Re: Bug#205471: [rene@debian.org: Bug#205471: devscripts: running debuild could lead to deleting _all_ backup dirs/files on the system]

2003-08-20 Thread Goswin von Brederlow
Julian Gilbey [EMAIL PROTECTED] writes:

 On Tue, Aug 19, 2003 at 09:24:25PM +0200, Goswin von Brederlow wrote:
  [EMAIL PROTECTED] (Aaron M. Ucko) writes:
  
   How about requiring the debian directory to have an appropriately
   named parent (as determined by debian/changelog and debian/control,
   which should probably also have to agree...), unless the user runs
   debuild with some sort of --force option?
  
  But then its a question of what name to use?
  
  I do have the following four cases:
  package
  package-version
  package-version.debian_version
  package-cvs
 
 I really like this idea, thank you!  I will accept directory names
 matching the regexp /^$package(-.*)?$/ - does that seem reasonable?

Fine with me.

MfG
Goswin




Re: Bits from the RM

2003-08-20 Thread Joel Baker
Hi, I'm Troy McClure - you may remeber me from such threads as How do we
get Debian to have a useful release timeframe, and... *er, wait*.

Okay, that sillyness aside...

On Wed, Aug 20, 2003 at 08:51:16AM -0400, Theodore Ts'o wrote:
 
 Better to have a hard freeze schedule, and then try to turn out new
 stable releases every 6-9 months.  Then folks won't be so desperate to
 shove new things in and screw up the release.  The problem, though, is
 the first such attempt take release schedules seriously and
 agressively (a) a really hardass RM, and (b) a certain amount of faith
 by the developers that we really can get our act together about short,
 regular, predictable releases.

Much, much better. I'd love to see it manage to hit every six months (and
even I agree that more often that that probably isn't feasible; most of the
major projects I know of that do scheduled releases don't have cycles  6
months, and generally don't have too many users screaming about out-of-date
software). The first time is going to be a lot of unfamiliar, a lot of
hectic, and frankly, probably a lot of things that we don't get quite as
right as we could with experience - since, of course, part of the need is
to gain that experience.

I'm glad to see, however, that an RM has decided that targeting an actual
date, with an actual and concrete timeline (to compare against and know if
we're slipping too far), and clear mileposts along the way, is a meaningful
way to attempt a release.

You already have (b) from this quarter - and my profound hope that we
can, in fact, pull this off. Because it would resolve about 80% of the
complaints I've ever heard from folks about Debian (another 19% being the
install setup, which is also being remedied, and 1% being it's focus on
Linux, which is a separate question entirely - and no, I do not forsee
trying to get netbsd-i386 into sarge. If we manage to achieve a six-month
turnaround, quite possibly not even into sarge+1; NetBSD hasn't announced a
release target for 2.0 yet).

Off to hunt some RC bugs, now... (yeah, yeah, I should have been doing
this all along, but frankly, porting work took priority when there was no
release goal :)
-- 
Joel Baker [EMAIL PROTECTED],''`.
Debian GNU NetBSD/i386 porter: :' :
 `. `'
   `-


pgpmFdFGuvjMV.pgp
Description: PGP signature


Re: FTBFS: architecture all packages

2003-08-20 Thread Matthias Urlichs
Hi, Andrew Suffield wrote:

 If its hoop-jumping then it must be intentional. Point is it happens.
 
 Who cares? We cannot build an automated system here that will be able
 to stop people doing things like that.

Why not? Just block binary uploads completely, and let everything get
built by the buildds. I certainly plan to do that with my own uploads.
(I've already set up my own buildds).

I'd go one step farther and schedule a low-priority rebuild of everything
that build-depends on a package which gets updated.

-- 
Matthias Urlichs   |   {M:U} IT Design @ m-u-it.de   |  [EMAIL PROTECTED]
Disclaimer: The quote was selected randomly. Really. | http://smurf.noris.de
 - -
Is knowledge knowable?  If not, how do we know that?




Re: #206298 spip: prerm script blindly removes directories

2003-08-20 Thread Jamin W. Collins
On Wed, Aug 20, 2003 at 05:38:42PM +0200, Gaetan Ryckeboer wrote:
 Le Wed, Aug 20, 2003 at 09:26:14AM -0600, Jamin W. Collins a ?crit :
  
  Is this uploaded data recorded anywhere?  In the MySQL database
  perhaps?  If so, the file names can be retrieved from there for
  removal on purge.

 Mmm... yes and no. Some of them could be. But a user may upload files
 without using them in the application.  So, the files are available,
 but unused, and unreferenced.

That would appear to be a deficiency of the spip app and one that should
probably be brought to the upstream developers attention.  The
application should probably log all uploads.

  Additionally, you may upset users by simply deleting their uploaded
  files on purge.  Some may see this as deletion of user data, which
  should not be done.

 Of course, I understand. But I wonder they won't upload personal files
 for another use than spip here...

This falls into something of a grey area.  Can the data concievably be
of value ot the user without spip?  If so, then it is probably user data
and should not be removed without confirmation from the user (debconf
prompt that defaults to no?)

  As someone else has already pointed out, /usr/share should be
  capable of being made read-only.  Any runtime changing data for an
  application

 True. But due to the implemntation of the application, which is
 written in php, datas are stored on the program dir. There is no real
 separation between datas and functions.
 
 And if i symlink some datas (for apache access AND direct file handler
 access), i'll will setup another alarm... and it won't be accepted.

So, use Alias directives to relocate the directories that need changing
data to /var/lib.  There is no need to use symlinks to accomplish this.
As a matter of fact, your current apache include enables the following
of symlinks, which it doesn't need and probably shouldn't. I can provide
examples of this if you need.

-- 
Jamin W. Collins

Linux is not The Answer. Yes is the answer. Linux is The Question. - Neo




Re: what about ip's

2003-08-20 Thread John Hasler
David Smith writes:
 my first assumption is that charter sells their users email addresses.
 does anyone on this list know how an unused email address that has never
 been used can have spam without the ip giving the address out?

Did you use 'dsmith' as the user name for the charter.net account?  If so
the answer should be obvious.

Hint: 99% of my spam is addressed to non-existent users.
-- 
John Hasler
[EMAIL PROTECTED] (John Hasler)
Dancing Horse Hill
Elmwood, WI




Bug#206421: ITP: gaim-encryption -- Gaim plugin that provides transparent RSA encryption

2003-08-20 Thread Leo Costela
Package: wnpp
Version: unavailable; reported 2003-08-20
Severity: wishlist

* Package name: gaim-encryption
  Version : 2.06
  Upstream Author : Bill Tompkins obobo at users.sourceforge.net
* URL : http://gaim-encryption.sourceforge.net
* License : GPL
  Description : Gaim plugin that provides transparent RSA encryption

Features include:


[RFC] Debian ruby policy (Re: Fw: Re: Ruby 1.8 transition plan; debian-ruby)

2003-08-20 Thread Fumitoshi UKAI
Hi,

I've wrote initial draft of debian ruby policy
 http://pkg-ruby.alioth.debian.org/ruby-policy.html/index.html
Comments are welcome.

First, I'll intent to package ruby-defaults soon, which provides ruby and
libruby packages in which this ruby policy documents is included, and
rename current ruby package to ruby1.6 (and libruby to libruby1.6, ...).
After doing that, we'll start 1.6-1.8 transition as written in above 
ruby policy documents.

I'd also like to hear opinions about ruby 1.8 packaging, especially 
from ruby package maintainers who maintain ruby modules package that are
included in upstream ruby 1.8 distribution. As you know, ruby 1.8
includes the following packages in upstream distribution, and now
ruby1.8 make these packages from ruby1.8 source package. Is this ok?
I'm wondering these modules will be released independently from ruby 1.8.x 
release. If so, it may be a problem because we may want such modules
that are released separately from ruby 1.8, instead of ruby 1.8 bundled ones.
What do you think about it?

New
 liberb-ruby1.8
 libdl-ruby1.8
 libbigdecimal-ruby1.8
 libracc-runtime-ruby1.8 (-ruby1.7?)

akira yamada [EMAIL PROTECTED]
 libwebrick-ruby1.8 (- libwebrick-ruby)
 libzlib-ruby1.8 (- libzlib-ruby)
 libopenssl-ruby1.8 (- libopenssl-ruby)
 libstrscan-ruby1.8 (- libstrscan-ruby)
 libdrb-ruby1.8 (- drb?)
 libiconv-ruby1.8 (- libiconv-ruby)
 libxmlrpc-ruby1.8 (- xmlrpc4r?)

Joe Wreschnig [EMAIL PROTECTED]
 libtest-unit-ruby1.8 (- libtest-unit-ruby)

Dmitry Borodaenko [EMAIL PROTECTED]
 libyaml-ruby1.8 (- libyaml-ruby)

Oliver M. Bolzer [EMAIL PROTECTED]
 librexml-ruby1.8 (- librexml-ruby)


At 05 Aug 2003 17:49:16 -0500,
Joe Wreschnig wrote:
 On Tue, 2003-08-05 at 12:12, Fumitoshi UKAI wrote:
  Since ruby 1.8.0 was released recently, ruby developers will go to 
  ruby 1.8.x, so that we, ruby maintenance team (akira, tagoh, ukai), 
  are discussing about how to deal with Ruby 1.8 transition and trying to make
  debian ruby policy soon.
  
  For now, ruby package provides /usr/bin/ruby of ruby 1.6.x, and
  ruby1.8 package provides /usr/bin/ruby1.8 of ruby 1.8.x.  Someone
  want to use /usr/bin/ruby of ruby 1.8.x, so we're considering to use 
  alternatives for /usr/bin/ruby to choice either ruby1.6, ruby1.8 (or any
  other version of ruby in future).
 
 There was a bug about this at some point, which I can no longer find,
 where I suggested doing for Ruby what Python does. Which is essentially:
 - 'ruby' is a metapackage depending the current default version of Ruby
 for Debian.
 - 'rubyX.Y' is a specific version of Ruby. 'ruby' depends on one of
 these.
 
 - 'libfoo-bar-ruby' is a metapacakge depending on libfoo-bar-rubyX.Y,
 where X.Y is the default version of Ruby (the same as the one 'ruby'
 depends on).
 - 'libfoo-bar-rubyX.Y' is foo-bar for a specific version of Ruby. The
 above depends on one of these. (These packages may be unncessary if the
 directory tree I outlined below is used, and the package is
 version-independent.)

Hmm, I agree that it would be good.

 As for module include paths, they're less important since most Ruby
 modules query Ruby for the right information at build-time anyway, but
 I'd like to see version-independent directories, and also preferrably a
 tree under /usr/share, too. Say,
 
 These are arch-independent:
 - /usr/share/ruby for Ruby modules that work with any version.
 - /usr/share/ruby/X.Y for Ruby modules that depend on version X.Y.

Currently, ruby upstream doesn't support such version independent module 
path /usr/share/ruby in $LOAD_PATH. Should we modify ruby 1.8 or later 
to support this?
 
 These are arch-dependent:
 - /usr/lib/ruby/version/X.Y/#{arch}-#{os} for all arch-dependent
 modules. I believe most architecture-dependent modules need to be
 recompiled for each version of Ruby anyway, and so a version-independent
 architecture-dependent directory makes no sense.

Yes, I agree.

Regards,
Fumitoshi UKAI


pgpsmdcpVGl6X.pgp
Description: PGP signature


Re: #206298 spip: prerm script blindly removes directories

2003-08-20 Thread Gaetan Ryckeboer
Le Wed, Aug 20, 2003 at 11:34:40AM -0600, Jamin W. Collins a écrit :
  Mmm... yes and no. Some of them could be. But a user may upload files
  without using them in the application.  So, the files are available,
  but unused, and unreferenced.
 
 That would appear to be a deficiency of the spip app and one that should
 probably be brought to the upstream developers attention.  The
 application should probably log all uploads.
Not necessary. Web administrators may upload files via FTP, andspip
users  never use them onto spip ? If so, the files will stay in place in
upload, instead of beeing integrated onto the spip tree at the right
place, and being logged in the sql database.

  Of course, I understand. But I wonder they won't upload personal files
  for another use than spip here...
 This falls into something of a grey area.  Can the data concievably be
 of value ot the user without spip?  If so, then it is probably user data
 and should not be removed without confirmation from the user (debconf
 prompt that defaults to no?)
You're right. I'll do such a dialog.

  True. But due to the implemntation of the application, which is
  written in php, datas are stored on the program dir. There is no real
  separation between datas and functions.
  
  And if i symlink some datas (for apache access AND direct file handler
  access), i'll will setup another alarm... and it won't be accepted.
 
 So, use Alias directives to relocate the directories that need changing
 data to /var/lib.  There is no need to use symlinks to accomplish this.
Yes it needs. I've still moves documentation to usr/share/doc, instead
of spip/ecrire/doc, but it is rather different with the cache and other
application managed files.

You may access the php files via apache, but php files may access to
other php file, or static file. For instance, to modify the
configuration, or read the cache.

The cache management will be patched to go to /var/cache, but I cannot
do more without symlinks... The application won't be changed to handle
FHS correctly without complete rewriting.

Just imagine that spip is a set of application datas for apache/php,
but is an complete application, with datas, procedures, and cache -- the
reason of the packaging.

 As a matter of fact, your current apache include enables the following
 of symlinks, which it doesn't need and probably shouldn't. I can provide
 examples of this if you need.
I accept. Please send me examples in private, if you found a way to
move php files accessing each other (via include) in another directory, 
without patching the application.
 
-- 
Monsieur à qui on ne la fait pas cherche Dame à qui on ne l'a pas fait.

Gaétan RYCKEBOER  Société Virtual-Net
[Tous textes et propos tenus dans ce couriel sont sous license DMDZZ]


pgp6Zxum4rF0S.pgp
Description: PGP signature


Bug#206429: ITP: ruby-defaults: Debian default version of ruby, libruby

2003-08-20 Thread Fumitoshi UKAI
Package: wnpp
Version: unavailable; reported 2003-08-21
Severity: wishlist

* Package name: ruby-defaults
  Version : 1.6.8
  Upstream Author : Fumitoshi UKAI [EMAIL PROTECTED], 
Akira Yamada [EMAIL PROTECTED],
Akira Tagoh [EMAIL PROTECTED]
* URL : http://pkg-ruby.alioth.debian.org/
* License : GPL or Ruby's
  Description : Debian default version of ruby, libruby

 ruby-defaults provides ruby and libruby that depends on 
debian default version of rubyX.Y and librubyX.Y.
It also contains Debian ruby policy documents.

For now, we already have ruby package in debian archive that is 
packaged from ruby 1.6.8.  I also plan to rename these packages to 
ruby1.6, libruby1.6 and so on, with this ITP.

Regards,
Fumitoshi UKAI




Non-free software on linex [was Re: Debian Weekly News - August 19th, 2003]

2003-08-20 Thread Hans Ekbrand
On Tue, Aug 19, 2003 at 11:33:12PM +0200, Mike Hommey wrote:
 On Tuesday 19 August 2003 22:12, Martin Schulze wrote:

[...]

  [2]Libranet 2.8, which is based on Debian. Richard Stallman [3]said
  he now prefers the [4]GNU/LinEx distribution over Debian because of
  non-free software on our FTP servers. 

[...]

 Let me see...
 I go to the linex home page. What do i see ?
 GNU/LinEx y tarjetas NVIDIA.
 Oh well, seems interesting, so I go in the page and see that they seem to 
 provide some package for nvidia drivers. Maybe newer drivers (their distro is 
 based on woody, so...)
 Ok, let's google a bit, and shazaam !
 http://www.linex.org/sources/linex/debian/linex/nvidia-glx_1.0.4349-1_i386.deb
 Oh ! non-free software !
 
 Thanks Richard for keeping me laughing.

There's more of it: http://www.linex.org/sources/linex/debian/linex/
lists acroread_4.05-3, mplayer_0.90pre5-3
flashplugin-nonfree_6.0.79-1, hsflinmodem-linex_0.5.2-1

-- 

Hans Ekbrand

pgp03pbgkbR6p.pgp
Description: PGP signature


Re: non-DD contributors and the debian keyring

2003-08-20 Thread Martin Quinson
On Wed, Aug 20, 2003 at 09:40:02AM -0400, Stephen Frost wrote:
 * Martin Quinson ([EMAIL PROTECTED]) wrote:
  $ LC_ALL=C gpg --keyserver keyring.debian.org --recv-keys E145F334 
  gpg: no valid OpenPGP data found.
  gpg: Total number processed: 0
  
  This is the ID of my key, available from www.keyserver.net and signed by 2
  DD. Did I mess something up ?
 
 keyring.debian.org has only DDs in it.  I think people were suggesting
 using the public keyservers.  keyring.debian.org isn't a part of the
 public key servers.

That's the part of the system I was criticizing :)

  Shouldn't Debian make sure that work submition from non-DD contributor are
  signed, just like it does for the work submition from DD ?
 
 Interesting question.  While it's not a bad idea I don't see it as
 entirely necessary either.  At least when sponsoring a package the DD
 performing the sponsor must check everything regardless of if it was
 sent to them signed or not. 
[...]

Hey, guys, I begun the thread stating that I was mainly a translator and not
a packager.


Let's say that the test case here is that I send a translation patch to
Wichert about dpkg, as I already did. I think that Wichert has no idea about
french, so he cannot review the meaning of my work. If he actually
understand some french, let's imagine I'm japaneese or whatever.


Of course, he can (and should) review the syntax of my po file (a badly
formated po file can easily let the application segfault by replacing %d by
%s in a printf format). msgfmt will warn him if I made such error.

Nevertheless, should he trust the meaning of my translation blindly? I mean,
it could contain offending material, and even unlegal material. I guess that
there will be someone to engage pursuits if dpkg subtly displayed racial
crime incitation, or so. 

I dunno in the states, but such things can bring you in jail for a bunch of
few months (if not years) in France. And it should be easy to insert illegal
material for the US in displayed text, thanks to your wonderfull anti
terrorist and digital right management acts...

Who will get sued in such situation? I guess Debian in first place, but if
I understand well, the whole identification process of the NM is exactly
about giving Debian the possibility to report the charges on the guilty
developper when sued, isn't it?


So, I ask again, shouldn't Debian check the real identity of contributors
when the maintainer is unable to check the material himself ?
If it's ok so, what is the big deal of asking the DD for having a trusted
key and signing the packages, anyway ?

I know about the public servers, but I was wondering why Debian make things
harder for the DD while it has the infrastructure to simplify their work.


Thanks for your time, Mt.

-- 
Failure is not an option.
It comes bundled with software.




Re: Debian Installation Goals (was: Happy Birthday)

2003-08-20 Thread Goswin von Brederlow
cobaco [EMAIL PROTECTED] writes:

 On 2003-08-19 21:14, Goswin von Brederlow wrote:
  cobaco [EMAIL PROTECTED] writes:
   On 2003-08-17 09:02, Goswin von Brederlow wrote:
As bad as it might be I would like to have a menu tree containing all
packages that can be configured and when you select one item a menu
would pop up with its configuration options.
 
   Package: configure-debian
 
  When is that used? At what stage?
 post-installation
 
  I'm talking about the selection of udebs and I certainly had no
  submenus with any images I managed to build.
 err, we were talking about package configuration, not package selection right?

Sort of both.

You select udebs for download, which should use tree menus and not a
flat list.

Then they add menu items to the main menu, which should be a tree too.

And thirdly after/during installing base you have the configure
options of the debs via debconf. A menu to change some values would be
nice there too. So you can answere only neccessary questions while
unpacking and then go and pocke some packages for more detailed
options.

  Let me guess. You first have to install the configure-debian.udeb?
  .oO( Which no newbie would ever find )
 true, you do need to install the package to use it, and yes the existence op 
 this package could(should?) be made clearer

Until your mail I had never heard of it. Gotta try it out.

MfG
Goswin




Re: Binaryless uploads

2003-08-20 Thread Manoj Srivastava
On Wed, 20 Aug 2003 10:04:40 -0400 (EDT), Jaldhar H Vyas
[EMAIL PROTECTED] said:  

 Ok.  Lets leave aside for a moment the .debs which would go into
 contrib or non-free so would have to be built seperately.  What

Whoa there. Are you telling me that webmin's orig.tar.gz that
 is in main contains non free material?

manoj
-- 
Football combines the worst elements of America: Mass violence
punctuated by committee meetings. Author Unknown
Manoj Srivastava   [EMAIL PROTECTED]  http://www.debian.org/%7Esrivasta/
1024R/C7261095 print CB D9 F4 12 68 07 E4 05  CC 2D 27 12 1D F5 E8 6E
1024D/BF24424C print 4966 F272 D093 B493 410B  924B 21BA DABB BF24 424C




Re: Proposal: make kernel install easier

2003-08-20 Thread Josh Lauricha
On Wed  10:51, Adam C Powell IV wrote:
 Greetings,
 
 Installing a new kernel package can be a bit of a pain, especially for
 newbies, what with hand-editing lilo.conf or config files for other
 bootloaders, from grub to yaboot/quik, aboot, palo, you name it.  Yes,
 the kernel-image postinst runs lilo, but lilo.conf is invariably out of
 date, so this is relatively useless except for upgrades.

Don't know about your system, but /vmlinuz and /vmlinuz.old always point
to the correct images and lilo.conf is set to use those by default. So,
whenever I upgrade the kernel this is all taken care of.

-- 


| Josh Lauricha|
| [EMAIL PROTECTED] |
| Bioinformatics, UCR  |
|--|


pgp4eCwekoLsj.pgp
Description: PGP signature


Re: Debian 10th birthday gear

2003-08-20 Thread Manoj Srivastava
Hi,

I would be interested in two of the steins, if I can make
 payment without jumping through too many hoops. What are my options?

manoj
-- 
A year spent in artificial intelligence is enough to make one believe
in God.
Manoj Srivastava   [EMAIL PROTECTED]  http://www.debian.org/%7Esrivasta/
1024R/C7261095 print CB D9 F4 12 68 07 E4 05  CC 2D 27 12 1D F5 E8 6E
1024D/BF24424C print 4966 F272 D093 B493 410B  924B 21BA DABB BF24 424C




Re: Bits from the RM

2003-08-20 Thread Steve Langasek
On Wed, Aug 20, 2003 at 04:34:18PM +0200, cobaco wrote:
  KDE3.2 doesn't miss the deadline by 7 days, it misses the deadline by
  almost two months:

  * October 15th
 Final, last-minute, low-risk bug fixes only

 Monday September 29th, 2003: Preparing Beta1
   The HEAD branch is tagged as Beta 1 and is frozen for nonurgent commits[1]

 is there any reason why stabilization of kde and stabilization of 
 kde-packaging can't be done in parallel?

Of course not; but you've missed the crucial difference between
stabilization of kde *packaging*, and stabilization of kde *packages*.
There is a great deal of testing that must be done with the packages /in
situ/ once they've been built, to ensure that they work well amid the
other software in Debian.  Moreover, Debian users exercise KDE packages
on a much wider range of hardware than KDE developers typically do
before release; there is simply some testing we can't do before packages
have been allowed to hit the archive, and the window between getting the
current KDE packages into testing (just in case), and getting KDE 3.2
pre packages into experimental/unstable, doesn't leave any margin for
error before the release.

-- 
Steve Langasek
postmodern programmer


pgpXIAMdhPg1V.pgp
Description: PGP signature


Re: non-DD contributors and the debian keyring

2003-08-20 Thread Martin Quinson
On Wed, Aug 20, 2003 at 11:03:32AM -0500, Steve Langasek wrote:
 On Wed, Aug 20, 2003 at 11:23:47AM +0200, Martin Quinson wrote:
  On Wed, Aug 20, 2003 at 06:46:34PM +1000, Martin Michlmayr wrote:
   * Goswin von Brederlow [EMAIL PROTECTED] [2003-08-20 10:31]:
 Martin Quinson [EMAIL PROTECTED] wrote:
  I just wondered if it would be possible for non-developper
  contributors to Debian to get their GPG key in the Debian 
  keyserver. 

You can also apply as a NM for translation work. You don't need to
maintaine a package or know much about the packaging system for
that. You get different taskskill tests.
   
  V I P   Martin Quinson [EMAIL PROTECTED]
 
  Exact. I *did* apply. I'm even pretty well advanced in the process.
 
  $ LC_ALL=C gpg --keyserver keyring.debian.org --recv-keys E145F334 
  gpg: no valid OpenPGP data found.
  gpg: Total number processed: 0
 
  This is the ID of my key, available from www.keyserver.net and signed by 2
  DD. Did I mess something up ?
 
  Shouldn't Debian make sure that work submition from non-DD contributor are
  signed, just like it does for the work submition from DD ?
 
 The keyring on keyring.debian.org is used directly as a means of
 authorizing people to a number of Debian resources, including the
 package upload queue and d-d-a.  Whether you agree with this design or
 not, it means that the Debian keyserver is not suitable for use as a
 general-purpose means of *authenticating* people.  For authenticating
 PGP users to one another, you should use the usual Web of Trust to
 achieve this.

I have to confess my ignorance here. Since it seems to be 4 keyrings on that
server (according to /usr/share/doc/debian-keyring/README.gz at least), I
was wondering if it would be possible to add a 5th for the trusted
contributors not being DD.

I can well imagine that the debian-keyring.{gpg,pgp} is used to allow people
to upload packages and such and want certainly not to get into that ring
(yet -- I'm in the NM process). But I was dreaming of such trust facility
for non DD contributors.


Another point is that it would constitute a strong signal to non DD
contributors: They would be trusted by Debian. According to the cathedral
and the bazzar, that's the way it should be if not too technically
difficult...


Thanks, Mt.

-- 
The unavoidable price of reliability is simplicity.
--Hoare




Re: Bits from the RM

2003-08-20 Thread Martin Quinson
On Wed, Aug 20, 2003 at 11:08:28AM +0200, cobaco wrote:
 On 2003-08-20 10:13, Chris Cheney wrote:
  On Wed, Aug 20, 2003 at 09:49:03AM +0200, Adrian von Bidder wrote:
 
   On Tuesday 19 August 2003 08:49, Anthony Towns wrote:
I'm all for aggressive goals, let's aim for sometime in December -- how
about 2003-12-01 00:00:00 UTC?
 
   Do you have some Official Opinion(tm)[1] as the RM about what KDE, gcc,
   X, gnome versions will be in sarge?
 
  KDE 3.1.4   (KDE 2.2 _will not_ stay in sarge!)
 
 kde 3.2  release is slated for 8th december[1], is there any chance we'll 
 wait 
 for it, just so the outdated kde label doesn't apply again immediately after 
 release?

What recent change in the KDE releasing schema let you think that they will
manage to get a really stable x.y.0 release [*] when it seems like it took 4
minor releases in the 3.1 branch ?

Naturally, no offense intended to the kde guys. Needing only 4 minor releases
to stabilize such an amount of code is really great.


Bye, Mt.

[*] ie, suitable for debian stable release, ie a version with which you
could live for a year on your desktop, maybe dreaming of new features (we
always want more), but not pesting against the bugs.
I speak of course of the ideal debian stable release ;)

-- 
Testing can only prove the presence of bugs. 
--- Dijkstra




Re: Binaryless uploads [Was: FTBFS: architecture all packages]

2003-08-20 Thread Goswin von Brederlow
Jaldhar H. Vyas [EMAIL PROTECTED] writes:

 On Wed, 20 Aug 2003, Goswin von Brederlow wrote:
 
  The only problem with that is the current failure to comply to policy,
  i.e. build from source as they should.
 
 
 The question remains is simply removing all the extra source from
 webmin-n.orig.tar.gz except that which is necessary to build the webmin
 binary package (i.e not any of the modules which will have their own
 source and binary packages) an aceptable solution to the problem or not?

From what I read in this thread webmin-n.orig.tar.gz also contains
some non-free sources, right?

Then you have no choice but split it up to get the rest into main. And
when you don't have a pristine upstream orig.tar.gz you can split it
up as far as you like or need to.

MfG
Goswin




Network Associates Webshield - e-mail Content Alert

2003-08-20 Thread viruscheck
Network Associates WebShield SMTP V4.5 MR1a on mailvwy01 intercepted a mail from
debian-devel@lists.debian.org which caused the Content Filter Block PIF 
Attachments to
be triggered.




Re: Proposal: make kernel install easier

2003-08-20 Thread Goswin von Brederlow
Adam C Powell IV [EMAIL PROTECTED] writes:

 Greetings,
 
 Installing a new kernel package can be a bit of a pain, especially for
 newbies, what with hand-editing lilo.conf or config files for other
 bootloaders, from grub to yaboot/quik, aboot, palo, you name it.  Yes,
 the kernel-image postinst runs lilo, but lilo.conf is invariably out of
 date, so this is relatively useless except for upgrades.
 
 So why not (optionally) automate the process a bit?  Use a directory
 e.g. /usr/lib/bootloaders/ to put scripts for managing the .conf files
 and running the bootloaders.

I believe lilo and grub already have that.

From /boot/grub/menu.lst

### BEGIN AUTOMAGIC KERNELS LIST
## lines between the AUTOMAGIC KERNELS LIST markers will be modified
## by the debian update-grub script except for the default optons below

There is also a mechanism in dpkg to install hooks now which is
hopefully already used to run update-grub.

MfG
Goswin




Re: ftp.gnu.org cracked

2003-08-20 Thread Matt Zimmerman
On Wed, Aug 20, 2003 at 04:25:31PM +0100, Scott James Remnant wrote:

 [ Moved to debian-devel, I don't think this is relevant to private as
   the GNU crack is well publicised ]

It is, in general, very poor taste to make this choice for others by
reposting their content from a private forum to a public forum.  While I
agree that this should have begun on -devel in the first place, it didn't,
and I respected the privacy of those I quoted by following up to -private.

-- 
 - mdz




Re: Debian Weekly News - August 19th, 2003

2003-08-20 Thread Jamin W. Collins
On Wed, Aug 20, 2003 at 05:30:39PM +0200, J?r?me Marant wrote:
 Quoting Scott James Remnant [EMAIL PROTECTED]:
 
   No he wouldn't. FDL is about free documentation. :-)
   
  Except it isn't :-)
 
 According to you :-)

This has been covered to death already.  There are a sufficient number
of respondents that see it as non-free.  The RM's recent post indicates
that possibly the FSF has even come around to the idea that their
license is less than Free.  Can we please move along now?

-- 
Jamin W. Collins

Linux is not The Answer. Yes is the answer. Linux is The Question. - Neo




Re: Binaryless uploads [Was: FTBFS: architecture all packages]

2003-08-20 Thread Jaldhar H. Vyas
On Wed, 20 Aug 2003, Goswin von Brederlow wrote:

 The only problem with that is the current failure to comply to policy,
 i.e. build from source as they should.


The question remains is simply removing all the extra source from
webmin-n.orig.tar.gz except that which is necessary to build the webmin
binary package (i.e not any of the modules which will have their own
source and binary packages) an aceptable solution to the problem or not?


-- 
Jaldhar H. Vyas [EMAIL PROTECTED]
La Salle Debain - http://www.braincells.com/debian/




Re: ftp.gnu.org cracked

2003-08-20 Thread Peter Karlsson
Scott James Remnant:
No problem, this is only a quick run -- others may find ways to improve 
this script somewhat.
What did you use to determine which packages to check? I notice that at 
least my package for GNU jwhois is missing from your list (although I know 
that the Debian version is correct since I post the versions to Debian and 
ftp.gnu.org at the same time...).

--
\\//
Peter - http://www.softwolves.pp.se/
 I do not read or respond to mail with HTML attachments.



Re: Bits from the RM

2003-08-20 Thread Steve Langasek
On Wed, Aug 20, 2003 at 07:13:38PM +0200, Santiago Vila wrote:
 On Wed, 20 Aug 2003, Steve Langasek wrote:

  On Wed, Aug 20, 2003 at 03:52:42PM +0200, Santiago Vila wrote:
   Will we some day consider seriously the idea of autobuilders compiling
   against testing those packages which do not need libraries from
   unstable to be built?

  Do you foresee any reasons why using experimental for new library
  uploads wouldn't serve the same purpose?

 Yes, autobuilders do not build stuff from experimental, so it will
 hardly serve the same purpose as the current unstable, even if you
 convince a lot of users so that experimental is tested as much as
 unstable.

There was, however, talk of providing an easy interface to allow
requests for building.

I think this is a design that could be made to work.

-- 
Steve Langasek
postmodern programmer


pgp1rKf75MNOB.pgp
Description: PGP signature


Re: Bits from the RM

2003-08-20 Thread Jaldhar H. Vyas
On Wed, 20 Aug 2003, Russell Coker wrote:

 Are there any big features you expect from KDE 3.2?


Well it will be built with Qt 3.2 which has proper support of Indian
languages.

But if a KDE 3.2 beta or 3.1 built against Qt 3.2 goes in, that is good
enough for me.

-- 
Jaldhar H. Vyas [EMAIL PROTECTED]
La Salle Debain - http://www.braincells.com/debian/




Re: Debian Weekly News - August 19th, 2003

2003-08-20 Thread Peter S Galbraith
Jérôme Marant [EMAIL PROTECTED] wrote:

 Quoting Scott James Remnant [EMAIL PROTECTED]:
 
   No he wouldn't. FDL is about free documentation. :-)
   
  Except it isn't :-)
 
 According to you :-)

According to debian-legal consensus.




Re: Bits from the RM

2003-08-20 Thread Gunnar Wolf
cobaco dijo [Wed, Aug 20, 2003 at 11:08:28AM +0200]:
  KDE 3.1.4   (KDE 2.2 _will not_ stay in sarge!)
 
 kde 3.2  release is slated for 8th december[1], is there any chance we'll 
 wait 
 for it, just so the outdated kde label doesn't apply again immediately after 
 release?

...And then wait for some 4 months in order for KDE 3.2 not to have all
the bugs introduced by a freshly sent major version? And then, we would
not have an excuse for not including Gnome 2.4... But by the time we got
Gnome 2.4 in, we would have to include XFree 4.4 as well, and not
shipping with kernel 2.6 by default would seem odd. But by then, KDE 3.3
would be knocking the door...

Please, this is Debian. We do not need no shiny new versions of neither
${package} nor ${subsystem}.

Greetings,

-- 
Gunnar Wolf - [EMAIL PROTECTED] - (+52-55)5630-9700 ext. 1366
PGP key 1024D/8BB527AF 2001-10-23
Fingerprint: 0C79 D2D1 2C4E 9CE4 5973  F800 D80E F35A 8BB5 27AF




Re: what about ip's

2003-08-20 Thread Alan Shutko
David Smith [EMAIL PROTECTED] writes:

 my first assumption is that charter sells their users email addresses. does
 anyone on this list know how an unused email address that has never been
 used can have spam without the ip giving the address out?

Is it a fairly simple username, like dsmith?  Those can get caught by
spammers blindly sending to common usernames.

Now, if the username were something like hkja89ZJNhks8S12 and got
spammed, someone in the organization is probably selling usernames,
but it could just be a rogue employee.

-- 
Alan Shutko [EMAIL PROTECTED] - I am the rocks.
Women were made to be loved, not to be understood.




Re: Non-free software on linex [was Re: Debian Weekly News - August 19th, 2003]

2003-08-20 Thread Mike Hommey
On Wednesday 20 August 2003 20:13, Hans Ekbrand wrote:
 There's more of it: http://www.linex.org/sources/linex/debian/linex/
 lists acroread_4.05-3, mplayer_0.90pre5-3
 flashplugin-nonfree_6.0.79-1, hsflinmodem-linex_0.5.2-1

... and j2re, yes, I saw that afterwards...
Some are quite badly packaged, by the way...

Mike




Re: #206298 spip: prerm script blindly removes directories

2003-08-20 Thread Jamin W. Collins
On Wed, Aug 20, 2003 at 07:53:41PM +0200, Gaetan Ryckeboer wrote:

 Not necessary. Web administrators may upload files via FTP, andspip
 users  never use them onto spip ? If so, the files will stay in place
 in upload, instead of beeing integrated onto the spip tree at the
 right place, and being logged in the sql database.

In which case should you be deleting them?  I would say no.  While they
are in that directory, they are not used by spip and thus not really a
part of spip.  The user(s) put them there, when in doubt, leave them
there.
 
 Yes it needs. I've still moves documentation to usr/share/doc, instead
 of spip/ecrire/doc, but it is rather different with the cache and
 other application managed files.
 
 You may access the php files via apache, but php files may access to
 other php file, or static file. For instance, to modify the
 configuration, or read the cache.

Yes, symlinks are needed for direct file access (unless you patch the
source).  Sorry, when I stated symlinks weren't needed I meant on the
Apache side.  I've dealt with this exact problem in my packaging of
Media Mate (new name for Movie Mate).  I'm currently using symlinks to
allow the php script to access files by the paths they expect and Apache
Alias directives to allow http requests to get the files without
enabling symlink following.

 I accept. Please send me examples in private, if you found a way to
 move php files accessing each other (via include) in another
 directory, without patching the application.

I'll forward Media Mate's packaging over to you.

-- 
Jamin W. Collins

Remember, root always has a loaded gun.  Don't run around with it unless
you absolutely need it. -- Vineet Kumar




Re: non-DD contributors and the debian keyring

2003-08-20 Thread Martin Quinson
[answer to a private mail on the list with the permission of Christian]

On Wed, Aug 20, 2003 at 02:53:49PM +0200, Christian Kurz wrote:
 On [19/08/03 18:05], Martin Quinson wrote:
  point is that currently, DD is very very strict about who can upload to the
  source and the packages, but when I submit a translation to someone who do
  not speak french, he have to trust me.
 
 Well, but even if you are a DD, I would have to trust you and the
 translation that you provided. And for me that trust doesn't depend on
 the signature of the e-Mail that contained the translation. For me it
 doesn't matter if you send me a translation know, with your key signed
 or with your key in the debian-keyring. I will in both cases apply the
 same procedure before including the translation. 

Of course, the signature is not sufficient to get the needed trust. But I'm
coordinator of the french translation team since a few years, so my skills
should be trustable, I guess.

But the point is that without the key, anyone can forge mails which seem to
come from me, and thus abuse the trust my work gained me in the mind of some
DDs.

I see this point as necessary even if not sufficient.


That is to say that if I were DD, I would never trust any contribution I
cannot check myself and comming from someone I'm not confident in 1) the
identity 2) the skills. 

Judging from the amount of translation rotting in the BTS, I guess some of
you guys react the same way, and I want to change this by easing this trust
relationship, if possible.


Thanks for your time, Mt.

-- 
Hi! I'm a .signature virus! Copy me into your ~/.signature, please!




Re: Bits from the RM

2003-08-20 Thread Tefilo Ruiz Surez
El 20-ago-2003 a las 09:49:03, Adrian von Bidder escribió:
Content-Description: signed data
 On Tuesday 19 August 2003 08:49, Anthony Towns wrote:
 
  I'm all for aggressive goals, let's aim for sometime in December -- how
  about 2003-12-01 00:00:00 UTC?
 
 Do you have some Official Opinion(tm)[1] as the RM about what KDE, gcc, X, 
 gnome versions will be in sarge?

What about Apache? Should we change the apache2 package to apache?

This release will be a funny challenge, so, let's have fun :)

Regards,
-- 
Teófilo Ruiz Suárez  ||(teo)||  Sevilla, España 

  [EMAIL PROTECTED]   

GnuPG Key ID: 420718E6
FPR: 0280 862C 064B FA76 9A1C  EB64 5755 A66C 4207 18E6



pgpvE8A9WaZQn.pgp
Description: PGP signature


Re: FTBFS: architecture all packages

2003-08-20 Thread Adam Heath
On Wed, 20 Aug 2003, Matthias Urlichs wrote:

 Why not? Just block binary uploads completely, and let everything get
 built by the buildds. I certainly plan to do that with my own uploads.
 (I've already set up my own buildds).

 I'd go one step farther and schedule a low-priority rebuild of everything
 that build-depends on a package which gets updated.

How about this:

* Maintainer does normal build, doing -all and -arch debs.  Maintainer
  uploads.
* dak verifies upload as normal.
* dak adds new source to unstable, but not the debs.
* buildds then proceed to build new source.  one buildd is choosen to build
  the -all debs.




Re: non-DD contributors and the debian keyring

2003-08-20 Thread Martin Quinson
On Wed, Aug 20, 2003 at 05:03:17PM -0400, Stephen Frost wrote:
 * Martin Quinson ([EMAIL PROTECTED]) wrote:
  On Wed, Aug 20, 2003 at 09:40:02AM -0400, Stephen Frost wrote:
   keyring.debian.org has only DDs in it.  I think people were suggesting
   using the public keyservers.  keyring.debian.org isn't a part of the
   public key servers.
  
  That's the part of the system I was criticizing :)
 
 Not going to change.

Quite definitive answer.. Ok, I guess I got my answer and go back to work ;)
 
  Nevertheless, should he trust the meaning of my translation blindly? I mean,
  it could contain offending material, and even unlegal material. I guess that
  there will be someone to engage pursuits if dpkg subtly displayed racial
  crime incitation, or so. 
 
 To some extent that's what unstable is for.
Right

 I doubt a poor translation would make it into a released version.
A lot of poor translation get into stable, mainly by lack of manwork, but
you are right no offending translation gets into testing. At least in french.

  Who will get sued in such situation? I guess Debian in first place, but if
  I understand well, the whole identification process of the NM is exactly
  about giving Debian the possibility to report the charges on the guilty
  developper when sued, isn't it?
 
 Ehhh, I'm not sure I'd agree with that specifically, but whatever.

Mmm. If so, I really cannot understand the big deal with IDs when signing
the key. Knowing my ID is not enough to prove that I won't upload a rootkit,
and it is not even needed... I must be perticulary dumb.

 Honestly I see there being a very big difference between having rude
 things done in a translation and, for example, having packages which
 install rootkits.  Sorry, that's just life.

Sure. Who said the contrary ? I said that really broken translation can lead
to issues, too (type 'Y' to erase/list the content of your home dir ;).  
I never said that it was the most important point in Debian. I'm not *that*
dumb ;)

  I know about the public servers, but I was wondering why Debian make things
  harder for the DD while it has the infrastructure to simplify their work.
 
 What is harder for the DD and how could the existing Debian
 infrastructure fix that?  Nothing in what you've said would lead me to
 believe that there's something we can change which would make things
 easier for the DD with regard to 'poor' translations.

The whole story is about easing the technical issue in a trust relationship.

Of course, I could (and have) uploaded my key on public servers, meaning
that other Debian member could check than a given mail with my address
desserve the trust they habitually give me. But those guys would have to 
configure their email specifically on people like me[*]. I was wondering if
could be avoided, that's all.

A really great improvement of this situation would be to make easily
available the keys of people in the NM queue, since translators are supposed
to become debian developer, too.


But, ok, if the majority here says that there would not be sufficient
benefit wrt the effort, I guess I'll have to deal with it. Easy :)


Thanks for your time, and sorry for preventing you fixing bugs.
Mt.

[*] Yeah, I use my personal example because of my borken non-native english,
to ease my sentences and have a little chance to get them right, But in
fact, we are a whole bunch in my situation.

-- 
Und auch jetzt ist ein Mensch mehr Affe als irgend ein Affe.
  --- F. Nietzsche




Re: Proposal: make kernel install easier

2003-08-20 Thread Manoj Srivastava
On 20 Aug 2003 10:51:54 -0400, Adam C Powell IV [EMAIL PROTECTED] said: 

 Greetings, Installing a new kernel package can be a bit of a pain,
 especially for newbies, what with hand-editing lilo.conf or config

Why on earth are you hand editing the lilo.conf file for every
 kernel image? The postinst already manages two symlinks for you that
 can be in the lilo.conf file. 

If you have to hand edit lilo.conf for every kernel image, you
are doing something wrong.


For the clever, you can manage any number of symlinks
 automatically for yourselves; the latest kernel-package gives
 an example of creating a set of symlinks for 2.4 kerels, another set
 for 2.5 kernels, and so on.

 files for other bootloaders, from grub

Another bad example. For grub you do not need to muck around
 with symlinks at all, you have update-grub, and again, the
 kernel-package package gives examples on how to use this script.

 to yaboot/quik, aboot, palo,
 you name it.  Yes, the kernel-image postinst runs lilo, but
 lilo.conf is invariably out of date, so this is relatively useless
 except for upgrades.

Rubbish. It is not our of date at all, as long as you have
 written it corectly, and to be compatible with the image postinst.

 So why not (optionally) automate the process a bit?  Use a directory
 e.g. /usr/lib/bootloaders/ to put scripts for managing the .conf
 files and running the bootloaders.

 For example, quik could have debconf questions: Manage quik.conf
 using debconf? and Install new kernels automatically? and perhaps
 Global kernel option defaults (though perhaps this would be better
 outside of each individual bootloader).  Then each kernel package
 would have a low- to med-priority debconf question asking with what
 options to boot the kernel starting from global defaults.  It could
 also ask whether to make this image top priority in the .conf, and
 what name string to use for this image.  Also, quik could Provide
 virtual package bootloader which kernel-image packages could
 Suggest.

Bloat. You have not yet demonstrated a need that can't be met
 with the current infrastructure (your examples are fraught with an
 ignorance of current practice).

 If there's interest (and no show-stoppers anyone can think of), I'll

Well, too late. There are show stoppers galore (lack of need
 for such bloat being just one of them).

 start writing patches to kernel-package, lilo, maybe even quik :-) --
 that is, unless someone else wants to, e.g. their maintainers.

Secondly, most of this creeping featurism does not belong in
 kernel-package proper, but should be off loaded to the hook scripts.

 [Please CC me in replies as I'm not subscribed.  And apologies if

In the old days, it was considered rude to ask questions on a
 forum when you were not subscribed.

 this has been brought up before; searches on lists.debian.org didn't turn up
 anything.]

It has not only been brought up, solutions have been found and
 have been implemented.


manoj
-- 
We were so poor we couldn't afford a watchdog.  If we heard a noise at
night, we'd bark ourselves. Crazy Jimmy
Manoj Srivastava   [EMAIL PROTECTED]  http://www.debian.org/%7Esrivasta/
1024R/C7261095 print CB D9 F4 12 68 07 E4 05  CC 2D 27 12 1D F5 E8 6E
1024D/BF24424C print 4966 F272 D093 B493 410B  924B 21BA DABB BF24 424C




ALERT: You may have sent a Virus

2003-08-20 Thread JARING E-Mail Virus Scanner

Dear debian-devel@lists.debian.org,

JARING E-Mail Virus Scanner has detected virus(es) in your e-mail attachment(s)

Original Date: Aug 21 02:56:50
Original Sender: debian-devel@lists.debian.org
Original To: [EMAIL PROTECTED]
Original Subject: Re: Your application 


Virus info:-

Attachname: h7KIumso01649 was infected with [EMAIL PROTECTED], 
and deleted


Thank you,

JARING E-Mail Virus Scanner ( http://www.jaring.my )




Re: Proposal: make kernel install easier

2003-08-20 Thread Adam C Powell IV
On Wed, 2003-08-20 at 14:25, Josh Lauricha wrote:
On Wed  10:51, Adam C Powell IV wrote:
 Greetings,
 
 Installing a new kernel package can be a bit of a pain, especially for
 newbies, what with hand-editing lilo.conf or config files for other
 bootloaders, from grub to yaboot/quik, aboot, palo, you name it.  Yes,
 the kernel-image postinst runs lilo, but lilo.conf is invariably out of
 date, so this is relatively useless except for upgrades.

Don't know about your system, but /vmlinuz and /vmlinuz.old always point
to the correct images and lilo.conf is set to use those by default. So,
whenever I upgrade the kernel this is all taken care of.

Not necessarily.  Ever removed a kernel?  Or tried to switch between
kernels with and without initrd.imgs?  (Or perhaps you don't use the
stock Debian 2.4 kernels...)

Zeen,
-- 
-Adam P.

GPG fingerprint: D54D 1AEE B11C CE9B A02B  C5DD 526F 01E8 564E E4B6

Welcome to the best software in the world today cafe!
http://lyre.mit.edu/~powell/The_Best_Stuff_In_The_World_Today_Cafe.ogg




Re: Bits from the RM

2003-08-20 Thread Chris Cheney
On Wed, Aug 20, 2003 at 04:34:18PM +0200, cobaco wrote:
  KDE3.2 doesn't miss the deadline by 7 days, it misses the deadline by
  almost two months:
 
  * October 15th
 Final, last-minute, low-risk bug fixes only
 
 Monday September 29th, 2003: Preparing Beta1
   The HEAD branch is tagged as Beta 1 and is frozen for nonurgent commits[1]
 
 is there any reason why stabilization of kde and stabilization of 
 kde-packaging can't be done in parallel?

Er you want the final version of KDE in stable to be a KDE 3.2 Beta 1
release? ;) It takes well more than 10 days on average for KDE to be
ready to migrate to sarge, esp with slow buildds such as m68k and mips.
And with KDE 3.2 Beta 1 releasing to packagers on Sept 29 it won't have
even finished building on the buildds much less waited the required 10
days by Oct 1.


Debian 3.1 Dates

Sept 1  Toolchain freeze.
Sept 15 Major package freeze.
Oct 1   Everything freezes(?)

Chris




Re: Binaryless uploads [Was: FTBFS: architecture all packages]

2003-08-20 Thread Jaldhar H. Vyas
On Wed, 20 Aug 2003, Goswin von Brederlow wrote:

 Jaldhar H. Vyas [EMAIL PROTECTED] writes:

  On Wed, 20 Aug 2003, Goswin von Brederlow wrote:
 
   The only problem with that is the current failure to comply to policy,
   i.e. build from source as they should.
  
 
  The question remains is simply removing all the extra source from
  webmin-n.orig.tar.gz except that which is necessary to build the webmin
  binary package (i.e not any of the modules which will have their own
  source and binary packages) an aceptable solution to the problem or not?

 From what I read in this thread webmin-n.orig.tar.gz also contains
 some non-free sources, right?


It has source for all the modules including the non-free ones.  However
the binary packages for those modules are built from seperate source
packages not this one.

 Then you have no choice but split it up to get the rest into main. And
 when you don't have a pristine upstream orig.tar.gz you can split it
 up as far as you like or need to.


The only reason for having the webmin.orig.tar.gz as it is was to provide
something approximating the upstream tarball. It sounds like I don't need
to bother about that.

-- 
Jaldhar H. Vyas [EMAIL PROTECTED]
La Salle Debain - http://www.braincells.com/debian/




Locales in display managers (Was: Re: Locales in init scripts (about gdm bug #147091))

2003-08-20 Thread Daniel Ruoso
Ok, but /etc/default/language is not created by the locales package
which does currently asks the system's default language, but saves it in
/etc/environment instead.

The question is:
Is it ok to a display manager source /etc/environment (at least until
another definition is made) into the init script?

Because that's the only way (except if init itself set the LANG
variable, or the locales package generate /etc/default/language) to get
the x login prompt using the system's default locale?

P.S.: This is an annoying bug that can be closed with a 1-line patch,
but it isn't because of this indefinition (See maintainer comments into
the bug history).

--daniel

Em Qua, 2003-08-20 às 07:53, Javier Fernández-Sanguino Peña escreveu:
 On Mon, Aug 18, 2003 at 12:19:03PM -0300, Daniel Ruoso wrote:
  Hi.
 (...)
  
  So, how to make the init scripts localized?
  
  What do you think?
  
 
 /etc/default/language? I believe this has been discussed previously, see 
 for example [1] and debian-boot [2]. 
 
 From briefly looking at redhat's redhat-config-language program (a GUI to
 setup precisely this) it seem they use /etc/sysconfig/i18n for this (is
 there also an /etc/sysconfig/language?) which gets sourced from scripts
 (lang.sh, lang.csh) in /etc/profile.d to setup the user's environment and
 by /etc/rc.d/init.d/functions which is incorporated by init.d programs.
 
 IMHO to get init scripts localized a similar (and policy mandated) set 
 of functions (including i18n/l10n) should be implemented. Locale 
 configuration (or boot-floopies/d-i for that matter) should then modify 
 those on admin's request.
 
 Regards
 
 Javi
 
 [1] www.debian.org/News/weekly/1999/27/mail
 [2] lists.debian.org/debian-boot/2001/debian-boot-200105/msg00667.html 
 -




Re: Proposal: make kernel install easier

2003-08-20 Thread Adam C Powell IV
On Wed, 2003-08-20 at 15:02, Goswin von Brederlow wrote:
Adam C Powell IV [EMAIL PROTECTED] writes:

 Greetings,
 
 Installing a new kernel package can be a bit of a pain, especially for
 newbies, what with hand-editing lilo.conf or config files for other
 bootloaders, from grub to yaboot/quik, aboot, palo, you name it.  Yes,
 the kernel-image postinst runs lilo, but lilo.conf is invariably out of
 date, so this is relatively useless except for upgrades.
 
 So why not (optionally) automate the process a bit?  Use a directory
 e.g. /usr/lib/bootloaders/ to put scripts for managing the .conf files
 and running the bootloaders.

I believe lilo and grub already have that.

From /boot/grub/menu.lst

### BEGIN AUTOMAGIC KERNELS LIST
## lines between the AUTOMAGIC KERNELS LIST markers will be modified
## by the debian update-grub script except for the default optons below

There is also a mechanism in dpkg to install hooks now which is
hopefully already used to run update-grub.

Cool, did not know.  I guess a hooks mechanism would be required for
unmodified kernel-image packages...

My proposed system would add user control of menu entry names/labels,
and finer-grained control of boot options (without editing the .conf
files), but these don't seem worth the overhead of such a system.

Is this documented somewhere, or should I just look at the latest lilo
and grub packages to see how to adapt this to other bootloaders?  It
would be nice if this were somewhat uniform (at least to the user)
across loaders and architectures.

Zeen,
-- 
-Adam P.

GPG fingerprint: D54D 1AEE B11C CE9B A02B  C5DD 526F 01E8 564E E4B6

Welcome to the best software in the world today cafe!
http://lyre.mit.edu/~powell/The_Best_Stuff_In_The_World_Today_Cafe.ogg




Re: Proposal: make kernel install easier

2003-08-20 Thread Adam C Powell IV
On Wed, 2003-08-20 at 14:46, Manoj Srivastava wrote:
On 20 Aug 2003 10:51:54 -0400, Adam C Powell IV [EMAIL PROTECTED] said: 

 Greetings, Installing a new kernel package can be a bit of a pain,
 especially for newbies, what with hand-editing lilo.conf or config

Why on earth are you hand editing the lilo.conf file for every
 kernel image? The postinst already manages two symlinks for you that
 can be in the lilo.conf file. 

If you have to hand edit lilo.conf for every kernel image, you
are doing something wrong.

See my reply to Josh Lauricha: kernel-image packages corrupt the
vmlinuz(.old) symlinks when removing a kernel, and switching between
kernels with and without initrd.img is not supported.

For the clever, you can manage any number of symlinks
 automatically for yourselves; the latest kernel-package gives
 an example of creating a set of symlinks for 2.4 kerels, another set
 for 2.5 kernels, and so on.

 files for other bootloaders, from grub

Another bad example. For grub you do not need to muck around
 with symlinks at all, you have update-grub, and again, the
 kernel-package package gives examples on how to use this script.

Then /usr/lib/bootloaders/grub would be very small and easy to write. 
My proposed mechanism would add finer-grained control of boot options
(e.g. apm=on for 2.2 kernels but not 2.4) and of menu entry
names/labels, with little additional coding.

 So why not (optionally) automate the process a bit?  Use a directory
 e.g. /usr/lib/bootloaders/ to put scripts for managing the .conf
 files and running the bootloaders.

 For example, quik could have debconf questions: Manage quik.conf
 using debconf? and Install new kernels automatically? and perhaps
 Global kernel option defaults (though perhaps this would be better
 outside of each individual bootloader).  Then each kernel package
 would have a low- to med-priority debconf question asking with what
 options to boot the kernel starting from global defaults.  It could
 also ask whether to make this image top priority in the .conf, and
 what name string to use for this image.  Also, quik could Provide
 virtual package bootloader which kernel-image packages could
 Suggest.

Bloat. You have not yet demonstrated a need that can't be met
 with the current infrastructure (your examples are fraught with an
 ignorance of current practice).

Please forgive me, I had not known that a newer version of quik had just
been uploaded which supports such features, and that's what I use to
boot my one fully-unstable machine (i.e. not just a chroot).

 If there's interest (and no show-stoppers anyone can think of), I'll

Well, too late. There are show stoppers galore (lack of need
 for such bloat being just one of them).

 start writing patches to kernel-package, lilo, maybe even quik :-) --
 that is, unless someone else wants to, e.g. their maintainers.

Secondly, most of this creeping featurism does not belong in
 kernel-package proper, but should be off loaded to the hook scripts.

Now that there are hook scripts, this makes some sense.  But if you
think about it for a few seconds, the bloat and creeping featurism
of the proposed bootloader scripts is no greater than that required for
hook scripts -- in fact, that's what they are (inspired by e.g.
update-cluster).

 [Please CC me in replies as I'm not subscribed.  And apologies if

In the old days, it was considered rude to ask questions on a
 forum when you were not subscribed.

Then I am glad I do not live in the old days.

 this has been brought up before; searches on lists.debian.org didn't turn 
up
 anything.]

It has not only been brought up, solutions have been found and
 have been implemented.

Again forgive me, I had not known these solutions had been applied to
aboot, quik, palo, etc.

Thank you for the kind and courteous reply,
-- 
-Adam P.

GPG fingerprint: D54D 1AEE B11C CE9B A02B  C5DD 526F 01E8 564E E4B6

Welcome to the best software in the world today cafe!
http://lyre.mit.edu/~powell/The_Best_Stuff_In_The_World_Today_Cafe.ogg




Bug#206477: ITP: libtunepimp -- MusicBrainz tagging library and simple tagger application

2003-08-20 Thread Robert Jordens
Package: wnpp
Version: unavailable; reported 2003-08-21
Severity: wishlist

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

* Package name: libtunepimp
  Version : 0.2.1
  Upstream Author : Robert Kaye [EMAIL PROTECTED]
* URL : ftp://ftp.musicbrainz.org/pub/musicbrainz/
* License : GPL2
  Description : MusicBrainz tagging library and simple tagger application

 Libtunepimp simplifies tagging your audio files with the correct data
 about artist, album and track title using the MusicBrainz infrastrucure.
 It works on top of libmusicbrainz and libraries to read audio in mp3
 files and ogg files.
 Included is tp_tagger, a simple example tagger application.


-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.2 (GNU/Linux)

iD8DBQE/Q/4ZHSjkv+Av7xERAq+8AJ9OvOJTwNINsfsfUzXxlxZAsBTN3wCfRea1
3ateDFz2qezmXTZZk8BK5S0=
=EONA
-END PGP SIGNATURE-




Re: Bug#205927: ITP: eggdrop -- Advanced IRC Robot

2003-08-20 Thread Ian Eure
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On Sunday August 17 2003 09:35 am, Peter Makholm wrote:
 Guilherme de S. Pastore [EMAIL PROTECTED] writes:
  * Package name: eggdrop
Version : 1.6.15
Upstream Author : EggHeads [EMAIL PROTECTED]
  * URL :
  ftp://ftp.eggheads.org/pub/eggdrop/source/1.6/eggdrop1.6.15.tar.gz *
  License : GPL
Description : Advanced IRC Robot
 
   Eggdrop is an IRC bot written in C. Eggdrop, being a bot, sits on a
  channel

 Seems to be packaged allready.

He's taking it over from me.

Guilherme, I believe that all you need to do is upload your package with your 
name in the Maintainer field of debian/control.

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.1 (GNU/Linux)

iD8DBQE/RAiYHJcvLJR6wWoRAk3mAKCOEnerAsFWI2SD065pI1bb7gInwACgoxuP
dPNJhspnj9j05ek0UsRoTYw=
=ICeZ
-END PGP SIGNATURE-




Re: ftp.gnu.org cracked

2003-08-20 Thread Joey Hess
Scott James Remnant wrote:
 No problem, this is only a quick run -- others may find ways to improve
 this script somewhat.

 !! xaos: xaos_3.0.orig.tar.gz NOT OK (e0e66a873b6d5193a79bc89345992d6b != 
 5a63c3b696821e5d5d566ad9da308117)

Diff shows the following differences:

[EMAIL PROTECTED]:~/tmpdiff -ur fsf/xaos-3.0 deb/XaoS-3.0
diff -ur fsf/xaos-3.0/src/include/xio.h deb/XaoS-3.0/src/include/xio.h
--- fsf/xaos-3.0/src/include/xio.h  1998-03-15 15:45:48.0 -0500
+++ deb/XaoS-3.0/src/include/xio.h  1998-03-04 16:49:12.0 -0500
@@ -10,8 +10,8 @@
   /*returns xio_file or XIO_FAILED in case it failed*/
 #define xio_ropen(fname) fopen(fname,r)
 #define xio_wopen(fname) fopen(fname,w)
-#define xio_rbopen(fname) fopen(fname,rb)
-#define xio_wbopen(fname) fopen(fname,wb)
+#define xio_rbopen(fname) fopen(fname,r)
+#define xio_wbopen(fname) fopen(fname,w)
   /*returns non zero in case of error*/
 #define xio_close(fname) fclose(fname)
 #define XIO_FAILED NULL

To complicate things, there is a third file, on sourceforge.net. This file,
XaoS-3.0.tar.gz, md5sums to fa26ce9805d4889174c891b334da6d09. Diff shows no
differences between it and the fsf version; inspection shows that they unpack
to different directories. Probably this tarball was repackaged to meet FSF
standards.

The original site I downloaded xaos from in 1998,
http://limax.paru.cas.cz/~hubicka/XaoS/ (and packaged as pristine source), is
no longer around. Probably the addition of the b's to the fopens happened
sometime after that, in a repackaged version of xaos. Since b has no effect
in Debian anyway, it's not worth thinking about anymore. :-)

-- 
see shy jo


pgpA1pU6JpwWQ.pgp
Description: PGP signature


vacation mail

2003-08-20 Thread vikasarora0011
mail recived




Your message was rejected because it contained a virus

2003-08-20 Thread web0002 . bjznet . com
Your message was rejected because it contained the file your_details.zip which 
contains a virus.

For more information on this virus please see 
http://securityresponse.symantec.com






Re: non-DD contributors and the debian keyring

2003-08-20 Thread Stephen Frost
* Martin Quinson ([EMAIL PROTECTED]) wrote:
 On Wed, Aug 20, 2003 at 09:40:02AM -0400, Stephen Frost wrote:
  keyring.debian.org has only DDs in it.  I think people were suggesting
  using the public keyservers.  keyring.debian.org isn't a part of the
  public key servers.
 
 That's the part of the system I was criticizing :)

Not going to change.

 Nevertheless, should he trust the meaning of my translation blindly? I mean,
 it could contain offending material, and even unlegal material. I guess that
 there will be someone to engage pursuits if dpkg subtly displayed racial
 crime incitation, or so. 

To some extent that's what unstable is for.  I doubt a poor
translation would make it into a released version.  Certainly not if we
actually start getting a sizable number of people using the translated
versions of things.  Unfortunately there really isn't a whole lot of
choice in the matter either.

 I dunno in the states, but such things can bring you in jail for a bunch of
 few months (if not years) in France. And it should be easy to insert illegal
 material for the US in displayed text, thanks to your wonderfull anti
 terrorist and digital right management acts...

I'm not sure it's as easy as you suggest but that's not really on the
topic anyway.

 Who will get sued in such situation? I guess Debian in first place, but if
 I understand well, the whole identification process of the NM is exactly
 about giving Debian the possibility to report the charges on the guilty
 developper when sued, isn't it?

Ehhh, I'm not sure I'd agree with that specifically, but whatever.

 So, I ask again, shouldn't Debian check the real identity of contributors
 when the maintainer is unable to check the material himself ?

Checking the identity doesn't really help in the situation you've
described.  If someone not in france submitted a translation patch that
had stuff which is illegal in france I doubt they'd be touched, even if
you could identify them.  Debian servers in France would be targeted and
the operators, not even the DDs, would be the ones who could get in 
trouble.

One could have similar concerns about the BTS due to the fact that it
displays emails sent to it.  This isn't really a new thing which makes
me not really worried about it in the end.

 If it's ok so, what is the big deal of asking the DD for having a trusted
 key and signing the packages, anyway ?

Honestly I see there being a very big difference between having rude
things done in a translation and, for example, having packages which
install rootkits.  Sorry, that's just life.

 I know about the public servers, but I was wondering why Debian make things
 harder for the DD while it has the infrastructure to simplify their work.

What is harder for the DD and how could the existing Debian
infrastructure fix that?  Nothing in what you've said would lead me to
believe that there's something we can change which would make things
easier for the DD with regard to 'poor' translations.

Stephen


pgpncY6hChw32.pgp
Description: PGP signature


Re: [RFC] Debian ruby policy (Re: Fw: Re: Ruby 1.8 transition plan; debian-ruby)

2003-08-20 Thread Joe Wreschnig
On Wed, 2003-08-20 at 12:53, Fumitoshi UKAI wrote:
 Joe Wreschnig [EMAIL PROTECTED]
  libtest-unit-ruby1.8 (- libtest-unit-ruby)

Actually, I now only maintain Test::Unit for Ruby 1.6. Since it became
included with 1.8, akira yamada maintains that version, and when 1.8 was
packaged I dropped support for 1.7 from my package.

I'll rename the 1.6 package appropriately, though, but I'll wait until
the Ruby/GTK packages are renamed (unless that's going to take a very
long time?)

 Currently, ruby upstream doesn't support such version independent module 
 path /usr/share/ruby in $LOAD_PATH. Should we modify ruby 1.8 or later 
 to support this?

I think so, but I'm open to suggestions about it. It does IMO make
packaging modules without C code much simpler. The downside is when a
major incompatibility happens (i.e. code that works correctly on more
than one version is impossible), but I believe this is a rare enough
case to ignore (AFAIK it's never happened).
-- 
Joe Wreschnig [EMAIL PROTECTED]


signature.asc
Description: This is a digitally signed message part


Re: non-DD contributors and the debian keyring

2003-08-20 Thread Stephen Frost
* Goswin von Brederlow ([EMAIL PROTECTED]) wrote:
 Usually the sponsor looks everything over so signing is not realy
 neccessary. Of cause if you have the same sponsor repeatetly he might
 want to just check your signature and sponsor the changes blindly
 knowing you did good work in the past.

This should never, ever, ever happen.  We have the NM process for a
reason and sponsoring things blindly goes completely around it.  If
you're having to alot of sponsoring from someone then I think the
appropriate action would be to drop a mail to the appropriate people
informing them of this.  If you point out the sponsored uploads you've
had to do and the additional work you're having to do which will be
removed once the NM becomes a DD I expect things might move a little
faster towards that.

Stephen


pgpa1esOztUcB.pgp
Description: PGP signature


Re: Proposal: make kernel install easier

2003-08-20 Thread Jamin W. Collins
On Wed, 2003-08-20 at 14:46, Manoj Srivastava wrote:
 On 20 Aug 2003 10:51:54 -0400, Adam C Powell IV said: 
 
  Greetings, Installing a new kernel package can be a bit of a pain,
  especially for newbies, what with hand-editing lilo.conf or config
 
 Why on earth are you hand editing the lilo.conf file for every kernel
 image?

Well, if they move from an installation kernel to a kernel-image
package, they have to add an entry for an initrd file.  After that, if
they upgrade to another kernel-image package and want to be able to use
both the new and the old they need to edit the old entry for an initrd
too.

-- 
Jamin W. Collins

Remember, root always has a loaded gun.  Don't run around with it unless
you absolutely need it. -- Vineet Kumar




Re: Bits from the RM

2003-08-20 Thread Branden Robinson
On Wed, Aug 20, 2003 at 03:13:11AM -0500, Chris Cheney wrote:
 On Wed, Aug 20, 2003 at 09:49:03AM +0200, Adrian von Bidder wrote:
  Do you have some Official Opinion(tm)[1] as the RM about what KDE, gcc, X, 
  gnome versions will be in sarge?
 
 An educated guess would produce:
[...]
 XFree 4.3.0   (Branden wants this to happen...)

If other people want it to happen as well, I need volunteers for the X
Strike Force.  I'm the only person doing significant commits lately.

Interested parties, please catch up on the last month's worth of traffic
to the debian-x mailing list to get a feel for the environment.

If you're not scared after that, please join the list and talk about
what you'd like to work on.

-- 
G. Branden Robinson|I must despise the world which does
Debian GNU/Linux   |not know that music is a higher
[EMAIL PROTECTED] |revelation than all wisdom and
http://people.debian.org/~branden/ |philosophy. -- Ludwig van Beethoven


pgpOkk6rvAf2U.pgp
Description: PGP signature


Packages-arch-specific

2003-08-20 Thread Aurelien Jarno
Hello,

One of my package (camstream) was removed from Packages-arch-specific more 
than one month ago in the CVS [1]. However, as the corresponding file on 
buildd.debian.org [2] is not updated, my package is still not built on 
architectures other than i386.

Could somebody with a root access on auric do a
cp /org/buildd.debian.org/web/quinn-diff/tmp/Packages-arch-specific 
/org/buildd.debian.org/web/quinn-diff
?

Thanks,
Aurelien

[1] http://cvs.debian.org/srcdep/Packages-arch-specific?cvsroot=dak
[2] http://buildd.debian.org/quinn-diff/Packages-arch-specific


pgpcWfzc79PA9.pgp
Description: PGP signature


Re: Bits from the RM

2003-08-20 Thread Chris Cheney
On Wed, Aug 20, 2003 at 08:49:44PM +0200, Martin Quinson wrote:
 What recent change in the KDE releasing schema let you think that they will
 manage to get a really stable x.y.0 release [*] when it seems like it took 4
 minor releases in the 3.1 branch ?
 
 Naturally, no offense intended to the kde guys. Needing only 4 minor releases
 to stabilize such an amount of code is really great.
 
 
 Bye, Mt.
 
 [*] ie, suitable for debian stable release, ie a version with which you
 could live for a year on your desktop, maybe dreaming of new features (we
 always want more), but not pesting against the bugs.
 I speak of course of the ideal debian stable release ;)

KDE usually releases new point releases about every two months until the
next major release happens. Then they only update for security related
bugs. It doesn't magically become stable after 4 releases.

Chris




Re: Bits from the RM

2003-08-20 Thread Colin Watson
On Wed, Aug 20, 2003 at 11:18:24AM -0600, Bruce Sass wrote:
 On Wed, 20 Aug 2003, cobaco wrote:
  I'd agree if there had been a rewrite of kdelibs or something, but
  kde 3.1 - 3.2 is evolutionary without big changes to what was
  already there.
 
 It does not take a big change to break software...
 e.g., openssh changed a message and the sftp kioslave broke
 http://bugs.kde.org/show_bug.cgi?id=51359

Not that I disagree with you, but frankly, the sftp kioslave was already
broken. It should never have been written to depend on 'ssh -v' output.

CHeers,

-- 
Colin Watson  [EMAIL PROTECTED]




Content violation

2003-08-20 Thread STAL-Gateway
Content violation found in email message.

From: debian-devel@lists.debian.org
To: [EMAIL PROTECTED]
Subject: Thank you!

Matching Subject: *thank you!*





Your message to Consume-thenet awaits moderator approval

2003-08-20 Thread consume-thenet-bounces
Your mail to 'Consume-thenet' with the subject

Re: Wicked screensaver

Is being held until the list moderator can review it for approval.

The reason it is being held:

Post by non-member to a members-only list

Either the message will get posted to the list, or you will receive
notification of the moderator's decision.  If you would like to cancel
this posting, please visit the following URL:


http://lists.consume.net/mailman/confirm/consume-thenet/a0ebfaa83c1a24e8eba7a5964deec76ef6882db6




Re: non-DD contributors and the debian keyring

2003-08-20 Thread Manoj Srivastava
On Wed, 20 Aug 2003 23:29:52 +0200, Martin Quinson [EMAIL PROTECTED] said: 

 But the point is that without the key, anyone can forge mails which
 seem to come from me, and thus abuse the trust my work gained me in
 the mind of some DDs.

So start signing your email. I'll download the key in I need
 to check wo you are -- and if your key has a DD sig on it, it is in
 the web of trust, once removed.

manoj
-- 
Dyslexics of the world, untie!
Manoj Srivastava   [EMAIL PROTECTED]  http://www.debian.org/%7Esrivasta/
1024R/C7261095 print CB D9 F4 12 68 07 E4 05  CC 2D 27 12 1D F5 E8 6E
1024D/BF24424C print 4966 F272 D093 B493 410B  924B 21BA DABB BF24 424C




Your message to Consume-thenet awaits moderator approval

2003-08-20 Thread consume-thenet-bounces
Your mail to 'Consume-thenet' with the subject

Re: Wicked screensaver

Is being held until the list moderator can review it for approval.

The reason it is being held:

Post by non-member to a members-only list

Either the message will get posted to the list, or you will receive
notification of the moderator's decision.  If you would like to cancel
this posting, please visit the following URL:


http://lists.consume.net/mailman/confirm/consume-thenet/8dfc3e54932d47d26bdc95b2abf36989fd96f339




Re: ftp.gnu.org cracked

2003-08-20 Thread Scott James Remnant
On Wed, 2003-08-20 at 20:16, Peter Karlsson wrote:

 Scott James Remnant:
 
  No problem, this is only a quick run -- others may find ways to improve 
  this script somewhat.
 
 What did you use to determine which packages to check? I notice that at 
 least my package for GNU jwhois is missing from your list (although I know 
 that the Debian version is correct since I post the versions to Debian and 
 ftp.gnu.org at the same time...).
 
If you read the script, you'll see it just checks what it can find.  The
only MD5 sums that GNU have provided are for 2.4, 2.4.1 and 2.4.2

Scott
-- 
Have you ever, ever felt like this?
Had strange things happen?  Are you going round the twist?


signature.asc
Description: This is a digitally signed message part


Re: Proposal: make kernel install easier

2003-08-20 Thread Manoj Srivastava
On 20 Aug 2003 15:39:18 -0400, Adam C Powell IV [EMAIL PROTECTED] said: 

 On Wed, 2003-08-20 at 15:02, Goswin von Brederlow wrote:
 Adam C Powell IV [EMAIL PROTECTED] writes:

 Greetings,

 Installing a new kernel package can be a bit of a pain, especially
 for newbies, what with hand-editing lilo.conf or config files for
 other bootloaders, from grub to yaboot/quik, aboot, palo, you name
 it.  Yes, the kernel-image postinst runs lilo, but lilo.conf is
 invariably out of date, so this is relatively useless except for
 upgrades.

 So why not (optionally) automate the process a bit?  Use a
 directory e.g. /usr/lib/bootloaders/ to put scripts for managing
 the .conf files and running the bootloaders.

 I believe lilo and grub already have that.

 From /boot/grub/menu.lst

 BEGIN AUTOMAGIC KERNELS LIST
 lines between the AUTOMAGIC KERNELS LIST markers will be modified
 by the debian update-grub script except for the default optons
 below

 There is also a mechanism in dpkg to install hooks now which is
 hopefully already used to run update-grub.

 Cool, did not know.  I guess a hooks mechanism would be required
 for unmodified kernel-image packages...

*Sigh*. There already is one implemented.

 My proposed system would add user control of menu entry
 names/labels, and finer-grained control of boot options (without
 editing the .conf files), but these don't seem worth the overhead of
 such a system.

You can do this without needing to modify kernel-package
 itself. 

 Is this documented somewhere, or should I just look at the latest
 lilo and grub packages to see how to adapt this to other
 bootloaders?  It would be nice if this were somewhat uniform (at
 least to the user) across loaders and architectures.

If ti is feasible at all (and I have no idea if it would be),
 the hooks mechanism in kernel-package should enable you to do this as
 a third party package.

manoj

-- 
To YOU I'm an atheist; to God, I'm the Loyal Opposition. Woody Allen
Manoj Srivastava   [EMAIL PROTECTED]  http://www.debian.org/%7Esrivasta/
1024R/C7261095 print CB D9 F4 12 68 07 E4 05  CC 2D 27 12 1D F5 E8 6E
1024D/BF24424C print 4966 F272 D093 B493 410B  924B 21BA DABB BF24 424C




Re: Binaryless uploads

2003-08-20 Thread Manoj Srivastava
On Wed, 20 Aug 2003 15:03:15 -0400 (EDT), Jaldhar H Vyas [EMAIL PROTECTED] 
said: 

 It has source for all the modules including the non-free ones.
 However the binary packages for those modules are built from
 seperate source packages not this one.

 The only reason for having the webmin.orig.tar.gz as it is was to
 provide something approximating the upstream tarball. It sounds like
 I don't need to bother about that.

Since the source goes into Debian main, keeping the sources
 together means that we are distributing non-free material in Debian
 main, which not only violates the social contract, it may well be
 illegal (or have people who distribute debnian CD's indulge in
 illegal activity), depending on how non free the non free bits are. 

This needs be corrected ASAP, and a bug needs be filed on
 ftp.debian.org to have the old sources, containing the non-fee bits,
 be removed from main.

manoj
-- 
We don't really understand it, so we'll give it to the programmers.
Manoj Srivastava   [EMAIL PROTECTED]  http://www.debian.org/%7Esrivasta/
1024R/C7261095 print CB D9 F4 12 68 07 E4 05  CC 2D 27 12 1D F5 E8 6E
1024D/BF24424C print 4966 F272 D093 B493 410B  924B 21BA DABB BF24 424C




Re: [rene@debian.org: Bug#205471: devscripts: running debuild could lead to deleting _all_ backup dirs/files on the system]

2003-08-20 Thread Aaron M. Ucko
Goswin von Brederlow [EMAIL PROTECTED] writes:

 I do have the following four cases:
 package
 package-version
 package-version.debian_version
 package-cvs

It should definitely allow package-upstreamver, since that's more or
less canonical.  However, generalizing a bit and simply checking that
the name of the directory starts with the name of the source package
would allow your other cases while still avoiding things like $HOME
(unless your username happens to match the package name, but that's
probably too much of a corner case to worry about).

BTW, no need to Cc: me.  (No big deal, though.)

-- 
Aaron M. Ucko, KB1CJC (amu at alum.mit.edu, ucko at debian.org)
Finger [EMAIL PROTECTED] (NOT a valid e-mail address) for more info.




Re: ftp.gnu.org cracked

2003-08-20 Thread Matt Zimmerman
On Wed, Aug 20, 2003 at 07:59:13PM -0400, Joey Hess wrote:

 Since b has no effect in Debian anyway, it's not worth thinking about
 anymore. :-)

...except to swear under our breath about upstreams who sneak in changes
without bumping the version number (I personally find this very annoying).

-- 
 - mdz




Re: non-DD contributors and the debian keyring

2003-08-20 Thread Manoj Srivastava
On Thu, 21 Aug 2003 00:16:47 +0200, Martin Quinson [EMAIL PROTECTED] said: 

 Mmm. If so, I really cannot understand the big deal with IDs when
 signing the key. Knowing my ID is not enough to prove that I won't
 upload a rootkit, and it is not even needed... I must be perticulary
 dumb.

It is retaliation ;-). If your key has been signed, and
 identity known, we would know where to send the black helicopters.

 Of course, I could (and have) uploaded my key on public servers,
 meaning that other Debian member could check than a given mail with
 my address desserve the trust they habitually give me. But those
 guys would have to configure their email specifically on people like
 me[*]. I was wondering if could be avoided, that's all.

Umm, my MUA can download the keys from a keyserver all by
 itself, and verify the signature; until needed my trust is given to
 the owner of the key (as I said, the real world id is only needed for
 the pilot of the black helicopter).

manoj
-- 
Blessed is he who expects no gratitude, for he shall not be
disappointed. W.C. Bennett
Manoj Srivastava   [EMAIL PROTECTED]  http://www.debian.org/%7Esrivasta/
1024R/C7261095 print CB D9 F4 12 68 07 E4 05  CC 2D 27 12 1D F5 E8 6E
1024D/BF24424C print 4966 F272 D093 B493 410B  924B 21BA DABB BF24 424C




Re: Proposal: make kernel install easier

2003-08-20 Thread Manoj Srivastava
On 20 Aug 2003 16:04:50 -0400, Adam C Powell IV [EMAIL PROTECTED] said: 

 On Wed, 2003-08-20 at 14:46, Manoj Srivastava wrote:
 On 20 Aug 2003 10:51:54 -0400, Adam C Powell IV
 [EMAIL PROTECTED] said:

 Greetings, Installing a new kernel package can be a bit of a pain,
 especially for newbies, what with hand-editing lilo.conf or config

   Why on earth are you hand editing the lilo.conf file for every
  kernel image? The postinst already manages two symlinks for you
  that can be in the lilo.conf file.

   If you have to hand edit lilo.conf for every kernel image, you
   are doing something wrong.

 See my reply to Josh Lauricha: kernel-image packages corrupt the
 vmlinuz(.old) symlinks when removing a kernel, and switching between
 kernels with and without initrd.img is not supported.

You can replace the symlink handling of kernel-image packages
 on the target machine, without modifying kerel-package. And yes, lilo
 conf files can be tricky with the default symlink handling --- but
 the example postinstall hook script demonstrates that all this canm
 be handled exernally to kernel-image packages. 

   For the clever, you can manage any number of symlinks
  automatically for yourselves; the latest kernel-package gives
  an example of creating a set of symlinks for 2.4 kerels,
  another set for 2.5 kernels, and so on.

 files for other bootloaders, from grub

   Another bad example. For grub you do not need to muck around
  with symlinks at all, you have update-grub, and again, the
  kernel-package package gives examples on how to use this
  script.

 Then /usr/lib/bootloaders/grub would be very small and easy to
 write.  My proposed mechanism would add finer-grained control of
 boot options (e.g. apm=on for 2.2 kernels but not 2.4) and of menu
 entry names/labels, with little additional coding.

The apm=on for 2.2 kernels can already be handled (see the
 sample postinst hook script provided for hints). I suppose
 dynamically creating labels is desirable, but all this can be a light
 weight /usr/sbin/update-lilo-conf  script. 

 Please forgive me, I had not known that a newer version of quik had
 just been uploaded which supports such features, and that's what I
 use to boot my one fully-unstable machine (i.e. not just a chroot).

quik does not follow symlinks?

 Now that there are hook scripts, this makes some sense.  But if you
 think about it for a few seconds, the bloat and creeping
 featurism of the proposed bootloader scripts is no greater than
 that required for hook scripts -- in fact, that's what they are
 (inspired by e.g.  update-cluster).

I have no idea what update-cluster is, so I doubt if they were
 inspired by that (I am an emacs user, hooks are old hat to us). In
 any case, kernel-package alreasy impolements hooks.

The fact that you came in talking about patching
 kernel-package without even being aware of current capabilities is
 disheartening -- and leads one to suggest you look at what
 kernel-image postinst does before you create new solutions. 

   It has not only been brought up, solutions have been found and
  have been implemented.

 Again forgive me, I had not known these solutions had been applied
 to aboot, quik, palo, etc.

So do some research about what the postinst does already. If
 you want to create a third party set of scripts to handle updating
 various boot loaders, fine. But your use cases for such a change were
 ill chosen. 

 Thank you for the kind and courteous reply,

Thank you for the courtesy of researching the problemset
 before proposing solutions.

manoj
-- 
%DCL-MEM-BAD, bad memory VMS-F-PDGERS, pudding between the ears
Manoj Srivastava   [EMAIL PROTECTED]  http://www.debian.org/%7Esrivasta/
1024R/C7261095 print CB D9 F4 12 68 07 E4 05  CC 2D 27 12 1D F5 E8 6E
1024D/BF24424C print 4966 F272 D093 B493 410B  924B 21BA DABB BF24 424C




Re: python 2.2 - python 2.3 transition

2003-08-20 Thread Donovan Baarda
On Wed, 2003-08-20 at 15:49, Anthony Towns wrote:
 On Tue, Aug 19, 2003 at 11:44:22PM -0400, Derrick 'dman' Hudson wrote:
  The negative effect for the users is that you can't upgrade python
  while wxgtk-python is installed so you can't try out the
  latest-and-greatest python in the meantime.  This is the issue at
  hand.
 
 Sure you can:
 
   $ sudo apt-get install python2.3
 
 The dependency stuff merely notes that upgrading python without also
 upgrading wxgtk-python may break stuff.

actually, if the dependencies are right, you cannot upgrade to python
(2.3) without also upgrading to wxgtk-python (2.3) or de-installing
wxgtk-python (2.2).

There is a difference between break stuff and not installable :-)

When the dependencies are right, you can't break stuff, because a
broken combination is not installable.

if you can then the dependencies are wrong and you should file a
bug-report.

-- 
Donovan Baarda [EMAIL PROTECTED]




Accepted airsnort 0.2.2-3 (i386 source)

2003-08-20 Thread Noel Koethe
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Wed, 20 Aug 2003 08:29:00 +0200
Source: airsnort
Binary: airsnort
Architecture: source i386
Version: 0.2.2-3
Distribution: unstable
Urgency: low
Maintainer: Noel Koethe [EMAIL PROTECTED]
Changed-By: Noel Koethe [EMAIL PROTECTED]
Description: 
 airsnort   - WLAN sniffer
Closes: 202948
Changes: 
 airsnort (0.2.2-3) unstable; urgency=low
 .
   * installed missing manpages
 (closes: Bug#202948)
   * updated Standards-Version
Files: 
 0a93f568980b1d80d7158059026331ca 664 net optional airsnort_0.2.2-3.dsc
 9c31de2a59d2589f987df0a08c46281e 25151 net optional airsnort_0.2.2-3.diff.gz
 db584570f9b549e9c7eb417b8dbf8242 50218 net optional airsnort_0.2.2-3_i386.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.2 (GNU/Linux)

iD8DBQE/QxWv9/DnDzB9Vu0RAnrgAJ9hBjrwY1OUlt77KMGfg+ElbwySUwCfZBY+
VzyQBTHmvlHnWuMIVKq2N70=
=UH2O
-END PGP SIGNATURE-


Accepted:
airsnort_0.2.2-3.diff.gz
  to pool/main/a/airsnort/airsnort_0.2.2-3.diff.gz
airsnort_0.2.2-3.dsc
  to pool/main/a/airsnort/airsnort_0.2.2-3.dsc
airsnort_0.2.2-3_i386.deb
  to pool/main/a/airsnort/airsnort_0.2.2-3_i386.deb


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Accepted kernel-patch-2.4-lsm 2003.08.13-2 (all source)

2003-08-20 Thread Russell Coker
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Wed, 20 Aug 2003 16:49:00 +1000
Source: kernel-patch-2.4-lsm
Binary: kernel-patch-2.4-lsm
Architecture: source all
Version: 2003.08.13-2
Distribution: unstable
Urgency: low
Maintainer: Russell Coker [EMAIL PROTECTED]
Changed-By: Russell Coker [EMAIL PROTECTED]
Description: 
 kernel-patch-2.4-lsm - lsm-full kernel patch - Linux Security Modules
Changes: 
 kernel-patch-2.4-lsm (2003.08.13-2) unstable; urgency=low
 .
   * Added patch for new-style SE Linux.
Files: 
 7944a95a9855124912ba9f981d3ffc85 560 devel extra kernel-patch-2.4-lsm_2003.08.13-2.dsc
 a8f7d8424a7a23d85e0dc3fc54435b9b 992667 devel extra 
kernel-patch-2.4-lsm_2003.08.13-2.tar.gz
 bb76f1398ff753b3b5891407b465051c 998096 devel extra 
kernel-patch-2.4-lsm_2003.08.13-2_all.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.2 (GNU/Linux)

iD8DBQE/QxnwwrB5/PXHUlYRAhzQAJwMqcCOa+eIq9MHpasltZtsarj/gwCeLjNr
dZH2SlsKwkXC3lfOkP07vu4=
=q2Cg
-END PGP SIGNATURE-


Accepted:
kernel-patch-2.4-lsm_2003.08.13-2.dsc
  to pool/main/k/kernel-patch-2.4-lsm/kernel-patch-2.4-lsm_2003.08.13-2.dsc
kernel-patch-2.4-lsm_2003.08.13-2.tar.gz
  to pool/main/k/kernel-patch-2.4-lsm/kernel-patch-2.4-lsm_2003.08.13-2.tar.gz
kernel-patch-2.4-lsm_2003.08.13-2_all.deb
  to pool/main/k/kernel-patch-2.4-lsm/kernel-patch-2.4-lsm_2003.08.13-2_all.deb


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Accepted shadow 1:4.0.3-9 (i386 source)

2003-08-20 Thread Karl Ramm
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Wed, 20 Aug 2003 02:06:50 -0400
Source: shadow
Binary: login passwd
Architecture: source i386
Version: 1:4.0.3-9
Distribution: unstable
Urgency: low
Maintainer: Karl Ramm [EMAIL PROTECTED]
Changed-By: Karl Ramm [EMAIL PROTECTED]
Description: 
 login  - System login tools
 passwd - Change and administer password and group data.
Closes: 79682 94138 110228 118245 166798 171179 171808 183998 186016 196804 198729 
200052 200130 204578 205991
Changes: 
 shadow (1:4.0.3-9) unstable; urgency=low
 .
   * fix mysterious creeping bug in po/Makefile.in.in, closes: #200052
   * dutch debconf translation, closes: #204578
   * switch to po-debconf, closes: #183998, #200130
   * use automake1.7, closes: #205991
   * update german debconf translation, closes: #94138
   * I can't come up with a good justification as to why characters other
 than ':'s and '\0's should be disallowed in group and usernames (other
 than '-' as the leading character).  Thus, the maintenance tools don't
 anymore.  closes: #79682, #166798, #171179
   * Fix typo in /etc/pam.d/su. closes: #196804
   * danish debconf translation, closes: #118245
   * russian debconf translation, closes: #198729
   * And last, but not least, what's undoubtedly going to be the most
 popular change: md5 passwords are turned on by default, and there is
 no prompt to change them.  Yes, this is reduced functionality.  No, it
 can't go back in the way it was; the old code not only modified
 conffiles, it modified *other*packages* conffiles and was a massive
 policy violation.  I expect this change will motivate the people who
 have said that they will come up with a proper solution to do so.
 closes: #186016, #110228, #171808
Files: 
 5ce2a71d38aded2970d83d7123414c9a 1345 base required shadow_4.0.3-9.dsc
 321c5d650a6fddca59a3458e20aa05d1 227610 base required shadow_4.0.3-9.diff.gz
 f8fed31336e952d7745ed0e06ff750c9 428522 base required passwd_4.0.3-9_i386.deb
 b3d40a452ce4056ffe63641a49789d05 254758 base required login_4.0.3-9_i386.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.2 (GNU/Linux)
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=LAFZ
-END PGP SIGNATURE-


Accepted:
login_4.0.3-9_i386.deb
  to pool/main/s/shadow/login_4.0.3-9_i386.deb
passwd_4.0.3-9_i386.deb
  to pool/main/s/shadow/passwd_4.0.3-9_i386.deb
shadow_4.0.3-9.diff.gz
  to pool/main/s/shadow/shadow_4.0.3-9.diff.gz
shadow_4.0.3-9.dsc
  to pool/main/s/shadow/shadow_4.0.3-9.dsc


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Accepted sbuild 0.27 (all source)

2003-08-20 Thread Francesco Paolo Lovergine
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Wed, 20 Aug 2003 09:03:41 +0200
Source: sbuild
Binary: sbuild
Architecture: source all
Version: 0.27
Distribution: unstable
Urgency: low
Maintainer: Francesco Paolo Lovergine [EMAIL PROTECTED]
Changed-By: Francesco Paolo Lovergine [EMAIL PROTECTED]
Description: 
 sbuild - Tool for building Debian binary packages from Debian sources
Closes: 206270
Changes: 
 sbuild (0.27) unstable; urgency=low
 .
   * sg is not available in hurd, removed in postinst and postrm (patch by Michael 
Banck).
(closes: #206270)
Files: 
 0096bc675077cb71dd461b38be5d7050 547 devel extra sbuild_0.27.dsc
 e1ad617294146fb753798a429d2c7307 51628 devel extra sbuild_0.27.tar.gz
 fa8feb053ec72f46e6beb09a49a3da7e 55998 devel extra sbuild_0.27_all.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.2 (GNU/Linux)

iD8DBQE/QyA4pFNRmenyx0cRAsoBAJ0T2+ytPOqmb7WrdUGnR6hAotXW8QCeNpwh
EhpwuyybX6SGEYYwMt9MgyU=
=//4X
-END PGP SIGNATURE-


Accepted:
sbuild_0.27.dsc
  to pool/main/s/sbuild/sbuild_0.27.dsc
sbuild_0.27.tar.gz
  to pool/main/s/sbuild/sbuild_0.27.tar.gz
sbuild_0.27_all.deb
  to pool/main/s/sbuild/sbuild_0.27_all.deb


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Accepted yada 0.19 (all source)

2003-08-20 Thread Piotr Roszatycki
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Wed, 20 Aug 2003 10:29:28 +0200
Source: yada
Binary: yada-doc yada
Architecture: source all
Version: 0.19
Distribution: unstable
Urgency: medium
Maintainer: Piotr Roszatycki [EMAIL PROTECTED]
Changed-By: Piotr Roszatycki [EMAIL PROTECTED]
Description: 
 yada   - Yet Another Debianisation Aid
 yada-doc   - Yet Another Debianisation Aid - documentation and examples
Changes: 
 yada (0.19) unstable; urgency=medium
 .
   * Fixed problem with detecting of perl dynamically loaded modules.
 Only directories contained /auto/ are searched for *.so files.
   * Ignore missing directories when finding perl and python scripts.
Files: 
 d8f188369e138247c6f8f0944b89c0f3 523 devel optional yada_0.19.dsc
 4b398ebb4c16abe11ab18e32788685ed 126163 devel optional yada_0.19.tar.gz
 3504eb504aeb8671b95aeca37e5ab9dc 156922 devel optional yada-doc_0.19_all.deb
 4c6d94f92bf15742b68160b4365560f5 35270 devel optional yada_0.19_all.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.2 (GNU/Linux)

iD8DBQE/QzNehMHHe8CxClsRAiHyAKCnYbGiNu3IbxiBkkukEhWq0YkHIwCeMndM
athFz616kxE5YdyE0qFnNsM=
=Pyul
-END PGP SIGNATURE-


Accepted:
yada-doc_0.19_all.deb
  to pool/main/y/yada/yada-doc_0.19_all.deb
yada_0.19.dsc
  to pool/main/y/yada/yada_0.19.dsc
yada_0.19.tar.gz
  to pool/main/y/yada/yada_0.19.tar.gz
yada_0.19_all.deb
  to pool/main/y/yada/yada_0.19_all.deb


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Accepted w3mir 1:1.0.10-3 (all source)

2003-08-20 Thread Daniel Schepler
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Wed, 20 Aug 2003 01:31:11 -0700
Source: w3mir
Binary: w3mir
Architecture: source all
Version: 1:1.0.10-3
Distribution: unstable
Urgency: low
Maintainer: Debian QA Group [EMAIL PROTECTED]
Changed-By: Daniel Schepler [EMAIL PROTECTED]
Description: 
 w3mir  - w3mir is an all purpose HTTP copying and mirroring tool.
Closes: 190618
Changes: 
 w3mir (1:1.0.10-3) unstable; urgency=low
 .
   * QA upload.
   * Add Build-Depends-Indep on debhelper.  Closes: #190618.
   * Move perl modules to /usr/share/perl5.
Files: 
 37b9a627e3325eb8ac7cff51c1c10d7b 580 web optional w3mir_1.0.10-3.dsc
 dfcc8a11e02f052992131c54da1230c7 11435 web optional w3mir_1.0.10-3.diff.gz
 6b157974172c2003b9c764c8ebb3a032 99254 web optional w3mir_1.0.10-3_all.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.2 (GNU/Linux)

iD8DBQE/QzQsNC3LAyACFJARAqTcAJ4x2kUSB6otCNItw3gP++esC3jNgwCfV0kX
0nJQeXJWcEzNxhFUCCHuLEI=
=ex/c
-END PGP SIGNATURE-


Accepted:
w3mir_1.0.10-3.diff.gz
  to pool/main/w/w3mir/w3mir_1.0.10-3.diff.gz
w3mir_1.0.10-3.dsc
  to pool/main/w/w3mir/w3mir_1.0.10-3.dsc
w3mir_1.0.10-3_all.deb
  to pool/main/w/w3mir/w3mir_1.0.10-3_all.deb


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Accepted debootstrap 0.2.4 (i386 source)

2003-08-20 Thread J.H.M. Dassen (Ray)
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Wed, 20 Aug 2003 10:28:49 +0200
Source: debootstrap
Binary: debootstrap-udeb debootstrap
Architecture: source i386
Version: 0.2.4
Distribution: unstable
Urgency: low
Maintainer: J.H.M. Dassen (Ray) [EMAIL PROTECTED]
Changed-By: J.H.M. Dassen (Ray) [EMAIL PROTECTED]
Description: 
 debootstrap - Bootstrap a basic Debian system
 debootstrap-udeb - Bootstrap the Debian system (udeb)
Closes: 206142
Changes: 
 debootstrap (0.2.4) unstable; urgency=low
 .
   * [sid] Added coreutils' new predependencies libacl1 and libattr1.
   * [debian/README.Debian] Corrected example invocation. (Closes: #206142)
   * [debian/README.Debian] Fixed a typo.
Files: 
 16ecc4b3ba212ee179866d4fdc864b62 884 admin extra debootstrap_0.2.4.dsc
 fe6879343973ea28e98ab4757174e779 26422 admin extra debootstrap_0.2.4.tar.gz
 92a93494c9b9a9a5376661f5cfcfa5c8 6 debian-installer extra 
debootstrap-udeb_0.2.4_i386.udeb
 da371f6fa7554af5d5b8413f9934a890 58544 admin extra debootstrap_0.2.4_i386.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.2 (GNU/Linux)

iQEWAwUBP0M3KQxJU8feGmjHFALPRAP/ZO/zDnRpJoLwxrHsMi4XZJkOJhRfq1uZ
SXXyder6bivdgTCRH2XaOZ1XwPIkpjO5Zge974TeqylFRrEc1iRVJLBtiMYiLL2Z
r828+IoykVtfwvSNqYnYDR/VHTbPPXTZE1Tw0DGYEEPAEIgF0sa+qUjaGQg/ecyZ
DToRb3py9EED+I9i1jXebzqcDuoNNKZmJ2zq7fGB3oSgiaQjLwMYQVIoFYhLpavH
ZbnTXBUd8jzmDw8c28NClzwR+vWdao9X6GidMQd2OR8OSGZGa+BppPSJ4mB+aSei
Cs5hm351zB5C3lRqj5TlDJyD6upo8ouqNv0YrBwSYom48gqof6zjz7c=
=Dqm4
-END PGP SIGNATURE-


Accepted:
debootstrap-udeb_0.2.4_i386.udeb
  to pool/main/d/debootstrap/debootstrap-udeb_0.2.4_i386.udeb
debootstrap_0.2.4.dsc
  to pool/main/d/debootstrap/debootstrap_0.2.4.dsc
debootstrap_0.2.4.tar.gz
  to pool/main/d/debootstrap/debootstrap_0.2.4.tar.gz
debootstrap_0.2.4_i386.deb
  to pool/main/d/debootstrap/debootstrap_0.2.4_i386.deb


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Accepted freefem 3.5.7-2 (i386 source all)

2003-08-20 Thread Christophe Prud'homme
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Wed, 20 Aug 2003 10:38:31 +0200
Source: freefem
Binary: freefem-doc freefem libfreefem-dev libfreefem-doc libfreefem0 freefem-examples
Architecture: source i386 all
Version: 3.5.7-2
Distribution: unstable
Urgency: low
Maintainer: Christophe Prud'homme [EMAIL PROTECTED]
Changed-By: Christophe Prud'homme [EMAIL PROTECTED]
Description: 
 freefem- A PDE oriented language using Finite Element Method
 freefem-doc - Documentation for FreeFEM (html and pdf)
 freefem-examples - Example files for FreeFEM
 libfreefem-dev - Development library, header files and manpages
 libfreefem-doc - Documentation for FreeFEM development
 libfreefem0 - Shared libraries for FreeFEM
Closes: 205984
Changes: 
 freefem (3.5.7-2) unstable; urgency=low
 .
   * removed automake1.5 dependency thanks to Eric Dorland and Artur
 R. Czechowski for pointing this out. It was a remnant of an old build
 system. (closes: #205984)
   * update Standards-Version to 3.6.0.0
   * use dh_install instead of dh_movefile
   * freefem-examples depends on freefem and there is a link to the example
 in /usr/share/doc/freefem/examples .
Files: 
 ab1cb36709ed14b0f29a39e6c1fd303c 702 math optional freefem_3.5.7-2.dsc
 1ceb4c9eb8da2af4a5e0762c3d074811 825763 math optional freefem_3.5.7-2.tar.gz
 6c844f7e0ba75a7b8010281bd1d80412 298692 math optional freefem-doc_3.5.7-2_all.deb
 5bc82e6043a095a0ef77d0ea25f4ef55 12120 math optional freefem-examples_3.5.7-2_all.deb
 e1161b50cccb274bf7446fdc992f 42020 math optional libfreefem-doc_3.5.7-2_all.deb
 cb13ebd67a356166315ba834fdf1c7c8 8854 math optional freefem_3.5.7-2_i386.deb
 de22cea800d3f572942c88c28992fdef 101856 math optional libfreefem0_3.5.7-2_i386.deb
 3b9b69498b20437c3dc6f7812e34b87a 139232 math optional libfreefem-dev_3.5.7-2_i386.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.2 (GNU/Linux)

iD8DBQE/Qz+CoY+0C9S+FFARAm0uAJwLby2i7UIhQzuAVKNX57K/zQQWVQCfZeiA
d8n02nFaRBxy++BOS+sYet0=
=y769
-END PGP SIGNATURE-


Accepted:
freefem-doc_3.5.7-2_all.deb
  to pool/main/f/freefem/freefem-doc_3.5.7-2_all.deb
freefem-examples_3.5.7-2_all.deb
  to pool/main/f/freefem/freefem-examples_3.5.7-2_all.deb
freefem_3.5.7-2.dsc
  to pool/main/f/freefem/freefem_3.5.7-2.dsc
freefem_3.5.7-2.tar.gz
  to pool/main/f/freefem/freefem_3.5.7-2.tar.gz
freefem_3.5.7-2_i386.deb
  to pool/main/f/freefem/freefem_3.5.7-2_i386.deb
libfreefem-dev_3.5.7-2_i386.deb
  to pool/main/f/freefem/libfreefem-dev_3.5.7-2_i386.deb
libfreefem-doc_3.5.7-2_all.deb
  to pool/main/f/freefem/libfreefem-doc_3.5.7-2_all.deb
libfreefem0_3.5.7-2_i386.deb
  to pool/main/f/freefem/libfreefem0_3.5.7-2_i386.deb


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Accepted ksensors 0.7.2-8 (i386 source)

2003-08-20 Thread Aurelien Jarno
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Wed, 20 Aug 2003 11:24:53 +0200
Source: ksensors
Binary: ksensors
Architecture: source i386
Version: 0.7.2-8
Distribution: unstable
Urgency: low
Maintainer: Aurelien Jarno [EMAIL PROTECTED]
Changed-By: Aurelien Jarno [EMAIL PROTECTED]
Description: 
 ksensors   - lm-sensors frontend for KDE
Closes: 204919
Changes: 
 ksensors (0.7.2-8) unstable; urgency=low
 .
   * Added nl debconf translation. Thanks to Wessel Dankers. (Closes:
 bug#204919).
   * Bumped Standards-Version to 3.6.1.
Files: 
 a6b60ba703661253eaa155860994ed01 704 kde optional ksensors_0.7.2-8.dsc
 667044ccf78e47da9a9c23bf2bec6e5a 6915 kde optional ksensors_0.7.2-8.diff.gz
 212d68c82c970c6ff333457d040f4550 250030 kde optional ksensors_0.7.2-8_i386.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.2 (GNU/Linux)

iD8DBQE/Q0GJw3ao2vG823MRAncHAJ9i0kcZXINpPcSwhpES/K8+N9bATgCgj7dh
7syCxBGSqOBIRfKkdFH30QA=
=d2Sv
-END PGP SIGNATURE-


Accepted:
ksensors_0.7.2-8.diff.gz
  to pool/main/k/ksensors/ksensors_0.7.2-8.diff.gz
ksensors_0.7.2-8.dsc
  to pool/main/k/ksensors/ksensors_0.7.2-8.dsc
ksensors_0.7.2-8_i386.deb
  to pool/main/k/ksensors/ksensors_0.7.2-8_i386.deb


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Accepted popa3d 0.6.3-3 (i386 source)

2003-08-20 Thread eloy
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Wed, 20 Aug 2003 11:30:19 +0200
Source: popa3d
Binary: popa3d
Architecture: source i386
Version: 0.6.3-3
Distribution: unstable
Urgency: low
Maintainer: Krzysztof Krzyzaniak (eloy) [EMAIL PROTECTED]
Changed-By: Krzysztof Krzyzaniak (eloy) [EMAIL PROTECTED]
Description: 
 popa3d - A tiny POP3 daemon, designed with security as the primary goal
Closes: 205165
Changes: 
 popa3d (0.6.3-3) unstable; urgency=low
 .
   * Dutch translation of templates file was addes (closes: #205165). Thanks
 goes to Bart Cornelis [EMAIL PROTECTED].
   * debian/control - Standards-Version updated to version 3.6.0.0
Files: 
 b84be5a99c8d5be427cdcac19117db3e 585 mail extra popa3d_0.6.3-3.dsc
 96cce97216dbfe3f16c86c5a625cc4fd 7746 mail extra popa3d_0.6.3-3.diff.gz
 80d60148fd6221fbbfe0546d80d2a7ff 28572 mail extra popa3d_0.6.3-3_i386.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.2 (GNU/Linux)

iD8DBQE/Q0EM+NMfSd6w7DERAsKeAJ9ZbCOSN1KoZpsGsUQc3bB0EeaAygCfTt7s
e9wXAKpLVLEYPjP/OFc6J5c=
=gDAi
-END PGP SIGNATURE-


Accepted:
popa3d_0.6.3-3.diff.gz
  to pool/main/p/popa3d/popa3d_0.6.3-3.diff.gz
popa3d_0.6.3-3.dsc
  to pool/main/p/popa3d/popa3d_0.6.3-3.dsc
popa3d_0.6.3-3_i386.deb
  to pool/main/p/popa3d/popa3d_0.6.3-3_i386.deb


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Accepted swi-prolog 5.2.5-1 (i386 source)

2003-08-20 Thread Michael Piefel
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Tue, 19 Aug 2003 15:10:19 +0200
Source: swi-prolog
Binary: swi-prolog-sgml swi-prolog-table swi-prolog-clib swi-prolog-xpce swi-prolog
Architecture: source i386
Version: 5.2.5-1
Distribution: unstable
Urgency: low
Maintainer: Michael Piefel [EMAIL PROTECTED]
Changed-By: Michael Piefel [EMAIL PROTECTED]
Description: 
 swi-prolog - Prolog interpreter
 swi-prolog-clib - Interface to system library for SWI Prolog
 swi-prolog-sgml - SGML/XML/HTML parser for SWI Prolog
 swi-prolog-table - Managing external tables for SWI Prolog
 swi-prolog-xpce - GUI library for SWI Prolog
Closes: 186468 187005
Changes: 
 swi-prolog (5.2.5-1) unstable; urgency=low
 .
   * New upstream version
   * Merged the source packages for swi-prolog and swi-prolog-packages together
 again. The build process upstream uses finally doesn't
 build-install-build-install anymore.
   * debian/rules: rearranged for better autotools and DEB_BUILD_OPTIONS
   * debian/rules: got rid of *.dirs.in ugliness
   * Remove make call from XPCE postinst (closes: #186468)
   * Update library index for sgml and clib (closes: #187005)
Files: 
 2493c24d01b34c3a4be4d2b1061e8c93 720 interpreters optional swi-prolog_5.2.5-1.dsc
 388311f2382db8908c94c5eb762f26bd 7015970 interpreters optional 
swi-prolog_5.2.5.orig.tar.gz
 97307430b2ba7c5e8377ab9894d09d5e 9680 interpreters optional swi-prolog_5.2.5-1.diff.gz
 84b913bf77ee7839c2790b36990c75ec 1062708 interpreters optional 
swi-prolog_5.2.5-1_i386.deb
 412f1011c5f1f6afc9651744b412a1b4 2256264 interpreters optional 
swi-prolog-xpce_5.2.5-1_i386.deb
 5d191b51aa2e3a03928a345ca11a77ef 100124 interpreters optional 
swi-prolog-sgml_5.2.5-1_i386.deb
 46d095897c95c5f48f33a68983845adb 34210 interpreters optional 
swi-prolog-clib_5.2.5-1_i386.deb
 81bf34c98f62880fac7dae0c09fbac44 26740 interpreters optional 
swi-prolog-table_5.2.5-1_i386.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.2 (GNU/Linux)

iD8DBQE/Q0HSTXj5ne9DlpARAvJpAKCmv4bXXy4hHPYexu6cV4LnbYETGgCgkMqw
Sh0p11sSdKbamU5G7r12Cbg=
=6OCf
-END PGP SIGNATURE-


Accepted:
swi-prolog-clib_5.2.5-1_i386.deb
  to pool/main/s/swi-prolog/swi-prolog-clib_5.2.5-1_i386.deb
swi-prolog-sgml_5.2.5-1_i386.deb
  to pool/main/s/swi-prolog/swi-prolog-sgml_5.2.5-1_i386.deb
swi-prolog-table_5.2.5-1_i386.deb
  to pool/main/s/swi-prolog/swi-prolog-table_5.2.5-1_i386.deb
swi-prolog-xpce_5.2.5-1_i386.deb
  to pool/main/s/swi-prolog/swi-prolog-xpce_5.2.5-1_i386.deb
swi-prolog_5.2.5-1.diff.gz
  to pool/main/s/swi-prolog/swi-prolog_5.2.5-1.diff.gz
swi-prolog_5.2.5-1.dsc
  to pool/main/s/swi-prolog/swi-prolog_5.2.5-1.dsc
swi-prolog_5.2.5-1_i386.deb
  to pool/main/s/swi-prolog/swi-prolog_5.2.5-1_i386.deb
swi-prolog_5.2.5.orig.tar.gz
  to pool/main/s/swi-prolog/swi-prolog_5.2.5.orig.tar.gz


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Accepted icewm 1.2.11-1 (i386 source)

2003-08-20 Thread Eduard Bloch
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Tue, 19 Aug 2003 21:49:28 +0200
Source: icewm
Binary: icewm-gnome icewm icewm-lite icewm-gnome-support icewm-common 
icewm-experimental
Architecture: source i386
Version: 1.2.11-1
Distribution: unstable
Urgency: low
Maintainer: Jerome Marant [EMAIL PROTECTED]
Changed-By: Eduard Bloch [EMAIL PROTECTED]
Description: 
 icewm  - A wonderful Win95-OS/2-Motif-like window manager
 icewm-common - A wonderful Win95-OS/2-Motif-like window manager
 icewm-experimental - A wonderful Win95-OS/2-Motif-like window manager
 icewm-gnome - A wonderful Win95-OS/2-Motif-like window manager
 icewm-gnome-support - GNOME support files for IceWM
 icewm-lite - A wonderful Win95-OS/2-Motif-like window manager
Closes: 206189
Changes: 
 icewm (1.2.11-1) unstable; urgency=low
 .
   * New upstream release
 + fixes icewmbg on start invocation, closes: Bug#206189
   * Removed po-debconf from Build-Deps
Files: 
 a5810a08ff3f67e5bf783d0150df4e75 840 x11 optional icewm_1.2.11-1.dsc
 4aeb61b5c28e86edbbb8a8d360785010 836627 x11 optional icewm_1.2.11.orig.tar.gz
 df557f2127c6a9ee2f4599d030562290 34243 x11 optional icewm_1.2.11-1.diff.gz
 3d8b30a69499191042807a29a2519fe0 299710 x11 optional icewm-common_1.2.11-1_i386.deb
 369c4beae506875c280bdf49f1ba2ddf 397238 x11 optional icewm_1.2.11-1_i386.deb
 2798649a8ce7d77cbd64e6d1fd9ae747 5300 gnome optional icewm-gnome_1.2.11-1_i386.deb
 3e3ffc6a5999d25b048b895a13bfbbd6 15464 gnome optional 
icewm-gnome-support_1.2.11-1_i386.deb
 8aac92da937296f1c7ff9771e52bb347 242802 x11 optional icewm-lite_1.2.11-1_i386.deb
 30a7ed807052f7af458ce1aee889efca 436034 x11 optional 
icewm-experimental_1.2.11-1_i386.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.2 (GNU/Linux)

iD8DBQE/QzpJ4QZIHu3wCMURAhZqAJ0YvAvbc/5eQ+fWsj07yv+hxze7tQCfa04f
CVRVzLymQuXj8o9Wv0yef9s=
=1M/n
-END PGP SIGNATURE-


Accepted:
icewm-common_1.2.11-1_i386.deb
  to pool/main/i/icewm/icewm-common_1.2.11-1_i386.deb
icewm-experimental_1.2.11-1_i386.deb
  to pool/main/i/icewm/icewm-experimental_1.2.11-1_i386.deb
icewm-gnome-support_1.2.11-1_i386.deb
  to pool/main/i/icewm/icewm-gnome-support_1.2.11-1_i386.deb
icewm-gnome_1.2.11-1_i386.deb
  to pool/main/i/icewm/icewm-gnome_1.2.11-1_i386.deb
icewm-lite_1.2.11-1_i386.deb
  to pool/main/i/icewm/icewm-lite_1.2.11-1_i386.deb
icewm_1.2.11-1.diff.gz
  to pool/main/i/icewm/icewm_1.2.11-1.diff.gz
icewm_1.2.11-1.dsc
  to pool/main/i/icewm/icewm_1.2.11-1.dsc
icewm_1.2.11-1_i386.deb
  to pool/main/i/icewm/icewm_1.2.11-1_i386.deb
icewm_1.2.11.orig.tar.gz
  to pool/main/i/icewm/icewm_1.2.11.orig.tar.gz


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Accepted w3m 0.4.1-6 (i386 source)

2003-08-20 Thread Fumitoshi UKAI
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Wed, 20 Aug 2003 19:15:40 +0900
Source: w3m
Binary: w3m w3m-img
Architecture: source i386
Version: 0.4.1-6
Distribution: unstable
Urgency: low
Maintainer: Fumitoshi UKAI [EMAIL PROTECTED]
Changed-By: Fumitoshi UKAI [EMAIL PROTECTED]
Description: 
 w3m- WWW browsable pager with excellent tables/frames support
 w3m-img- inline image extension support utilities for w3m
Changes: 
 w3m (0.4.1-6) unstable; urgency=low
 .
   * rebuild with libgc-dev
   * build-depends: libgc6-dev = libgc-dev
Files: 
 8a75e799fb3caa0ba7c326672cfd111c 656 text optional w3m_0.4.1-6.dsc
 dac98ff58c27aaa3eabc64fd316023c6 31800 text optional w3m_0.4.1-6.diff.gz
 112d003b1e41a9b02c2937f9a4f26cad 680918 text optional w3m_0.4.1-6_i386.deb
 6ea76979acb5fa6cca9e147943f6482f 82346 text optional w3m-img_0.4.1-6_i386.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.2 (GNU/Linux)

iD8DBQE/Q0uL9D5yZjzIjAkRAiECAJoDqsbaoga4Y4UWimLvE85mmv/i/QCeIKJL
Y6AWJsK0mv+CdwNNKLUi/as=
=/PE1
-END PGP SIGNATURE-


Accepted:
w3m-img_0.4.1-6_i386.deb
  to pool/main/w/w3m/w3m-img_0.4.1-6_i386.deb
w3m_0.4.1-6.diff.gz
  to pool/main/w/w3m/w3m_0.4.1-6.diff.gz
w3m_0.4.1-6.dsc
  to pool/main/w/w3m/w3m_0.4.1-6.dsc
w3m_0.4.1-6_i386.deb
  to pool/main/w/w3m/w3m_0.4.1-6_i386.deb


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Accepted elk 3.0-16 (i386 source all)

2003-08-20 Thread Debian packages
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Wed, 20 Aug 2003 11:34:24 +0200
Source: elk
Binary: elkdoc elk
Architecture: source i386 all
Version: 3.0-16
Distribution: unstable
Urgency: low
Maintainer: Sam Hocevar (Debian packages) [EMAIL PROTECTED]
Changed-By: Sam Hocevar (Debian packages) [EMAIL PROTECTED]
Description: 
 elk- implementation of Scheme (the Extension Language Kit)
 elkdoc - documentation for the Extension Language Kit
Closes: 205645
Changes: 
 elk (3.0-16) unstable; urgency=low
 .
   * **/build: Use gcc to link shared objects instead of ld, because gcc does
 a lot of additional magic. Fixes the __canonicalize_funcptr_for_compare
 unresolved symbol on HPPA (Closes: #205645).
   * src/build: Make the build continue if debian/arch-config is not found.
   * debian/compat: Use this instead of DH_COMPAT.
Files: 
 b58d4693d89cc74c1cc17a0e414a585d 626 devel optional elk_3.0-16.dsc
 198c44a3f8c40ced456e4eb196f0b0ef 82106 devel optional elk_3.0-16.diff.gz
 13f7d70af437b10b554dc6b6ca014091 1043430 doc optional elkdoc_3.0-16_all.deb
 bd4eed67051bd557e4bc48c811ce294c 1335226 devel optional elk_3.0-16_i386.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.2 (GNU/Linux)

iD8DBQE/Q0d4fPP1rylJn2ERAr+9AKCtk20weD5vlyeppXmss2/qoRu4OQCfZYvZ
QvZU5M9sWS80XssTAMTO91s=
=jZEd
-END PGP SIGNATURE-


Accepted:
elk_3.0-16.diff.gz
  to pool/main/e/elk/elk_3.0-16.diff.gz
elk_3.0-16.dsc
  to pool/main/e/elk/elk_3.0-16.dsc
elk_3.0-16_i386.deb
  to pool/main/e/elk/elk_3.0-16_i386.deb
elkdoc_3.0-16_all.deb
  to pool/main/e/elk/elkdoc_3.0-16_all.deb


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Accepted w3mmee 0.3.p24.18-4 (i386 source)

2003-08-20 Thread Fumitoshi UKAI
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Wed, 20 Aug 2003 19:23:22 +0900
Source: w3mmee
Binary: w3mmee-img w3mmee
Architecture: source i386
Version: 0.3.p24.18-4
Distribution: unstable
Urgency: low
Maintainer: Fumitoshi UKAI [EMAIL PROTECTED]
Changed-By: Fumitoshi UKAI [EMAIL PROTECTED]
Description: 
 w3mmee - WWW browsable pager with excellent tables/frames, MB extension
 w3mmee-img - inline image extension support utilities for w3mmee
Changes: 
 w3mmee (0.3.p24.18-4) unstable; urgency=low
 .
   * rebuild with libgc-dev
   * build-depends: libgc6-dev = libgc-dev
   * main.c w3mbookmark.c w3mhelperpanel.c: no need to include gcmain.c
Files: 
 2f9afa8003a180e48feb884ea08150dc 693 web optional w3mmee_0.3.p24.18-4.dsc
 bffa7c343b69bf68b134272d4a3e6e36 12375 web optional w3mmee_0.3.p24.18-4.diff.gz
 fd2639ce0e64626e49f0ac97a5af7901 582912 web optional w3mmee_0.3.p24.18-4_i386.deb
 2b2770a89b05738920cc565bb948cecb 72068 web optional w3mmee-img_0.3.p24.18-4_i386.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.2 (GNU/Linux)

iD8DBQE/Q05q9D5yZjzIjAkRAs7eAJ9MO/PBix+LLXvjrYs8oqLNX2pOxACgmcWZ
9ZSyE9G+WTxRmOSSOGBHbMI=
=DjYF
-END PGP SIGNATURE-


Accepted:
w3mmee-img_0.3.p24.18-4_i386.deb
  to pool/main/w/w3mmee/w3mmee-img_0.3.p24.18-4_i386.deb
w3mmee_0.3.p24.18-4.diff.gz
  to pool/main/w/w3mmee/w3mmee_0.3.p24.18-4.diff.gz
w3mmee_0.3.p24.18-4.dsc
  to pool/main/w/w3mmee/w3mmee_0.3.p24.18-4.dsc
w3mmee_0.3.p24.18-4_i386.deb
  to pool/main/w/w3mmee/w3mmee_0.3.p24.18-4_i386.deb


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Accepted insight 5.3+cvs.2003.08.13-2 (i386 source)

2003-08-20 Thread Masayuki Hatta
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Wed, 20 Aug 2003 19:08:09 +0900
Source: insight
Binary: insight
Architecture: source i386
Version: 5.3+cvs.2003.08.13-2
Distribution: unstable
Urgency: low
Maintainer: Masayuki Hatta [EMAIL PROTECTED]
Changed-By: Masayuki Hatta [EMAIL PROTECTED]
Description: 
 insight- Graphical debugger based on GDB
Closes: 206235
Changes: 
 insight (5.3+cvs.2003.08.13-2) unstable; urgency=low
 .
   * Added Build-Depends: libncurses-dev - closes: #206235
Files: 
 7528fa6c6949387b0e444e48288bb2fa 680 devel optional insight_5.3+cvs.2003.08.13-2.dsc
 e049e72dcfc08763a99eeb2f9d32d439 8508 devel optional 
insight_5.3+cvs.2003.08.13-2.diff.gz
 37c7367306a30aef34680531f74578cb 1858314 devel optional 
insight_5.3+cvs.2003.08.13-2_i386.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.2 (GNU/Linux)

iD8DBQE/Q1OJvA5bJSX0Hx8RAi8eAKCTYH/Pr6yZfuA6Vec3whU3aSlcYACggNqC
04s5m4jvz98aC3Qj5EgYysA=
=wIPS
-END PGP SIGNATURE-


Accepted:
insight_5.3+cvs.2003.08.13-2.diff.gz
  to pool/main/i/insight/insight_5.3+cvs.2003.08.13-2.diff.gz
insight_5.3+cvs.2003.08.13-2.dsc
  to pool/main/i/insight/insight_5.3+cvs.2003.08.13-2.dsc
insight_5.3+cvs.2003.08.13-2_i386.deb
  to pool/main/i/insight/insight_5.3+cvs.2003.08.13-2_i386.deb


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Accepted ksensors 0.7.2-9 (i386 source)

2003-08-20 Thread Aurelien Jarno
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Wed, 20 Aug 2003 12:37:05 +0200
Source: ksensors
Binary: ksensors
Architecture: source i386
Version: 0.7.2-9
Distribution: unstable
Urgency: low
Maintainer: Aurelien Jarno [EMAIL PROTECTED]
Changed-By: Aurelien Jarno [EMAIL PROTECTED]
Description: 
 ksensors   - lm-sensors frontend for KDE
Changes: 
 ksensors (0.7.2-9) unstable; urgency=low
 .
   * The nl debconf translation is from Bart Cornelis and not Wessel
 Dankers. Updated the changelog. Sorry Bart.
Files: 
 27397073c6de619d36adf1b4f19605d0 704 kde optional ksensors_0.7.2-9.dsc
 a409f367d84159b4e7034ffc1d49974e 6979 kde optional ksensors_0.7.2-9.diff.gz
 26b2a2d7c2a595978a28b2ed87445f45 250092 kde optional ksensors_0.7.2-9_i386.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.2 (GNU/Linux)

iD8DBQE/Q1Juw3ao2vG823MRAlMsAJ92/z1biUURgr/4Yb5eNEyoCSeE9ACdGO8t
h+yLFC7SkfuZRMxBS7auFLg=
=Va/b
-END PGP SIGNATURE-


Accepted:
ksensors_0.7.2-9.diff.gz
  to pool/main/k/ksensors/ksensors_0.7.2-9.diff.gz
ksensors_0.7.2-9.dsc
  to pool/main/k/ksensors/ksensors_0.7.2-9.dsc
ksensors_0.7.2-9_i386.deb
  to pool/main/k/ksensors/ksensors_0.7.2-9_i386.deb


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Accepted ident2 1.03-7 (i386 source)

2003-08-20 Thread Rob Bradford
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Wed, 20 Aug 2003 10:37:59 +0100
Source: ident2
Binary: ident2
Architecture: source i386
Version: 1.03-7
Distribution: unstable
Urgency: low
Maintainer: Rob Bradford [EMAIL PROTECTED]
Changed-By: Rob Bradford [EMAIL PROTECTED]
Description: 
 ident2 - An advanced ident daemon
Closes: 206244 206247
Changes: 
 ident2 (1.03-7) unstable; urgency=low
 .
   * Modified the postrm's way for dealing with the inetd configuration
 (Closes: #206244,#206247).
Files: 
 c23eb8de9c074b9cf5bdd4c1f63dd940 557 net optional ident2_1.03-7.dsc
 152a8779493e3c3f57b0fc1b3534da4e 5157 net optional ident2_1.03-7.diff.gz
 fb6895e037c1c3cff545b8b2d33f 17386 net optional ident2_1.03-7_i386.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.2 (GNU/Linux)

iD8DBQE/Q00xCw8pKd+B7oMRAtvAAKCBlE8hkF42oOEWQ5wnMWFrP2N9EwCgv5Sw
IINNDWK+mn8xl/rbnLwve+A=
=9mAx
-END PGP SIGNATURE-


Accepted:
ident2_1.03-7.diff.gz
  to pool/main/i/ident2/ident2_1.03-7.diff.gz
ident2_1.03-7.dsc
  to pool/main/i/ident2/ident2_1.03-7.dsc
ident2_1.03-7_i386.deb
  to pool/main/i/ident2/ident2_1.03-7_i386.deb


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Accepted libsdl-sge 020904-2 (i386 source)

2003-08-20 Thread Julien Danjou
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Wed, 20 Aug 2003 13:15:36 +0200
Source: libsdl-sge
Binary: libsdl-sge-dev libsdl-sge
Architecture: source i386
Version: 020904-2
Distribution: unstable
Urgency: low
Maintainer: Julien Danjou [EMAIL PROTECTED]
Changed-By: Julien Danjou [EMAIL PROTECTED]
Description: 
 libsdl-sge - set of graphic functions that use SDL
 libsdl-sge-dev - development files for libsdl-sge
Changes: 
 libsdl-sge (020904-2) unstable; urgency=low
 .
   * Acknowledging NMU, thanks to Sam.
 This closes #190293, #190294, #190290
   * Set policy to 3.6.1.0
Files: 
 cdb42b7c95015c350e9cd021e0a569ff 646 - optional libsdl-sge_020904-2.dsc
 4524f4712eef2961ccf17aa347611ed8 3055 - optional libsdl-sge_020904-2.diff.gz
 be5967cc19667910065f73f590c8c5f0 49828 libs optional libsdl-sge_020904-2_i386.deb
 4495034f9e31ad1277a443d9f4978478 55126 libdevel optional 
libsdl-sge-dev_020904-2_i386.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.2 (GNU/Linux)

iD8DBQE/Q1hzpGK1HsL+5c0RAn5dAKCTjKijJPj7YQc27kC+7rQ38EegoACeMQkN
U5BbuwKdG9Gi8ZnerzbxhAw=
=W//p
-END PGP SIGNATURE-


Accepted:
libsdl-sge-dev_020904-2_i386.deb
  to pool/main/libs/libsdl-sge/libsdl-sge-dev_020904-2_i386.deb
libsdl-sge_020904-2.diff.gz
  to pool/main/libs/libsdl-sge/libsdl-sge_020904-2.diff.gz
libsdl-sge_020904-2.dsc
  to pool/main/libs/libsdl-sge/libsdl-sge_020904-2.dsc
libsdl-sge_020904-2_i386.deb
  to pool/main/libs/libsdl-sge/libsdl-sge_020904-2_i386.deb


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Accepted texfam 1.2.1-4 (i386 source all)

2003-08-20 Thread TSUCHIYA Masatoshi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Wed,  7 May 2003 13:07:39 +0900
Source: texfam
Binary: multex-bin jlatex209-bin jtex-bin
Architecture: source i386 all
Version: 1.2.1-4
Distribution: unstable
Urgency: low
Maintainer: TSUCHIYA Masatoshi [EMAIL PROTECTED]
Changed-By: TSUCHIYA Masatoshi [EMAIL PROTECTED]
Description: 
 jlatex209-bin - NTT Japanese LaTeX 2.09 command and configuration files
 jtex-bin   - NTT Japanese TeX binary files
 multex-bin - Multilingual TeX binary files
Closes: 191019
Changes: 
 texfam (1.2.1-4) unstable; urgency=low
 .
   * debian/jlatex209-bin.{postinst,postrm,prerm}: New files. (closes: #191019)
Files: 
 bf86dd4798cb7fc6bb2e124b276bc35c 635 tex optional texfam_1.2.1-4.dsc
 d046b73cc980f436d9650af1323572cf 19847 tex optional texfam_1.2.1-4.diff.gz
 5fd2fda24e9980311578e5ca18e34c88 5148 tex optional jlatex209-bin_1.9.1-4_all.deb
 722b17c58130d0b1dfba9e1635508fd4 149414 tex optional jtex-bin_1.9.1-4_i386.deb
 04498b95f9f6d23b8ffdabb5bb9731dd 147864 tex optional multex-bin_0.8.1-4_i386.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.2 (GNU/Linux)

iD8DBQE/Q1muvA5bJSX0Hx8RAudkAJ9caT/5LdUlnAWvkHExLtK2fMjFPQCfWYOs
LwrjKh892wwXv04fBzPBu90=
=0Hzb
-END PGP SIGNATURE-


Accepted:
jlatex209-bin_1.9.1-4_all.deb
  to pool/main/t/texfam/jlatex209-bin_1.9.1-4_all.deb
jtex-bin_1.9.1-4_i386.deb
  to pool/main/t/texfam/jtex-bin_1.9.1-4_i386.deb
multex-bin_0.8.1-4_i386.deb
  to pool/main/t/texfam/multex-bin_0.8.1-4_i386.deb
texfam_1.2.1-4.diff.gz
  to pool/main/t/texfam/texfam_1.2.1-4.diff.gz
texfam_1.2.1-4.dsc
  to pool/main/t/texfam/texfam_1.2.1-4.dsc


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Accepted ledstats 0.3-1 (i386 source)

2003-08-20 Thread Julien Danjou
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Wed, 20 Aug 2003 13:28:39 +0200
Source: ledstats
Binary: ledstats
Architecture: source i386
Version: 0.3-1
Distribution: unstable
Urgency: low
Maintainer: Julien Danjou [EMAIL PROTECTED]
Changed-By: Julien Danjou [EMAIL PROTECTED]
Description: 
 ledstats   - Show CPU usage on a LED device plugged on parallel port
Changes: 
 ledstats (0.3-1) unstable; urgency=low
 .
   * NMU ack
   * New upstream release
   * No more deps on a dev package !
   * Bump Standards-Version to 3.6.1.0
   * Include documentation about device (Closes, #186913)
Files: 
 c5b229c53e49e3ca89af9a465e96f0da 587 utils optional ledstats_0.3-1.dsc
 3d59e5e69f2ca132d4ff1b16389a8875 22794 utils optional ledstats_0.3.orig.tar.gz
 a1750daa57589ad7e1fc66821e2b049a 2724 utils optional ledstats_0.3-1.diff.gz
 3e633a0cabc92bd5e40c29304a10b4b3 5576 utils optional ledstats_0.3-1_i386.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.2 (GNU/Linux)

iD8DBQE/Q12UpGK1HsL+5c0RAoSkAKCxxOQnTgfPzILZqKNJOIf25RWuEQCeLzAv
D37BfEDQAt/s7Y7ZrlYaqfY=
=68Zh
-END PGP SIGNATURE-


Accepted:
ledstats_0.3-1.diff.gz
  to pool/main/l/ledstats/ledstats_0.3-1.diff.gz
ledstats_0.3-1.dsc
  to pool/main/l/ledstats/ledstats_0.3-1.dsc
ledstats_0.3-1_i386.deb
  to pool/main/l/ledstats/ledstats_0.3-1_i386.deb
ledstats_0.3.orig.tar.gz
  to pool/main/l/ledstats/ledstats_0.3.orig.tar.gz


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Accepted inn 1:1.7.2debian-23 (i386 source)

2003-08-20 Thread Marco d'Itri
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Wed, 20 Aug 2003 04:46:14 +0200
Source: inn
Binary: inn-dev inewsinn inn
Architecture: source i386
Version: 1:1.7.2debian-23
Distribution: unstable
Urgency: medium
Maintainer: Marco d'Itri [EMAIL PROTECTED]
Changed-By: Marco d'Itri [EMAIL PROTECTED]
Description: 
 inewsinn   - NNTP client news injector, from InterNetNews (INN)
 inn- News transport system `InterNetNews' by the ISC and Rich Salz
 inn-dev- The libinn.a library and manpages
Closes: 54975
Changes: 
 inn (1:1.7.2debian-23) unstable; urgency=medium
 .
   * Fixed the bug introduced in 1:1.7.2-14 by the path_audit patch which
 caused random segfaults when hosts.nntp was reloaded.
   * Fixed the innreport path in scanlogs.
   * Added support for a inewsport config file option. (Closes: #54975)
   * Remove /etc/news/crontab and add /etc/cron.d/inn.
   * Updated the default control.ctl from ftp.isc.org.
Files: 
 e5782bb5697bccd1a1b44747adb80fa5 625 news extra inn_1.7.2debian-23.dsc
 5114e6d4f0df7a956a7d16283f7b1c2b 175396 news extra inn_1.7.2debian-23.diff.gz
 641ef11cce44cfbec08c89009ddfbece 751214 news extra inn_1.7.2debian-23_i386.deb
 15e0345c92431e262009b5474e93a87f 36416 news extra inewsinn_1.7.2debian-23_i386.deb
 7861ce6bc16eb8c48421b1030d898557 58474 news extra inn-dev_1.7.2debian-23_i386.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.2 (GNU/Linux)

iD8DBQE/QuoPFGfw2OHuP7ERAnC2AJ9P/usFaM8Ez3p5gov9gmbKJMIkaACdE4it
BifJrH8oX4dOlMm3DWeup38=
=3HCR
-END PGP SIGNATURE-


Accepted:
inewsinn_1.7.2debian-23_i386.deb
  to pool/main/i/inn/inewsinn_1.7.2debian-23_i386.deb
inn-dev_1.7.2debian-23_i386.deb
  to pool/main/i/inn/inn-dev_1.7.2debian-23_i386.deb
inn_1.7.2debian-23.diff.gz
  to pool/main/i/inn/inn_1.7.2debian-23.diff.gz
inn_1.7.2debian-23.dsc
  to pool/main/i/inn/inn_1.7.2debian-23.dsc
inn_1.7.2debian-23_i386.deb
  to pool/main/i/inn/inn_1.7.2debian-23_i386.deb


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Accepted python-dns 2.3.0-5 (all source)

2003-08-20 Thread Joerg Wendland
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Wed, 20 Aug 2003 14:25:29 +0200
Source: python-dns
Binary: python-dns
Architecture: source all
Version: 2.3.0-5
Distribution: unstable
Urgency: low
Maintainer: Joerg Wendland [EMAIL PROTECTED]
Changed-By: Joerg Wendland [EMAIL PROTECTED]
Description: 
 python-dns - pydns - DNS client module for Python
Closes: 205884
Changes: 
 python-dns (2.3.0-5) unstable; urgency=low
 .
   * debian/control:
 Use ${python:Depends} for Depends, so that correct Depends are
 generated by dh_python. (closes: Bug#205884)
   * debian/python-dns.postinst
 debian/python-dns.prerm:
 Remove these files and let debhelper handle these issues.
Files: 
 fc9e044a5f09b1f05cee5ab0dc206829 598 python optional python-dns_2.3.0-5.dsc
 dd2613a53c37e2b83b63c342ce3b4c3e 1543 python optional python-dns_2.3.0-5.diff.gz
 f23e10a69930006cce5d9f83070607f3 21970 python optional python-dns_2.3.0-5_all.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.2 (GNU/Linux)

iD8DBQE/Q2l8V6N/vVHPhBcRAoQqAJ9goZZyNkni6t4C84aAuvGq+psbBQCdHDVq
QOAtyjpxGciB9RaJ9uNMXn8=
=o8zg
-END PGP SIGNATURE-


Accepted:
python-dns_2.3.0-5.diff.gz
  to pool/main/p/python-dns/python-dns_2.3.0-5.diff.gz
python-dns_2.3.0-5.dsc
  to pool/main/p/python-dns/python-dns_2.3.0-5.dsc
python-dns_2.3.0-5_all.deb
  to pool/main/p/python-dns/python-dns_2.3.0-5_all.deb


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Accepted libmusicbrainz-2.0 2.0.2-2 (i386 source)

2003-08-20 Thread Andreas Rottmann
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Wed, 13 Aug 2003 18:20:33 +0200
Source: libmusicbrainz-2.0
Binary: python2.3-musicbrainz python2.1-musicbrainz libmusicbrainz2 
libmusicbrainz2-dev python2.2-musicbrainz
Architecture: source i386
Version: 2.0.2-2
Distribution: unstable
Urgency: low
Maintainer: Andreas Rottmann [EMAIL PROTECTED]
Changed-By: Andreas Rottmann [EMAIL PROTECTED]
Description: 
 libmusicbrainz2 - Second generation incarnation of the CD Index - library
 libmusicbrainz2-dev - Second generation incarnation of the CD Index - development
 python2.1-musicbrainz - Second generation incarnation of the CD Index - library
 python2.2-musicbrainz - Second generation incarnation of the CD Index - library
 python2.3-musicbrainz - Second generation incarnation of the CD Index - library
Closes: 205227
Changes: 
 libmusicbrainz-2.0 (2.0.2-2) unstable; urgency=low
 .
   * Added missing build-dependency on python2.{1,2,3}-dev (closes: #205227).
Files: 
 f8380c2a7a5e4ac5cc8ae3445bac8a0d 756 libs optional libmusicbrainz-2.0_2.0.2-2.dsc
 a07cc5f5f66a2153310b5cae584f9094 6466 libs optional libmusicbrainz-2.0_2.0.2-2.diff.gz
 e57f62ef014f337cf3df0c7860ce3ccc 129076 libdevel optional 
libmusicbrainz2-dev_2.0.2-2_i386.deb
 f29f91b37be5f57c1598c3d6e89bd9a0 102724 libs optional libmusicbrainz2_2.0.2-2_i386.deb
 60eed6043352cd0034b1819f35b5b73b 20566 libs optional 
python2.1-musicbrainz_2.0.2-2_i386.deb
 8bda8d810d946c32924afef7d0d02611 20786 python optional 
python2.2-musicbrainz_2.0.2-2_i386.deb
 262bbcb81062767021a68efdad82768b 13666 python optional 
python2.3-musicbrainz_2.0.2-2_i386.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.2 (GNU/Linux)

iD8DBQE/OnK/+S/PxQH9W2IRAtmIAJ9uWZIKxgF5pUCc6Vnh26/d5biXrgCgi6Ph
pXY1PVbKtUzYq1przoUbMRw=
=BowC
-END PGP SIGNATURE-


Accepted:
libmusicbrainz-2.0_2.0.2-2.diff.gz
  to pool/main/libm/libmusicbrainz-2.0/libmusicbrainz-2.0_2.0.2-2.diff.gz
libmusicbrainz-2.0_2.0.2-2.dsc
  to pool/main/libm/libmusicbrainz-2.0/libmusicbrainz-2.0_2.0.2-2.dsc
libmusicbrainz2-dev_2.0.2-2_i386.deb
  to pool/main/libm/libmusicbrainz-2.0/libmusicbrainz2-dev_2.0.2-2_i386.deb
libmusicbrainz2_2.0.2-2_i386.deb
  to pool/main/libm/libmusicbrainz-2.0/libmusicbrainz2_2.0.2-2_i386.deb
python2.1-musicbrainz_2.0.2-2_i386.deb
  to pool/main/libm/libmusicbrainz-2.0/python2.1-musicbrainz_2.0.2-2_i386.deb
python2.2-musicbrainz_2.0.2-2_i386.deb
  to pool/main/libm/libmusicbrainz-2.0/python2.2-musicbrainz_2.0.2-2_i386.deb
python2.3-musicbrainz_2.0.2-2_i386.deb
  to pool/main/libm/libmusicbrainz-2.0/python2.3-musicbrainz_2.0.2-2_i386.deb


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Accepted vtk 4.2.2-1 (i386 source all)

2003-08-20 Thread A. Maitland Bottoms
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Wed, 20 Aug 2003 04:48:06 +
Source: vtk
Binary: python-vtk vtk-tcl vtk-doc libvtk4-dev libvtk4 vtk-examples
Architecture: source i386 all
Version: 4.2.2-1
Distribution: unstable
Urgency: low
Maintainer: A. Maitland Bottoms [EMAIL PROTECTED]
Changed-By: A. Maitland Bottoms [EMAIL PROTECTED]
Description: 
 libvtk4- Visualization Toolkit - A high level 3D visualization library
 libvtk4-dev - VTK header files for building C++ code
 python-vtk - Python bindings for VTK
 vtk-doc- VTK class reference documentation
 vtk-examples - C++, Tcl and Python example programs/scripts for VTK
 vtk-tcl- Tcl bindings for VTK
Changes: 
 vtk (4.2.2-1) unstable; urgency=low
 .
   * New upstream release
   * use soname fix_linkage from Gavin Baker [EMAIL PROTECTED]
   * build wiith python2.3
Files: 
 2b3eda2a0e81b35c2592864cc26e758e 847 graphics optional vtk_4.2.2-1.dsc
 8a2355ccdcfcc3b994346dd67212e39a 6179447 graphics optional vtk_4.2.2.orig.tar.gz
 c1245f406b87b9903ccbd4b97d620b12 43851 graphics optional vtk_4.2.2-1.diff.gz
 c7df1eaa9eefe0dda959d712510d1a20 24179484 doc optional vtk-doc_4.2.2-1_all.deb
 7a041ef918f0366c42257a454f52589f 322306 graphics optional vtk-examples_4.2.2-1_all.deb
 94ef566ad24067f6bd5f04f8cb2483fc 703622 devel optional libvtk4-dev_4.2.2-1_all.deb
 44a583b7fb7ff75599eecb6c5c16cd30 4583404 libs optional libvtk4_4.2.2-1_i386.deb
 69d8de0ffe9c8d4d66a5580e603df8dd 921378 interpreters optional vtk-tcl_4.2.2-1_i386.deb
 07edfe1f62efd6584c9d514b28e241e4 2062502 graphics optional python-vtk_4.2.2-1_i386.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.2 (GNU/Linux)

iD8DBQE/Q1R2kwbJvNrxBUwRAjqvAJ47WDFXzQM7gy/FF16534lOKW4HFACeLFDA
0IHHFRNU4dz6ncTj/mdYkV8=
=9T+9
-END PGP SIGNATURE-


Accepted:
libvtk4-dev_4.2.2-1_all.deb
  to pool/main/v/vtk/libvtk4-dev_4.2.2-1_all.deb
libvtk4_4.2.2-1_i386.deb
  to pool/main/v/vtk/libvtk4_4.2.2-1_i386.deb
python-vtk_4.2.2-1_i386.deb
  to pool/main/v/vtk/python-vtk_4.2.2-1_i386.deb
vtk-doc_4.2.2-1_all.deb
  to pool/main/v/vtk/vtk-doc_4.2.2-1_all.deb
vtk-examples_4.2.2-1_all.deb
  to pool/main/v/vtk/vtk-examples_4.2.2-1_all.deb
vtk-tcl_4.2.2-1_i386.deb
  to pool/main/v/vtk/vtk-tcl_4.2.2-1_i386.deb
vtk_4.2.2-1.diff.gz
  to pool/main/v/vtk/vtk_4.2.2-1.diff.gz
vtk_4.2.2-1.dsc
  to pool/main/v/vtk/vtk_4.2.2-1.dsc
vtk_4.2.2.orig.tar.gz
  to pool/main/v/vtk/vtk_4.2.2.orig.tar.gz


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Accepted apt-build 0.8.6 (all source)

2003-08-20 Thread Julien Danjou
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Wed, 20 Aug 2003 13:50:09 +0200
Source: apt-build
Binary: apt-build
Architecture: source all
Version: 0.8.6
Distribution: unstable
Urgency: low
Maintainer: Julien Danjou [EMAIL PROTECTED]
Changed-By: Julien Danjou [EMAIL PROTECTED]
Description: 
 apt-build  - Frontend to apt to build, optimize and install packages
Closes: 201987 203935
Changes: 
 apt-build (0.8.6) unstable; urgency=low
 .
   * Fix a postinst bug with zcat on new install
   * Include patch from Yindong Yu, it should closes: #201987, #203935
Files: 
 8003e60d32d35397f4553780d9cf3579 500 devel optional apt-build_0.8.6.dsc
 eaa5e4f745558262860494adb0ac5c16 18828 devel optional apt-build_0.8.6.tar.gz
 5105442f230cb4b7405c05459b652aac 17514 devel optional apt-build_0.8.6_all.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.2 (GNU/Linux)

iD8DBQE/Q2D/pGK1HsL+5c0RApcRAJ4otTo4alXQAExHZtNWtQGVKIHJYwCdEvoO
q/fIa6HvjLQLPd+6+5vX7cg=
=OmSL
-END PGP SIGNATURE-


Accepted:
apt-build_0.8.6.dsc
  to pool/main/a/apt-build/apt-build_0.8.6.dsc
apt-build_0.8.6.tar.gz
  to pool/main/a/apt-build/apt-build_0.8.6.tar.gz
apt-build_0.8.6_all.deb
  to pool/main/a/apt-build/apt-build_0.8.6_all.deb


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Accepted pointless 0.4-2 (i386 source)

2003-08-20 Thread Zufus
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Wed, 20 Aug 2003 11:14:53 +0200
Source: pointless
Binary: pointless
Architecture: source i386
Version: 0.4-2
Distribution: unstable
Urgency: low
Maintainer: Marco Presi (Zufus) [EMAIL PROTECTED]
Changed-By: Marco Presi (Zufus) [EMAIL PROTECTED]
Description: 
 pointless  - A presentation tool based on OpenGL
Changes: 
 pointless (0.4-2) unstable; urgency=low
 .
   * Simlinked /usr/share/pointless/pointlessrc to /etc/pointlessrc.
Files: 
 b31b56f1e01acb113fc5132a0f3cf536 682 misc optional pointless_0.4-2.dsc
 e52f42882fa07ac22193f60241d6327f 1001362 misc optional pointless_0.4-2.tar.gz
 fbc77ef693234b8c04d838ac21bca82c 487696 misc optional pointless_0.4-2_i386.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.2 (GNU/Linux)

iD8DBQE/Q2FLh0XdeHWCwhoRAovSAJ428cnpB5nGaYRVwaPBKJgW/dHpVwCePuR+
s08b877NOVkFszLBK8CYLkw=
=OK9T
-END PGP SIGNATURE-


Accepted:
pointless_0.4-2.dsc
  to pool/main/p/pointless/pointless_0.4-2.dsc
pointless_0.4-2.tar.gz
  to pool/main/p/pointless/pointless_0.4-2.tar.gz
pointless_0.4-2_i386.deb
  to pool/main/p/pointless/pointless_0.4-2_i386.deb


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Accepted sane-backends 1.0.12-7 (i386 source)

2003-08-20 Thread Julien BLACHE
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Wed, 20 Aug 2003 14:03:14 +0200
Source: sane-backends
Binary: libsane-dev sane-utils libsane
Architecture: source i386
Version: 1.0.12-7
Distribution: unstable
Urgency: low
Maintainer: Julien BLACHE [EMAIL PROTECTED]
Changed-By: Julien BLACHE [EMAIL PROTECTED]
Description: 
 libsane- API library for scanners
 libsane-dev - API development library for scanners [development files]
 sane-utils - API library for scanners -- utilities
Closes: 205291
Changes: 
 sane-backends (1.0.12-7) unstable; urgency=low
 .
   * The Maintainer's birthday release.
   * Simplified the needlessly complex debconf questions. Now use a multiselect
 question instead of 3 independent questions.
 + debian/libsane.templates: rewritten to use a multiselect type
 + debian/libsane.config: ditto, try to convert from the older questions,
   then purge them once done.
 + debian/libsane.postinst: rewritten to parse the answer from the new
   debconf thingy.
 + debian/control: now Depends: debconf (= 0.5.0) due to the use of db_fset
   in debian/libsane.config.
   * debian/libsane.postinst: use ':' as a separator for chown instead of '.'.
   * debian/libsane.README.Debian: ditto.
   * debian/control: only Suggests: hotplug (closes: #205291).
Files: 
 5487c73e505c6bd398d3d833e4de7995 833 graphics optional sane-backends_1.0.12-7.dsc
 16cce6dfc641aa45c62b3847ce5926b9 88857 graphics optional 
sane-backends_1.0.12-7.diff.gz
 2fd3755e6fe5babdb88488b61def86fc 92330 graphics optional sane-utils_1.0.12-7_i386.deb
 3918d2f3c23b3d470e95adbce676cc79 2139584 libs optional libsane_1.0.12-7_i386.deb
 7c402cb1750776ebec8ea50483ff6af3 1791016 libdevel optional 
libsane-dev_1.0.12-7_i386.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.2 (GNU/Linux)

iD8DBQE/Q2V6zWFP1/XWUWkRArk1AJ0XFJWBUVwfEJW0mJ2w1jsPtquh6gCfQEbl
6UPYxYuQGpJJXoTaNZeZkMc=
=6LCW
-END PGP SIGNATURE-


Accepted:
libsane-dev_1.0.12-7_i386.deb
  to pool/main/s/sane-backends/libsane-dev_1.0.12-7_i386.deb
libsane_1.0.12-7_i386.deb
  to pool/main/s/sane-backends/libsane_1.0.12-7_i386.deb
sane-backends_1.0.12-7.diff.gz
  to pool/main/s/sane-backends/sane-backends_1.0.12-7.diff.gz
sane-backends_1.0.12-7.dsc
  to pool/main/s/sane-backends/sane-backends_1.0.12-7.dsc
sane-utils_1.0.12-7_i386.deb
  to pool/main/s/sane-backends/sane-utils_1.0.12-7_i386.deb


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Accepted snack 2.2.2-2 (i386 source all)

2003-08-20 Thread David A. van Leeuwen
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Mon, 18 Aug 2003 21:03:01 +0200
Source: snack
Binary: libsnack2-doc libsnack2-dev libsnack2
Architecture: source all i386
Version: 2.2.2-2
Distribution: unstable
Urgency: low
Maintainer: David A. van Leeuwen [EMAIL PROTECTED]
Changed-By: David A. van Leeuwen [EMAIL PROTECTED]
Description: 
 libsnack2  - Sound functionality extension to the Tcl/Tk language
 libsnack2-dev - Snack development files
 libsnack2-doc - Snack documentation
Closes: 134397 144488 196635
Changes: 
 snack (2.2.2-2) unstable; urgency=low
 .
   * added a million of -a and -i's in debian/rules.  Sorry, but i find the
 mixed architecture dependen/indenpendent rules files not elegant. (closes: 
#196635)
   * 2.1.6-1 closed a lot of minor issues.  (closes: #144488)
   * Repeated short description in control file in -dev and -doc packages. (closes: 
#134397)
Files: 
 96b5cfb6c9ab2f64cc3e70d63de37dc1 614 sound optional snack_2.2.2-2.dsc
 b5761ca8c8ff53946db36911c589203e 1187329 sound optional snack_2.2.2-2.tar.gz
 daa0a84c1febd9e7cd99d70a0c2ee7cd 338868 libs optional libsnack2_2.2.2-2_i386.deb
 7de1fc3f4521f0f7bdddb4fb53915116 18754 devel optional libsnack2-dev_2.2.2-2_all.deb
 94318da23d73dee7ccb5aaaedecfedfa 216150 doc optional libsnack2-doc_2.2.2-2_all.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: For info see http://www.gnupg.org

iD8DBQE/Q2qQJrPWgQLzcTwRAjDJAKD2THpCZFYWlVSQZskBBE3kMbBpCwCfY1Uy
q2aEysoDRrvD6VQFlytutw4=
=SPMH
-END PGP SIGNATURE-


Accepted:
libsnack2-dev_2.2.2-2_all.deb
  to pool/main/s/snack/libsnack2-dev_2.2.2-2_all.deb
libsnack2-doc_2.2.2-2_all.deb
  to pool/main/s/snack/libsnack2-doc_2.2.2-2_all.deb
libsnack2_2.2.2-2_i386.deb
  to pool/main/s/snack/libsnack2_2.2.2-2_i386.deb
snack_2.2.2-2.dsc
  to pool/main/s/snack/snack_2.2.2-2.dsc
snack_2.2.2-2.tar.gz
  to pool/main/s/snack/snack_2.2.2-2.tar.gz


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Accepted ots 0.3.0+cvs.2003.07.27-2 (i386 source)

2003-08-20 Thread Masayuki Hatta
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Wed, 20 Aug 2003 21:49:05 +0900
Source: ots
Binary: libots-dev libots0
Architecture: source i386
Version: 0.3.0+cvs.2003.07.27-2
Distribution: unstable
Urgency: low
Maintainer: Masayuki Hatta [EMAIL PROTECTED]
Changed-By: Masayuki Hatta [EMAIL PROTECTED]
Description: 
 libots-dev - Open Text Summarizer (development)
 libots0- Open Text Summarizer (library)
Closes: 203772
Changes: 
 ots (0.3.0+cvs.2003.07.27-2) unstable; urgency=low
 .
   * Added Build-Depends: libpopt-dev - closes: #203772
Files: 
 e73d24d59584cb5372e340983af5ec3e 637 devel optional ots_0.3.0+cvs.2003.07.27-2.dsc
 f26aa65673e88ea81c6af44812910263 2491 devel optional 
ots_0.3.0+cvs.2003.07.27-2.diff.gz
 32866d3bb1cd93a2bc4ee2f58da5f768 17634 libdevel optional 
libots-dev_0.3.0+cvs.2003.07.27-2_i386.deb
 0e092b1b96ec9d47230f32e7bc8bde61 33014 libs optional 
libots0_0.3.0+cvs.2003.07.27-2_i386.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.2 (GNU/Linux)

iD8DBQE/Q27GvA5bJSX0Hx8RAvcrAJ422E4VIvfxDn5id2o6TatLOeNHJACfSTVi
L7kkefq/se+wziwvU4ss4GU=
=JoDi
-END PGP SIGNATURE-


Accepted:
libots-dev_0.3.0+cvs.2003.07.27-2_i386.deb
  to pool/main/o/ots/libots-dev_0.3.0+cvs.2003.07.27-2_i386.deb
libots0_0.3.0+cvs.2003.07.27-2_i386.deb
  to pool/main/o/ots/libots0_0.3.0+cvs.2003.07.27-2_i386.deb
ots_0.3.0+cvs.2003.07.27-2.diff.gz
  to pool/main/o/ots/ots_0.3.0+cvs.2003.07.27-2.diff.gz
ots_0.3.0+cvs.2003.07.27-2.dsc
  to pool/main/o/ots/ots_0.3.0+cvs.2003.07.27-2.dsc


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Accepted sapphire 0.15.8-3 (i386 source)

2003-08-20 Thread Chris Boyle
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Wed, 20 Aug 2003 13:19:34 +0100
Source: sapphire
Binary: sapphire
Architecture: source i386
Version: 0.15.8-3
Distribution: unstable
Urgency: low
Maintainer: Chris Boyle [EMAIL PROTECTED]
Changed-By: Chris Boyle [EMAIL PROTECTED]
Description: 
 sapphire   - A minimal but configurable X11R6 window manager
Closes: 182430
Changes: 
 sapphire (0.15.8-3) unstable; urgency=low
 .
   * Finished upstream's incomplete support for switching window
 managers, added a new wmexec menu item type, changed menu-method
 to use it instead of my half-assed kludge using skill sapphire.
 (closes: #182430)
   * Corrected version string in windowmanager.cc:30.
Files: 
 259a560089629c7fec0d10bb3f72d884 590 x11 optional sapphire_0.15.8-3.dsc
 39f5cbf0355b8a8f2382dbe4d042380d 27468 x11 optional sapphire_0.15.8-3.diff.gz
 0b566d3116cfce7577c6434899662762 56064 x11 optional sapphire_0.15.8-3_i386.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.2 (GNU/Linux)

iD8DBQE/Q2jtRi6ArLfYbg8RAkEkAKDRc3u4x+xn1/mDoyEOfIYRRbzOBwCfSg0d
E8qiZQS89p+km/m+glLLiHQ=
=+7ip
-END PGP SIGNATURE-


Accepted:
sapphire_0.15.8-3.diff.gz
  to pool/main/s/sapphire/sapphire_0.15.8-3.diff.gz
sapphire_0.15.8-3.dsc
  to pool/main/s/sapphire/sapphire_0.15.8-3.dsc
sapphire_0.15.8-3_i386.deb
  to pool/main/s/sapphire/sapphire_0.15.8-3_i386.deb


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



<    1   2   3   >