Re: Bulding 3.0.1 Under Ubuntu 10.04 i386

2013-02-28 Thread Christian PERRIER
> Old debian source packages (subsurface-1.2-1 and libdivecomputer-0.1.0), > could also be of some value. > > I'm really looking forward to see latest subsurface/libdivecomputer in > debian, as soon as it can be done. It'll most probably be unstable, but This thread is interesting. I faced abou

Re: Getting Intel Cedarview drivers into Debian

2013-02-28 Thread Paul Wise
On Fri, Mar 1, 2013 at 4:12 AM, Lisandro Damián Nicanor Pérez Meyer wrote: > Is it just me or this thread about propietary stuff should not be happening > here? http://www.debian.org/social_contract > It may be just me, yes. It definitely isn't just you. -- bye, pabs http://wiki.debian.org/P

Re: git dangerous operations on alioth

2013-02-28 Thread Henrique de Moraes Holschuh
On Thu, 28 Feb 2013, Holger Levsen wrote: > signed commits, so you can identify unwanted bits and clean up in the very > care case that's actually needed? Indeed. Secure git workflows are possible, although it is a relatively new development. Signed commits and pull requests are a very big part

Work-needing packages report for Mar 1, 2013

2013-02-28 Thread wnpp
The following is a listing of packages for which help has been requested through the WNPP (Work-Needing and Prospective Packages) system in the last week. Total number of orphaned packages: 495 (new: 1) Total number of packages offered up for adoption: 143 (new: 0) Total number of packages request

Re: Bulding 3.0.1 Under Ubuntu 10.04 i386

2013-02-28 Thread Cristian Ionescu-Idbohrn
On Thu, 28 Feb 2013, Robert Wolfe wrote: > > Um, forgot about me already, hmm? :) But, of course not. Do you want to be Cc:ed? > And yes, libdivecomputer-3.0.1 in .DEB format That should probably be: subsurface-3.0.1 and libdivecomputer-0.3.0 I presume. Can you make the sourc

RE: Bulding 3.0.1 Under Ubuntu 10.04 i386

2013-02-28 Thread Dirk Hohndel
Robert Wolfe writes: > Um, forgot about me already, hmm? :)  And yes, libdivecomputer-3.0.1 > in .DEB format is also available on my site if anyone wants to try > that (in RPM format, too). Not at all. The problem with your approach to creating a package was that you are using the tool that is q

Re: Bulding 3.0.1 Under Ubuntu 10.04 i386

2013-02-28 Thread Dirk Hohndel
Dmitrijs Ledkovs writes: > > I have only one dive of a whole 8m deep, but I am ubuntu & debian > developer and can upload this package to debian/ubuntu and a ppa. > > Is there any packaging done so far? Point me to it, if not just file > Debian RFP and CC me on it. There are old packages for Subs

Re: Bulding 3.0.1 Under Ubuntu 10.04 i386

2013-02-28 Thread Dmitrijs Ledkovs
On 28 February 2013 20:03, Cristian Ionescu-Idbohrn wrote: > Please Cc:, not subscribed to the debian-devel@lists.debian.org list. > > Hi there! Linus Torvalds is highly involved in this project :) > > On Thu, 28 Feb 2013, Dirk Hohndel wrote: >> >> The problem is that our target audience are dive

Re: git dangerous operations on alioth

2013-02-28 Thread Holger Levsen
Hi, signed commits, so you can identify unwanted bits and clean up in the very care case that's actually needed? cheer,s Holger -- To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org Archive: htt

Re: git dangerous operations on alioth

2013-02-28 Thread Philipp Kern
On Thu, Feb 28, 2013 at 04:01:34PM +0600, Andrey Rahmatullin wrote: > On Thu, Feb 28, 2013 at 10:45:35AM +0100, Tollef Fog Heen wrote: > > > Has anybody had experience controlling access to git repositories, for > > > example, to give users access but prevent some of the following > > > dangerous o

Debian / Ubuntu packages [was: Re: Bulding 3.0.1 Under Ubuntu 10.04 i386]

2013-02-28 Thread Dirk Hohndel
On Feb 28, 2013, at 12:03 PM, Cristian Ionescu-Idbohrn wrote: >> And for those I try to make their lives easier. > > Of course. Where do you get all that energy from? I'm impressed. > Really. Actually, I just decided to give up. This is an utter waste of my time. Whatever. Someone who cares m

Re: git dangerous operations on alioth

2013-02-28 Thread Daniel Pocock
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 28/02/13 20:20, Jonas Smedegaard wrote: > Quoting Daniel Pocock (2013-02-28 19:20:09) >> On 28/02/13 13:15, Simon McVittie wrote: >>> On 28/02/13 09:39, Daniel Pocock wrote: Has anybody had experience controlling access to git repositori

Re: Bulding 3.0.1 Under Ubuntu 10.04 i386

2013-02-28 Thread Cristian Ionescu-Idbohrn
Please Cc:, not subscribed to the debian-devel@lists.debian.org list. Hi there! Linus Torvalds is highly involved in this project :) On Thu, 28 Feb 2013, Dirk Hohndel wrote: > > The problem is that our target audience are divers, not hackers. Agreed. > Someone who can build from those sources

Re: Getting Intel Cedarview drivers into Debian

2013-02-28 Thread Lisandro Damián Nicanor Pérez Meyer
On Thu 28 Feb 2013 14:46:28 Carlos Alberto Lopez Perez escribió: > On 28/02/13 15:54, Mikko Rasa wrote: > > We considered the possibility of updating the DDK to version 1.9, but in > > the end decided to stay with 1.7. An update of the DDK would involve an > > unknown amount of work in making the

Re: git dangerous operations on alioth

2013-02-28 Thread Jonas Smedegaard
Quoting Daniel Pocock (2013-02-28 19:20:09) > On 28/02/13 13:15, Simon McVittie wrote: > > On 28/02/13 09:39, Daniel Pocock wrote: > >> Has anybody had experience controlling access to git repositories, > >> for example, to give users access but prevent some of the following > >> dangerous operat

Re: git dangerous operations on alioth

2013-02-28 Thread Daniel Pocock
On 28/02/13 13:15, Simon McVittie wrote: > On 28/02/13 09:39, Daniel Pocock wrote: >> Has anybody had experience controlling access to git repositories, for >> example, to give users access but prevent some of the following >> dangerous operations? > > If you look at it from the appropriate angle

Re: Getting Intel Cedarview drivers into Debian

2013-02-28 Thread Carlos Alberto Lopez Perez
On 28/02/13 15:54, Mikko Rasa wrote: > > We considered the possibility of updating the DDK to version 1.9, but in > the end decided to stay with 1.7. An update of the DDK would involve an > unknown amount of work in making the driver work with it, and that was > deemed undesirable by the customer

Re: git dangerous operations on alioth

2013-02-28 Thread gregor herrmann
On Thu, 28 Feb 2013 12:51:33 +0100, Arno Töll wrote: > On 28.02.2013 11:07, Stefano Zacchiroli wrote: > > On Thu, Feb 28, 2013 at 10:39:26AM +0100, Daniel Pocock wrote: > >> Has anybody had experience controlling access to git repositories, for > >> example, to give users access but prevent some o

Re: arm64 Debian/Ubuntu port image available

2013-02-28 Thread Michael K. Edwards
Nice work, Wookey! If experience cross-building for armhf is any guide, all you need for NSS is a host build of shlibsign; see https://github.com/mkedwards/crosstool-ng/blob/master/patches/nss/3.12.10/0001-Modify-shlibsign-wrapper-for-cross-compilation.patch. There's also scriptage in that repo f

Re: Processed: Re: Bug#701883: general: error in the load driver displaylink_drv.so in configuration for two displays with Xinerama

2013-02-28 Thread Julien Cristau
On Thu, Feb 28, 2013 at 16:21:05 +, Debian Bug Tracking System wrote: > Processing commands for cont...@bugs.debian.org: > > > reassign 701883 xserver-xorg > Bug #701883 [general] general: error in the load driver displaylink_drv.so in > configuration for two displays with Xinerama > Bug rea

Processed: Re: Bug#701883: general: error in the load driver displaylink_drv.so in configuration for two displays with Xinerama

2013-02-28 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > reassign 701883 xserver-xorg Bug #701883 [general] general: error in the load driver displaylink_drv.so in configuration for two displays with Xinerama Bug reassigned from package 'general' to 'xserver-xorg'. Ignoring request to alter found versi

Bug#701894: ITP: proot -- chroot, mount --bind, and binfmt_misc without privilege/setup

2013-02-28 Thread Rémi Duraffort
Package: wnpp Severity: wishlist Owner: "Rémi Duraffort" * Package name: proot Version : 2.3.1 Upstream Author : Cédric Vincent * URL : http://proot.me * License : GPL Programming Lang: C Description : chroot, mount --bind, and binfmt_misc without pr

Bug#701893: ITP: libapache2-mod-auth-mellon -- A SAML 2.0 authentication module for Apache

2013-02-28 Thread Thijs Kinkhorst
Package: wnpp Severity: wishlist Owner: Thijs Kinkhorst * Package name: libapache2-mod-auth-mellon Version : 0.6.0 Upstream Author : Feide RND, Uninett * URL : http://code.google.com/p/modmellon/ * License : GPLv3 Programming Lang: C Description : A SAM

Re: Getting Intel Cedarview drivers into Debian

2013-02-28 Thread Mikko Rasa
On 25.02.2013 17:06, Carlos Alberto Lopez Perez wrote: On 25/02/13 15:09, Mikko Rasa wrote: On 21.02.2013 19:42, Carlos Alberto Lopez Perez wrote: On 21/12/12 14:23, Mikko Rasa wrote: Hi Debian developers, I'm working as a consultant on a project to develop drivers for the PowerVR graphics pr

Annual ping for Sergey B Kirpichev

2013-02-28 Thread Sergey B Kirpichev
Package: debian-maintainers This is my annual ping. CC'd to debian-devel@, as d-m pseudo-package has lots of stalled "annual ping" reports. Are we have need in such kind of bureaucracy? signature.asc Description: Digital signature

Bug#701883: general: error in the load driver displaylink_drv.so in configuration for two displays with Xinerama

2013-02-28 Thread Pablo Zuniga
Package: general Severity: important Dear Maintainer, *** Please consider answering these questions, where appropriate *** * What led up to the situation? * What exactly did you do (or not do) that was effective (or ineffective)? * What was the outcome of this action? * What outc

Re: git dangerous operations on alioth

2013-02-28 Thread Andrew Shadura
Hello. On 28 February 2013 12:51, Arno Töll wrote: > Having that said the risk is real and it may be time to reconsider some > choices including the use of Alioth itself for those who do not believe > in openness. Chances are #700630 is going to rescue us all on that. > Maybe we could set-up our

Re: git dangerous operations on alioth

2013-02-28 Thread Simon McVittie
On 28/02/13 09:39, Daniel Pocock wrote: > Has anybody had experience controlling access to git repositories, for > example, to give users access but prevent some of the following > dangerous operations? Do you consider this to be a strong security measure against malicious changes, or a weak safet

Re: git dangerous operations on alioth

2013-02-28 Thread Arno Töll
Hi, On 28.02.2013 11:07, Stefano Zacchiroli wrote: > On Thu, Feb 28, 2013 at 10:39:26AM +0100, Daniel Pocock wrote: >> Has anybody had experience controlling access to git repositories, for >> example, to give users access but prevent some of the following >> dangerous operations? > > Related to

Re: git dangerous operations on alioth

2013-02-28 Thread Stefano Zacchiroli
On Thu, Feb 28, 2013 at 10:39:26AM +0100, Daniel Pocock wrote: > Has anybody had experience controlling access to git repositories, for > example, to give users access but prevent some of the following > dangerous operations? Related to this, there is also the risk that a user will ssh on alioth a

Re: git dangerous operations on alioth

2013-02-28 Thread Andrey Rahmatullin
On Thu, Feb 28, 2013 at 10:45:35AM +0100, Tollef Fog Heen wrote: > > Has anybody had experience controlling access to git repositories, for > > example, to give users access but prevent some of the following > > dangerous operations? > > > > - prevent users pushing with the `--force' option > > (fr

Re: git dangerous operations on alioth

2013-02-28 Thread Dmitrijs Ledkovs
On 28 February 2013 09:39, Daniel Pocock wrote: > > > There was recently some discussion in pkg-javascript about how to give > more people access to the VCS (e.g. keeping the git repositories > logically organised under the pkg-javascript tree, but making write > access available to all DDs + alio

Re: git dangerous operations on alioth

2013-02-28 Thread Tollef Fog Heen
]] Daniel Pocock > Has anybody had experience controlling access to git repositories, for > example, to give users access but prevent some of the following > dangerous operations? > > - prevent users pushing with the `--force' option > (from the man page for git-push: "This can cause the remote r

git dangerous operations on alioth

2013-02-28 Thread Daniel Pocock
There was recently some discussion in pkg-javascript about how to give more people access to the VCS (e.g. keeping the git repositories logically organised under the pkg-javascript tree, but making write access available to all DDs + alioth guest users and not just those in the pkg-javascript UNI