCgs5plsV0mS7bImFdo1nE2lD/f
xOEAn2CCZjue3o15BEBpGOOaWFAy6UjJ
=Da3B
-END PGP SIGNATURE-




Uploaded pam 0.72-32 (sparc) to ftp-master

2001-09-22 Thread Debian/SPARC Build Daemon
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Sat, 22 Sep 2001 06:32:29 -0400
Source: pam
Binary: libpam-runtime libpam-modules libpam-cracklib libpam0g-dev libpam-doc 
libpam0g
Architecture: sparc
Version: 0.72-32
Distribution: unstable
Urgency: medium
Maintainer: Debian/sparc Build Daemon [EMAIL PROTECTED]
Changed-By: Sam Hartman [EMAIL PROTECTED]
Description: 
 libpam-cracklib - PAM module to enable cracklib support.
 libpam-modules - Pluggable Authentication Modules for PAM
 libpam-runtime - Runtime support for the PAM library
 libpam0g   - Pluggable Authentication Modules library
 libpam0g-dev - Development files for PAM
Closes: 111854
Changes: 
 pam (0.72-32) unstable; urgency=medium
 .
   * This should probably get into testing before freeze; medium.
   * Patch from Volker Stolz to fix bug in previous pam_group patch,
 closes: #111854
Files: 
 98bd102e0f705503d87f510663de6d17 67664 base required libpam0g_0.72-32_sparc.deb
 43e98c06af85608f9b91c97e96c39784 143884 base required 
libpam-modules_0.72-32_sparc.deb
 5b69a9a43e6309330071f1cd742cdf9d 42802 base required 
libpam-runtime_0.72-32_sparc.deb
 3afcf8fa7e867acb8907071b73826fc9 166110 devel optional 
libpam0g-dev_0.72-32_sparc.deb
 84773a6ce796929099208906fd823732 44272 libs optional 
libpam-cracklib_0.72-32_sparc.deb
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: Processed by Mailcrypt 3.5.6 and Gnu Privacy Guard 
http://www.gnupg.org/

iEYEARECAAYFAjus+JsACgkQgD/uEicUG7C7+gCgxk4n9AbMLqmecQNUWV6glfoW
Q3UAn2dJXs2IoIvTZ0BUg92aIrKmbD4K
=prHk
-END PGP SIGNATURE-




Uploaded bash 2.05-9 (sparc) to ftp-master

2001-09-22 Thread Debian/SPARC Build Daemon
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Sat, 22 Sep 2001 11:26:44 +0200
Source: bash
Binary: bash-doc bash bash-builtins
Architecture: sparc
Version: 2.05-9
Distribution: unstable
Urgency: medium
Maintainer: Debian/sparc Build Daemon [EMAIL PROTECTED]
Changed-By: Matthias Klose [EMAIL PROTECTED]
Description: 
 bash   - The GNU Bourne Again SHell
 bash-builtins - Bash loadable builtins - headers  examples
Closes: 109807 110275 110276 110307 113111
Changes: 
 bash (2.05-9) unstable; urgency=medium
 .
   * Remove files left from test build (closes: #110307, #109807).
   * Apply patches from reports (closes: #110275, #110276).
   * Fix include of rbash man page (closes: #113111).
Files: 
 12fd7fa282493aa587e05b50f8fe5059 365442 base required bash_2.05-9_sparc.deb
 b851a7b51f85320ff786695c4d378065 92948 utils optional 
bash-builtins_2.05-9_sparc.deb
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: Processed by Mailcrypt 3.5.6 and Gnu Privacy Guard 
http://www.gnupg.org/

iEYEARECAAYFAjus+pMACgkQgD/uEicUG7D+WACfZ7R6t5KT7GRUXbDk5Q/48CD/
/sIAn1EHYqsQwxUW06sSz01XeqyHQOr0
=PD8h
-END PGP SIGNATURE-




Uploaded mpich 1.2.1-13 (sparc) to ftp-master

2001-09-22 Thread Debian/SPARC Build Daemon
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Fri, 21 Sep 2001 17:18:50 +0900
Source: mpich
Binary: mpich mpi-doc
Architecture: sparc
Version: 1.2.1-13
Distribution: unstable
Urgency: low
Maintainer: Debian/sparc Build Daemon [EMAIL PROTECTED]
Changed-By: Junichi Uekawa [EMAIL PROTECTED]
Description: 
 mpich  - Parallel computing system
Closes: 112905
Changes: 
 mpich (1.2.1-13) unstable; urgency=low
 .
   * Fixing a nonexistent upshot problem (closes: #112905)
   * updated the TODO file.
Files: 
 89253df47843f4bbae26dd6e8d3bbc00 1211664 devel extra mpich_1.2.1-13_sparc.deb
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: Processed by Mailcrypt 3.5.6 and Gnu Privacy Guard 
http://www.gnupg.org/

iEYEARECAAYFAjutDnwACgkQgD/uEicUG7DJxwCeJnAe4ivYI6g4ntGZdqZygB2N
+6sAn1+tXQE0av5bwM71cnCLeiI+yboM
=rQrJ
-END PGP SIGNATURE-




Uploaded kdesdk 2.2.1-2 (sparc) to ftp-master

2001-09-22 Thread Debian/SPARC Build Daemon
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Sat, 22 Sep 2001 12:00:37 -0500
Source: kdesdk
Binary: kspy kstartperf poxml kdesdk-doc kdesdk kbabel-dev kapptemplate kbabel 
kmtrace kexample kdepalettes kdesdk-scripts
Architecture: sparc
Version: 2.2.1-2
Distribution: unstable
Urgency: low
Maintainer: Debian/sparc Build Daemon [EMAIL PROTECTED]
Changed-By: Ben Burton [EMAIL PROTECTED]
Description: 
 kbabel - a PO-file editor for KDE
 kbabel-dev - a PO-file editor for KDE (development files)
 kdesdk - KDE Software Development Kit
 kexample   - a simple KDE demo application for programmers
 kmtrace- a KDE memory leak tracer
 kspy   - examines the internal state of a Qt/KDE app
 kstartperf - startup time measurement for KDE apps
 poxml  - tools for using PO-files to translate DocBook XML files
Closes: 113110
Changes: 
 kdesdk (2.2.1-2) unstable; urgency=low
 .
   * Updated parameters for alpha build (closes: Bug#113110).
Files: 
 410cf28e9d3a8f23801d10baaa868581 4264 devel optional kdesdk_2.2.1-2_sparc.deb
 014ba905219cd886be6b6aefc68eb9af 782714 devel optional kbabel_2.2.1-2_sparc.deb
 1d68e3a44819962c482594b94f839ed6 20788 devel optional 
kbabel-dev_2.2.1-2_sparc.deb
 774827177009e0abdaed6934c979553e 25922 devel optional 
kexample_2.2.1-2_sparc.deb
 08fdad6e405842e832cb410686cbd5ca 54948 devel optional kmtrace_2.2.1-2_sparc.deb
 6db53859b61cde8fb0e8d640c126e3bb 29046 devel optional kspy_2.2.1-2_sparc.deb
 bba6da36fcb257b43d9333d99d595944 12892 devel optional 
kstartperf_2.2.1-2_sparc.deb
 440e068cad99cde5834d7567a72cbc56 585832 devel optional poxml_2.2.1-2_sparc.deb
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: Processed by Mailcrypt 3.5.6 and Gnu Privacy Guard 
http://www.gnupg.org/

iEYEARECAAYFAjutDoAACgkQgD/uEicUG7C5KwCfeTF8qxhkYGi1BqWJAUBXY9Xw
oMsAoImciZWBeLuwdPntlYLb6pAjB8ir
=li71
-END PGP SIGNATURE-




Uploaded kdeaddons 2.2.1-2 (sparc) to ftp-master

2001-09-22 Thread Debian/SPARC Build Daemon
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Sat, 22 Sep 2001 12:00:37 -0500
Source: kdeaddons
Binary: kicker-applets konq-plugins kdeaddons-doc-html knewsticker-scripts 
kate-plugins noatun-plugins
Architecture: sparc
Version: 2.2.1-2
Distribution: unstable
Urgency: low
Maintainer: Debian/sparc Build Daemon [EMAIL PROTECTED]
Changed-By: Ben Burton [EMAIL PROTECTED]
Description: 
 kate-plugins - plugins for Kate, the KDE text editor
 kicker-applets - applets for Kicker, the KDE panel
 konq-plugins - plugins for Konqueror, the KDE file/web/doc browser
 noatun-plugins - plugins for Noatun, the KDE media player
Closes: 113099
Changes: 
 kdeaddons (2.2.1-2) unstable; urgency=low
 .
   * Updated parameters for alpha build (closes: Bug#113099).
Files: 
 47434a138548c1343c4e061b1db11377 135166 web optional 
konq-plugins_2.2.1-2_sparc.deb
 c426525b51315d6174ad6b8814664496 82678 editors optional 
kate-plugins_2.2.1-2_sparc.deb
 f456852c50fcd1467b32b0af130b9773 78320 x11 optional 
kicker-applets_2.2.1-2_sparc.deb
 ba5e40848373cd257b6c5e4ce342e033 33506 sound optional 
noatun-plugins_2.2.1-2_sparc.deb
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: Processed by Mailcrypt 3.5.6 and Gnu Privacy Guard 
http://www.gnupg.org/

iEYEARECAAYFAjutHBMACgkQgD/uEicUG7ARtgCffq5Nv/rKMb/NlYCTmAjPXSm1
51sAoJV/YFXSnUpHKSXbGSxgZ/pHCNVy
=KMXE
-END PGP SIGNATURE-




Uploaded xscreensaver 3.33-3 (sparc) to ftp-master

2001-09-22 Thread Debian/SPARC Build Daemon
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Fri, 21 Sep 2001 17:52:17 -0500
Source: xscreensaver
Binary: xscreensaver-gl xscreensaver
Architecture: sparc
Version: 3.33-3
Distribution: unstable
Urgency: low
Maintainer: Debian/sparc Build Daemon [EMAIL PROTECTED]
Changed-By: Larry Daffner [EMAIL PROTECTED]
Description: 
 xscreensaver - Automatic screensaver for X
 xscreensaver-gl - GL(Mesa) screenhacks for xscreensaver
Closes: 99797 100915 104582 108596 109453 112395 112849 112973
Changes: 
 xscreensaver (3.33-3) unstable; urgency=low
 .
   * Removed dependency on removed package xv (Closes: #112395)
   * Changed build-depends from xlibmesa-dev to libgl-dev (Closes: #104582)
   * Include time.h in prefs.c to fix IA64 (Closes: #112973)
   * Changed speedmine to ework around Alpha FP foo (Closes: #108596)
   * Added note to README.gl about memory usage and GL
 screensavers. (Closes: #112849)
   * Fixed spelling error in molecule manpage (Closes: #100915)
   * Shut up message about unknown client messages. (Closes: #109453)
   * Fixed command line defaults for xaos (Closes: #99797)
Files: 
 d64938731da83fa13aa666ab65591831 2664496 x11 optional 
xscreensaver_3.33-3_sparc.deb
 cfb9ba0b8098624d63106cca20928d52 876536 x11 optional 
xscreensaver-gl_3.33-3_sparc.deb
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: Processed by Mailcrypt 3.5.6 and Gnu Privacy Guard 
http://www.gnupg.org/

iEYEARECAAYFAjutHjAACgkQgD/uEicUG7AZugCg7yAFx+oY/9dAbCHwYeNA18xT
V+MAn1XWIReWqRdQrSMuCM6VFP1xNJ35
=xTWm
-END PGP SIGNATURE-




Uploaded gkrellkam 0.2.4-1 (sparc) to ftp-master

2001-09-22 Thread Debian/SPARC Build Daemon
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Tue, 11 Sep 2001 14:44:55 -0600
Source: gkrellkam
Binary: gkrellkam
Architecture: sparc
Version: 0.2.4-1
Distribution: unstable
Urgency: low
Maintainer: Debian/sparc Build Daemon [EMAIL PROTECTED]
Changed-By: paul cannon [EMAIL PROTECTED]
Description: 
 gkrellkam  - GKrellM plugin that displays a periodically updating image
Closes: 111622
Changes: 
 gkrellkam (0.2.4-1) unstable; urgency=low
 .
   * New upstream release
   * No longer uses any lockfiles (closes: Bug#111622)
   * Packaging done by upstream author (in NM queue! :)
Files: 
 ab79367421fd7907ac11a78b0651d2a8 25808 x11 optional gkrellkam_0.2.4-1_sparc.deb
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: Processed by Mailcrypt 3.5.6 and Gnu Privacy Guard 
http://www.gnupg.org/

iEYEARECAAYFAjutFxoACgkQgD/uEicUG7D2LQCeM4NSJvVTozbt8EslySdsbIaj
bfIAoJVYFmxQxS63sH+Ch1dFHvbW5HGo
=NT64
-END PGP SIGNATURE-




Uploaded nbd 1.2-5 (sparc) to ftp-master

2001-09-22 Thread Debian/SPARC Build Daemon
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Sat, 22 Sep 2001 11:38:51 -0400
Source: nbd
Binary: nbd-client nbd-server
Architecture: sparc
Version: 1:1.2-5
Distribution: unstable
Urgency: low
Maintainer: Debian/sparc Build Daemon [EMAIL PROTECTED]
Changed-By: Wouter Verhelst [EMAIL PROTECTED]
Description: 
 nbd-client - the Network Block Device client
 nbd-server - the Network Block Device server
Closes: 113143
Changes: 
 nbd (1:1.2-5) unstable; urgency=low
 .
   * Made sure /etc/nbd-server exists before trying to access it
 (Closes: #113143)
Files: 
 072571a0d1e9a384b80cd20307c8cec7 19030 admin optional 
nbd-server_1.2-5_sparc.deb
 d01f4ac7ab3343c31cdc797e110322b8 17226 admin optional 
nbd-client_1.2-5_sparc.deb
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: Processed by Mailcrypt 3.5.6 and Gnu Privacy Guard 
http://www.gnupg.org/

iEYEARECAAYFAjutGrcACgkQgD/uEicUG7Ci1ACg8BjtVAH+i+oPgV1/Ux+V6ETf
ujQAn0RidU2r5sELotgL3+AWw835nxlC
=KJvJ
-END PGP SIGNATURE-




Uploaded zsh 4.0.2-8 (sparc) to ftp-master

2001-09-22 Thread Debian/SPARC Build Daemon
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Fri, 21 Sep 2001 16:44:21 -0400
Source: zsh
Binary: zsh zsh-static zsh-doc
Architecture: sparc
Version: 4.0.2-8
Distribution: unstable
Urgency: high
Maintainer: Debian/sparc Build Daemon [EMAIL PROTECTED]
Changed-By: Clint Adams [EMAIL PROTECTED]
Description: 
 zsh- A shell with lots of features.
Closes: 112955
Changes: 
 zsh (4.0.2-8) unstable; urgency=high
 .
   * Try not to choke in the prerm when cleaning out
   the compiled function digests.  closes: bug#112955.
Files: 
 457dc2aec4ed419b3251b007bbeb5243 1602840 shells optional zsh_4.0.2-8_sparc.deb
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: Processed by Mailcrypt 3.5.6 and Gnu Privacy Guard 
http://www.gnupg.org/

iEYEARECAAYFAjutEjAACgkQgD/uEicUG7AaiQCfWyjmYKr0LzLtThxuHiF9Ag5k
wCkAniC7QHPT/GGhYr9kzx1LMCU37HkC
=dDwJ
-END PGP SIGNATURE-




Uploaded iptables 1.2.3-2 (sparc) to ftp-master

2001-09-22 Thread Debian/SPARC Build Daemon
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Sat, 22 Sep 2001 14:10:45 -0400
Source: iptables
Binary: iptables-dev iptables
Architecture: sparc
Version: 1.2.3-2
Distribution: unstable
Urgency: low
Maintainer: Debian/sparc Build Daemon [EMAIL PROTECTED]
Changed-By: Laurence J. Lane [EMAIL PROTECTED]
Description: 
 iptables   - IP packet filter administration for 2.4.4+ kernels
 iptables-dev - development files for iptable's libipq and libiptc
Changes: 
 iptables (1.2.3-2) unstable; urgency=low
 .
   * Everett Coleman II's [EMAIL PROTECTED]
 string_to_number() correction for libipt_TOS.c
Files: 
 d1f1c69ff88f5a7be399c4d67ef7847a 250564 net optional iptables_1.2.3-2_sparc.deb
 f68e74e9cf7554227c43a45b91ff448d 40950 net optional 
iptables-dev_1.2.3-2_sparc.deb
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: Processed by Mailcrypt 3.5.6 and Gnu Privacy Guard 
http://www.gnupg.org/

iEYEARECAAYFAjutH6MACgkQgD/uEicUG7ATswCfXKJLd0L+6wtBYDE13MHjYU67
MO4AoOgNSNkCpLWm0l1tNK8aXsZccYmm
=tnUk
-END PGP SIGNATURE-




Uploaded dhcp 2.0pl5-6.1 (sparc) to ftp-master

2001-09-22 Thread Debian/SPARC Build Daemon
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Mon, 17 Sep 2001 00:08:50 -0400
Source: dhcp
Binary: dhcp-client-udeb dhcp dhcp-relay dhcp-client
Architecture: sparc
Version: 2.0pl5-6.1
Distribution: unstable
Urgency: high
Maintainer: Debian/sparc Build Daemon [EMAIL PROTECTED]
Changed-By: Adam Di Carlo [EMAIL PROTECTED]
Description: 
 dhcp   - DHCP server for automatic IP address assignment
 dhcp-client - DHCP Client
 dhcp-client-udeb - DHCP Client for debian-installer (udeb)
 dhcp-relay - DHCP Relay
Closes: 57917 66432 75604 76401 98680
Changes: 
 dhcp (2.0pl5-6.1) unstable; urgency=high
 .
   * NMU to fix RC bugs; specifically the urgency is high for
 boot-floppies; currently, things are breaking for boot-floppies when
 the network was configured statically
   * remove /etc/init.d/dhcp-client, since we use /etc/network/interfaces
 now; hopefully that doesn't break too many people upgrading, but
 better to break some upgrades than to break all new installs, IMHO
 closes: #66432, #98680
   * not having the init script, but using ifupdown, fixes tons of other
 problems too, although one wonders whether perhaps we shouldn't remove
 the init script on upgrade as well
 closes: #76401, #57917, #75604
Files: 
 f66de0980c5da4fe03a15188b25af6a4 209924 net optional dhcp_2.0pl5-6.1_sparc.deb
 4a6a2417de436f1c4ad1645cc83f6f88 197184 net optional 
dhcp-client_2.0pl5-6.1_sparc.deb
 68cd9c0c199b1dc9c0c80622256bbce1 150400 net optional 
dhcp-relay_2.0pl5-6.1_sparc.deb
 935cb0614809578e12ed37528824b46e 48252 debian-installer optional 
dhcp-client-udeb_2.0pl5-6.1_sparc.udeb
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: Processed by Mailcrypt 3.5.6 and Gnu Privacy Guard 
http://www.gnupg.org/

iEYEARECAAYFAjutH58ACgkQgD/uEicUG7BrFgCaAgEchpD7iNsYvNLaU6W/hmGa
2h4AoL0Ueqgf57gg6n4jR+bFFmWoa1FQ
=9+x6
-END PGP SIGNATURE-




Uploaded isdnutils 3.1pre1b-23 (sparc) to ftp-master

2001-09-22 Thread Debian/SPARC Build Daemon
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Fri, 21 Sep 2001 14:17:44 +0200
Source: isdnutils
Binary: isdnvboxclient isdnvboxserver isdnutils-xtools isdnactivecards 
libcapi20 isdnlog-data pppdcapiplugin isdneurofile isdnutils-base ipppd 
isdnutils isdnlog isdnvbox isdnutils-doc
Architecture: sparc
Version: 1:3.1pre1b-23
Distribution: unstable
Urgency: high
Maintainer: Debian/sparc Build Daemon [EMAIL PROTECTED]
Changed-By: Paul Slootman [EMAIL PROTECTED]
Description: 
 ipppd  - PPP daemon for syncPPP over ISDN
 isdnactivecards - support for active ISDN cards and CAPI
 isdneurofile - ISDN eurofile transfer tool
 isdnlog- ISDN connection logger
 isdnutils  - Most important ISDN-related packages and utilities.
 isdnutils-base - ISDN utilities, the basic (minimal) set
 isdnutils-xtools - ISDN utilities that use X
 isdnvbox   - ISDN answering machine, client and server
 isdnvboxclient - ISDN answering machine, client
 isdnvboxserver - ISDN answering machine, server
 libcapi20  - libraries for CAPI support
 pppdcapiplugin - plugin for pppd to communicate with CAPI-capable ISDN cards
Closes: 82082 112874 113021
Changes: 
 isdnutils (1:3.1pre1b-23) unstable; urgency=high
 .
   * isdnutils finally made it to testing! Of course that means a new set of
 bad upgrading problems has been discovered (hence urgency=high).
   * There was no cleaner way of smoothly handling upgrades, so I've added a
 transitional package isdnutils that depends on the major component
 packages. What up to now (1:3.1pre1b-1 - 1:3.1pre1b-22) was known as
 isdnutils is now called isdnutils-base. Now to get the various depends /
 conflicts things right for the brave people who had already been tracking
 unstable, and already had 1:3.1pre1b installed...
 closes:#113021
   * When upgrading from 1:3.0-20, the test for ipppd doesn't work if you don't
 use dselect to upgrade; apt-get doesn't set the selection flag in dpkg's
 database. Grep debconf's config.dat for ipppd/ as a (dirty) workaround if
 ipppd isn't listed as to-be-installed by dpkg -l.
   * If the test for ipppd fails, restart the (old) isdnutils as the old
 prerm script stops them when upgrading. Someone will complain that they
 weren't running beforehand, but that's tough, sometimes a decision needs
 to be made. Hence that's at most a won't fix wishlist bug.
   * The postinst scripts for isdnutils and ipppd need a db_stop to prevent
 hanging after the daemons are started. They're only stopped and started
 when upgrading from pre-1:3.1pre1b ...
   * Ignore errors from /etc/init.d/isdnutils start in the isdnutils postinst
 as it will give an error also if the daemons are still/already running.
   * Depend on makedev, as apparently that isn't an essential package. Strange.
 closes:#112874
   * As this is now in isdnutils, the bug asking for the new version in testing
 can be closed: closes:#82082
   * Added a Depends: libcapi20 for pppdcapiplugin, as the plugin most
 certainly needs it.
Files: 
 fb271085ea0c17c20f89c482d82dafbf 17714 utils optional 
isdnutils_3.1pre1b-23_sparc.deb
 1ae9362c6ed33c33f359359b1c3ea074 202364 utils optional 
isdnutils-base_3.1pre1b-23_sparc.deb
 2b8b879854da9c35d20d51d20d24a051 41628 x11 extra 
isdnutils-xtools_3.1pre1b-23_sparc.deb
 de5bf1fb1144c75203043aa6dab8561e 130890 net extra ipppd_3.1pre1b-23_sparc.deb
 ddabc4a99c743a9e94b6b4946a2f0239 454858 utils extra 
isdnlog_3.1pre1b-23_sparc.deb
 552e0941001c784e3d0daf7b8ab6185d 13178 utils extra 
isdnvbox_3.1pre1b-23_sparc.deb
 f5ff92ef40957624bbe6705a0aad37ef 55734 utils extra 
isdnvboxclient_3.1pre1b-23_sparc.deb
 096b63673cc2858cb830249b6a1558c0 38 utils extra 
isdnvboxserver_3.1pre1b-23_sparc.deb
 0d604be87e00ce5577f909d36bc1da4d 55126 libs extra 
libcapi20_3.1pre1b-23_sparc.deb
 b3885ef64dfdc3c509b5c626986182fe 1575600 utils extra 
isdnactivecards_3.1pre1b-23_sparc.deb
 727f56e99acf037da854a0c9313e171b 142504 net extra 
pppdcapiplugin_3.1pre1b-23_sparc.deb
 ce421a259a51b26fcd6723f75b9aa818 149190 comm extra 
isdneurofile_3.1pre1b-23_sparc.deb
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: Processed by Mailcrypt 3.5.6 and Gnu Privacy Guard 
http://www.gnupg.org/

iEYEARECAAYFAjutFx4ACgkQgD/uEicUG7Ct3ACgm9wDDIIS3s7uAqzs8/bpMk0Z
LOUAoI+jgeSYRu89DF+jktsE/Eu2Cw+D
=SGHB
-END PGP SIGNATURE-




Uploaded kdeartwork 2.2.1-2 (sparc) to ftp-master

2001-09-22 Thread Debian/SPARC Build Daemon
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Sat, 22 Sep 2001 12:00:37 -0500
Source: kdeartwork
Binary: kdeartwork-theme-window kdeartwork-theme-desktop kdeartwork-misc 
kdeartwork-style
Architecture: sparc
Version: 2.2.1-2
Distribution: unstable
Urgency: low
Maintainer: Debian/sparc Build Daemon [EMAIL PROTECTED]
Changed-By: Ben Burton [EMAIL PROTECTED]
Description: 
 kdeartwork-style - widget styles released with KDE
Closes: 113125
Changes: 
 kdeartwork (2.2.1-2) unstable; urgency=low
 .
   * Updated parameters for alpha build (closes: Bug#113125).
Files: 
 0dffb6be3c1ee51f167170866460a1c5 45644 graphics optional 
kdeartwork-style_2.2.1-2_sparc.deb
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: Processed by Mailcrypt 3.5.6 and Gnu Privacy Guard 
http://www.gnupg.org/

iEYEARECAAYFAjutEjMACgkQgD/uEicUG7CQRgCeNTmSxr6vEcGM+h3nqur1BTv/
2g4AoNL77XWBXtOypx5h9v9CAu7+m70q
=xgIF
-END PGP SIGNATURE-




Re: new port: and the winner is....

2001-09-22 Thread Junichi Uekawa
Henrique de Moraes Holschuh [EMAIL PROTECTED] immo vero scripsit

 Someone could always port Debian to the Windows kernel, but they should not
 call it Debian anymore, and it has no place in our archives (because it is
 contrib [or non-free?] and too big to be inserted in the contrib
 distribution).

Of course, if we manage to have a working ReactOS,
things will be different.

Until then, we will have a very contrib system.



regards,
junichi

-- 
[EMAIL PROTECTED]  http://www.netfort.gr.jp/~dancer






Re: new port: and the winner is....

2001-09-22 Thread Manuel Segura
I agree totaly with you..

Manuel Segura

Richard B. Kreckel a écrit :
 
 Hi,
 
 On Thu, 30 Aug 2001, A Mennucc1 wrote:
 [...]
   -why is the 'win' port important?
 [...]
 
 (Sorry for dropping in late to this thread, I was too busy lately to
 follow debian-devel tightly.)
 
 The social contract says Our Priorities are Our Users and Free Software.
 Such a win-port might indeed serve some users.  But for my own part, I do
 have some personal problems with making all free software win-compatible.
 Does it serve Free Software?  Such ports frequently lead to crippled
 design [1] and frankly, I do not like to give people more excuses for not
 switching to an entirely free OS.
 
 The one argument I am missing from the discussion is this: The porters
 find some problem with package foo and file a bugreport (most probably
 critical) to the maintainer of foo who has to look into the problem,
 withdrawing time for more important things than a weird port.  It has
 happened before [2] and it will happen again.  We really shouldn't invite
 everything into Debian.  It will distract us from providing a really
 useful free OS.
 
 For my own part, the mere thought of receiving reports like package bar
 doesn't build on win gives me the creeps.  I would have to log in to one
 of those crippled machines, try to fix scripts, makefiles, code, whatnot.
 Ugh.
 
 Instead, I would consider downgrading the bugreport to wishlist/wontfix.
 
 Regards
  -richy.
 
 [1] Why does Apache have to abstract away their threads?  Right, because
 Winsux doesn't have pthreads.  Admittedly, this might be a little
 off-topic because that is for a native port, but that's the basic
 pattern.
 [2] Look at the parisc port: GCC-3.0 is not even officially supported
 upstream and the entire toolchain seems to be changing frequently.
 Some packages build one day but not the next.  I wonder how they
 want to release that stuff.
 --
   .''`.  Richard B. Kreckel
  : :' :  [EMAIL PROTECTED]
  `. `'   [EMAIL PROTECTED]
`-http://www.ginac.de/~kreckel/
 
 --
 To UNSUBSCRIBE, email to [EMAIL PROTECTED]
 with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]

-- 
---
Manuel Segura
ESCPI - CNAM
---




Re: bind9-chroot (was: questions on ITP)

2001-09-22 Thread Richard Atterer
WRT chrooting certain applications - wouldn't it make sense to mandate
one consistent way for the user to do this if the package supports it? 
That way, chrooting daemons is much more user-friendly, which in turn
will (hopefully) lead to more people doing it.

One idea: In a configuration file, the user lists those daemons he
wants to run chrooted. init.d scripts that support it read this
information and act on it, copying the required files to a chroot
before starting the daemon there.

(The config file should probably not be read directly, instead the
init.d script should call a small query script. That way, file format
changes are possible.)

Furthermore, IMHO init.d scripts that support chrooting should clearly
print [chrooted] or [non-chrooted] in their startup message, both
to make the user aware that chrooting is possible, and to make it
clear whether it takes place.

So:
- If I were to put together a chroot-helper package, would people be
  interested in using it for their package?
- Any chance of getting a recommendation for this into policy?

Cheers,

  Richard

-- 
  __   _
  |_) /|  Richard Atterer |  CS student at the Technische  |  GnuPG key:
  | \/¯|  http://atterer.net  |  Universität München, Germany  |  0x888354F7
  ¯ ´` ¯


pgpRpbNdfnvwh.pgp
Description: PGP signature


building a new debian package

2001-09-22 Thread Søren Boll Overgaard
Hello

I am having trouble making a debian package that I building install a binary
file the directory of my choice.
I've been looking at
http://www.debian.org/doc/maint-guide/ch-modify.html#s-destdir to change the
install directory, but I can't seem to get it to work. 

After running dpkg-buildpackage the Makefile of the program I trying to
build looks like this (irrelevant parts have been cut away) :

[...]
# Edited for Debian GNU/Linux.
DESTDIR =

[...]
prefix = /usr/local
exec_prefix = ${prefix}
#exec_prefix = $(DESTDIR)/usr/X11R6/bin
#bindir = ${exec_prefix}/bin
bindir = $(DESTDIR)/usr/X11R6/bin
sbindir = ${exec_prefix}/sbin
[...]

And debian/rules contains the following for the configure command:

[...]
configure-stamp:
dh_testdir
# Add here commands to configure the package.
#   ./configure --prefix=/usr --mandir=\$${prefix}/share/man
--infodir=\$${p
refix}/share/info
./configure 

touch configure-stamp

[...]

However, even with the above parameters, the binary is installed in /bin/,
which in this case is not desirable.
Any input would be greatly appreciated.

-- 
Søren O.




Re: madison

2001-09-22 Thread Admar Schoonen
On Fri, Sep 21, 2001 at 05:15:31PM -0400, Matt Zimmerman wrote:
 On Fri, Sep 21, 2001 at 12:52:37PM +0200, Martin F Krafft wrote:
 
  madison seems to be what the debian.org webpage sports as the package
  search over distributions. is it packaged? do you need someone to package
  it?
 
 madison requires connectivity to a Debian database which is not publicly
 accessible, so it is only useful on a couple of internal Debian machines.
 For this reason, it probably isn't worthwhile to package it.

I think it can be useful for those who want to create their own flavour of
Debian or want to (partially) mirror Debian. dpkg-scanpackages/apt-ftparchive
doesn't work very well for packages which are located in the pool, and the only
way to generate correct packagelists is to put all information from all packages
in a database and query that database when packagelists are generated; thus
people who want to partially mirror or create their own Debian-flavour should
create their own Debian database from information gathered from packagelists
which are downloaded by apt.

[I'm not a developer, and this is just my humble opinion.]

Admar Schoonen




ITP: kernel-patch-selinux

2001-09-22 Thread Russell Coker
I intend to package the kernel patch for NSA Security Enhanced Linux.

Below is all the details on licenses.  My interpretation of the below license 
details (copied from the web site) is that the kernel patch is under the GPL 
and everything is fine.

However is the issue about warranty exclusion etc which requires agreement 
before download going to force me to use non-free for my package?

I know I could ask upstream for clarification of this issue, however the NSA 
takes a long time to prepare public statements, and I imagine that things 
will take longer now than they would have a few weeks ago...



License statement from http://www.nsa.gov/selinux/license.html :
 
All source code found on this site is released under the same terms and
conditions as the original sources. For example, the patches to the Linux
kernel, patches to many existing utilities, and new programs and libraries
available here are released under the terms and conditions of the GNU General
Public License (GPL). The patches to some existing utilities and libraries
available here are released under the terms and conditions of the BSD license.
 
I downloaded the patch from http://www.nsa.gov/selinux/src-disclaim.html
which has the following disclaimer:

Before downloading this software, you must accept the warranty exclusion and
limitation of liability which appears below.
 
WARRANTY EXCLUSION
 
I expressly understand and agree that this software is a non-commercially
developed program that may contain bugs (as that term is used in the
industry) and that it may not function as intended. The software is licensed
as is. NSA makes no, and hereby expressly disclaims all, warranties,
express, implied, statutory, or otherwise with respect to the software,
including noninfringement and the implied warranties of merchantability and
fitness for a particular purpose.
 
LIMITATION OF LIABILITY
 
In no event will NSA be liable for any damages, including loss of data, lost
profits, cost of cover, or other special, incidental, consequential, direct or
indirect damages arising from the software or the use thereof, however caused
and on any theory of liability. This limitation will apply even if NSA has
been advised of the possibility of such damage. I acknowledge that this is a
reasonable allocation of risk.

-- 
http://www.coker.com.au/bonnie++/ Bonnie++ hard drive benchmark
http://www.coker.com.au/postal/   Postal SMTP/POP benchmark
http://www.coker.com.au/projects.html Projects I am working on
http://www.coker.com.au/~russell/ My home page




Re: bind9-chroot (was: questions on ITP)

2001-09-22 Thread Bernhard R. Link
* Richard Atterer [EMAIL PROTECTED] [010922 16:26]:
 One idea: In a configuration file, the user lists those daemons he
 wants to run chrooted. init.d scripts that support it read this
 information and act on it, copying the required files to a chroot
 before starting the daemon there.
 
 (The config file should probably not be read directly, instead the
 init.d script should call a small query script. That way, file format
 changes are possible.)

Help, please no. More supports for chroots may be nice. But not this
way! init.d-scripts calling scripts, that parse global config files
is ugly and one of the many points to make people switch from Suse or
Redhat to debian. 
And why should there be an global config file for all daemons? Beeing
chrooted is an quite personal thing for every package. Why should
an daemon that run chroot (and there are not that many, that can
can be run there) parse a file which is of no interest for him but
for the other daemons?

Hochachtungsvoll,
  Bernhard R. Link




Re: bind9-chroot (was: questions on ITP)

2001-09-22 Thread Martin F Krafft
also sprach Richard Atterer (on Sat, 22 Sep 2001 03:28:21PM +0200):
 One idea: In a configuration file, the user lists those daemons he
 wants to run chrooted. init.d scripts that support it read this
 information and act on it, copying the required files to a chroot
 before starting the daemon there.

well, you might just use SuSE then...
i don't think this is a good idea. for one, it is not necessary to
copoy the chroot files over and over again with each init.d start.
this interferes with tripwire installations, and it's in violation of
the never touch a running system philosophy. even if libc is
updated, if bind runs happily in its chroot. and if some security
patch or otherwise crucial update is pending for a library that bind
also uses, then the bind9 and bind9-chroot packages should be updated
anyway. sure, this requires more work on the maintainer side, but it's
the best way to do it.

 - If I were to put together a chroot-helper package, would people be
   interested in using it for their package?

i don't think a global solution is a good choice here. if i install
bind9-chroot (hypothetically speaking), then bind9 should not possibly
ever run non-chrooted again. this should be done via diversions.

martin;  (greetings from the heart of the sun.)
  \ echo mailto: !#^.*|tr * mailto:; [EMAIL PROTECTED]
-- 
you will be run over by a beer truck.


pgpNLq6IqYszk.pgp
Description: PGP signature


Re: building a new debian package

2001-09-22 Thread Gergely Nagy
It seems to be an autoconf/automake based project, from what you
included in your mail, how about using make install
DESTDIR=$(CURDIR)/debian/tmp from the install target of your
debian/rules? Or if that doesn't work, you can still use make install
bindir=$(CURDIR)/debian/tmp/usr/bin or something like that..

Cheers,
-- 
Gergely Nagy \ mhp/|8]


pgpS3dP2SXClJ.pgp
Description: PGP signature


(None)

2001-09-22 Thread Cong ty Luat Gia Pham
Title: Cong ty Luat Gia Pham







http://www.giapham.com

KÝnh göi: 	Quý b¹n hµng!

C«ng ty LuËt Gia Ph¹m xin göi lêi chµo tr©n träng tíi quý doanh nghiÖp!

C«ng ty LuËt Gia Ph¹m, mét C«ng ty chuyªn ho¹t ®éng trong lÜnh vùc t­ vÊn víi ®éi ngò luËt gia, t­ vÊn viªn chuyªn nghiÖp giµu kinh nghiÖm ®¶m b¶o cung cÊp cho kh¸ch hµng nh÷ng dÞch vô t­ vÊn hoµn h¶o vµ chÊt l­îng.

Trong thêi gian qua ®­îc sù tin cËy cña Céng ®ång c¸c Doanh nghiÖp, chóng t«i th­êng xuyªn nhËn ®­îc sù ñy quyÒn, nh÷ng yªu cÇu t­ vÊn vµ thùc hiÖn c¸c dÞch vô hç trî c¸c doanh nghiÖp trong nh÷ng lÜnh vùc sau:

  Thµnh lËp míi doanh nghiÖp, thay ®æi, bæ sung ®¨ng ký kinh doanh, më chi nh¸nh, v¨n phßng ®¹i diÖn t¹i Hµ Néi vµ c¸c tØnh phÝa B¾c;
  §¨ng ký b¶o hé ®éc quyÒn nh·n hiÖu s¶n phÈm, kiÓu d¸ng c«ng nghiÖp, s¸ng chÕ, gi¶i ph¸p h÷u Ých;
  §¨ng ký b¶o hé quyÒn t¸c gi¶ ®èi víi c¸c t¸c phÈm v¨n häc, nghÖ thuËt, khoa häc;
  §¨ng ký m· sè m· v¹ch  tiªu chuÈn quèc tÕ cho c¸c s¶n phÈm 
  T­ vÊn th­êng xuyªn hç trî c¸c doanh nghiÖp trong c¸c lÜnh vùc ph¸p lý, thuÕ, tµi chÝnh, qu¶n trÞ doanh nghiÖp;
  Tham gia tranh tông, ®µm ph¸n gi¶i quyÕt c¸c xung ®ét vÒ lao ®éng, c¸c tranh chÊp kinh tÕ, d©n sù;
  ChuÈn hãa tÝnh ph¸p lý cña hå s¬ doanh nghiÖp, hîp ®ång vµ c¸c v¨n b¶n, tµi liÖu kh¸c.


Víi bÒ dµy kinh nghiÖm, tÝnh chuyªn nghiÖp cña c¸c c¸n bé t­ vÊn, chóng
t«i ®¶m b¶o cung cÊp c¸c dÞch vô t­ vÊn toµn diÖn vµ ®a ngµnh, lu«n lµm tháa m·n mäi yªu cÇu kh¾t khe nhÊt cña kh¸ch hµng. Sù g¾n bã cña kh¸ch hµng víi c¸c dÞch vô hç trî tæng thÓ ®· ®em l¹i thµnh
c«ng cho chóng t«i nh­ ngµy h«m nay!
Chóng t«i lµm ®iÒu ®ã bëi nhËn thÊy r»ng Doanh nghiÖp tù phßng vÖ ch­a ®ñ mµ cÇn ph¶i thiÕt lËp c¸c quan hÖ ph¸p lý ®Ó b¶o vÖ m×nh tr­íc khi bÞ tÊn c«ng. ThÕ m¹nh cña c«ng ty chóng t«i lµ sù kÕt hîp gi÷a kinh nghiÖm vµ sù t×m tßi c¸c gi¶i ph¸p thùc tiÔn nh­ng ®¶m b¶o tÝnh chuyªn nghiÖp trong chÊt l­îng dÞch vô.
Mäi ho¹t ®éng cña chóng t«i còng kh«ng n»m ngoµi môc tiªu chung cña tÊt c¶ c¸c nhµ ®Çu t­:
 "Hîp t¸c ®Ó cïng ph¸t triÓn".

Tr©n träng
LuËt Gia Ph¹m Thµnh Long
C«ng ty LuËt Gia Ph¹m
Tel: 84-4- 55 838 55 Fax: 55
809 55

§Þa chØ:  240 Phè Quan Nh©n, Thanh Xu©n, Hµ Néi
http://www.giapham.com


Scope of business:

-Advisory of procedures and documentation for establishment of enterprises, branch, representative office;
-Registration of stamp, tax code, import- export code ;
-Regitration of scopes of conditional professional, business licenses of profession practising, petroleum and oil , LPG, advisory of designing, etc;
-Registration of indutrial intellectual  protection, invention, industrial style, useful solutions, goods trademarks, goods origination names;
-Registration of licensing of code international line codes for commodities.

please visiting our website: http://www.giapham.com









Re: madison

2001-09-22 Thread Andrew Suffield
On Sat, Sep 22, 2001 at 04:44:46PM +0200, Admar Schoonen wrote:
 I think it can be useful for those who want to create their own flavour of
 Debian or want to (partially) mirror Debian. dpkg-scanpackages/apt-ftparchive
 doesn't work very well for packages which are located in the pool, and the 
 only
 way to generate correct packagelists is to put all information from all 
 packages
 in a database and query that database when packagelists are generated; thus
 people who want to partially mirror or create their own Debian-flavour should
 create their own Debian database from information gathered from packagelists
 which are downloaded by apt.

Those people are going to want all of dak (katie) anyway, which
contains madison. It's not packaged either, but is available from
anonymous cvs at cvs.debian.org.

However, the value of a package that would be used by about half a
dozen people in total is probably not all that high.

-- 
  .''`.  ** Debian GNU/Linux ** | Andrew Suffield
 : :' : | Dept. of Computing,
 `. `'  | Imperial College,
   `-http://www.debian.org/ | London, UK


pgpmwwHifndOR.pgp
Description: PGP signature


Re: madison

2001-09-22 Thread Matt Zimmerman
On Sat, Sep 22, 2001 at 04:44:46PM +0200, Admar Schoonen wrote:

 On Fri, Sep 21, 2001 at 05:15:31PM -0400, Matt Zimmerman wrote:
  madison requires connectivity to a Debian database which is not publicly
  accessible, so it is only useful on a couple of internal Debian
  machines.  For this reason, it probably isn't worthwhile to package it.
 
 I think it can be useful for those who want to create their own flavour of
 Debian or want to (partially) mirror Debian.
 dpkg-scanpackages/apt-ftparchive doesn't work very well for packages which
 are located in the pool, and the only way to generate correct packagelists
 is to put all information from all packages in a database and query that
 database when packagelists are generated; thus people who want to
 partially mirror or create their own Debian-flavour should create their
 own Debian database from information gathered from packagelists which are
 downloaded by apt.

There's no need for a database unless you want to maintain multiple
distributions out of cross-sections of the pool, as Debian does.  If you
only want to make a single set of packages available, or you only have one
version of each package, then you don't need to worry about it.
apt-ftparchive and dpkg-scanpackages will work fine.  It doesn't matter how
the files are arranged (in a pool-like hierarchy or section hierarchy or a
flat directory).

If you want to create your own flavour that contains different versions of
certain packages, or excludes certain packages, the situation is the same,
just with a different set of packages.  Partial mirrors should use the
Packages files on the mirrors to decide which files need to be downloaded.

Or is there a different goal you're describing that I don't understand?

-- 
 - mdz




Re: bind9-chroot (was: questions on ITP)

2001-09-22 Thread Bdale Garbee
[EMAIL PROTECTED] (Martin F Krafft) writes:

 i don't think a global solution is a good choice here. if i install
 bind9-chroot (hypothetically speaking), then bind9 should not possibly
 ever run non-chrooted again. this should be done via diversions.

Eee.  Diversions are so, well, messy.  I think the obvious right way to 
handle this is to add debconf support to the bind9 package asking whether to
run in a chroot or not, and if the answer is yes, just do it.  As has been
pointed out by Marco and others, bind9 is substantially easier to chroot than
previous versions, so this shouldn't be a big deal.

Having said that, since I don't personally run bind9 in a chroot, I continue 
to be willing to accept a clueful patch to the current bind9 source in non-US
to implement this... but am in no big rush to implement it myself.

Bdale




Re: dpkg logging

2001-09-22 Thread Bdale Garbee
[EMAIL PROTECTED] (Wichert Akkerman) writes:

 Previously Steve Greenland wrote:
  Stdout and stderr from the maintainer scripts. (This may be obvious, but
 you didn't explicitly list it.)

 No, they should use debconf.

Regardless of whether packages are using debconf, I have wondered for *years*
why we didn't at least have the option of logging stdout and stderr from
everything in the install/update process.  I think it's a good idea.

Bdale




Re: bind9-chroot (was: questions on ITP)

2001-09-22 Thread Richard Atterer
On Sat, Sep 22, 2001 at 05:39:20PM +0200, Bernhard R. Link wrote:
 Help, please no. More supports for chroots may be nice. But not this
 way! init.d-scripts calling scripts, that parse global config files
 is ugly and one of the many points to make people switch from Suse
 or Redhat to debian.

On Sat, Sep 22, 2001 at 05:46:57PM +0200, Martin F Krafft wrote:
 well, you might just use SuSE then...

:-)

The config script was only a suggestion, and maybe there is a better
way. But my main point was: Chrooting a daemon should be possible in a
uniform way for all daemons that support it.

What alternative possibilities for implementing this do you see? The
package will have to contain the necessary chrooting script somewhere,
and the admin will have to perform some action to trigger its
execution. After he has done that, the init.d script should execute
the chrooted daemon.

It is possible to tell the admin to edit the init.d script, changing
some variable assignment to chroot=yes, but somehow I don't think
this is very clean, either...

Cheers,

  Richard

-- 
  __   _
  |_) /|  Richard Atterer |  CS student at the Technische  |  GnuPG key:
  | \/¯|  http://atterer.net  |  Universität München, Germany  |  0x888354F7
  ¯ ´` ¯


pgp2CxJpGiE30.pgp
Description: PGP signature


Re: bind9-chroot (was: questions on ITP)

2001-09-22 Thread Martin F Krafft
also sprach Bdale Garbee (on Sat, 22 Sep 2001 12:06:37PM -0600):
 Eee.  Diversions are so, well, messy.  I think the obvious right
 way to handle this is to add debconf support to the bind9 package
 asking whether to run in a chroot or not, and if the answer is yes,
 just do it.  As has been pointed out by Marco and others, bind9 is
 substantially easier to chroot than previous versions, so this
 shouldn't be a big deal.

well, okay then. i'll paste together a script that will chroot bind
right after it was successfully installed as bind9 package, and one
which will remove the chroot again.

martin;  (greetings from the heart of the sun.)
  \ echo mailto: !#^.*|tr * mailto:; [EMAIL PROTECTED]
-- 
if loving linux is wrong, i don't want to be right.


pgpSS5gaKw8IH.pgp
Description: PGP signature


Re: bind9-chroot (was: questions on ITP)

2001-09-22 Thread Martin F Krafft
also sprach Richard Atterer (on Sat, 22 Sep 2001 10:03:55PM +0200):
 What alternative possibilities for implementing this do you see? The
 package will have to contain the necessary chrooting script somewhere,
 and the admin will have to perform some action to trigger its
 execution. After he has done that, the init.d script should execute
 the chrooted daemon.

i believe that chroot should be an install time choice, not a runtime
one (as in config script).

martin;  (greetings from the heart of the sun.)
  \ echo mailto: !#^.*|tr * mailto:; [EMAIL PROTECTED]
-- 
la lune, c'est comme les canards
il faut aimer caresser les chats
pour avoir envie d'y aller.


pgpYni67FCDuI.pgp
Description: PGP signature


New attempt to build debhelper 3 for potato

2001-09-22 Thread Marc Haber
Hi,

tonight, I tried a second time to build debhelper 3 for potato.
Because of the radical changes that have taken place especially with
the SGML stuff, I have now successfully built 37 .deb files and am -
again - beginning to wonder if it is really this major an effort to
get a basic tool like debhelper built.

For example, is it really necessary to update debconf to have a
current debhelper? debhelper 3.0.45 build-depends on debconf-utils
which is not present in potato's debconf.

I have now a debconf 1.0.01 for potato which doesn't install since
perl 5.005 has its include files in a different place, and the debconf
postinst looks for Debconf/Db.pm in a bunch of other places instead of
/usr/share/perl5/Debconf where the backported debconf places it. I
certainly won't backport perl 5.6 to potato, and I am quite reluctant
to look that deeply into debconf 1.0.01's sources to figure out where
the perl modules should go with potato's perl.

I'd appreciate any hints. I am now off to bed ;) See you tomorrow.

Greetings
Marc

-- 
-
Marc Haber | I don't trust Computers. They | Mailadresse im Header
Karlsruhe, Germany |  lose things.Winona Ryder | Fon: *49 721 966 32 15
Nordisch by Nature |  How to make an American Quilt | Fax: *49 721 966 31 29




Re: New attempt to build debhelper 3 for potato

2001-09-22 Thread Marc Haber
On Sun, 23 Sep 2001 00:02:16 +0200, Marc Haber
[EMAIL PROTECTED] wrote:
tonight, I tried a second time to build debhelper 3 for potato.

And obviously goofed with my From: address. Sorry 'bout that.

Greetings
Marc

-- 
-- !! No courtesy copies, please !! -
Marc Haber  |Questions are the | Mailadresse im Header
Karlsruhe, Germany  | Beginning of Wisdom  | Fon: *49 721 966 32 15
Nordisch by Nature  | Lt. Worf, TNG Rightful Heir | Fax: *49 721 966 31 29




Re: bind9-chroot (was: questions on ITP)

2001-09-22 Thread Bryan Andersen
Martin F Krafft wrote:
 
 also sprach Richard Atterer (on Sat, 22 Sep 2001 10:03:55PM +0200):
  What alternative possibilities for implementing this do you see? The
  package will have to contain the necessary chrooting script somewhere,
  and the admin will have to perform some action to trigger its
  execution. After he has done that, the init.d script should execute
  the chrooted daemon.
 
 i believe that chroot should be an install time choice, not a runtime
 one (as in config script).

For the long term, this is the safer choice.

For even better security, just make the standard install chrooted
if it is of wise security reasons to.  I've long questioned why 
this hasn't been done for many daemons already.  I know some people
may feel that because it breaks something or another one shouldn't
do this, but I know bind doesn't break anything by being chrooted.
What about others?

-- 
|  Bryan Andersen   |   [EMAIL PROTECTED]   |   http://www.nerdvest.com   |
| Buzzwords are like annoying little flies that deserve to be swatted. |
|   -Bryan Andersen|




Re: bind9-chroot (was: questions on ITP)

2001-09-22 Thread Ethan Benson
On Sat, Sep 22, 2001 at 05:39:20PM +0200, Bernhard R. Link wrote:
 * Richard Atterer [EMAIL PROTECTED] [010922 16:26]:
  One idea: In a configuration file, the user lists those daemons he
  wants to run chrooted. init.d scripts that support it read this
  information and act on it, copying the required files to a chroot
  before starting the daemon there.
  
  (The config file should probably not be read directly, instead the
  init.d script should call a small query script. That way, file format
  changes are possible.)
 
 Help, please no. More supports for chroots may be nice. But not this
 way! init.d-scripts calling scripts, that parse global config files
 is ugly and one of the many points to make people switch from Suse or
 Redhat to debian. 

very much agreed.

 And why should there be an global config file for all daemons? Beeing
 chrooted is an quite personal thing for every package. Why should
 an daemon that run chroot (and there are not that many, that can
 can be run there) parse a file which is of no interest for him but
 for the other daemons?

yes the proper way is usually /etc/default/package  which has config
variables for the initscript, such as CHROOT=yes 

-- 
Ethan Benson
http://www.alaska.net/~erbenson/


pgpMr4lCrK712.pgp
Description: PGP signature


Re: bind9-chroot (was: questions on ITP)

2001-09-22 Thread Martin F Krafft
also sprach Bryan Andersen (on Sat, 22 Sep 2001 05:42:23PM -0500):
 For even better security, just make the standard install chrooted
 if it is of wise security reasons to.  I've long questioned why 
 this hasn't been done for many daemons already.  I know some people
 may feel that because it breaks something or another one shouldn't
 do this, but I know bind doesn't break anything by being chrooted.
 What about others?

my postfix runs in a total chroot (even more than standard debian). so
does my proftpd. problem with the latter is, of course, that no users
can use ftp to access their homedirectories, which i don't consider a
problem. i could enable it with 
'mount --bind /home /chroot/proftpd/home'
but i don't mind imposing sftp on everyone for security reasons
anyway!

other than that, i have long wanted to set up an apache chroot. i
don't know of other daemons (read: i don't use other daemons), which
would profit from a chroot...

martin;  (greetings from the heart of the sun.)
  \ echo mailto: !#^.*|tr * mailto:; [EMAIL PROTECTED]
-- 
laugh alone and the world thinks you're an idiot.


pgpVBMmCiDN7p.pgp
Description: PGP signature


Re: Bug#66135: libtool_1.3.5-1(unstable): wrapping of binaries fails with -D__LIBTOOL_IS_A_FOOL__

2001-09-22 Thread Brian May
 Domenico == Domenico Andreoli [EMAIL PROTECTED] writes:

Domenico how to find these evil packages?

Just grep __LIBTOOL_IS_A_FOOL__ debian/rules (for every source
package) should find most of them, I think (not tested).

Since the hack is probably exactly the same in every instance, it
might even be possible to develop a simple script for automatically
removing the hack (not sure if this would be worthwhile or not).

Just don't remove the hack unless the program uses a recent version of
libtool (look at the version on the initial bug report for a general
idea, do any packages still fall into this category?)
-- 
Brian May [EMAIL PROTECTED]




URGENT AND CONFIDENTIAL

2001-09-22 Thread hassan bellob
Hassan Bello.
#20  LOUIS BOTHA CRESCENT
SADTON SOUTH AFRICA,
Fax: 874-762-727949. 
Tel: 874-762-727947.
 
{URGENT AND   CONFIDENTIAL} 
Dear sir,  

In order to transfer out (USD 126 M) One hundred and
twenty six million United States Dollars) from African
Development Bank. I have the courage to ask you to
look for a reliable and honest person who will be
capable for
this important business believing that you will never
let me down either now or in future.

I am Hassan Bello the Chief auditor of African
Development Bank (ADB). There is an account opened in
this bank in 1980 and since 1990 nobody has operated
on this account again. after going through some old
files in the records I discovered that if I do not
remit this money out urgently it will be forfeited for
nothing. the owner of this account is Mr. Smith B.
Andreas, a foreigner, and a miner at kruger gold co.,
a geologist by profession and  he died since 1990. no
other person knows about this account or any thing
concerning it, the account has no other beneficiary
and my investigation proved to me as well that this
company does not know anything about this account and
the amount involved is (USD 126M) One hundred and
twenty six million United States Dollars million
dollars. I want to first transfer USDM twenty six
million United States Dollars from this money into a
safe foreigners account abroad before the rest, but I
don't know any foreigner, I am only contacting you as
a foreigner because this money can not be approved to
a local bank here, but can only be approved to any
foreign account because the money is in ,us dollars
and
the former owner of the account is Mr. Smith B.
Andreas is  a foreigner too.  I know that this message
will come to you as a surprise as we  don't know our
selves before, we will sign agreement, but be sure
that it is real and a genuine business. I
only got your contact address  from my secretary who
operates computer,
with believe in God that you will never let me down in
this business you are the only person that I have
contacted in this business, so please reply urgently
so that I will inform you the next step to take
urgently. Send also your private telephone and fax
number including the full details of the account to be
used for the deposit.

I want us to meet face to face or sign a binding
agreement to bind us together so that you can receive
this money into a foreign account or any account of
your choice where the fund will be safe. and I will
fly to your country for withdrawal and sharing and
other investments.

I am contacting you because of the need to involve a
foreigner with foreign account and foreign
beneficiary. I need your full co-operation to make
this work fine. because the management is ready to
approve this payment to any foreigner who has correct
information of this account, which I will give to you
later immediately, if you are able and with capability
to handle such amount in strict confidence and trust
according to my instructions and advice for our mutual
benefit because this opportunity will never come again
in my life. I need truthful person in this business
because I don't want to make mistake I need your
strong assurance and trust.

With my position now in the office I can transfer this
money to any foreigner's reliable account which you
can provide with assurance that this money will be
intact pending my physical arrival in your country for
sharing. I will destroy all documents of transaction
immediately we receive this money leaving no trace to
any place. you can also come to discuss with me face
to face after which I will make this remittance in
your presence and two of us will fly to your country
at least two days ahead of the money going into the
account.

I will apply for annual leave to get visa immediately
I hear from you that you are ready to act and receive
this fund in your account. I will use my position and
influence to effect legal approvals and onward
transfer of this money to your account with
appropriate clearance forms of the ministries and
foreign exchange departments.

At the conclusion of this business, you will be given
35% of the total amount, 60% will be for me, while 5%
will be for expenses both parties might have incurred
during the process of transferring.

I look forward to your earliest reply through my email
address or by my tel: 874-762-727947,fax: 874-762
727949.

yours truly


Hassan Bello.



__
Do You Yahoo!?
Get email alerts  NEW webcam video instant messaging with Yahoo! Messenger. 
http://im.yahoo.com




Re: madison

2001-09-22 Thread Wichert Akkerman
Previously Andrew Suffield wrote:
 However, the value of a package that would be used by about half a
 dozen people in total is probably not all that high.

We have packages that nobody uses. I wouldn't mind seeing the whole
archive management suite being packaged properly, and I think it 
would be used more then you might think.

Wichert.

-- 
  _
 /   Nothing is fool-proof to a sufficiently talented fool \
| [EMAIL PROTECTED]   http://www.liacs.nl/~wichert/ |
| 1024D/2FA3BC2D 576E 100B 518D 2F16 36B0  2805 3CB8 9250 2FA3 BC2D |




Re: bind9-chroot

2001-09-22 Thread Herbert Xu
Bryan Andersen [EMAIL PROTECTED] wrote:

 do this, but I know bind doesn't break anything by being chrooted.
 What about others?

Last I checked bind when chrooted can't listen on interfaces that are
brought up after it has been started.
-- 
Debian GNU/Linux 2.2 is out! ( http://www.debian.org/ )
Email:  Herbert Xu ~{PmVHI~} [EMAIL PROTECTED]
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt




Re: Preview of new Ghostscript packages - please test

2001-09-22 Thread Yasuhiro Take
[ Ccing to [EMAIL PROTECTED] for notice ]
Hello,

At 21 Sep 2001 15:39:27 +0300,
Samuli Suonpaa wrote:
 
 
 Torsten Landschoff [EMAIL PROTECTED] wrote:
  Please take a look at these packages and tell me about any problems
  which are not obvious - there is a lot of stuff still lacking and I
  only want to upload the packages to the archive when they are
  feature complete.
 
 I really do not know much about gs, but it seems there's something
 wrong with fontpaths here. When trying to configure my PSC500 (using
 hpijs and DJ8xx drivers now included in GhostScript, thank you for
 that), I only get complaint: Error: /invalid font in findfont and
 something like that.

If you are using defoma 0.4.10, it may be a bug of defoma.
Please look into /var/lib/defoma/gs.d/dirs/fonts, where is one of the
font paths of gs and is managed by defoma.
The bug makes creating Fontmap file fail so you may find out that there're
symlinks of pfb files of gsfonts but no Fontmap file in the directory.

Please update to defoma 0.4.11 i'm just duploading and run:
defoma-app update gs

Thanks,

hirot



pgp6xoTdVk25L.pgp
Description: PGP signature


Re: gpg and trustdb very slow

2001-09-22 Thread Karsten M. Self
on Tue, Sep 18, 2001 at 08:37:33AM -0300, Henrique de Moraes Holschuh ([EMAIL 
PROTECTED]) wrote:
 On Tue, 18 Sep 2001, Christian Kurz wrote:
  On 01-09-18 Joey Hess wrote:
   It'd be nice if someone would look at optimizing it sometime; the
   behavior I see with strace is absurd, and could easily be done with no
   syscalls, at least, by just reading the whole trustdb into memory.
  
  I know that the Werner revamped the whole keyring code about 1 or two
  weeks ago. I just tried the --list-keys with my private and the debian
  keyring specified in the options file and I didn't took more then 5
  minutes for me. (AMD K6-200). So I don't think if anyone would really
  want to optimize the code more, he should look at the current cvs code.
 
 As well as reading the docs, where it is said that one must reinsert
 all keys in the trustdb to take advantage of a new caching
 algorithm...

Could you point us to the relevant docs and/or the command for
re-reading keys?

Peace.

-- 
Karsten M. Self kmself@ix.netcom.comhttp://kmself.home.netcom.com/
 What part of Gestalt don't you understand?  Home of the brave
  http://gestalt-system.sourceforge.net/Land of the free
   Free Dmitry! Boycott Adobe! Repeal the DMCA!  http://www.freesklyarov.org
Geek for Hire  http://kmself.home.netcom.com/resume.html


pgpmTtP8aIl64.pgp
Description: PGP signature


Re: gpg and trustdb very slow

2001-09-22 Thread Henrique de Moraes Holschuh
On Sat, 22 Sep 2001, Karsten M. Self wrote:
 on Tue, Sep 18, 2001 at 08:37:33AM -0300, Henrique de Moraes Holschuh ([EMAIL 
 PROTECTED]) wrote:
  On Tue, 18 Sep 2001, Christian Kurz wrote:
   On 01-09-18 Joey Hess wrote:
It'd be nice if someone would look at optimizing it sometime; the
behavior I see with strace is absurd, and could easily be done with no
syscalls, at least, by just reading the whole trustdb into memory.
   
   I know that the Werner revamped the whole keyring code about 1 or two
   weeks ago. I just tried the --list-keys with my private and the debian
   keyring specified in the options file and I didn't took more then 5
   minutes for me. (AMD K6-200). So I don't think if anyone would really
   want to optimize the code more, he should look at the current cvs code.
  
  As well as reading the docs, where it is said that one must reinsert
  all keys in the trustdb to take advantage of a new caching
  algorithm...
 
 Could you point us to the relevant docs and/or the command for
 re-reading keys?

Nope, I have no idea where the hell I read that. I'd try the changelogs of
upstream and the Debian package, however: that rings a bell on my mind.

As for the useful information, that I can help you with. All you have to do
is to let gnupg readd all your keys to a keyring (as in 'new insertions to a
keyring are made in the new cache scheme'). Simple enough to do with any RW
keyrings you might have:

1. move every keyring out of the way, including the RO ones.
2. feed a keyring to gnupg. You might want to use --fast-import followed by
an --update-trustdb for that.
3. replace the old keyring you fed gnupg with with the new one
4. repeat as needed.

I actually find it better to have just one RW keyring, and feed any RO
keyrings I might need (such as Debian's) to gnupg to get them added to that
RW keyring.  Since gnupg's handling of multiple keyrings is not really that
hot, keeping track of only a simple RW keyring helps a lot.

 Peace.
Hmm, sorry about that. I sounded far more annoyed/annoying ;) than I should
have.

-- 
  One disk to rule them all, One disk to find them. One disk to bring
  them all and in the darkness grind them. In the Land of Redmond
  where the shadows lie. -- The Silicon Valley Tarot
  Henrique Holschuh




doc-html-w3

2001-09-22 Thread Joseph Schlecht
I am seriously considering adopting [1]doc-html-w3. I use many of these 
recommendation on a daily basis where I work. It would be nice to have a 
current local copy of them. However, before I decide to go any further with 
the adoption process, I want to get some feedback for an idea that I have. 

I would like to change doc-html-w3's name to one that is more descriptive of 
its current and potential contents. I think that the name of this package is 
currently too narrow; besides HTML, indicated by the name, it also contains 
CSS2, SMIL, XPATH and many other recommendations. What do you think?

Here are a couple of the names I've been kicking around:
   a) doc-w3 (most general, my favorite; perhaps even doc-w3c)
   b) doc-markup-w3 (but this name excludes style: CSS2, XSLT, etc)
   c) doc-w3c-recommend
   d) [your suggestion here]

Feel free to CC me, thanks.

Joe Schlecht

[1] http://bugs.debian.org/cgi-bin/bugreport.cgi?archive=no\bug=110945