Le 27 mai 2012 03:12, Jon Bernard jbern...@debian.org a écrit :
* Charles Plessy ple...@debian.org wrote:
Hello everybody,
for one of the packages maintained by the pkg-eucalyptus team
(euca2ools), the
upstream source moved to GitHub, and we would like to try to maintain
the
Debian
On Sat, May 26, 2012 at 10:59:06PM -0400, Joey Hess wrote:
Adam Borowski wrote:
I think that box had jfs, but other filesystems are no different: for
example, ext* will fsync() during a rename() call behind your back even if
you don't request it, forcing every file to hit the disk platters
Your message dated Sun, 27 May 2012 10:28:03 +0200
with message-id 201205271028.04412.hol...@layer-acht.org
and subject line Re: Bug#674662: general: While closing the Run Command
application in kde desktop, its shadow remains after its closed.
has caused the Debian Bug report #674662,
regarding
On Sun, May 27, 2012 at 05:21:04AM +0300, Serge wrote:
2012/5/27 Adam Borowski wrote:
I think that box had jfs, but other filesystems are no different: for
example, ext* will fsync() during a rename() call behind your back even
if you don't request it, forcing every file to hit the disk
On Sat, 26 May 2012, Joey Hess wrote:
Henrique de Moraes Holschuh wrote:
In fact it is the other way. We have /var/tmp for the large file since
about forever, and important platforms that have /tmp in memory since the
early 2000's (Solaris)
And that STILL wasn't enough for people
On 05/27/2012 02:55 AM, Mike Hommey wrote:
I hope it isn't, because it's poor security. It's easy to read the
file from /proc/$pid/fd/$num
Mike
If you were to trust Adobe in terms of security, then you'd be the first
person I know to do so.
Jokes set apart, I believe that they just
On 05/27/2012 02:35 AM, François Bottin wrote:
My point is that I can't stand that the major point to not use tmpfs
is caused by a closed source software. If you think it is faulty, then
do not use it!
By the way, I can't reproduce your problem. That's probably due to the
fact that there is
On Sun, May 27, 2012 at 05:39:21AM +0300, Serge wrote:
2012/5/25 Iustin Pop wrote:
And no, I really can't think of any popular application is not a valid
discussion point.
But there're already popular applications and usecases that break because
of that. It can render the system
On Sat, 26 May 2012, Carlos Alberto Lopez Perez wrote:
So please, don't argue about theoretical things about virtual memory or
IO schedulers. If you are a desktop Linux user, you should know how ugly
the things get when the system is swapping.
Mine is not that annoying, but certainly not
On Sun, May 27, 2012 at 2:42 AM, olivier sallou
olivier.sal...@gmail.com wrote:
Le 27 mai 2012 03:12, Jon Bernard jbern...@debian.org a écrit :
* Charles Plessy ple...@debian.org wrote:
Hello everybody,
for one of the packages maintained by the pkg-eucalyptus team
(euca2ools), the
On 05/27/2012 04:32 AM, Russ Allbery wrote:
The root problem here is that we have multiple parameters that we want to
set on temporary storage:
1. Space for dumping arbitrary files without assuming anything about the
structure of the user's home directory.
2. Fast space for small
On 05/27/2012 04:32 AM, Russ Allbery wrote:
In an ideal world, in which we could throw out all of UNIX history and
make up our own rules, 1 (alone) would be /var/tmp, 2 would be some new
path (/run/tmp or something), and 3 would be /tmp. But we don't live in
the world where it's likely we can
On 05/27/2012 08:09 PM, Henrique de Moraes Holschuh wrote:
But my point was that people will not switch to writing small temporary
files somewhere else, because they have not switched to writing files to
$TMPDIR even after 10 years.
Please define who are the people you are talking about. If
On Sun, 27 May 2012, Iustin Pop ius...@debian.org wrote:
There's a difference between tmpfs is bad and the defaults for tmpfs
are bad.
The new defaults don't seem good when they are suddenly applied on upgrade.
My workstation unexpectedly went from having 2G of free space on the root
On 05/25/2012 05:41 PM, Josselin Mouette wrote:
Le vendredi 25 mai 2012 à 11:04 +0200, Salvo Tomaselli a écrit :
Apparently not everybody has experienced that, and this would explain why
they
are so happy about the idea of paging out a couple of Gigabytes.
Because paging out a
On 05/25/2012 03:29 PM, Josselin Mouette wrote:
Which means a *huge* performance
improvement. Do the measurements yourself, it works with basically
anything that makes heavy use of /tmp.
I have yet to know what application you are talking about.
Who's doing heavy use of /tmp exactly?
On 27/05/12 14:53, Thomas Goirand wrote:
On 05/25/2012 03:29 PM, Josselin Mouette wrote:
Which means a *huge* performance
improvement. Do the measurements yourself, it works with basically
anything that makes heavy use of /tmp.
I have yet to know what application you are talking about.
On Sat, 26 May 2012, Salvo Tomaselli wrote:
Or, it should get clever and not unpack everything. There are plenty of
software that are able to read into archives without extracting from
them.
You can't do it for a .tar.gz or a .tar.bz and they are the most common kind
of archive.
Yes,
On 05/27/2012 01:59 AM, Wookey wrote:
here's a case where a lot of space gets used in there: open a .ppt
(powerpoint) file in libreoffice. The conversion involves writing a
file in /tmp/mktmpdir for every page/image. To open an image-heavy
256Mb .ppt I have lying about here, generates 382MB of
On 05/27/2012 02:52 AM, Mike Hommey wrote:
Or, it should get clever and not unpack everything. There are plenty of
software that are able to read into archives without extracting from
them. There are even fuse filesystems to do that if it doesn't want to
do it itself. Using a temporary
On 05/25/2012 07:44 PM, Roger Leigh wrote:
However, the majority of
software which finds the tmpfs too small has unreasonable expectations
of what can be expected to be available (by default).
We welcome you to rewrite / patch these software then!
Good luck, the list is huge, and growing
On 05/26/2012 03:12 AM, Nikolaus Rath wrote:
Aren't quotas only for non-root and per file system? I think we're
already safe from non-root filling up / because of the reserved 5%.
Best,
-Nikolaus
That's a bit off-topic but...
XFS has project quota, which are directory based. I'd love
On Sun, 2012-05-27 at 22:43 +0800, Thomas Goirand wrote:
On 05/27/2012 02:52 AM, Mike Hommey wrote:
Or, it should get clever and not unpack everything. There are plenty of
software that are able to read into archives without extracting from
them. There are even fuse filesystems to do that
On 05/27/2012 09:38 PM, Russell Coker wrote:
Sure it's easy for me to fix that when upgrading and when compared to all the
other things I have to do on an upgrade it's not much of a big deal.
It's *not* easy, this involve init.d script foo ATM. See #674517.
Thomas
--
To UNSUBSCRIBE, email
On 05/27/2012 11:25 PM, Ben Hutchings wrote:
As will /tmp on a small root partition.
As will a small dedicated /tmp partition.
Why taking just bad configurations as counter arguments?
Do you know it is as well possible to have enough space
in your /tmp? :)
Cheers,
Thomas
--
To
On 05/27/2012 02:42 PM, olivier sallou wrote:
Keeping an updated mirror is not a good method for me, it is a painful
task and you are never sure of the status
Isn't it possible to keep this repo up-to-date using
some of the git hooks? Like, when you push to your
repo on Alioth, it would
Wookey dixit:
But there is this issue of the way its vfs does temporay unpacking in
/tmp. That makes sense in the 'this is temporary, it should go away on
reboot' sense, but some big files will use up a lot of ram when /tmp
is tmpfs.
I don't know what the right thing to do about this is, but
Thorsten Glaser wrote:
On 25/05/2012 18:20, Salvo Tomaselli wrote:
Double-click on a .tar causes it to be unpacked in /tmp/something.
I suppose a lot of not so skilled users do that instead of tar -xf
That doesn't seem to happen with file-roller. Perhaps you need to file a
bug
Hm. mc
Joey Hess dixit:
If programs that write large files to /tmp are changed to usr /var/tmp,
then over time a system will accumulate orphaned large tmp files in
/var/tmp. Nothing will come along and clean them up.
This is indeed a valid point. But that’s no regression; /tmp has
always been for small
Charles Plessy dixit:
upstream source moved to GitHub, and we would like to try to maintain the
Debian package there as well.
This is not a good idea: http://mako.cc/writing/hill-free_tools.html
bye,
//mirabilos
--
I believe no one can invent an algorithm. One just happens to hit upon it
when
Please define who are the people you are talking about. If they aren't
using mktemp, please file a bug.
man 3 mktemp
BUGS
Never use mktemp() [...]
--
Salvo Tomaselli
--
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact
This is indeed a valid point. But that’s no regression; /tmp has
always been for small short-lived files, and /var/tmp for those
that are not one of them or not both.
You just made up this difference.
Nothing nowhere says anything about the size of the files. The only thing
mentioned is the
On 27/05/12 20:01, Thorsten Glaser wrote:
This is indeed a valid point. But that’s no regression; /tmp has
always been for small short-lived files, and /var/tmp for those
that are not one of them or not both.
I am still waiting for someone to tell me where is said that /tmp should
be for small
On 27/05/12 17:47, Thomas Goirand wrote:
On 05/27/2012 11:25 PM, Ben Hutchings wrote:
As will /tmp on a small root partition.
As will a small dedicated /tmp partition.
Why taking just bad configurations as counter arguments?
Do you know it is as well possible to have enough space
in your
Salvo Tomaselli dixit:
Please define who are the people you are talking about. If they aren't
using mktemp, please file a bug.
man 3 mktemp
BUGS
Never use mktemp() [...]
Your manpage search order is (also) wrong:
‣ https://www.mirbsd.org/man.cgi?mktemp
(1) come before (3) section
On 05/28/2012 02:08 AM, Salvo Tomaselli wrote:
man 3 mktemp
I was talking about /bin/mktemp.
Thomas
--
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive:
Ben Hutchings wrote:
As will /tmp on a small root partition.
As will a small dedicated /tmp partition.
The differences between these cases and forcing tmpfs by default is that
in the above cases, the person who installed the system chose those
partition sizes. They are therefore responsible for
On Sun, May 27, 2012 at 04:25:30PM +0100, Ben Hutchings wrote:
We should be thinking about implementing per-user temporary directories
and making sure that programs respect $TMPDIR. (On Linux it's also
possible to give each user a different /tmp through mount namespaces.
I'm not sure whether
On Sat, May 26, 2012 at 09:11:40PM -0400, Jon Bernard wrote:
I believe a Github pull-request must reference a commit within Github itself.
You could still file an issue linking to an external repository, but I suspect
they're encouraging you to use Github for packaging so they can leverage all
]] Thomas Goirand
Come on, WE CAN! Let's create a /run/tmp *now*, it wont cost us much,
then later applications can slowly use it if they want. Worst case:
not a lot of app uses it, and the /run/tmp tmpfs isn't used much,
which isn't a problem. Best case: everyone that needs a fast space
2012/5/27 Adam Borowski wrote:
First, you're benchmarking the speed of process creation, not of file
operations. Starting up seq or mv takes ages compared to an in-memory
file write.
They may be slower than in-memory operations, but they're definitely
faster than fsync(). So if there was
On Sat, May 26, 2012 at 04:39:34PM -0400, Joey Hess wrote:
Roger Leigh wrote:
I did want to have this for wheezy (#633299). But I lacked the time
and familiarity with the d-i code, and the d-i developers also have
higher priorities.
Personally, this d-i developer has as one priority
Package: wnpp
Severity: wishlist
Owner: Jonas Smedegaard d...@jones.dk
* Package name: sugar-toolkit-gtk3
Version : 0.96.1
Upstream Author : Sugar Labs sugar-de...@lists.sugarlabs.org
* URL : http://wiki.sugarlabs.org/go/Sugar
* License : GPL-2+
Programming
2012/5/27 Iustin Pop wrote:
There's a difference between tmpfs is bad and the defaults for tmpfs
are bad.
First, I'm not saying that tmpfs is just bad. It's GOOD. For some cases.
I use it myself when I need to be sure that (having enough RAM) some of
my *large* files will never leave the cache
* Thomas Goirand [Sun May 27, 2012 at 11:52:27PM +0800]:
On 05/27/2012 02:42 PM, olivier sallou wrote:
Keeping an updated mirror is not a good method for me, it is a painful
task and you are never sure of the status
Isn't it possible to keep this repo up-to-date using
some of the git
On Sun, May 27, 2012 at 4:43 PM, Thomas Goirand z...@debian.org wrote:
On 05/27/2012 02:52 AM, Mike Hommey wrote:
Or, it should get clever and not unpack everything. There are plenty of
software that are able to read into archives without extracting from
them. There are even fuse filesystems
On Sun, May 27, 2012 at 10:46:27PM +0800, Thomas Goirand wrote:
On 05/25/2012 07:44 PM, Roger Leigh wrote:
However, the majority of
software which finds the tmpfs too small has unreasonable expectations
of what can be expected to be available (by default).
We welcome you to rewrite /
On Sun, May 27, 2012 at 10:01:22PM +0200, Tollef Fog Heen wrote:
]] Thomas Goirand
Come on, WE CAN! Let's create a /run/tmp *now*, it wont cost us much,
then later applications can slowly use it if they want. Worst case:
not a lot of app uses it, and the /run/tmp tmpfs isn't used much,
Salvo Tomaselli wrote:
Or, it should get clever and not unpack everything. There are plenty of
software that are able to read into archives without extracting from
them.
You can't do it for a .tar.gz or a .tar.bz and they are the most common kind
of archive.
xz compression format supports
2012/5/28 Roger Leigh wrote:
The primary cause of problems is simply that the tmpfs /tmp isn't big
enough. [...] what guarantees are offered by the system in terms of
minimum and maximum available space on /tmp? [...] Consider the default:
/tmp is on the rootfs (which [...] may have lots of
On Mon, 28 May 2012, Thomas Goirand z...@debian.org wrote:
On 05/27/2012 09:38 PM, Russell Coker wrote:
Sure it's easy for me to fix that when upgrading and when compared to all
the other things I have to do on an upgrade it's not much of a big deal.
It's *not* easy, this involve init.d
On Mon, 2012-05-28 at 10:40 +1000, Russell Coker wrote:
On Mon, 28 May 2012, Thomas Goirand z...@debian.org wrote:
On 05/27/2012 09:38 PM, Russell Coker wrote:
Sure it's easy for me to fix that when upgrading and when compared to all
the other things I have to do on an upgrade it's not
Hello Michael,
First of all, I want to seize this opportunity to congratulate you about
Phoronix and all the work you do helping all the Linux community with
the nice benchmarks that you publish.
In the last days there is a growing flame on debian-devel mailing list
about if tmpfs for /tmp is a
On 05/28/2012 05:32 AM, Roger Leigh wrote:
On Sun, May 27, 2012 at 10:46:27PM +0800, Thomas Goirand wrote:
On 05/25/2012 07:44 PM, Roger Leigh wrote:
However, the majority of
software which finds the tmpfs too small has unreasonable expectations
of what can be expected to be available (by
-BEGIN PGP SIGNED MESSAGE-
Hash: RIPEMD160
Format: 1.8
Date: Sun, 20 May 2012 17:14:17 -0700
Source: frogatto-data
Binary: frogatto-data
Architecture: source all
Version: 1.2+dfsg-1
Distribution: unstable
Urgency: low
Maintainer: Dmitry E. Oboukhov un...@debian.org
Changed-By: Vincent
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Sun, 27 May 2012 22:46:42 -0700
Source: uptimed
Binary: uptimed libuptimed0 libuptimed-dev uprecords-cgi
Architecture: source all ia64
Version: 1:0.3.17-3
Distribution: unstable
Urgency: low
Maintainer: Thibaut VARENE
-BEGIN PGP SIGNED MESSAGE-
Hash: RIPEMD160
Format: 1.8
Date: Sun, 27 May 2012 09:52:56 +0400
Source: frogatto
Binary: frogatto
Architecture: source amd64
Version: 1.2+dfsg-1
Distribution: unstable
Urgency: low
Maintainer: Dmitry E. Oboukhov un...@debian.org
Changed-By: Dmitry E. Oboukhov
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Sun, 27 May 2012 01:46:34 -0400
Source: lat
Binary: lat
Architecture: source all
Version: 1.2.3-9
Distribution: unstable
Urgency: low
Maintainer: Eric Dorland e...@debian.org
Changed-By: Eric Dorland e...@debian.org
Description:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Sun, 27 May 2012 08:32:31 +0200
Source: libconfig-any-perl
Binary: libconfig-any-perl
Architecture: source all
Version: 0.23-1
Distribution: unstable
Urgency: low
Maintainer: Debian Perl Group
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Sat, 26 May 2012 01:12:36 +1000
Source: m17n-docs
Binary: m17n-docs
Architecture: source all
Version: 1.6.2-2
Distribution: unstable
Urgency: low
Maintainer: Harshula Jayasuriya harsh...@debian.org
Changed-By: Harshula Jayasuriya
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Sun, 27 May 2012 09:18:19 +0200
Source: libtest-most-perl
Binary: libtest-most-perl
Architecture: source all
Version: 0.25-1
Distribution: unstable
Urgency: low
Maintainer: Debian Perl Group
-BEGIN PGP SIGNED MESSAGE-
Hash: RIPEMD160
Format: 1.8
Date: Sun, 27 May 2012 09:11:11 +0200
Source: xfpt
Binary: xfpt
Architecture: source i386
Version: 0.09-1
Distribution: unstable
Urgency: low
Maintainer: Andreas Metzler ametz...@debian.org
Changed-By: Andreas Metzler
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Sun, 27 May 2012 17:25:29 +1000
Source: jffnms
Binary: jffnms
Architecture: source all
Version: 0.9.3-1
Distribution: unstable
Urgency: low
Maintainer: Craig Small csm...@debian.org
Changed-By: Craig Small csm...@debian.org
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Sun, 27 May 2012 10:03:00 +0200
Source: openswan
Binary: openswan openswan-dbg openswan-doc openswan-modules-source
openswan-modules-dkms
Architecture: source all amd64
Version: 1:2.6.37-3
Distribution: unstable
Urgency: low
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Sat, 26 May 2012 20:31:17 +0200
Source: xmoto
Binary: xmoto xmoto-data
Architecture: source i386 all
Version: 0.5.9+dfsg-3
Distribution: unstable
Urgency: low
Maintainer: Debian Games Team pkg-games-de...@lists.alioth.debian.org
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Sun, 27 May 2012 18:42:38 +1000
Source: igal2
Binary: igal2
Architecture: source all
Version: 2.0-6
Distribution: unstable
Urgency: low
Maintainer: Alexander Zangerl a...@debian.org
Changed-By: Alexander Zangerl a...@debian.org
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Sun, 27 May 2012 10:58:42 +0200
Source: libmath-random-mt-perl
Binary: libmath-random-mt-perl
Architecture: source amd64
Version: 1.14-1
Distribution: unstable
Urgency: low
Maintainer: Debian Perl Group
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Sun, 27 May 2012 15:36:22 +0800
Source: scim
Binary: scim libscim8c2a libscim-dev scim-gtk-immodule scim-modules-socket
scim-dev scim-dev-doc
Architecture: source i386 all
Version: 1.4.13-1
Distribution: unstable
Urgency: low
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Sat, 31 Mar 2012 20:50:12 +0200
Source: mumble-django
Binary: python-django-mumble mumble-django
Architecture: source all
Version: 2.7-2
Distribution: unstable
Urgency: low
Maintainer: Debian VoIP Team
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Sun, 27 May 2012 11:25:44 +0200
Source: gpac
Binary: gpac gpac-dbg gpac-modules-base libgpac2 libgpac-dbg libgpac-dev
Architecture: source amd64
Version: 0.5.0~dfsg0-1
Distribution: unstable
Urgency: low
Maintainer: Debian
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Sun, 27 May 2012 12:24:20 +0300
Source: cupt
Binary: libcupt2-0 libcupt2-dev libcupt2-doc cupt
libcupt2-0-downloadmethod-curl libcupt2-0-downloadmethod-wget
Architecture: source i386 all
Version: 2.5.5
Distribution: unstable
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Sun, 27 May 2012 11:46:08 +0200
Source: kupfer
Binary: kupfer
Architecture: source all
Version: 0+v207-2
Distribution: unstable
Urgency: low
Maintainer: Luca Falavigna dktrkr...@debian.org
Changed-By: Luca Falavigna
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Sun, 27 May 2012 11:42:28 +0200
Source: python-larch
Binary: python-larch
Architecture: source all
Version: 1.20120527-1
Distribution: unstable
Urgency: low
Maintainer: Lars Wirzenius l...@liw.fi
Changed-By: Lars Wirzenius
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Sun, 27 May 2012 12:07:29 +0200
Source: python-httplib2
Binary: python-httplib2 python3-httplib2
Architecture: source all
Version: 0.7.4-2
Distribution: unstable
Urgency: low
Maintainer: Luca Falavigna dktrkr...@debian.org
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Sun, 27 May 2012 12:16:53 +0200
Source: libraw
Binary: libraw5 libraw-bin libraw-dev libraw-doc
Architecture: source amd64 all
Version: 0.14.6-2
Distribution: unstable
Urgency: low
Maintainer: Debian Shotwell Maintainers
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Sun, 27 May 2012 12:36:22 +0200
Source: alure
Binary: libalure-dev libalure1 alure-doc alure-utils
Architecture: source amd64 all
Version: 1.2-6
Distribution: unstable
Urgency: low
Maintainer: Debian Games Team
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Sun, 27 May 2012 12:32:02 +0200
Source: obnam
Binary: obnam
Architecture: source amd64
Version: 0.29-1
Distribution: unstable
Urgency: low
Maintainer: Lars Wirzenius l...@liw.fi
Changed-By: Lars Wirzenius l...@liw.fi
Description:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Sat, 21 Apr 2012 12:56:37 +0200
Source: lsscsi
Binary: lsscsi
Architecture: source amd64 i386 ia64 mips mipsel powerpc sparc
Version: 0.26-1
Distribution: unstable
Urgency: low
Maintainer: Matt Taggart tagg...@debian.org
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Sun, 27 May 2012 12:53:43 +0200
Source: sdl-ball
Binary: sdl-ball sdl-ball-data
Architecture: source amd64 all
Version: 1.01-3
Distribution: unstable
Urgency: low
Maintainer: Debian Games Team pkg-games-de...@lists.alioth.debian.org
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Sun, 27 May 2012 13:19:28 +0200
Source: fakeroot-ng
Binary: fakeroot-ng
Architecture: source amd64
Version: 0.16-1.1
Distribution: unstable
Urgency: low
Maintainer: Shachar Shemesh shac...@debian.org
Changed-By: Moritz Muehlenhoff
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Sun, 27 May 2012 13:02:14 +0200
Source: openmsx-debugger
Binary: openmsx-debugger
Architecture: source amd64
Version: 0.0.0.svn20110306-3
Distribution: unstable
Urgency: low
Maintainer: Debian QA Group packa...@qa.debian.org
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Sun, 27 May 2012 13:57:14 +0200
Source: anet
Binary: libanet0.1 libanet0.1-dev libanet0.1-dbg
Architecture: source amd64
Version: 0.1-3
Distribution: unstable
Urgency: low
Maintainer: Reto Buerki r...@codelabs.ch
Changed-By: Reto
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Fri, 16 Dec 2011 23:35:26 +0100
Source: libcommons-lang3-java
Binary: libcommons-lang3-java libcommons-lang3-java-doc
Architecture: source all
Version: 3.1-1
Distribution: sid
Urgency: low
Maintainer: Debian Java Maintainers
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Sun, 27 May 2012 13:17:12 +0200
Source: mixxx
Binary: mixxx mixxx-data
Architecture: source amd64 all
Version: 1.10.0~dfsg0-2
Distribution: unstable
Urgency: low
Maintainer: Debian Multimedia Maintainers
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Sat, 26 May 2012 19:24:16 +0300
Source: amarok
Binary: amarok amarok-common amarok-doc amarok-utils amarok-dbg
Architecture: source amd64 all
Version: 2.5.0-3
Distribution: unstable
Urgency: low
Maintainer: Debian KDE Extras Team
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Thu, 17 May 2012 11:24:26 +0200
Source: mimefilter
Binary: mimefilter
Architecture: source all
Version: 1.7+nmu1
Distribution: unstable
Urgency: low
Maintainer: Davide G. M. Salvetti sa...@debian.org
Changed-By: Salvatore
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Sat, 26 May 2012 11:02:37 -0700
Source: handlersocket
Binary: handlersocket-mysql-5.5 handlersocket-doc libhsclient-dev
libnet-handlersocket-perl
Architecture: source amd64 all
Version: 1.1.0-7-g1044a28-1
Distribution: unstable
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Thu, 24 May 2012 18:05:03 -0700
Source: haskell-knob
Binary: libghc-knob-dev libghc-knob-prof libghc-knob-doc
Architecture: source all amd64
Version: 0.1.1-1
Distribution: unstable
Urgency: low
Maintainer: Debian Haskell Group
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Sat, 26 May 2012 20:37:00 +0300
Source: kactivities
Binary: libkactivities-bin libkactivities6 libkactivities-dev libkactivities-dbg
Architecture: source amd64
Version: 4:4.8.3-1
Distribution: experimental
Urgency: low
Maintainer:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Sun, 27 May 2012 02:45:09 +0300
Source: kde-l10n
Binary: kde-l10n-ar kde-l10n-bg kde-l10n-bs kde-l10n-ca kde-l10n-cavalencia
kde-l10n-cs kde-l10n-da kde-l10n-de kde-l10n-el kde-l10n-engb kde-l10n-es
kde-l10n-et kde-l10n-eu
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Sat, 26 May 2012 20:03:31 +0300
Source: kdepimlibs
Binary: kdepimlibs5-dev kdepimlibs-kio-plugins libakonadi-contact4
libakonadi-kabc4 libakonadi-kcal4 libakonadi-kde4 libakonadi-kmime4
libakonadi-notes4 libgpgme++2 libkabc4
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Sun, 27 May 2012 02:38:37 +0300
Source: kdeplasma-addons
Binary: kdeplasma-addons plasma-widgets-addons plasma-containments-addons
plasma-dataengines-addons plasma-runners-addons plasma-wallpapers-addons
plasma-widget-lancelot
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Sat, 26 May 2012 20:03:53 +0200
Source: libdata-util-perl
Binary: libdata-util-perl
Architecture: source amd64
Version: 0.59-1
Distribution: unstable
Urgency: low
Maintainer: Debian Perl Group
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Sun, 27 May 2012 09:39:53 +1000
Source: opal
Binary: libopal3.10.5 libopal-dev simpleopal libopal-dbg libopal-doc
Architecture: source amd64 all
Version: 3.10.5~dfsg-1
Distribution: experimental
Urgency: low
Maintainer: Debian VoIP
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Sun, 27 May 2012 04:14:03 +0200
Source: python-pip
Binary: python-pip python3-pip
Architecture: source all
Version: 1.1-1
Distribution: unstable
Urgency: low
Maintainer: Debian Python Modules Team
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Sun, 27 May 2012 00:15:46 +0200
Source: sugar-datastore-0.96
Binary: python-carquinyol-0.96
Architecture: source amd64
Version: 0.96.0-1
Distribution: unstable
Urgency: low
Maintainer: Debian OLPC
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Sat, 19 May 2012 03:41:34 +0200
Source: libdumb
Binary: libdumb1 libdumb1-dev libaldmb1 libaldmb1-dev
Architecture: source amd64
Version: 1:0.9.3-5.3
Distribution: unstable
Urgency: low
Maintainer: Debian allegro packages maintainers
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Sun, 27 May 2012 13:00:38 +0200
Source: mongodb
Binary: mongodb mongodb-server mongodb-clients mongodb-dev
Architecture: amd64 i386 source
Version: 1:2.0.5-2
Distribution: unstable
Urgency: low
Maintainer: Antonin Kral
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Sun, 27 May 2012 08:21:17 +0200
Source: oce
Binary: liboce-foundation2 liboce-modeling2 liboce-visualization2
liboce-ocaf-lite2 liboce-ocaf2 oce-draw liboce-foundation-dev
liboce-modeling-dev liboce-ocaf-lite-dev liboce-ocaf-dev
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Sat, 26 May 2012 13:39:21 +0200
Source: calligra
Binary: calligra karbon kexi kexi-calligrasheets-driver kexi-mysql-driver
kexi-postgresql-driver kexi-xbase-driver kexi-sybase-driver
kexi-web-form-widget kexi-map-form-widget
1 - 100 of 223 matches
Mail list logo