Uploaded agt 0.85-3 (sparc) to ftp-master
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.7 Date: Fri, 21 Sep 2001 21:30:43 +1000 Source: agt Binary: agt Architecture: sparc Version: 0.85-3 Distribution: unstable Urgency: low Maintainer: Debian/sparc Build Daemon [EMAIL PROTECTED] Changed-By: Steve Kowalik [EMAIL PROTECTED] Description: agt- Easy, flexible iptables configuration Changes: agt (0.85-3) unstable; urgency=low . * Updated Maintainer address. * Fix lintian errors. Files: 7cbd5f2180bcea70c745526807245252 12788 net optional agt_0.85-3_sparc.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1.0.6 (GNU/Linux) Comment: Processed by Mailcrypt 3.5.6 and Gnu Privacy Guard http://www.gnupg.org/ iEYEARECAAYFAjus1JwACgkQgD/uEicUG7BN9ACgsJo04mPP8ivmiwZm1HqnTN61 AOEAn2DcXLil+kvH9SqLRyWE9RqeH7Ti =tgNE -END PGP SIGNATURE-
Uploaded gtkextramm 0.9.1.0cvs20010920-1 (sparc) to ftp-master
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.7 Date: Thu, 20 Sep 2001 21:45:53 -0700 Source: gtkextramm Binary: libgtkextramm-dev libgtkextramm10 Architecture: sparc Version: 0.9.1.0cvs20010920-1 Distribution: unstable Urgency: low Maintainer: Debian/sparc Build Daemon [EMAIL PROTECTED] Changed-By: Bradley Bell [EMAIL PROTECTED] Description: libgtkextramm-dev - Static library and header files of GtkExtra-- libgtkextramm10 - Shared library of GtkExtra-- Changes: gtkextramm (0.9.1.0cvs20010920-1) unstable; urgency=low . * New upstream release (cvs) Files: ba81e8c8c063ac26e1fe4a156b708b82 188488 devel optional libgtkextramm-dev_0.9.1.0cvs20010920-1_sparc.deb b64d8a799dcd8acbba6351b426503d92 86506 devel optional libgtkextramm10_0.9.1.0cvs20010920-1_sparc.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1.0.6 (GNU/Linux) Comment: Processed by Mailcrypt 3.5.6 and Gnu Privacy Guard http://www.gnupg.org/ iEYEARECAAYFAjus1KEACgkQgD/uEicUG7DRqACffjc4bbjdJ3hhsTZ4/en1CVnF xdwAnj9ciUP6cORNp/fQ9RwDEJ/IZS5t =i7yy -END PGP SIGNATURE-
Uploaded battleball 2.0-12 (sparc) to ftp-master
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.7 Date: Fri, 21 Sep 2001 11:21:10 -0700 Source: battleball Binary: battleball Architecture: sparc Version: 2.0-12 Distribution: unstable Urgency: low Maintainer: Debian/sparc Build Daemon [EMAIL PROTECTED] Changed-By: Chris Waters [EMAIL PROTECTED] Description: battleball - a soccer game played with tanks or helicopters Closes: 105942 Changes: battleball (2.0-12) unstable; urgency=low . * Removed libstdc++-dev from build-dependencies (already in build-essential). Closes: #105942 * Hacked debian/rules to cope with new xmkmf breakage. Files: f9060d6765626c322be9c00d8fa24627 111440 games optional battleball_2.0-12_sparc.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1.0.6 (GNU/Linux) Comment: Processed by Mailcrypt 3.5.6 and Gnu Privacy Guard http://www.gnupg.org/ iEYEARECAAYFAjus1JEACgkQgD/uEicUG7C/ZQCfQQbSwp2UIav0XDnURM9IWVkI oiIAniA+Jt6TchyBfWu9JSovu1Zht/Ky =2wlh -END PGP SIGNATURE-
Uploaded palo 0.94 (sparc) to ftp-master
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.7 Date: Sat, 8 Sep 2001 12:32:21 -0600 Source: palo Binary: palo Architecture: sparc Version: 0.94 Distribution: unstable Urgency: low Maintainer: Debian/sparc Build Daemon [EMAIL PROTECTED] Changed-By: Paul Bame [EMAIL PROTECTED] Description: palo - Linux boot loader for parisc/hppa Changes: palo (0.94) unstable; urgency=low . * Add support for symlinks so we can reference /boot/vmlinux in palo.conf and not have to rerun palo on every kernel upgrade. * Move iplboot into /usr/share/palo. * Only generate iplboot if building on hppa machines. debian-cd needs palo, and is likely to be run on i386. *-- Richard Hirst [EMAIL PROTECTED] Wed, 5 Sep 2001 08:48:39 +0100 . * --bootloader now defaults to /usr/share/palo/iplboot so is usually not required. Adjusted documents slightly to accomodate. * add postinstall/prerm scripts to handle changed iplboot location Files: 01070fd0b4f3539d6bcb3cda9da46130 211858 base important palo_0.94_sparc.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1.0.6 (GNU/Linux) Comment: Processed by Mailcrypt 3.5.6 and Gnu Privacy Guard http://www.gnupg.org/ iEYEARECAAYFAjus1GkACgkQgD/uEicUG7CBCQCfXkHyHyVY9sEEBeSOtOdkQNbn 8twAn0jRQRnaZLVcMyuoKweb9oQ7rZyB =SNTt -END PGP SIGNATURE-
Uploaded lvm10 1.0.1rc2-1 (sparc) to ftp-master
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.7 Date: Fri, 21 Sep 2001 13:55:19 +0200 Source: lvm10 Binary: lvm10 Architecture: sparc Version: 1.0.1rc2-1 Distribution: unstable Urgency: low Maintainer: Debian/sparc Build Daemon [EMAIL PROTECTED] Changed-By: Robert van der Meulen [EMAIL PROTECTED] Description: lvm10 - The Logical Volume Manager for Linux Closes: 110590 79 111425 112627 Changes: lvm10 (1.0.1rc2-1) unstable; urgency=low . * New upstream version * This version should fix version mismatches, and enable 'older' volumes again. (Closes: #111425) * Removed lvm10-dev package description (Closes: #79) * As updating to the new format is not needed in rc2, the upgrade-document doesn't need to be present anymore. (Closes: #112627) * Fixed error reporting in lvm_user.h (Closes: #110590) Files: f8ab83c914bf7615a36cba685f8e73a4 2051476 admin optional lvm10_1.0.1rc2-1_sparc.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1.0.6 (GNU/Linux) Comment: Processed by Mailcrypt 3.5.6 and Gnu Privacy Guard http://www.gnupg.org/ iEYEARECAAYFAjus1JkACgkQgD/uEicUG7BUGgCfed0diUn1D8MMT1zFrfSz/N98 QtYAoINzIOvOvfa2AE54R40BWBNUFAPf =HJj9 -END PGP SIGNATURE-
Uploaded siag 3.4.10-1 (sparc) to ftp-master
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.7 Date: Fri, 21 Sep 2001 07:00:00 +0200 Source: siag Binary: xsiag xpw tsiag siagoffice-plugins egon siag-common siagoffice-common Architecture: sparc Version: 3.4.10-1 Distribution: unstable Urgency: low Maintainer: Debian/sparc Build Daemon [EMAIL PROTECTED] Changed-By: peter karlsson [EMAIL PROTECTED] Description: egon - The animator program from Siag Office siagoffice-common - Common files for Siag Office siagoffice-plugins - Plugins for Siag Office tsiag - text version of the SIAG spreadsheet xpw- the Pathetic Writer word-processor xsiag - a spreadsheet with an X11 user-interface Changes: siag (3.4.10-1) unstable; urgency=low . * New upstream release: - Updated Russian translation and added Hungarian. - Bugfixes for filenames with spaces. - Fixed misspellings in kdelnk files that prevented Mime bindings from working. Files: d6096788cd3bf495b6a45c87a625d4f8 1193214 misc optional siagoffice-common_3.4.10-1_sparc.deb 31f782938dc6585c27f3abd7d61a8d9d 147528 misc optional siagoffice-plugins_3.4.10-1_sparc.deb 3332cfef4646041a8e0be1c9d35a3954 240508 math optional xsiag_3.4.10-1_sparc.deb 9042a4e40ae1dca44c406b4b09985bad 143546 math optional tsiag_3.4.10-1_sparc.deb c6e3fb589cc630968076bc10a469292b 256302 text optional xpw_3.4.10-1_sparc.deb f1489f2bbfc95dd5e08a47a6edb2700c 261442 graphics optional egon_3.4.10-1_sparc.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1.0.6 (GNU/Linux) Comment: Processed by Mailcrypt 3.5.6 and Gnu Privacy Guard http://www.gnupg.org/ iEYEARECAAYFAjus1IAACgkQgD/uEicUG7CfgACg5NXdIP1ElebZSAuEK3Z2PWLm LyIAn0hl1bMu+bc41Sp8zNEtDWNAP0zA =1Cau -END PGP SIGNATURE-
Uploaded patchutils 0.1.2-1 (sparc) to ftp-master
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.7 Date: Fri, 21 Sep 2001 13:25:57 +0200 Source: patchutils Binary: patchutils Architecture: sparc Version: 0.1.2-1 Distribution: unstable Urgency: low Maintainer: Debian/sparc Build Daemon [EMAIL PROTECTED] Changed-By: Adrian Bunk [EMAIL PROTECTED] Description: patchutils - Utilities to work with patches Closes: 110342 Changes: patchutils (0.1.2-1) unstable; urgency=low . * New upstream release. - This release includes the fix to let patchutils compile on alpha. (closes: #110342) Files: f4068d3124a404ee5b48a214a7f9fa4e 20496 text optional patchutils_0.1.2-1_sparc.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1.0.6 (GNU/Linux) Comment: Processed by Mailcrypt 3.5.6 and Gnu Privacy Guard http://www.gnupg.org/ iEYEARECAAYFAjus1JQACgkQgD/uEicUG7CF0QCgyO+6rDDSRTl1qWXP+uxxyctJ a8AAn27VrORyNucGObsaZxEzmj/pTt1w =5Q/f -END PGP SIGNATURE-
Uploaded sendmail 8.12.0-4 (sparc) to ftp-master
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.7 Date: Fri, 21 Sep 2001 13:00:00 -0500 Source: sendmail Binary: sendmail libmilter-dev sendmail-doc Architecture: sparc Version: 8.12.0-4 Distribution: unstable Urgency: low Maintainer: Debian/sparc Build Daemon [EMAIL PROTECTED] Changed-By: Richard A Nelson (Rick) [EMAIL PROTECTED] Description: libmilter-dev - The Sendmail Mail Filter API (Milter). sendmail - A powerful, efficient, and scalable Mail Transport Agent. Closes: 113044 Changes: sendmail (8.12.0-4) unstable; urgency=low . * Changes started Tue, 18 Sep 2001 14:00:00 . * ouch... What happened to /etc/mail/Makefile?!? Its much better now * Remove FEATURE(`no_default_msa')dnl from debian-mta, as I'm now using the 3rd parm on FEATURE(`msp') to do MSP-MSA submissions. * Remove ANONYMOUS from default authentication methods. * Remove authentication from sendmail -Ac -bs (/etc/sasldb !o+r) * Move setting of filemode from ostype/debian to domain/debian-mta * Remove dontblamesendmail for MSP, not needed. * Note in submit.mc how to do masquerading. * /usr/lib/sm.bin/mail.local needs to run suid because of LMTP mode while here, make sensible-mda honour links in /usr/lib/sm.bin when looking for available MDAs. closes: #113044 Files: a3f9ad7838c8a91ab44cf623fdb874ae 1410464 mail extra sendmail_8.12.0-4_sparc.deb e2622fb58192ec932986815ba46213cd 81568 devel extra libmilter-dev_8.12.0-4_sparc.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1.0.6 (GNU/Linux) Comment: Processed by Mailcrypt 3.5.6 and Gnu Privacy Guard http://www.gnupg.org/ iEYEARECAAYFAjus1HwACgkQgD/uEicUG7BrcQCg78cVRazv7ZbgmNB0xW4Ak1DY isgAnRpQfJGhMbWGmWkrDWi0fkQJOv3c =ixSj -END PGP SIGNATURE-
Uploaded kfilereplace 0.6.1-7.1 (sparc) to ftp-master
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.7 Date: Wed, 19 Sep 2001 12:10:00 -0700 Source: kfilereplace Binary: kfilereplace Architecture: sparc Version: 0.6.1-7.1 Distribution: unstable Urgency: low Maintainer: Debian/sparc Build Daemon [EMAIL PROTECTED] Changed-By: Ivan E. Moore II [EMAIL PROTECTED] Description: kfilereplace - Linux/KDE utility to replace strings inside several files Changes: kfilereplace (0.6.1-7.1) unstable; urgency=low . * Don't use xinerama or objprelink * build with -O0 and with gcc2 for alpha Files: 7a6e688a5c2e24bde71bee94192aa7ae 214486 utils optional kfilereplace_0.6.1-7.1_sparc.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1.0.6 (GNU/Linux) Comment: Processed by Mailcrypt 3.5.6 and Gnu Privacy Guard http://www.gnupg.org/ iEYEARECAAYFAjus1JsACgkQgD/uEicUG7CPtwCfUuq7FMPVb0mBW+X0GXeiK/Pr TnYAnR4gCZhVqyqNP3oA/fQZcHMIRv+J =VMFX -END PGP SIGNATURE-
Uploaded quantlib 0.2.0-1 (sparc) to ftp-master
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.7 Date: Thu, 20 Sep 2001 21:21:08 -0500 Source: quantlib Binary: libquantlib0 libquantlib0-dev Architecture: sparc Version: 0.2.0-1 Distribution: unstable Urgency: low Maintainer: Debian/sparc Build Daemon [EMAIL PROTECTED] Changed-By: Dirk Eddelbuettel [EMAIL PROTECTED] Description: libquantlib0 - Quantitative Finance Library -- development package libquantlib0-dev - Quantitative Finance Library -- library package Closes: 104706 Changes: quantlib (0.2.0-1) unstable; urgency=low . * Upgraded to new upstream release 0.2.0 * This new release now builds under gcc/g++ 3.0.1 (Closes: #104706) * debian/libquantlib0-dev.links: Link doc dir to libquantlib0 * debian/libquantlib0-dev.preinst: Delete old doc directory Files: 8ae33d6684ddfe1b99af95114ae37243 1112922 libs optional libquantlib0_0.2.0-1_sparc.deb e91a1742185817c7cee682fe5e4e18b2 4265092 libs optional libquantlib0-dev_0.2.0-1_sparc.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1.0.6 (GNU/Linux) Comment: Processed by Mailcrypt 3.5.6 and Gnu Privacy Guard http://www.gnupg.org/ iEYEARECAAYFAjus1J8ACgkQgD/uEicUG7Dy2ACeOXuMlk7O6Esvph3Yd8/xfDDC LDIAoK2cMJe7nAA2Xs+eRPhkAgscPk3x =zw6D -END PGP SIGNATURE-
Uploaded libpaper 1.0.10 (sparc) to ftp-master
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.7 Date: Fri, 21 Sep 2001 13:51:58 +0200 Source: libpaper Binary: libpaperg-dev libpaperg Architecture: sparc Version: 1.0.10 Distribution: unstable Urgency: low Maintainer: Debian/sparc Build Daemon [EMAIL PROTECTED] Changed-By: Adrian Bunk [EMAIL PROTECTED] Description: libpaperg - Library for handling paper characteristics libpaperg-dev - Library for handling paper characteristics (development files) Closes: 112977 Changes: libpaper (1.0.10) unstable; urgency=low . * Add a || true to the removal of the diversions in the preinst of libpaperg. (closes: #112977) * Renamed configure.in to configure.ac. Files: 0ddc15ab4ad2f7b154f1e89e63642df8 21416 libs optional libpaperg_1.0.10_sparc.deb 30e1e31c9d5126b5edcd7be049dedd46 11770 devel optional libpaperg-dev_1.0.10_sparc.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1.0.6 (GNU/Linux) Comment: Processed by Mailcrypt 3.5.6 and Gnu Privacy Guard http://www.gnupg.org/ iEYEARECAAYFAjus1JYACgkQgD/uEicUG7CgDgCgkEm/sd6+h8aBzr8pwmiCi7ZQ nJUAoIKtWs/Blw9bqtuqcHk+m0FolQSQ =ePA/ -END PGP SIGNATURE-
Uploaded csmash 0.6.3-2 (sparc) to ftp-master
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.7 Date: Thu, 20 Sep 2001 22:40:58 -0400 Source: csmash Binary: csmash Architecture: sparc Version: 0.6.3-2 Distribution: unstable Urgency: low Maintainer: Debian/sparc Build Daemon [EMAIL PROTECTED] Changed-By: Wolfgang Sourdeau [EMAIL PROTECTED] Description: csmash - CannonSmash, a tabletennis simulation game Changes: csmash (0.6.3-2) unstable; urgency=low . * -1 was built against a home-made 1.2.10-2 version of libgtk1.2. Files: ff552d553f1bf8321d6757c06bad24ba 1234504 games optional csmash_0.6.3-2_sparc.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1.0.6 (GNU/Linux) Comment: Processed by Mailcrypt 3.5.6 and Gnu Privacy Guard http://www.gnupg.org/ iEYEARECAAYFAjus1IUACgkQgD/uEicUG7DX7QCcCQ4y2NhY3TNFjaokOw0FpFeb 8T4Aniujf3sO8phC3QzcfKH/uT1/5zjC =lVDK -END PGP SIGNATURE-
Uploaded oidentd 1.9.9.1+cvs20010921-1 (sparc) to ftp-master
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.7 Date: Fri, 21 Sep 2001 15:19:27 +0200 Source: oidentd Binary: oidentd Architecture: sparc Version: 1.9.9.1+cvs20010921-1 Distribution: unstable Urgency: low Maintainer: Debian/sparc Build Daemon [EMAIL PROTECTED] Changed-By: Martin Waitz [EMAIL PROTECTED] Description: oidentd- Replacement ident daemon Closes: 110540 113043 Changes: oidentd (1.9.9.1+cvs20010921-1) unstable; urgency=low . * New upstream source taken from cvs - fixes port binding, Closes: #113043 - more masquarade fixes, Closes: #110540 (again ;) Files: ed9d08d222c8da18d4cec500532e04af 40092 net extra oidentd_1.9.9.1+cvs20010921-1_sparc.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1.0.6 (GNU/Linux) Comment: Processed by Mailcrypt 3.5.6 and Gnu Privacy Guard http://www.gnupg.org/ iEYEARECAAYFAjus1HQACgkQgD/uEicUG7Aq8gCg5XSs6Irhol5HztfvNCdboOq6 g00Ani48iK5VokljTTOaM9ctD0u65mYQ =yOzQ -END PGP SIGNATURE-
Uploaded jazip 0.34-1 (sparc) to ftp-master
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.7 Date: Fri, 21 Sep 2001 11:08:28 -0400 Source: jazip Binary: jazip Architecture: sparc Version: 0.34-1 Distribution: unstable Urgency: high Maintainer: Debian/sparc Build Daemon [EMAIL PROTECTED] Changed-By: Peter S Galbraith [EMAIL PROTECTED] Description: jazip - mount and unmount Iomega Zip and/or Jaz drives. Closes: 106988 Changes: jazip (0.34-1) unstable; urgency=high . * Permissions on jazip binary were wrong in 0.33-3 and allowed any user access to jazip (and it's devices)! (Version 0.33-3 is only one affected.) * New upstream release to fix important bug. The umount system call was used with a block device as argument, and this is no longer supported in kernel 2.4. The call was simply changed to have the mounted directory as argument. (closes: #106988). * Added debconf support to display the notice at installation rather than using an echo in the postinst script. * debian/rules: implemented DEB_BUILD_OPTIONS support for building with or without debugging info. * debian/control: Changed priority to extra (to match override file). * debian/control: Standards-Version increased from 3.1.1 to 3.5.6. Files: e6e93c9329178a02fc26bdc5e4b445ba 134680 contrib/utils extra jazip_0.34-1_sparc.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1.0.6 (GNU/Linux) Comment: Processed by Mailcrypt 3.5.6 and Gnu Privacy Guard http://www.gnupg.org/ iEYEARECAAYFAjus1GgACgkQgD/uEicUG7AhvwCcDKkAuGsjnB7Dir8ZICMgiXYY lo8AniAHr4Oij8h1KdoIRhhuoAPKxk3k =FifM -END PGP SIGNATURE-
Uploaded aethera 0.9.3-4.1 (sparc) to ftp-master
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.7 Date: Wed, 19 Sep 2001 12:08:00 -0700 Source: aethera Binary: aethera Architecture: sparc Version: 0.9.3-4.1 Distribution: unstable Urgency: low Maintainer: Debian/sparc Build Daemon [EMAIL PROTECTED] Changed-By: Ivan E. Moore II [EMAIL PROTECTED] Description: aethera- Email and PIM application for KDE Changes: aethera (0.9.3-4.1) unstable; urgency=low . * Don't use objprelink * Don't build with xinerama support * Dont build with -O2 for alpha, use -O0 * Update build-depends Files: 1538da4a5c4591cf03243a21d23b247c 2427558 mail optional aethera_0.9.3-4.1_sparc.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1.0.6 (GNU/Linux) Comment: Processed by Mailcrypt 3.5.6 and Gnu Privacy Guard http://www.gnupg.org/ iEYEARECAAYFAjus1JgACgkQgD/uEicUG7Al3gCgyXTNxpThHcxjg67qCllSR318 eI8AoJh5vovRjltagAX4Gm96IJolObjZ =ELAN -END PGP SIGNATURE-
Uploaded nbd 1.2-4 (sparc) to ftp-master
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.7 Date: Thu, 20 Sep 2001 13:37:34 +0200 Source: nbd Binary: nbd-client nbd-server Architecture: sparc Version: 1:1.2-4 Distribution: unstable Urgency: low Maintainer: Debian/sparc Build Daemon [EMAIL PROTECTED] Changed-By: Wouter Verhelst [EMAIL PROTECTED] Description: nbd-client - the Network Block Device client nbd-server - the Network Block Device server Closes: 112049 Changes: nbd (1:1.2-4) unstable; urgency=low . * Changed debian/rules file a bit so that this package should build the nbd-server on non-linux ports (currently only The Hurd). Unfortunately, I have to sum up each and every linux-port to achieve this. Have a look at #112325 to find out why. Since nbd-client needs support from the kernel, and since this is a linux-only thing, it makes no sense compiling nbd-client on other kernels. Hence, I don't try. * Created manpages for both nbd-client and nbd-server (Closes: #112049) * Now created an initscript for nbd-server too. Works the same way as the nbd-client initscript. Files: 0dacd0c57a80a33b76db0dda598f07a3 18952 admin optional nbd-server_1.2-4_sparc.deb 35834261e5dc2fafd8d8db0e702892ec 17144 admin optional nbd-client_1.2-4_sparc.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1.0.6 (GNU/Linux) Comment: Processed by Mailcrypt 3.5.6 and Gnu Privacy Guard http://www.gnupg.org/ iEYEARECAAYFAjus1J4ACgkQgD/uEicUG7DC4gCfU38N4g3mINoGVHPbYAlshyo7 MM4An1O9zbE6Hj/JkdhzfYN4UvCAmvp/ =TaD9 -END PGP SIGNATURE-
Uploaded snappea 3.0d3-7 (sparc) to ftp-master
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.7 Date: Fri, 21 Sep 2001 10:41:46 -0500 Source: snappea Binary: snappea Architecture: sparc Version: 3.0d3-7 Distribution: unstable Urgency: low Maintainer: Debian/sparc Build Daemon [EMAIL PROTECTED] Changed-By: Ben Burton [EMAIL PROTECTED] Description: snappea- A program for creating and studying hyperbolic 3-manifolds. Changes: snappea (3.0d3-7) unstable; urgency=low . * Depends on python instead of python-base. Files: 2d1e25a7b7684190eb2bc945910470e2 351656 math extra snappea_3.0d3-7_sparc.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1.0.6 (GNU/Linux) Comment: Processed by Mailcrypt 3.5.6 and Gnu Privacy Guard http://www.gnupg.org/ iEYEARECAAYFAjus1G4ACgkQgD/uEicUG7BI7ACdELF3A+jCglVdSv0asYZIFYIa CM0AoKpOMtSdIWAPTC3k3xADqypKR6Mi =CDLH -END PGP SIGNATURE-
Uploaded ktexmaker2 1.5-2 (sparc) to ftp-master
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.7 Date: Fri, 21 Sep 2001 10:41:46 -0500 Source: ktexmaker2 Binary: ktexmaker2 Architecture: sparc Version: 1.5-2 Distribution: unstable Urgency: low Maintainer: Debian/sparc Build Daemon [EMAIL PROTECTED] Changed-By: Ben Burton [EMAIL PROTECTED] Description: ktexmaker2 - LaTeX source editor and TeX shell for KDE Changes: ktexmaker2 (1.5-2) unstable; urgency=low . * Oops, added in Recommends: and Suggests: for tools that are used. Files: 68eefdcc60f61c073b4b844352d34220 305424 tex optional ktexmaker2_1.5-2_sparc.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1.0.6 (GNU/Linux) Comment: Processed by Mailcrypt 3.5.6 and Gnu Privacy Guard http://www.gnupg.org/ iEYEARECAAYFAjus1JMACgkQgD/uEicUG7BiJQCguEXKgzNdYPIYQXEQkb2zdO7/ cvEAnRAx37TWmHek8jrZN/aDzIxZqsEF =8B3Y -END PGP SIGNATURE-
Uploaded gsl 0.9.3-1 (sparc) to ftp-master
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.7 Date: Thu, 20 Sep 2001 21:22:36 -0500 Source: gsl Binary: gsl-bin libgsl0 libgsl0-dev Architecture: sparc Version: 0.9.3-1 Distribution: unstable Urgency: low Maintainer: Debian/sparc Build Daemon [EMAIL PROTECTED] Changed-By: Dirk Eddelbuettel [EMAIL PROTECTED] Description: gsl-bin- The GNU Scientific Library (GSL) -- binary package libgsl0- The GNU Scientific Library (GSL) -- library package libgsl0-dev - The GNU Scientific Library (GSL) -- development package Changes: gsl (0.9.3-1) unstable; urgency=low . * Upgraded to new upstream release 0.9.3 * debian/*.links: Link libgsl0-dev, gsl-bin to /usr/share/doc/libgsl0 * debian/*.preinst: Delete old doc dir for libgsl0-dev, gsl-bin Files: 2813ccce400b7fd50e0305fb00f49b3b 744230 math optional libgsl0_0.9.3-1_sparc.deb d0e7eaccd5abea6a7f13f5f9427ab438 1281332 devel optional libgsl0-dev_0.9.3-1_sparc.deb 989e8c2292845263f59340ad4141a596 10838 math optional gsl-bin_0.9.3-1_sparc.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1.0.6 (GNU/Linux) Comment: Processed by Mailcrypt 3.5.6 and Gnu Privacy Guard http://www.gnupg.org/ iEYEARECAAYFAjus1IMACgkQgD/uEicUG7CFpgCgz4z4mTRHAfBvEvJEpL1W115k djoAoOSHJv1C8zr/5yznZzaGhPCWLpaQ =P1eC -END PGP SIGNATURE-
Uploaded xosview 1.7.3-5 (sparc) to ftp-master
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.7 Date: Thu, 20 Sep 2001 17:30:25 -0500 Source: xosview Binary: xosview Architecture: sparc Version: 1.7.3-5 Distribution: unstable Urgency: low Maintainer: Debian/sparc Build Daemon [EMAIL PROTECTED] Changed-By: Zed Pobre [EMAIL PROTECTED] Description: xosview- X based system monitor Closes: 112941 Changes: xosview (1.7.3-5) unstable; urgency=low . * Section: utils instead of x11 * Removed debugging message in intmeter.cc left in the -4 patch * Added xlibs-dev to Build-Depends (closes: #112941) Files: 8b33714d472320438026410cb0ae328c 67616 utils optional xosview_1.7.3-5_sparc.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1.0.6 (GNU/Linux) Comment: Processed by Mailcrypt 3.5.6 and Gnu Privacy Guard http://www.gnupg.org/ iEYEARECAAYFAjus4mcACgkQgD/uEicUG7B4XgCeIF1iX9j7C4v/dC2pLUpmnuvO w/4AniorNuW0X2T5V5Fwq9GVxzY7imDo =3jWy -END PGP SIGNATURE-
Uploaded eiffelfox 0.8.5-2 (sparc) to ftp-master
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.7 Date: Thu, 20 Sep 2001 20:44:24 -0700 Source: eiffelfox Binary: eiffelfox-dev eiffelfox Architecture: sparc Version: 0.8.5-2 Distribution: unstable Urgency: low Maintainer: Debian/sparc Build Daemon [EMAIL PROTECTED] Changed-By: Brent A. Fulgham [EMAIL PROTECTED] Description: eiffelfox - Eiffel Bindings for the FOX GUI Toolkit eiffelfox-dev - Eiffel Bindings for the FOX GUI Toolkit Closes: 112876 Changes: eiffelfox (0.8.5-2) unstable; urgency=low . * Correct build dependencies. (Closes:Bug#112876) Files: 365203e6a28ddbf441817827f35ab75a 204558 libs optional eiffelfox_0.8.5-2_sparc.deb 3bee8394503c2193b63147283ca803cd 707758 devel optional eiffelfox-dev_0.8.5-2_sparc.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1.0.6 (GNU/Linux) Comment: Processed by Mailcrypt 3.5.6 and Gnu Privacy Guard http://www.gnupg.org/ iEYEARECAAYFAjus4l8ACgkQgD/uEicUG7CPrQCeIC0r9Vv2AMU39xLULqmQ4j3p BCcAn3a0XEXku70fja0Egy++kWFENg4M =jay5 -END PGP SIGNATURE-
Uploaded thrust 0.89b-2 (sparc) to ftp-master
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.7 Date: Fri, 21 Sep 2001 20:43:35 +0200 Source: thrust Binary: thrust Architecture: sparc Version: 0.89b-2 Distribution: unstable Urgency: low Maintainer: Debian/sparc Build Daemon [EMAIL PROTECTED] Changed-By: RISKO Gergely [EMAIL PROTECTED] Description: thrust - a port of the classic Commodore 64 game Closes: 113039 Changes: thrust (0.89b-2) unstable; urgency=low . * build-depends fix (closes: Bug#113039) Files: 79613842f21d1ccbec439f65ade2ff15 106832 games optional thrust_0.89b-2_sparc.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1.0.6 (GNU/Linux) Comment: Processed by Mailcrypt 3.5.6 and Gnu Privacy Guard http://www.gnupg.org/ iEYEARECAAYFAjus6QcACgkQgD/uEicUG7Cp4QCfSqhcGR1mFfPwrgY27e5hytbq zNAAn0otgFpP++8ATApbTHd/NITG8Hjq =1HdX -END PGP SIGNATURE-
Uploaded libapache-mod-witch 0.0.4-1 (sparc) to ftp-master
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.7 Date: Thu, 20 Sep 2001 22:00:25 +0200 Source: libapache-mod-witch Binary: libapache-mod-witch Architecture: sparc Version: 0.0.4-1 Distribution: unstable Urgency: low Maintainer: Debian/sparc Build Daemon [EMAIL PROTECTED] Changed-By: Tamas SZERB [EMAIL PROTECTED] Description: libapache-mod-witch - mod_witch is an Apache module to log the access_log via syslog Closes: 112705 Changes: libapache-mod-witch (0.0.4-1) unstable; urgency=low . * m68k build failure (closes: #112705) Files: 74b9a8b9323a8dda7c1c8e0f74c86879 8358 web optional libapache-mod-witch_0.0.4-1_sparc.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1.0.6 (GNU/Linux) Comment: Processed by Mailcrypt 3.5.6 and Gnu Privacy Guard http://www.gnupg.org/ iEYEARECAAYFAjus6jQACgkQgD/uEicUG7DpGACfWhBPDMXJ4lGhbuvS1hxl1LFJ PMgAoIJdfHQQkp65VJss/3vUIngwyGQY =4poG -END PGP SIGNATURE-
Uploaded cyrus-sasl 1.5.24-9 (sparc) to ftp-master
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.7 Date: Thu, 20 Sep 2001 13:43:18 +0100 Source: cyrus-sasl Binary: libsasl7 libsasl-dev libsasl-bin libsasl-digestmd5-plain libsasl-modules-plain Architecture: sparc Version: 1.5.24-9 Distribution: unstable Urgency: low Maintainer: Debian/sparc Build Daemon [EMAIL PROTECTED] Changed-By: Dima Barsky [EMAIL PROTECTED] Description: libsasl-bin - Programs for manupulating the SASL users database libsasl-dev - Development files for authentication abstraction library. libsasl-digestmd5-plain - DIGEST-MD5 module for SASL libsasl-modules-plain - Basic Pluggable Authentication Modules for SASL libsasl7 - Authentication abstraction library. Changes: cyrus-sasl (1.5.24-9) unstable; urgency=low . * Removed all Recommends: lines from the control file, it was not a good idea. * Create only one doc directory (/usr/share/doc/libsasl7), all other packages will have symbolic links pointing to it. Files: a65c13018e59a90fd40ac80a87b6b65d 66856 devel optional libsasl-dev_1.5.24-9_sparc.deb d2a9c06499064e8a5af782290d5f3d86 13768 devel optional libsasl-bin_1.5.24-9_sparc.deb b6a9ed463b772824a1b874f987b4612d 15262 devel optional libsasl-modules-plain_1.5.24-9_sparc.deb 8368d8375a5477d90be04a97ea169643 17132 devel optional libsasl-digestmd5-plain_1.5.24-9_sparc.deb eb8379f185dd4ac57de95cdd8365394e 154006 devel optional libsasl7_1.5.24-9_sparc.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1.0.6 (GNU/Linux) Comment: Processed by Mailcrypt 3.5.6 and Gnu Privacy Guard http://www.gnupg.org/ iEYEARECAAYFAjus+toACgkQgD/uEicUG7AQBgCgpwN3RMjKLKWHrWKy6vIZ/HXx 318Ania/SeMwcxKAn+W5ERsyTTNAtNyf =/05y -END PGP SIGNATURE-
Uploaded fltk 1.0.11-4 (sparc) to ftp-master
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.7 Date: Fri, 21 Sep 2001 14:25:59 -0500 Source: fltk Binary: libfltk1-dev libfltk1-dbg fltk-doc libfltk1 libfltk1-example Architecture: sparc Version: 1.0.11-4 Distribution: unstable Urgency: medium Maintainer: Debian/sparc Build Daemon [EMAIL PROTECTED] Changed-By: An Thi-Nguyen Le [EMAIL PROTECTED] Description: libfltk1 - The Fast Light Toolkit, a GUI toolkit inspired by libForms libfltk1-dbg - The Fast Light Toolkit, and the Fluid user interface designer libfltk1-dev - The Fast Light Toolkit, and the Fluid user interface designer Closes: 112623 Changes: fltk (1.0.11-4) unstable; urgency=medium . * Add debian/libfltk1-dev.links, add symlink libfltk.so to versioned library (closes: #112623). * Removed extraneous files: debian/{rules.new rules.old} * Makefile: use 'cd $$dir ' instead of 'cd $$dir;' to catch errors. * Updated standards version to 3.5.6.0. Files: 6f3e8287a2e0d5c0e6970184fbe94e23 168258 libs optional libfltk1_1.0.11-4_sparc.deb 87aa3e536d07379c9bb248d14416584c 352358 devel optional libfltk1-dev_1.0.11-4_sparc.deb edf24a8fd6ca3113535ea62e2ea1d77b 402728 devel extra libfltk1-dbg_1.0.11-4_sparc.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1.0.6 (GNU/Linux) Comment: Processed by Mailcrypt 3.5.6 and Gnu Privacy Guard http://www.gnupg.org/ iEYEARECAAYFAjutAQwACgkQgD/uEicUG7DZwACg5mlirRvUcKjFTJw8z7wsp3ec AlgAoOkY8uP9drDNGHQ0lUkpETOEfa7Q =OEZJ -END PGP SIGNATURE-
Uploaded gnustep-base 1.0.2-0.4 (sparc) to ftp-master
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.7 Date: Sat, 22 Sep 2001 10:14:36 +0200 Source: gnustep-base Binary: gnustep-base1-dbg gnustep-base-examples gnustep-base1 gnustep-base1-dev Architecture: sparc Version: 1.0.2-0.4 Distribution: unstable Urgency: low Maintainer: Debian/sparc Build Daemon [EMAIL PROTECTED] Changed-By: Matthias Klose [EMAIL PROTECTED] Description: gnustep-base1 - The GNUstep Base Library gnustep-base1-dbg - Debugging versions for the GNUstep Base Library gnustep-base1-dev - Header files and static libraries for the GNUstep Base Closes: 107940 112484 Changes: gnustep-base (1.0.2-0.4) unstable; urgency=low . * Lower 'Depends' to 'Recommends' in gnustep-base-examples (closes: #107940, #112484). Files: b24735e6ae24d9f85b18f660924a8e99 950978 libs optional gnustep-base1_1.0.2-0.4_sparc.deb bf83702136dc418a7e3a23e8ab5bc98f 1237400 devel optional gnustep-base1-dev_1.0.2-0.4_sparc.deb 07888a7f46dcab904b2c83694e6d1773 1582980 devel optional gnustep-base1-dbg_1.0.2-0.4_sparc.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1.0.6 (GNU/Linux) Comment: Processed by Mailcrypt 3.5.6 and Gnu Privacy Guard http://www.gnupg.org/ iEYEARECAAYFAjutA6IACgkQgD/uEicUG7D3/wCgs5plsV0mS7bImFdo1nE2lD/f xOEAn2CCZjue3o15BEBpGOOaWFAy6UjJ =Da3B -END PGP SIGNATURE-
Uploaded pam 0.72-32 (sparc) to ftp-master
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.7 Date: Sat, 22 Sep 2001 06:32:29 -0400 Source: pam Binary: libpam-runtime libpam-modules libpam-cracklib libpam0g-dev libpam-doc libpam0g Architecture: sparc Version: 0.72-32 Distribution: unstable Urgency: medium Maintainer: Debian/sparc Build Daemon [EMAIL PROTECTED] Changed-By: Sam Hartman [EMAIL PROTECTED] Description: libpam-cracklib - PAM module to enable cracklib support. libpam-modules - Pluggable Authentication Modules for PAM libpam-runtime - Runtime support for the PAM library libpam0g - Pluggable Authentication Modules library libpam0g-dev - Development files for PAM Closes: 111854 Changes: pam (0.72-32) unstable; urgency=medium . * This should probably get into testing before freeze; medium. * Patch from Volker Stolz to fix bug in previous pam_group patch, closes: #111854 Files: 98bd102e0f705503d87f510663de6d17 67664 base required libpam0g_0.72-32_sparc.deb 43e98c06af85608f9b91c97e96c39784 143884 base required libpam-modules_0.72-32_sparc.deb 5b69a9a43e6309330071f1cd742cdf9d 42802 base required libpam-runtime_0.72-32_sparc.deb 3afcf8fa7e867acb8907071b73826fc9 166110 devel optional libpam0g-dev_0.72-32_sparc.deb 84773a6ce796929099208906fd823732 44272 libs optional libpam-cracklib_0.72-32_sparc.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1.0.6 (GNU/Linux) Comment: Processed by Mailcrypt 3.5.6 and Gnu Privacy Guard http://www.gnupg.org/ iEYEARECAAYFAjus+JsACgkQgD/uEicUG7C7+gCgxk4n9AbMLqmecQNUWV6glfoW Q3UAn2dJXs2IoIvTZ0BUg92aIrKmbD4K =prHk -END PGP SIGNATURE-
Uploaded bash 2.05-9 (sparc) to ftp-master
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.7 Date: Sat, 22 Sep 2001 11:26:44 +0200 Source: bash Binary: bash-doc bash bash-builtins Architecture: sparc Version: 2.05-9 Distribution: unstable Urgency: medium Maintainer: Debian/sparc Build Daemon [EMAIL PROTECTED] Changed-By: Matthias Klose [EMAIL PROTECTED] Description: bash - The GNU Bourne Again SHell bash-builtins - Bash loadable builtins - headers examples Closes: 109807 110275 110276 110307 113111 Changes: bash (2.05-9) unstable; urgency=medium . * Remove files left from test build (closes: #110307, #109807). * Apply patches from reports (closes: #110275, #110276). * Fix include of rbash man page (closes: #113111). Files: 12fd7fa282493aa587e05b50f8fe5059 365442 base required bash_2.05-9_sparc.deb b851a7b51f85320ff786695c4d378065 92948 utils optional bash-builtins_2.05-9_sparc.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1.0.6 (GNU/Linux) Comment: Processed by Mailcrypt 3.5.6 and Gnu Privacy Guard http://www.gnupg.org/ iEYEARECAAYFAjus+pMACgkQgD/uEicUG7D+WACfZ7R6t5KT7GRUXbDk5Q/48CD/ /sIAn1EHYqsQwxUW06sSz01XeqyHQOr0 =PD8h -END PGP SIGNATURE-
Uploaded mpich 1.2.1-13 (sparc) to ftp-master
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.7 Date: Fri, 21 Sep 2001 17:18:50 +0900 Source: mpich Binary: mpich mpi-doc Architecture: sparc Version: 1.2.1-13 Distribution: unstable Urgency: low Maintainer: Debian/sparc Build Daemon [EMAIL PROTECTED] Changed-By: Junichi Uekawa [EMAIL PROTECTED] Description: mpich - Parallel computing system Closes: 112905 Changes: mpich (1.2.1-13) unstable; urgency=low . * Fixing a nonexistent upshot problem (closes: #112905) * updated the TODO file. Files: 89253df47843f4bbae26dd6e8d3bbc00 1211664 devel extra mpich_1.2.1-13_sparc.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1.0.6 (GNU/Linux) Comment: Processed by Mailcrypt 3.5.6 and Gnu Privacy Guard http://www.gnupg.org/ iEYEARECAAYFAjutDnwACgkQgD/uEicUG7DJxwCeJnAe4ivYI6g4ntGZdqZygB2N +6sAn1+tXQE0av5bwM71cnCLeiI+yboM =rQrJ -END PGP SIGNATURE-
Uploaded kdesdk 2.2.1-2 (sparc) to ftp-master
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.7 Date: Sat, 22 Sep 2001 12:00:37 -0500 Source: kdesdk Binary: kspy kstartperf poxml kdesdk-doc kdesdk kbabel-dev kapptemplate kbabel kmtrace kexample kdepalettes kdesdk-scripts Architecture: sparc Version: 2.2.1-2 Distribution: unstable Urgency: low Maintainer: Debian/sparc Build Daemon [EMAIL PROTECTED] Changed-By: Ben Burton [EMAIL PROTECTED] Description: kbabel - a PO-file editor for KDE kbabel-dev - a PO-file editor for KDE (development files) kdesdk - KDE Software Development Kit kexample - a simple KDE demo application for programmers kmtrace- a KDE memory leak tracer kspy - examines the internal state of a Qt/KDE app kstartperf - startup time measurement for KDE apps poxml - tools for using PO-files to translate DocBook XML files Closes: 113110 Changes: kdesdk (2.2.1-2) unstable; urgency=low . * Updated parameters for alpha build (closes: Bug#113110). Files: 410cf28e9d3a8f23801d10baaa868581 4264 devel optional kdesdk_2.2.1-2_sparc.deb 014ba905219cd886be6b6aefc68eb9af 782714 devel optional kbabel_2.2.1-2_sparc.deb 1d68e3a44819962c482594b94f839ed6 20788 devel optional kbabel-dev_2.2.1-2_sparc.deb 774827177009e0abdaed6934c979553e 25922 devel optional kexample_2.2.1-2_sparc.deb 08fdad6e405842e832cb410686cbd5ca 54948 devel optional kmtrace_2.2.1-2_sparc.deb 6db53859b61cde8fb0e8d640c126e3bb 29046 devel optional kspy_2.2.1-2_sparc.deb bba6da36fcb257b43d9333d99d595944 12892 devel optional kstartperf_2.2.1-2_sparc.deb 440e068cad99cde5834d7567a72cbc56 585832 devel optional poxml_2.2.1-2_sparc.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1.0.6 (GNU/Linux) Comment: Processed by Mailcrypt 3.5.6 and Gnu Privacy Guard http://www.gnupg.org/ iEYEARECAAYFAjutDoAACgkQgD/uEicUG7C5KwCfeTF8qxhkYGi1BqWJAUBXY9Xw oMsAoImciZWBeLuwdPntlYLb6pAjB8ir =li71 -END PGP SIGNATURE-
Uploaded kdeaddons 2.2.1-2 (sparc) to ftp-master
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.7 Date: Sat, 22 Sep 2001 12:00:37 -0500 Source: kdeaddons Binary: kicker-applets konq-plugins kdeaddons-doc-html knewsticker-scripts kate-plugins noatun-plugins Architecture: sparc Version: 2.2.1-2 Distribution: unstable Urgency: low Maintainer: Debian/sparc Build Daemon [EMAIL PROTECTED] Changed-By: Ben Burton [EMAIL PROTECTED] Description: kate-plugins - plugins for Kate, the KDE text editor kicker-applets - applets for Kicker, the KDE panel konq-plugins - plugins for Konqueror, the KDE file/web/doc browser noatun-plugins - plugins for Noatun, the KDE media player Closes: 113099 Changes: kdeaddons (2.2.1-2) unstable; urgency=low . * Updated parameters for alpha build (closes: Bug#113099). Files: 47434a138548c1343c4e061b1db11377 135166 web optional konq-plugins_2.2.1-2_sparc.deb c426525b51315d6174ad6b8814664496 82678 editors optional kate-plugins_2.2.1-2_sparc.deb f456852c50fcd1467b32b0af130b9773 78320 x11 optional kicker-applets_2.2.1-2_sparc.deb ba5e40848373cd257b6c5e4ce342e033 33506 sound optional noatun-plugins_2.2.1-2_sparc.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1.0.6 (GNU/Linux) Comment: Processed by Mailcrypt 3.5.6 and Gnu Privacy Guard http://www.gnupg.org/ iEYEARECAAYFAjutHBMACgkQgD/uEicUG7ARtgCffq5Nv/rKMb/NlYCTmAjPXSm1 51sAoJV/YFXSnUpHKSXbGSxgZ/pHCNVy =KMXE -END PGP SIGNATURE-
Uploaded xscreensaver 3.33-3 (sparc) to ftp-master
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.7 Date: Fri, 21 Sep 2001 17:52:17 -0500 Source: xscreensaver Binary: xscreensaver-gl xscreensaver Architecture: sparc Version: 3.33-3 Distribution: unstable Urgency: low Maintainer: Debian/sparc Build Daemon [EMAIL PROTECTED] Changed-By: Larry Daffner [EMAIL PROTECTED] Description: xscreensaver - Automatic screensaver for X xscreensaver-gl - GL(Mesa) screenhacks for xscreensaver Closes: 99797 100915 104582 108596 109453 112395 112849 112973 Changes: xscreensaver (3.33-3) unstable; urgency=low . * Removed dependency on removed package xv (Closes: #112395) * Changed build-depends from xlibmesa-dev to libgl-dev (Closes: #104582) * Include time.h in prefs.c to fix IA64 (Closes: #112973) * Changed speedmine to ework around Alpha FP foo (Closes: #108596) * Added note to README.gl about memory usage and GL screensavers. (Closes: #112849) * Fixed spelling error in molecule manpage (Closes: #100915) * Shut up message about unknown client messages. (Closes: #109453) * Fixed command line defaults for xaos (Closes: #99797) Files: d64938731da83fa13aa666ab65591831 2664496 x11 optional xscreensaver_3.33-3_sparc.deb cfb9ba0b8098624d63106cca20928d52 876536 x11 optional xscreensaver-gl_3.33-3_sparc.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1.0.6 (GNU/Linux) Comment: Processed by Mailcrypt 3.5.6 and Gnu Privacy Guard http://www.gnupg.org/ iEYEARECAAYFAjutHjAACgkQgD/uEicUG7AZugCg7yAFx+oY/9dAbCHwYeNA18xT V+MAn1XWIReWqRdQrSMuCM6VFP1xNJ35 =xTWm -END PGP SIGNATURE-
Uploaded gkrellkam 0.2.4-1 (sparc) to ftp-master
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.7 Date: Tue, 11 Sep 2001 14:44:55 -0600 Source: gkrellkam Binary: gkrellkam Architecture: sparc Version: 0.2.4-1 Distribution: unstable Urgency: low Maintainer: Debian/sparc Build Daemon [EMAIL PROTECTED] Changed-By: paul cannon [EMAIL PROTECTED] Description: gkrellkam - GKrellM plugin that displays a periodically updating image Closes: 111622 Changes: gkrellkam (0.2.4-1) unstable; urgency=low . * New upstream release * No longer uses any lockfiles (closes: Bug#111622) * Packaging done by upstream author (in NM queue! :) Files: ab79367421fd7907ac11a78b0651d2a8 25808 x11 optional gkrellkam_0.2.4-1_sparc.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1.0.6 (GNU/Linux) Comment: Processed by Mailcrypt 3.5.6 and Gnu Privacy Guard http://www.gnupg.org/ iEYEARECAAYFAjutFxoACgkQgD/uEicUG7D2LQCeM4NSJvVTozbt8EslySdsbIaj bfIAoJVYFmxQxS63sH+Ch1dFHvbW5HGo =NT64 -END PGP SIGNATURE-
Uploaded nbd 1.2-5 (sparc) to ftp-master
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.7 Date: Sat, 22 Sep 2001 11:38:51 -0400 Source: nbd Binary: nbd-client nbd-server Architecture: sparc Version: 1:1.2-5 Distribution: unstable Urgency: low Maintainer: Debian/sparc Build Daemon [EMAIL PROTECTED] Changed-By: Wouter Verhelst [EMAIL PROTECTED] Description: nbd-client - the Network Block Device client nbd-server - the Network Block Device server Closes: 113143 Changes: nbd (1:1.2-5) unstable; urgency=low . * Made sure /etc/nbd-server exists before trying to access it (Closes: #113143) Files: 072571a0d1e9a384b80cd20307c8cec7 19030 admin optional nbd-server_1.2-5_sparc.deb d01f4ac7ab3343c31cdc797e110322b8 17226 admin optional nbd-client_1.2-5_sparc.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1.0.6 (GNU/Linux) Comment: Processed by Mailcrypt 3.5.6 and Gnu Privacy Guard http://www.gnupg.org/ iEYEARECAAYFAjutGrcACgkQgD/uEicUG7Ci1ACg8BjtVAH+i+oPgV1/Ux+V6ETf ujQAn0RidU2r5sELotgL3+AWw835nxlC =KJvJ -END PGP SIGNATURE-
Uploaded zsh 4.0.2-8 (sparc) to ftp-master
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.7 Date: Fri, 21 Sep 2001 16:44:21 -0400 Source: zsh Binary: zsh zsh-static zsh-doc Architecture: sparc Version: 4.0.2-8 Distribution: unstable Urgency: high Maintainer: Debian/sparc Build Daemon [EMAIL PROTECTED] Changed-By: Clint Adams [EMAIL PROTECTED] Description: zsh- A shell with lots of features. Closes: 112955 Changes: zsh (4.0.2-8) unstable; urgency=high . * Try not to choke in the prerm when cleaning out the compiled function digests. closes: bug#112955. Files: 457dc2aec4ed419b3251b007bbeb5243 1602840 shells optional zsh_4.0.2-8_sparc.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1.0.6 (GNU/Linux) Comment: Processed by Mailcrypt 3.5.6 and Gnu Privacy Guard http://www.gnupg.org/ iEYEARECAAYFAjutEjAACgkQgD/uEicUG7AaiQCfWyjmYKr0LzLtThxuHiF9Ag5k wCkAniC7QHPT/GGhYr9kzx1LMCU37HkC =dDwJ -END PGP SIGNATURE-
Uploaded iptables 1.2.3-2 (sparc) to ftp-master
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.7 Date: Sat, 22 Sep 2001 14:10:45 -0400 Source: iptables Binary: iptables-dev iptables Architecture: sparc Version: 1.2.3-2 Distribution: unstable Urgency: low Maintainer: Debian/sparc Build Daemon [EMAIL PROTECTED] Changed-By: Laurence J. Lane [EMAIL PROTECTED] Description: iptables - IP packet filter administration for 2.4.4+ kernels iptables-dev - development files for iptable's libipq and libiptc Changes: iptables (1.2.3-2) unstable; urgency=low . * Everett Coleman II's [EMAIL PROTECTED] string_to_number() correction for libipt_TOS.c Files: d1f1c69ff88f5a7be399c4d67ef7847a 250564 net optional iptables_1.2.3-2_sparc.deb f68e74e9cf7554227c43a45b91ff448d 40950 net optional iptables-dev_1.2.3-2_sparc.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1.0.6 (GNU/Linux) Comment: Processed by Mailcrypt 3.5.6 and Gnu Privacy Guard http://www.gnupg.org/ iEYEARECAAYFAjutH6MACgkQgD/uEicUG7ATswCfXKJLd0L+6wtBYDE13MHjYU67 MO4AoOgNSNkCpLWm0l1tNK8aXsZccYmm =tnUk -END PGP SIGNATURE-
Uploaded dhcp 2.0pl5-6.1 (sparc) to ftp-master
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.7 Date: Mon, 17 Sep 2001 00:08:50 -0400 Source: dhcp Binary: dhcp-client-udeb dhcp dhcp-relay dhcp-client Architecture: sparc Version: 2.0pl5-6.1 Distribution: unstable Urgency: high Maintainer: Debian/sparc Build Daemon [EMAIL PROTECTED] Changed-By: Adam Di Carlo [EMAIL PROTECTED] Description: dhcp - DHCP server for automatic IP address assignment dhcp-client - DHCP Client dhcp-client-udeb - DHCP Client for debian-installer (udeb) dhcp-relay - DHCP Relay Closes: 57917 66432 75604 76401 98680 Changes: dhcp (2.0pl5-6.1) unstable; urgency=high . * NMU to fix RC bugs; specifically the urgency is high for boot-floppies; currently, things are breaking for boot-floppies when the network was configured statically * remove /etc/init.d/dhcp-client, since we use /etc/network/interfaces now; hopefully that doesn't break too many people upgrading, but better to break some upgrades than to break all new installs, IMHO closes: #66432, #98680 * not having the init script, but using ifupdown, fixes tons of other problems too, although one wonders whether perhaps we shouldn't remove the init script on upgrade as well closes: #76401, #57917, #75604 Files: f66de0980c5da4fe03a15188b25af6a4 209924 net optional dhcp_2.0pl5-6.1_sparc.deb 4a6a2417de436f1c4ad1645cc83f6f88 197184 net optional dhcp-client_2.0pl5-6.1_sparc.deb 68cd9c0c199b1dc9c0c80622256bbce1 150400 net optional dhcp-relay_2.0pl5-6.1_sparc.deb 935cb0614809578e12ed37528824b46e 48252 debian-installer optional dhcp-client-udeb_2.0pl5-6.1_sparc.udeb -BEGIN PGP SIGNATURE- Version: GnuPG v1.0.6 (GNU/Linux) Comment: Processed by Mailcrypt 3.5.6 and Gnu Privacy Guard http://www.gnupg.org/ iEYEARECAAYFAjutH58ACgkQgD/uEicUG7BrFgCaAgEchpD7iNsYvNLaU6W/hmGa 2h4AoL0Ueqgf57gg6n4jR+bFFmWoa1FQ =9+x6 -END PGP SIGNATURE-
Uploaded isdnutils 3.1pre1b-23 (sparc) to ftp-master
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.7 Date: Fri, 21 Sep 2001 14:17:44 +0200 Source: isdnutils Binary: isdnvboxclient isdnvboxserver isdnutils-xtools isdnactivecards libcapi20 isdnlog-data pppdcapiplugin isdneurofile isdnutils-base ipppd isdnutils isdnlog isdnvbox isdnutils-doc Architecture: sparc Version: 1:3.1pre1b-23 Distribution: unstable Urgency: high Maintainer: Debian/sparc Build Daemon [EMAIL PROTECTED] Changed-By: Paul Slootman [EMAIL PROTECTED] Description: ipppd - PPP daemon for syncPPP over ISDN isdnactivecards - support for active ISDN cards and CAPI isdneurofile - ISDN eurofile transfer tool isdnlog- ISDN connection logger isdnutils - Most important ISDN-related packages and utilities. isdnutils-base - ISDN utilities, the basic (minimal) set isdnutils-xtools - ISDN utilities that use X isdnvbox - ISDN answering machine, client and server isdnvboxclient - ISDN answering machine, client isdnvboxserver - ISDN answering machine, server libcapi20 - libraries for CAPI support pppdcapiplugin - plugin for pppd to communicate with CAPI-capable ISDN cards Closes: 82082 112874 113021 Changes: isdnutils (1:3.1pre1b-23) unstable; urgency=high . * isdnutils finally made it to testing! Of course that means a new set of bad upgrading problems has been discovered (hence urgency=high). * There was no cleaner way of smoothly handling upgrades, so I've added a transitional package isdnutils that depends on the major component packages. What up to now (1:3.1pre1b-1 - 1:3.1pre1b-22) was known as isdnutils is now called isdnutils-base. Now to get the various depends / conflicts things right for the brave people who had already been tracking unstable, and already had 1:3.1pre1b installed... closes:#113021 * When upgrading from 1:3.0-20, the test for ipppd doesn't work if you don't use dselect to upgrade; apt-get doesn't set the selection flag in dpkg's database. Grep debconf's config.dat for ipppd/ as a (dirty) workaround if ipppd isn't listed as to-be-installed by dpkg -l. * If the test for ipppd fails, restart the (old) isdnutils as the old prerm script stops them when upgrading. Someone will complain that they weren't running beforehand, but that's tough, sometimes a decision needs to be made. Hence that's at most a won't fix wishlist bug. * The postinst scripts for isdnutils and ipppd need a db_stop to prevent hanging after the daemons are started. They're only stopped and started when upgrading from pre-1:3.1pre1b ... * Ignore errors from /etc/init.d/isdnutils start in the isdnutils postinst as it will give an error also if the daemons are still/already running. * Depend on makedev, as apparently that isn't an essential package. Strange. closes:#112874 * As this is now in isdnutils, the bug asking for the new version in testing can be closed: closes:#82082 * Added a Depends: libcapi20 for pppdcapiplugin, as the plugin most certainly needs it. Files: fb271085ea0c17c20f89c482d82dafbf 17714 utils optional isdnutils_3.1pre1b-23_sparc.deb 1ae9362c6ed33c33f359359b1c3ea074 202364 utils optional isdnutils-base_3.1pre1b-23_sparc.deb 2b8b879854da9c35d20d51d20d24a051 41628 x11 extra isdnutils-xtools_3.1pre1b-23_sparc.deb de5bf1fb1144c75203043aa6dab8561e 130890 net extra ipppd_3.1pre1b-23_sparc.deb ddabc4a99c743a9e94b6b4946a2f0239 454858 utils extra isdnlog_3.1pre1b-23_sparc.deb 552e0941001c784e3d0daf7b8ab6185d 13178 utils extra isdnvbox_3.1pre1b-23_sparc.deb f5ff92ef40957624bbe6705a0aad37ef 55734 utils extra isdnvboxclient_3.1pre1b-23_sparc.deb 096b63673cc2858cb830249b6a1558c0 38 utils extra isdnvboxserver_3.1pre1b-23_sparc.deb 0d604be87e00ce5577f909d36bc1da4d 55126 libs extra libcapi20_3.1pre1b-23_sparc.deb b3885ef64dfdc3c509b5c626986182fe 1575600 utils extra isdnactivecards_3.1pre1b-23_sparc.deb 727f56e99acf037da854a0c9313e171b 142504 net extra pppdcapiplugin_3.1pre1b-23_sparc.deb ce421a259a51b26fcd6723f75b9aa818 149190 comm extra isdneurofile_3.1pre1b-23_sparc.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1.0.6 (GNU/Linux) Comment: Processed by Mailcrypt 3.5.6 and Gnu Privacy Guard http://www.gnupg.org/ iEYEARECAAYFAjutFx4ACgkQgD/uEicUG7Ct3ACgm9wDDIIS3s7uAqzs8/bpMk0Z LOUAoI+jgeSYRu89DF+jktsE/Eu2Cw+D =SGHB -END PGP SIGNATURE-
Uploaded kdeartwork 2.2.1-2 (sparc) to ftp-master
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.7 Date: Sat, 22 Sep 2001 12:00:37 -0500 Source: kdeartwork Binary: kdeartwork-theme-window kdeartwork-theme-desktop kdeartwork-misc kdeartwork-style Architecture: sparc Version: 2.2.1-2 Distribution: unstable Urgency: low Maintainer: Debian/sparc Build Daemon [EMAIL PROTECTED] Changed-By: Ben Burton [EMAIL PROTECTED] Description: kdeartwork-style - widget styles released with KDE Closes: 113125 Changes: kdeartwork (2.2.1-2) unstable; urgency=low . * Updated parameters for alpha build (closes: Bug#113125). Files: 0dffb6be3c1ee51f167170866460a1c5 45644 graphics optional kdeartwork-style_2.2.1-2_sparc.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1.0.6 (GNU/Linux) Comment: Processed by Mailcrypt 3.5.6 and Gnu Privacy Guard http://www.gnupg.org/ iEYEARECAAYFAjutEjMACgkQgD/uEicUG7CQRgCeNTmSxr6vEcGM+h3nqur1BTv/ 2g4AoNL77XWBXtOypx5h9v9CAu7+m70q =xgIF -END PGP SIGNATURE-
Re: new port: and the winner is....
Henrique de Moraes Holschuh [EMAIL PROTECTED] immo vero scripsit Someone could always port Debian to the Windows kernel, but they should not call it Debian anymore, and it has no place in our archives (because it is contrib [or non-free?] and too big to be inserted in the contrib distribution). Of course, if we manage to have a working ReactOS, things will be different. Until then, we will have a very contrib system. regards, junichi -- [EMAIL PROTECTED] http://www.netfort.gr.jp/~dancer
Re: new port: and the winner is....
I agree totaly with you.. Manuel Segura Richard B. Kreckel a écrit : Hi, On Thu, 30 Aug 2001, A Mennucc1 wrote: [...] -why is the 'win' port important? [...] (Sorry for dropping in late to this thread, I was too busy lately to follow debian-devel tightly.) The social contract says Our Priorities are Our Users and Free Software. Such a win-port might indeed serve some users. But for my own part, I do have some personal problems with making all free software win-compatible. Does it serve Free Software? Such ports frequently lead to crippled design [1] and frankly, I do not like to give people more excuses for not switching to an entirely free OS. The one argument I am missing from the discussion is this: The porters find some problem with package foo and file a bugreport (most probably critical) to the maintainer of foo who has to look into the problem, withdrawing time for more important things than a weird port. It has happened before [2] and it will happen again. We really shouldn't invite everything into Debian. It will distract us from providing a really useful free OS. For my own part, the mere thought of receiving reports like package bar doesn't build on win gives me the creeps. I would have to log in to one of those crippled machines, try to fix scripts, makefiles, code, whatnot. Ugh. Instead, I would consider downgrading the bugreport to wishlist/wontfix. Regards -richy. [1] Why does Apache have to abstract away their threads? Right, because Winsux doesn't have pthreads. Admittedly, this might be a little off-topic because that is for a native port, but that's the basic pattern. [2] Look at the parisc port: GCC-3.0 is not even officially supported upstream and the entire toolchain seems to be changing frequently. Some packages build one day but not the next. I wonder how they want to release that stuff. -- .''`. Richard B. Kreckel : :' : [EMAIL PROTECTED] `. `' [EMAIL PROTECTED] `-http://www.ginac.de/~kreckel/ -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED] -- --- Manuel Segura ESCPI - CNAM ---
Re: bind9-chroot (was: questions on ITP)
WRT chrooting certain applications - wouldn't it make sense to mandate one consistent way for the user to do this if the package supports it? That way, chrooting daemons is much more user-friendly, which in turn will (hopefully) lead to more people doing it. One idea: In a configuration file, the user lists those daemons he wants to run chrooted. init.d scripts that support it read this information and act on it, copying the required files to a chroot before starting the daemon there. (The config file should probably not be read directly, instead the init.d script should call a small query script. That way, file format changes are possible.) Furthermore, IMHO init.d scripts that support chrooting should clearly print [chrooted] or [non-chrooted] in their startup message, both to make the user aware that chrooting is possible, and to make it clear whether it takes place. So: - If I were to put together a chroot-helper package, would people be interested in using it for their package? - Any chance of getting a recommendation for this into policy? Cheers, Richard -- __ _ |_) /| Richard Atterer | CS student at the Technische | GnuPG key: | \/¯| http://atterer.net | Universität München, Germany | 0x888354F7 ¯ ´` ¯ pgpRpbNdfnvwh.pgp Description: PGP signature
building a new debian package
Hello I am having trouble making a debian package that I building install a binary file the directory of my choice. I've been looking at http://www.debian.org/doc/maint-guide/ch-modify.html#s-destdir to change the install directory, but I can't seem to get it to work. After running dpkg-buildpackage the Makefile of the program I trying to build looks like this (irrelevant parts have been cut away) : [...] # Edited for Debian GNU/Linux. DESTDIR = [...] prefix = /usr/local exec_prefix = ${prefix} #exec_prefix = $(DESTDIR)/usr/X11R6/bin #bindir = ${exec_prefix}/bin bindir = $(DESTDIR)/usr/X11R6/bin sbindir = ${exec_prefix}/sbin [...] And debian/rules contains the following for the configure command: [...] configure-stamp: dh_testdir # Add here commands to configure the package. # ./configure --prefix=/usr --mandir=\$${prefix}/share/man --infodir=\$${p refix}/share/info ./configure touch configure-stamp [...] However, even with the above parameters, the binary is installed in /bin/, which in this case is not desirable. Any input would be greatly appreciated. -- Søren O.
Re: madison
On Fri, Sep 21, 2001 at 05:15:31PM -0400, Matt Zimmerman wrote: On Fri, Sep 21, 2001 at 12:52:37PM +0200, Martin F Krafft wrote: madison seems to be what the debian.org webpage sports as the package search over distributions. is it packaged? do you need someone to package it? madison requires connectivity to a Debian database which is not publicly accessible, so it is only useful on a couple of internal Debian machines. For this reason, it probably isn't worthwhile to package it. I think it can be useful for those who want to create their own flavour of Debian or want to (partially) mirror Debian. dpkg-scanpackages/apt-ftparchive doesn't work very well for packages which are located in the pool, and the only way to generate correct packagelists is to put all information from all packages in a database and query that database when packagelists are generated; thus people who want to partially mirror or create their own Debian-flavour should create their own Debian database from information gathered from packagelists which are downloaded by apt. [I'm not a developer, and this is just my humble opinion.] Admar Schoonen
ITP: kernel-patch-selinux
I intend to package the kernel patch for NSA Security Enhanced Linux. Below is all the details on licenses. My interpretation of the below license details (copied from the web site) is that the kernel patch is under the GPL and everything is fine. However is the issue about warranty exclusion etc which requires agreement before download going to force me to use non-free for my package? I know I could ask upstream for clarification of this issue, however the NSA takes a long time to prepare public statements, and I imagine that things will take longer now than they would have a few weeks ago... License statement from http://www.nsa.gov/selinux/license.html : All source code found on this site is released under the same terms and conditions as the original sources. For example, the patches to the Linux kernel, patches to many existing utilities, and new programs and libraries available here are released under the terms and conditions of the GNU General Public License (GPL). The patches to some existing utilities and libraries available here are released under the terms and conditions of the BSD license. I downloaded the patch from http://www.nsa.gov/selinux/src-disclaim.html which has the following disclaimer: Before downloading this software, you must accept the warranty exclusion and limitation of liability which appears below. WARRANTY EXCLUSION I expressly understand and agree that this software is a non-commercially developed program that may contain bugs (as that term is used in the industry) and that it may not function as intended. The software is licensed as is. NSA makes no, and hereby expressly disclaims all, warranties, express, implied, statutory, or otherwise with respect to the software, including noninfringement and the implied warranties of merchantability and fitness for a particular purpose. LIMITATION OF LIABILITY In no event will NSA be liable for any damages, including loss of data, lost profits, cost of cover, or other special, incidental, consequential, direct or indirect damages arising from the software or the use thereof, however caused and on any theory of liability. This limitation will apply even if NSA has been advised of the possibility of such damage. I acknowledge that this is a reasonable allocation of risk. -- http://www.coker.com.au/bonnie++/ Bonnie++ hard drive benchmark http://www.coker.com.au/postal/ Postal SMTP/POP benchmark http://www.coker.com.au/projects.html Projects I am working on http://www.coker.com.au/~russell/ My home page
Re: bind9-chroot (was: questions on ITP)
* Richard Atterer [EMAIL PROTECTED] [010922 16:26]: One idea: In a configuration file, the user lists those daemons he wants to run chrooted. init.d scripts that support it read this information and act on it, copying the required files to a chroot before starting the daemon there. (The config file should probably not be read directly, instead the init.d script should call a small query script. That way, file format changes are possible.) Help, please no. More supports for chroots may be nice. But not this way! init.d-scripts calling scripts, that parse global config files is ugly and one of the many points to make people switch from Suse or Redhat to debian. And why should there be an global config file for all daemons? Beeing chrooted is an quite personal thing for every package. Why should an daemon that run chroot (and there are not that many, that can can be run there) parse a file which is of no interest for him but for the other daemons? Hochachtungsvoll, Bernhard R. Link
Re: bind9-chroot (was: questions on ITP)
also sprach Richard Atterer (on Sat, 22 Sep 2001 03:28:21PM +0200): One idea: In a configuration file, the user lists those daemons he wants to run chrooted. init.d scripts that support it read this information and act on it, copying the required files to a chroot before starting the daemon there. well, you might just use SuSE then... i don't think this is a good idea. for one, it is not necessary to copoy the chroot files over and over again with each init.d start. this interferes with tripwire installations, and it's in violation of the never touch a running system philosophy. even if libc is updated, if bind runs happily in its chroot. and if some security patch or otherwise crucial update is pending for a library that bind also uses, then the bind9 and bind9-chroot packages should be updated anyway. sure, this requires more work on the maintainer side, but it's the best way to do it. - If I were to put together a chroot-helper package, would people be interested in using it for their package? i don't think a global solution is a good choice here. if i install bind9-chroot (hypothetically speaking), then bind9 should not possibly ever run non-chrooted again. this should be done via diversions. martin; (greetings from the heart of the sun.) \ echo mailto: !#^.*|tr * mailto:; [EMAIL PROTECTED] -- you will be run over by a beer truck. pgpNLq6IqYszk.pgp Description: PGP signature
Re: building a new debian package
It seems to be an autoconf/automake based project, from what you included in your mail, how about using make install DESTDIR=$(CURDIR)/debian/tmp from the install target of your debian/rules? Or if that doesn't work, you can still use make install bindir=$(CURDIR)/debian/tmp/usr/bin or something like that.. Cheers, -- Gergely Nagy \ mhp/|8] pgpS3dP2SXClJ.pgp Description: PGP signature
(None)
Title: Cong ty Luat Gia Pham http://www.giapham.com KÝnh göi: Quý b¹n hµng! C«ng ty LuËt Gia Ph¹m xin göi lêi chµo tr©n träng tíi quý doanh nghiÖp! C«ng ty LuËt Gia Ph¹m, mét C«ng ty chuyªn ho¹t ®éng trong lÜnh vùc t vÊn víi ®éi ngò luËt gia, t vÊn viªn chuyªn nghiÖp giµu kinh nghiÖm ®¶m b¶o cung cÊp cho kh¸ch hµng nh÷ng dÞch vô t vÊn hoµn h¶o vµ chÊt lîng. Trong thêi gian qua ®îc sù tin cËy cña Céng ®ång c¸c Doanh nghiÖp, chóng t«i thêng xuyªn nhËn ®îc sù ñy quyÒn, nh÷ng yªu cÇu t vÊn vµ thùc hiÖn c¸c dÞch vô hç trî c¸c doanh nghiÖp trong nh÷ng lÜnh vùc sau: Thµnh lËp míi doanh nghiÖp, thay ®æi, bæ sung ®¨ng ký kinh doanh, më chi nh¸nh, v¨n phßng ®¹i diÖn t¹i Hµ Néi vµ c¸c tØnh phÝa B¾c; §¨ng ký b¶o hé ®éc quyÒn nh·n hiÖu s¶n phÈm, kiÓu d¸ng c«ng nghiÖp, s¸ng chÕ, gi¶i ph¸p h÷u Ých; §¨ng ký b¶o hé quyÒn t¸c gi¶ ®èi víi c¸c t¸c phÈm v¨n häc, nghÖ thuËt, khoa häc; §¨ng ký m· sè m· v¹ch tiªu chuÈn quèc tÕ cho c¸c s¶n phÈm T vÊn thêng xuyªn hç trî c¸c doanh nghiÖp trong c¸c lÜnh vùc ph¸p lý, thuÕ, tµi chÝnh, qu¶n trÞ doanh nghiÖp; Tham gia tranh tông, ®µm ph¸n gi¶i quyÕt c¸c xung ®ét vÒ lao ®éng, c¸c tranh chÊp kinh tÕ, d©n sù; ChuÈn hãa tÝnh ph¸p lý cña hå s¬ doanh nghiÖp, hîp ®ång vµ c¸c v¨n b¶n, tµi liÖu kh¸c. Víi bÒ dµy kinh nghiÖm, tÝnh chuyªn nghiÖp cña c¸c c¸n bé t vÊn, chóng t«i ®¶m b¶o cung cÊp c¸c dÞch vô t vÊn toµn diÖn vµ ®a ngµnh, lu«n lµm tháa m·n mäi yªu cÇu kh¾t khe nhÊt cña kh¸ch hµng. Sù g¾n bã cña kh¸ch hµng víi c¸c dÞch vô hç trî tæng thÓ ®· ®em l¹i thµnh c«ng cho chóng t«i nh ngµy h«m nay! Chóng t«i lµm ®iÒu ®ã bëi nhËn thÊy r»ng Doanh nghiÖp tù phßng vÖ cha ®ñ mµ cÇn ph¶i thiÕt lËp c¸c quan hÖ ph¸p lý ®Ó b¶o vÖ m×nh tríc khi bÞ tÊn c«ng. ThÕ m¹nh cña c«ng ty chóng t«i lµ sù kÕt hîp gi÷a kinh nghiÖm vµ sù t×m tßi c¸c gi¶i ph¸p thùc tiÔn nhng ®¶m b¶o tÝnh chuyªn nghiÖp trong chÊt lîng dÞch vô. Mäi ho¹t ®éng cña chóng t«i còng kh«ng n»m ngoµi môc tiªu chung cña tÊt c¶ c¸c nhµ ®Çu t: "Hîp t¸c ®Ó cïng ph¸t triÓn". Tr©n träng LuËt Gia Ph¹m Thµnh Long C«ng ty LuËt Gia Ph¹m Tel: 84-4- 55 838 55 Fax: 55 809 55 §Þa chØ: 240 Phè Quan Nh©n, Thanh Xu©n, Hµ Néi http://www.giapham.com Scope of business: -Advisory of procedures and documentation for establishment of enterprises, branch, representative office; -Registration of stamp, tax code, import- export code ; -Regitration of scopes of conditional professional, business licenses of profession practising, petroleum and oil , LPG, advisory of designing, etc; -Registration of indutrial intellectual protection, invention, industrial style, useful solutions, goods trademarks, goods origination names; -Registration of licensing of code international line codes for commodities. please visiting our website: http://www.giapham.com
Re: madison
On Sat, Sep 22, 2001 at 04:44:46PM +0200, Admar Schoonen wrote: I think it can be useful for those who want to create their own flavour of Debian or want to (partially) mirror Debian. dpkg-scanpackages/apt-ftparchive doesn't work very well for packages which are located in the pool, and the only way to generate correct packagelists is to put all information from all packages in a database and query that database when packagelists are generated; thus people who want to partially mirror or create their own Debian-flavour should create their own Debian database from information gathered from packagelists which are downloaded by apt. Those people are going to want all of dak (katie) anyway, which contains madison. It's not packaged either, but is available from anonymous cvs at cvs.debian.org. However, the value of a package that would be used by about half a dozen people in total is probably not all that high. -- .''`. ** Debian GNU/Linux ** | Andrew Suffield : :' : | Dept. of Computing, `. `' | Imperial College, `-http://www.debian.org/ | London, UK pgpmwwHifndOR.pgp Description: PGP signature
Re: madison
On Sat, Sep 22, 2001 at 04:44:46PM +0200, Admar Schoonen wrote: On Fri, Sep 21, 2001 at 05:15:31PM -0400, Matt Zimmerman wrote: madison requires connectivity to a Debian database which is not publicly accessible, so it is only useful on a couple of internal Debian machines. For this reason, it probably isn't worthwhile to package it. I think it can be useful for those who want to create their own flavour of Debian or want to (partially) mirror Debian. dpkg-scanpackages/apt-ftparchive doesn't work very well for packages which are located in the pool, and the only way to generate correct packagelists is to put all information from all packages in a database and query that database when packagelists are generated; thus people who want to partially mirror or create their own Debian-flavour should create their own Debian database from information gathered from packagelists which are downloaded by apt. There's no need for a database unless you want to maintain multiple distributions out of cross-sections of the pool, as Debian does. If you only want to make a single set of packages available, or you only have one version of each package, then you don't need to worry about it. apt-ftparchive and dpkg-scanpackages will work fine. It doesn't matter how the files are arranged (in a pool-like hierarchy or section hierarchy or a flat directory). If you want to create your own flavour that contains different versions of certain packages, or excludes certain packages, the situation is the same, just with a different set of packages. Partial mirrors should use the Packages files on the mirrors to decide which files need to be downloaded. Or is there a different goal you're describing that I don't understand? -- - mdz
Re: bind9-chroot (was: questions on ITP)
[EMAIL PROTECTED] (Martin F Krafft) writes: i don't think a global solution is a good choice here. if i install bind9-chroot (hypothetically speaking), then bind9 should not possibly ever run non-chrooted again. this should be done via diversions. Eee. Diversions are so, well, messy. I think the obvious right way to handle this is to add debconf support to the bind9 package asking whether to run in a chroot or not, and if the answer is yes, just do it. As has been pointed out by Marco and others, bind9 is substantially easier to chroot than previous versions, so this shouldn't be a big deal. Having said that, since I don't personally run bind9 in a chroot, I continue to be willing to accept a clueful patch to the current bind9 source in non-US to implement this... but am in no big rush to implement it myself. Bdale
Re: dpkg logging
[EMAIL PROTECTED] (Wichert Akkerman) writes: Previously Steve Greenland wrote: Stdout and stderr from the maintainer scripts. (This may be obvious, but you didn't explicitly list it.) No, they should use debconf. Regardless of whether packages are using debconf, I have wondered for *years* why we didn't at least have the option of logging stdout and stderr from everything in the install/update process. I think it's a good idea. Bdale
Re: bind9-chroot (was: questions on ITP)
On Sat, Sep 22, 2001 at 05:39:20PM +0200, Bernhard R. Link wrote: Help, please no. More supports for chroots may be nice. But not this way! init.d-scripts calling scripts, that parse global config files is ugly and one of the many points to make people switch from Suse or Redhat to debian. On Sat, Sep 22, 2001 at 05:46:57PM +0200, Martin F Krafft wrote: well, you might just use SuSE then... :-) The config script was only a suggestion, and maybe there is a better way. But my main point was: Chrooting a daemon should be possible in a uniform way for all daemons that support it. What alternative possibilities for implementing this do you see? The package will have to contain the necessary chrooting script somewhere, and the admin will have to perform some action to trigger its execution. After he has done that, the init.d script should execute the chrooted daemon. It is possible to tell the admin to edit the init.d script, changing some variable assignment to chroot=yes, but somehow I don't think this is very clean, either... Cheers, Richard -- __ _ |_) /| Richard Atterer | CS student at the Technische | GnuPG key: | \/¯| http://atterer.net | Universität München, Germany | 0x888354F7 ¯ ´` ¯ pgp2CxJpGiE30.pgp Description: PGP signature
Re: bind9-chroot (was: questions on ITP)
also sprach Bdale Garbee (on Sat, 22 Sep 2001 12:06:37PM -0600): Eee. Diversions are so, well, messy. I think the obvious right way to handle this is to add debconf support to the bind9 package asking whether to run in a chroot or not, and if the answer is yes, just do it. As has been pointed out by Marco and others, bind9 is substantially easier to chroot than previous versions, so this shouldn't be a big deal. well, okay then. i'll paste together a script that will chroot bind right after it was successfully installed as bind9 package, and one which will remove the chroot again. martin; (greetings from the heart of the sun.) \ echo mailto: !#^.*|tr * mailto:; [EMAIL PROTECTED] -- if loving linux is wrong, i don't want to be right. pgpSS5gaKw8IH.pgp Description: PGP signature
Re: bind9-chroot (was: questions on ITP)
also sprach Richard Atterer (on Sat, 22 Sep 2001 10:03:55PM +0200): What alternative possibilities for implementing this do you see? The package will have to contain the necessary chrooting script somewhere, and the admin will have to perform some action to trigger its execution. After he has done that, the init.d script should execute the chrooted daemon. i believe that chroot should be an install time choice, not a runtime one (as in config script). martin; (greetings from the heart of the sun.) \ echo mailto: !#^.*|tr * mailto:; [EMAIL PROTECTED] -- la lune, c'est comme les canards il faut aimer caresser les chats pour avoir envie d'y aller. pgpYni67FCDuI.pgp Description: PGP signature
New attempt to build debhelper 3 for potato
Hi, tonight, I tried a second time to build debhelper 3 for potato. Because of the radical changes that have taken place especially with the SGML stuff, I have now successfully built 37 .deb files and am - again - beginning to wonder if it is really this major an effort to get a basic tool like debhelper built. For example, is it really necessary to update debconf to have a current debhelper? debhelper 3.0.45 build-depends on debconf-utils which is not present in potato's debconf. I have now a debconf 1.0.01 for potato which doesn't install since perl 5.005 has its include files in a different place, and the debconf postinst looks for Debconf/Db.pm in a bunch of other places instead of /usr/share/perl5/Debconf where the backported debconf places it. I certainly won't backport perl 5.6 to potato, and I am quite reluctant to look that deeply into debconf 1.0.01's sources to figure out where the perl modules should go with potato's perl. I'd appreciate any hints. I am now off to bed ;) See you tomorrow. Greetings Marc -- - Marc Haber | I don't trust Computers. They | Mailadresse im Header Karlsruhe, Germany | lose things.Winona Ryder | Fon: *49 721 966 32 15 Nordisch by Nature | How to make an American Quilt | Fax: *49 721 966 31 29
Re: New attempt to build debhelper 3 for potato
On Sun, 23 Sep 2001 00:02:16 +0200, Marc Haber [EMAIL PROTECTED] wrote: tonight, I tried a second time to build debhelper 3 for potato. And obviously goofed with my From: address. Sorry 'bout that. Greetings Marc -- -- !! No courtesy copies, please !! - Marc Haber |Questions are the | Mailadresse im Header Karlsruhe, Germany | Beginning of Wisdom | Fon: *49 721 966 32 15 Nordisch by Nature | Lt. Worf, TNG Rightful Heir | Fax: *49 721 966 31 29
Re: bind9-chroot (was: questions on ITP)
Martin F Krafft wrote: also sprach Richard Atterer (on Sat, 22 Sep 2001 10:03:55PM +0200): What alternative possibilities for implementing this do you see? The package will have to contain the necessary chrooting script somewhere, and the admin will have to perform some action to trigger its execution. After he has done that, the init.d script should execute the chrooted daemon. i believe that chroot should be an install time choice, not a runtime one (as in config script). For the long term, this is the safer choice. For even better security, just make the standard install chrooted if it is of wise security reasons to. I've long questioned why this hasn't been done for many daemons already. I know some people may feel that because it breaks something or another one shouldn't do this, but I know bind doesn't break anything by being chrooted. What about others? -- | Bryan Andersen | [EMAIL PROTECTED] | http://www.nerdvest.com | | Buzzwords are like annoying little flies that deserve to be swatted. | | -Bryan Andersen|
Re: bind9-chroot (was: questions on ITP)
On Sat, Sep 22, 2001 at 05:39:20PM +0200, Bernhard R. Link wrote: * Richard Atterer [EMAIL PROTECTED] [010922 16:26]: One idea: In a configuration file, the user lists those daemons he wants to run chrooted. init.d scripts that support it read this information and act on it, copying the required files to a chroot before starting the daemon there. (The config file should probably not be read directly, instead the init.d script should call a small query script. That way, file format changes are possible.) Help, please no. More supports for chroots may be nice. But not this way! init.d-scripts calling scripts, that parse global config files is ugly and one of the many points to make people switch from Suse or Redhat to debian. very much agreed. And why should there be an global config file for all daemons? Beeing chrooted is an quite personal thing for every package. Why should an daemon that run chroot (and there are not that many, that can can be run there) parse a file which is of no interest for him but for the other daemons? yes the proper way is usually /etc/default/package which has config variables for the initscript, such as CHROOT=yes -- Ethan Benson http://www.alaska.net/~erbenson/ pgpMr4lCrK712.pgp Description: PGP signature
Re: bind9-chroot (was: questions on ITP)
also sprach Bryan Andersen (on Sat, 22 Sep 2001 05:42:23PM -0500): For even better security, just make the standard install chrooted if it is of wise security reasons to. I've long questioned why this hasn't been done for many daemons already. I know some people may feel that because it breaks something or another one shouldn't do this, but I know bind doesn't break anything by being chrooted. What about others? my postfix runs in a total chroot (even more than standard debian). so does my proftpd. problem with the latter is, of course, that no users can use ftp to access their homedirectories, which i don't consider a problem. i could enable it with 'mount --bind /home /chroot/proftpd/home' but i don't mind imposing sftp on everyone for security reasons anyway! other than that, i have long wanted to set up an apache chroot. i don't know of other daemons (read: i don't use other daemons), which would profit from a chroot... martin; (greetings from the heart of the sun.) \ echo mailto: !#^.*|tr * mailto:; [EMAIL PROTECTED] -- laugh alone and the world thinks you're an idiot. pgpVBMmCiDN7p.pgp Description: PGP signature
Re: Bug#66135: libtool_1.3.5-1(unstable): wrapping of binaries fails with -D__LIBTOOL_IS_A_FOOL__
Domenico == Domenico Andreoli [EMAIL PROTECTED] writes: Domenico how to find these evil packages? Just grep __LIBTOOL_IS_A_FOOL__ debian/rules (for every source package) should find most of them, I think (not tested). Since the hack is probably exactly the same in every instance, it might even be possible to develop a simple script for automatically removing the hack (not sure if this would be worthwhile or not). Just don't remove the hack unless the program uses a recent version of libtool (look at the version on the initial bug report for a general idea, do any packages still fall into this category?) -- Brian May [EMAIL PROTECTED]
URGENT AND CONFIDENTIAL
Hassan Bello. #20 LOUIS BOTHA CRESCENT SADTON SOUTH AFRICA, Fax: 874-762-727949. Tel: 874-762-727947. {URGENT AND CONFIDENTIAL} Dear sir, In order to transfer out (USD 126 M) One hundred and twenty six million United States Dollars) from African Development Bank. I have the courage to ask you to look for a reliable and honest person who will be capable for this important business believing that you will never let me down either now or in future. I am Hassan Bello the Chief auditor of African Development Bank (ADB). There is an account opened in this bank in 1980 and since 1990 nobody has operated on this account again. after going through some old files in the records I discovered that if I do not remit this money out urgently it will be forfeited for nothing. the owner of this account is Mr. Smith B. Andreas, a foreigner, and a miner at kruger gold co., a geologist by profession and he died since 1990. no other person knows about this account or any thing concerning it, the account has no other beneficiary and my investigation proved to me as well that this company does not know anything about this account and the amount involved is (USD 126M) One hundred and twenty six million United States Dollars million dollars. I want to first transfer USDM twenty six million United States Dollars from this money into a safe foreigners account abroad before the rest, but I don't know any foreigner, I am only contacting you as a foreigner because this money can not be approved to a local bank here, but can only be approved to any foreign account because the money is in ,us dollars and the former owner of the account is Mr. Smith B. Andreas is a foreigner too. I know that this message will come to you as a surprise as we don't know our selves before, we will sign agreement, but be sure that it is real and a genuine business. I only got your contact address from my secretary who operates computer, with believe in God that you will never let me down in this business you are the only person that I have contacted in this business, so please reply urgently so that I will inform you the next step to take urgently. Send also your private telephone and fax number including the full details of the account to be used for the deposit. I want us to meet face to face or sign a binding agreement to bind us together so that you can receive this money into a foreign account or any account of your choice where the fund will be safe. and I will fly to your country for withdrawal and sharing and other investments. I am contacting you because of the need to involve a foreigner with foreign account and foreign beneficiary. I need your full co-operation to make this work fine. because the management is ready to approve this payment to any foreigner who has correct information of this account, which I will give to you later immediately, if you are able and with capability to handle such amount in strict confidence and trust according to my instructions and advice for our mutual benefit because this opportunity will never come again in my life. I need truthful person in this business because I don't want to make mistake I need your strong assurance and trust. With my position now in the office I can transfer this money to any foreigner's reliable account which you can provide with assurance that this money will be intact pending my physical arrival in your country for sharing. I will destroy all documents of transaction immediately we receive this money leaving no trace to any place. you can also come to discuss with me face to face after which I will make this remittance in your presence and two of us will fly to your country at least two days ahead of the money going into the account. I will apply for annual leave to get visa immediately I hear from you that you are ready to act and receive this fund in your account. I will use my position and influence to effect legal approvals and onward transfer of this money to your account with appropriate clearance forms of the ministries and foreign exchange departments. At the conclusion of this business, you will be given 35% of the total amount, 60% will be for me, while 5% will be for expenses both parties might have incurred during the process of transferring. I look forward to your earliest reply through my email address or by my tel: 874-762-727947,fax: 874-762 727949. yours truly Hassan Bello. __ Do You Yahoo!? Get email alerts NEW webcam video instant messaging with Yahoo! Messenger. http://im.yahoo.com
Re: madison
Previously Andrew Suffield wrote: However, the value of a package that would be used by about half a dozen people in total is probably not all that high. We have packages that nobody uses. I wouldn't mind seeing the whole archive management suite being packaged properly, and I think it would be used more then you might think. Wichert. -- _ / Nothing is fool-proof to a sufficiently talented fool \ | [EMAIL PROTECTED] http://www.liacs.nl/~wichert/ | | 1024D/2FA3BC2D 576E 100B 518D 2F16 36B0 2805 3CB8 9250 2FA3 BC2D |
Re: bind9-chroot
Bryan Andersen [EMAIL PROTECTED] wrote: do this, but I know bind doesn't break anything by being chrooted. What about others? Last I checked bind when chrooted can't listen on interfaces that are brought up after it has been started. -- Debian GNU/Linux 2.2 is out! ( http://www.debian.org/ ) Email: Herbert Xu ~{PmVHI~} [EMAIL PROTECTED] Home Page: http://gondor.apana.org.au/~herbert/ PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
Re: Preview of new Ghostscript packages - please test
[ Ccing to [EMAIL PROTECTED] for notice ] Hello, At 21 Sep 2001 15:39:27 +0300, Samuli Suonpaa wrote: Torsten Landschoff [EMAIL PROTECTED] wrote: Please take a look at these packages and tell me about any problems which are not obvious - there is a lot of stuff still lacking and I only want to upload the packages to the archive when they are feature complete. I really do not know much about gs, but it seems there's something wrong with fontpaths here. When trying to configure my PSC500 (using hpijs and DJ8xx drivers now included in GhostScript, thank you for that), I only get complaint: Error: /invalid font in findfont and something like that. If you are using defoma 0.4.10, it may be a bug of defoma. Please look into /var/lib/defoma/gs.d/dirs/fonts, where is one of the font paths of gs and is managed by defoma. The bug makes creating Fontmap file fail so you may find out that there're symlinks of pfb files of gsfonts but no Fontmap file in the directory. Please update to defoma 0.4.11 i'm just duploading and run: defoma-app update gs Thanks, hirot pgp6xoTdVk25L.pgp Description: PGP signature
Re: gpg and trustdb very slow
on Tue, Sep 18, 2001 at 08:37:33AM -0300, Henrique de Moraes Holschuh ([EMAIL PROTECTED]) wrote: On Tue, 18 Sep 2001, Christian Kurz wrote: On 01-09-18 Joey Hess wrote: It'd be nice if someone would look at optimizing it sometime; the behavior I see with strace is absurd, and could easily be done with no syscalls, at least, by just reading the whole trustdb into memory. I know that the Werner revamped the whole keyring code about 1 or two weeks ago. I just tried the --list-keys with my private and the debian keyring specified in the options file and I didn't took more then 5 minutes for me. (AMD K6-200). So I don't think if anyone would really want to optimize the code more, he should look at the current cvs code. As well as reading the docs, where it is said that one must reinsert all keys in the trustdb to take advantage of a new caching algorithm... Could you point us to the relevant docs and/or the command for re-reading keys? Peace. -- Karsten M. Self kmself@ix.netcom.comhttp://kmself.home.netcom.com/ What part of Gestalt don't you understand? Home of the brave http://gestalt-system.sourceforge.net/Land of the free Free Dmitry! Boycott Adobe! Repeal the DMCA! http://www.freesklyarov.org Geek for Hire http://kmself.home.netcom.com/resume.html pgpmTtP8aIl64.pgp Description: PGP signature
Re: gpg and trustdb very slow
On Sat, 22 Sep 2001, Karsten M. Self wrote: on Tue, Sep 18, 2001 at 08:37:33AM -0300, Henrique de Moraes Holschuh ([EMAIL PROTECTED]) wrote: On Tue, 18 Sep 2001, Christian Kurz wrote: On 01-09-18 Joey Hess wrote: It'd be nice if someone would look at optimizing it sometime; the behavior I see with strace is absurd, and could easily be done with no syscalls, at least, by just reading the whole trustdb into memory. I know that the Werner revamped the whole keyring code about 1 or two weeks ago. I just tried the --list-keys with my private and the debian keyring specified in the options file and I didn't took more then 5 minutes for me. (AMD K6-200). So I don't think if anyone would really want to optimize the code more, he should look at the current cvs code. As well as reading the docs, where it is said that one must reinsert all keys in the trustdb to take advantage of a new caching algorithm... Could you point us to the relevant docs and/or the command for re-reading keys? Nope, I have no idea where the hell I read that. I'd try the changelogs of upstream and the Debian package, however: that rings a bell on my mind. As for the useful information, that I can help you with. All you have to do is to let gnupg readd all your keys to a keyring (as in 'new insertions to a keyring are made in the new cache scheme'). Simple enough to do with any RW keyrings you might have: 1. move every keyring out of the way, including the RO ones. 2. feed a keyring to gnupg. You might want to use --fast-import followed by an --update-trustdb for that. 3. replace the old keyring you fed gnupg with with the new one 4. repeat as needed. I actually find it better to have just one RW keyring, and feed any RO keyrings I might need (such as Debian's) to gnupg to get them added to that RW keyring. Since gnupg's handling of multiple keyrings is not really that hot, keeping track of only a simple RW keyring helps a lot. Peace. Hmm, sorry about that. I sounded far more annoyed/annoying ;) than I should have. -- One disk to rule them all, One disk to find them. One disk to bring them all and in the darkness grind them. In the Land of Redmond where the shadows lie. -- The Silicon Valley Tarot Henrique Holschuh
doc-html-w3
I am seriously considering adopting [1]doc-html-w3. I use many of these recommendation on a daily basis where I work. It would be nice to have a current local copy of them. However, before I decide to go any further with the adoption process, I want to get some feedback for an idea that I have. I would like to change doc-html-w3's name to one that is more descriptive of its current and potential contents. I think that the name of this package is currently too narrow; besides HTML, indicated by the name, it also contains CSS2, SMIL, XPATH and many other recommendations. What do you think? Here are a couple of the names I've been kicking around: a) doc-w3 (most general, my favorite; perhaps even doc-w3c) b) doc-markup-w3 (but this name excludes style: CSS2, XSLT, etc) c) doc-w3c-recommend d) [your suggestion here] Feel free to CC me, thanks. Joe Schlecht [1] http://bugs.debian.org/cgi-bin/bugreport.cgi?archive=no\bug=110945