Hi Charles,
Quoting Charles Plessy (2014-07-16 02:58:58)
viewed from the opposite side of the chain, I have the impression that in
most cases where I receive a report that package X does not build on
architecture Y, it is a pure waste of time, since that package has no user
base on that
❦ 16 juillet 2014 09:58 +0900, Charles Plessy ple...@debian.org :
Patch systems have a high importance in Debian because we accumulate patches
that have little relevance for Upstream and the software's users. One of the
solution is to standardise the patch systems, but another solution is to
Hi,
2014-07-16 3:36 GMT+02:00 Guillem Jover guil...@debian.org:
Hi!
[...]
Such warning might have made sense iff:
- the new formats had been uncontroversial,
There is no such thing as being uncontroversial in Debian. There is
always somebody nitpicking when gaining hundred features and
Package: wnpp
Severity: wishlist
X-Debbugs-CC: debian-devel@lists.debian.org
--- Please fill out the fields below. ---
Package name: tiptop
Version: 2.2
Upstream Author: Erven Rohou erven.ro...@inria.fr
URL: http://tiptop.gforge.inria.fr/
License: GPLv2
Hi Emmanuel,
On Wed, Jul 16, 2014 at 12:19:53AM +0200, Emmanuel Bourg wrote:
Ok, but could you say it nicely please? I just came across this info and
brought it on the list for discussion because it'll impact us at some
point.
...
Thanks for the information. I perceived in line with your
Hi,
On Wed, 16 Jul 2014, Guillem Jover wrote:
The only reason for that warning right now is to pester people into
either switching, which they should be doing out of their own
volition anyway because people think the new formats are really
superior and help them. Or so that people set it
On 15/07/2014 23:55, Matthias Klose wrote:
Am 15.07.2014 23:08, schrieb Emmanuel Bourg:
This was expected but now it's effective, Java 9 no longer supports
source/target level 1.5:
http://mail.openjdk.java.net/pipermail/jdk9-dev/2014-July/000972.html
So if you update a package and see these
Gesendet: Mittwoch, 16. Juli 2014 um 09:50 Uhr
Von: Sylvestre Ledru sylves...@debian.org
An: Matthias Klose d...@debian.org, Emmanuel Bourg ebo...@apache.org,
Debian Java debian-j...@lists.debian.org
Cc: debian-devel@lists.debian.org debian-devel@lists.debian.org, Debian
Release
On 2014-07-13 13:17:24 +0200, Arno Töll wrote:
Unfortunately it turns out, that /a lot/ of people use aptitude
--purge-unused safe-upgrade, or the apt equivalent apt-get
dist-upgrade --purge which causes dpkg to purge the user's
configuration, in particular enabled modules, during the upgrade
On 2014-07-14 08:53:22 +, Thorsten Glaser wrote:
But I normally use apt-get --purge dist-upgrade both to upgrade
across distros and to stay within one distro (or sid), because
otherwise I get issues:
* Running upgrade before dist-upgrade sometimes doesn't get the
dependencies right
Package: wnpp
Severity: wishlist
Owner: Tomasz Buchert tomasz.buch...@inria.fr
Package name: tiptop
Version : 2.2
Upstream Author : Erven Rohou
URL : http://tiptop.gforge.inria.fr/
License : GPL2
Programming Lang: C
Description : performance
Hi folks,
how comes that network-manager-strongswan has been dropped
from testing? This package is extremely important for road-
warrior setups using IPsec.
Regards
Harri
--
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact
On Wed, July 16, 2014 12:17, Harald Dunkel wrote:
how comes that network-manager-strongswan has been dropped
from testing? This package is extremely important for road-
warrior setups using IPsec.
You can find that out for any package on the PTS:
On 16/07/14 11:17, Harald Dunkel wrote:
how comes that network-manager-strongswan has been dropped
from testing?
https://packages.qa.debian.org/n/network-manager-strongswan.html says:
network-manager-strongswan (source, i386, amd64, armel, armhf, mips,
mipsel, powerpc, s390x) has new bugs!
Hi Thijs,
On 07/16/14 12:35, Thijs Kinkhorst wrote:
As it turns out, this package got removed because it has an unfixed
release critical bug (which interestingly enough you yourself reported).
When this bug is fixed, the package will transition back to testing.
Of course I know that I
On Wed, July 16, 2014 13:05, Harald Dunkel wrote:
On 07/16/14 12:35, Thijs Kinkhorst wrote:
As it turns out, this package got removed because it has an unfixed
release critical bug (which interestingly enough you yourself reported).
When this bug is fixed, the package will transition back to
Hi Simon,
On 07/16/14 12:36, Simon McVittie wrote:
If the change you proposed works correctly, an NMU seems appropriate.
I am using the fix in a private package since I
created the bug report. Seems to work fine (using
strongswan 5.x).
I have appended a diff to the bug report. Hope
this
Hi!
On Wed, 2014-07-16 at 11:41:25 +0200, Vincent Lefevre wrote:
On 2014-07-13 13:17:24 +0200, Arno Töll wrote:
Unfortunately it turns out, that /a lot/ of people use aptitude
--purge-unused safe-upgrade, or the apt equivalent apt-get
dist-upgrade --purge which causes dpkg to purge the
On Mon, Jul 14, 2014 at 12:26:30PM -0500, Jeff Epler wrote:
actually used by current versions of apt. (ideally you'd just go sha256,
but iirc it's the md5sum that is used in practice, even today. but
please find that thread, don't trust my summary)
- apt-get --print-uris defaults to MD5 by
On Mon, Jul 14, 2014 at 06:25:47PM +0200, Jakub Wilk wrote:
Description-md5 794.3 KiB 11.9%
Needed to provide a mapping as versions change a lot more often than
descriptions do; also, historically, Translation-* were outside of the
control of ftpmasters (at least, that is what history
On Wed, Jul 16, 2014 at 11:36:32AM +0200, Vincent Lefevre wrote:
On 2014-07-14 08:53:22 +, Thorsten Glaser wrote:
But I normally use apt-get --purge dist-upgrade both to upgrade
across distros and to stay within one distro (or sid), because
otherwise I get issues:
* Running upgrade
On Wed, Jul 16, 2014 at 01:05:26PM +0200, Harald Dunkel wrote:
Hi Thijs,
On 07/16/14 12:35, Thijs Kinkhorst wrote:
As it turns out, this package got removed because it has an unfixed
release critical bug (which interestingly enough you yourself reported).
When this bug is fixed, the
On Wed, Jul 16, 2014 at 03:40:13PM +0300, Riku Voipio wrote:
Since you seem to know the software well, and it is important for you,
perhaps you can take over maintainence of the package? The current
maintainer doesn't seem to be active (no upload since 2012..).
Alternatively the package could
Hi Riku,
On Mittwoch, 16. Juli 2014, Riku Voipio wrote:
This a side-effect from Debian's policy that discourages fixing bugs in
other maintainers packages via NMUs. Somehow, it is felt better to
remove packages from testing than possibly offending the maintainer with
an unwarranted NMU.
Huh,
On 07/16/14 15:17, Holger Levsen wrote:
Especially if the NMU is properly done (eg documented in the BTS, uploaded to
DELAYED-foo, etc) I've hardly seen any complaints in recent years.
Surely I could have done better in providing a clean
fix to #741415, making it more easy for the Debian
Hi Riku, Holger,
Holger Levsen hol...@layer-acht.org (2014-07-16):
On Mittwoch, 16. Juli 2014, Riku Voipio wrote:
This a side-effect from Debian's policy that discourages fixing bugs in
other maintainers packages via NMUs. Somehow, it is felt better to
remove packages from testing than
On Wed, Jul 16, 2014 at 02:23:34PM +0200, David Kalnischkies wrote:
With a slight change in semantic we could drop the field from the
Packages file again anyhow: At the moment it is the MD5sum of the long
description. If it isn't present the clients are expected to calculate
it for themselves
On 07/16/2014 10:06 PM, Harald Dunkel wrote:
On 07/16/14 15:17, Holger Levsen wrote:
Especially if the NMU is properly done (eg documented in the BTS, uploaded
to
DELAYED-foo, etc) I've hardly seen any complaints in recent years.
Surely I could have done better in providing a clean
fix
On 2014-07-16, Thomas Goirand z...@debian.org wrote:
BTW, it feels weird that the package build-depends on debhelper when it
really is using CDBS. The debian/copyright is also quite wrong, as it
If you use cdbs' debhelper module (which runs the various dh_foo
commands), you need to ensure
Hi Jakub,
On Mon, Jul 14, 2014, at 18:25, Jakub Wilk wrote:
Food for thought:
Which fields take up most space in Packages.xz[0]?
I am still lost - what problem are we trying to solve here?
Could we at least define it to see if the problem exists?
Ondrej
--
Ondřej Surý ond...@sury.org
Knot
Hi Mike
On Fri, Jul 11, 2014, at 09:33, Mike Gabriel wrote:
Please also consider filing a
transition bug to help us (the release team) get an overview of the
affected packages at your earliest convenience.
If someone else could take this over before August, that will be much
Ondřej Surý ond...@sury.org writes:
On Mon, Jul 14, 2014, at 18:25, Jakub Wilk wrote:
Food for thought:
Which fields take up most space in Packages.xz[0]?
I am still lost - what problem are we trying to solve here?
Could we at least define it to see if the problem exists?
I'm fairly sure
2014-07-15 21:39 GMT+02:00 Philipp Kern pk...@debian.org:
On 2014-07-15 16:00, Thorsten Glaser wrote:
Martin Zobel-Helas dixit:
Furthermore, we will change the people.debian.org web-service such that
only HTTPS connections will be supported (unencrypted requests will be
redirected).
[…]
On Wed, Jul 16, 2014, at 19:28, Russ Allbery wrote:
Ondřej Surý ond...@sury.org writes:
On Mon, Jul 14, 2014, at 18:25, Jakub Wilk wrote:
Food for thought:
Which fields take up most space in Packages.xz[0]?
I am still lost - what problem are we trying to solve here?
Could we at
On 16/07/14 03:06, Paul Tagliamonte wrote:
I didn't see this yet in the thread, so:
https://www.agwa.name/blog/post/libressls_prng_is_unsafe_on_linux
What's most interesting is that someone spent such effort to look for
this; that there are so many eyes now on both the original OpenSSL and
the
]] Thomas Goirand
On 07/15/2014 09:42 AM, Charles Plessy wrote:
I am not a big fan of the 3.0 (quilt) format because it imposes a patch
system.
In particular, this format does not make much sense when managing the source
package with Git.
I'm not sure I'm following you. I do use git
Tollef Fog Heen tfh...@err.no writes:
I can't speak for Plessy, but the entire concept of using a different,
much more limited patch system on top of git is just.. weird. It makes
absolutely no sense to dumb down all the rich metadata you have in your
git repository to something that's
Steven Chamberlain ste...@pyro.eu.org writes:
What's most interesting is that someone spent such effort to look for
this; that there are so many eyes now on both the original OpenSSL and
the new LibreSSL code. Both projects ought to benefit from this.
Yes.
This was a real, but totally
On Wed, 2014-07-16 at 19:50 +0200, Bálint Réczey wrote:
2014-07-15 21:39 GMT+02:00 Philipp Kern pk...@debian.org:
On 2014-07-15 16:00, Thorsten Glaser wrote:
Martin Zobel-Helas dixit:
Furthermore, we will change the people.debian.org web-service such that
only HTTPS connections will
On Wed, 2014-07-16 at 12:47 -0700, Russ Allbery wrote:
Steven Chamberlain ste...@pyro.eu.org writes:
[...]
It seems extreme, but the point is that something must be wrong on the
system if we get to the fallback code - /dev/urandom missing from a
chroot, or fd's exhausted, and the kernel not
Hi!
On Wed, 2014-07-16 at 19:54:38 +0100, Steven Chamberlain wrote:
The other major concern was about scary entropy-gathering code,
implemented in LibreSSL Portable for Linux as a last resort for when
/dev/urandom can't be read. I agree that it's too risky, or: too
difficult to prove safe
Ben Hutchings b...@decadent.org.uk writes:
On Wed, 2014-07-16 at 12:47 -0700, Russ Allbery wrote:
It would be nice to have a reliable kernel interface for getting
randomness rather than relying on proper chroot configuration.
There is such an interface. It happens to be a char device.
On Wed, Jul 16, 2014 at 09:50:46AM +0200, Sylvestre Ledru wrote:
I think that is unfair statement against Emmanuel (especially when
adding d-d d-r to the cc list).
Totally agree with Sylvestre on this.
I also have sponsored many packages for Emmanuel in the Java team.
Frankly, I don't get
On Wed, Jul 16, 2014 at 05:32:32PM -0300, Miguel Landaeta wrote:
On Wed, Jul 16, 2014 at 09:50:46AM +0200, Sylvestre Ledru wrote:
I think that is unfair statement against Emmanuel (especially when
adding d-d d-r to the cc list).
Totally agree with Sylvestre on this.
I also have
(This may seem a little off-topic for the ITP but please bear with me...)
On 16/07/14 21:13, Guillem Jover wrote:
kFreeBSD does have a supported sysctl for this: CTL_KERN KERN_ARND.
(As does NetBSD which has two, KERN_URND and KERN_ARND.)
Actually yes, we would certainly want to use that. But
Oh, and note that OpenSSH Portable uses RAND_bytes from libssl to seed
its arc4random implementation.
So AFAICT if you were to link OpenSSH Portable against LibreSSL
Portable, it would get really crazy:
/dev/urandom or sysctl or scary fallback -
LibreSSL Portable getentropy -
LibreSSL Portable
Hi all,
We're now at the point where we want to flip the default init system for
Jessie on Linux. A lot of systems have already switched over to systemd
as their init system [0] and the package received a fair amount of
testing and integration work over the last couple of months. This makes
us
Hi,
Tollef Fog Heen tfh...@err.no writes:
So we are proposing the following scheme:
a/ Upload a new init package. This is a new, essential package that
will replace sysvinit as the package that ensures your system has an
init system. We want to build this binary package from a package which
+++ Holger Levsen [2014-07-16 15:17 +0200]:
Hi Riku,
On Mittwoch, 16. Juli 2014, Riku Voipio wrote:
This a side-effect from Debian's policy that discourages fixing bugs in
other maintainers packages via NMUs. Somehow, it is felt better to
remove packages from testing than possibly
On Wed, 16 Jul 2014 16:06:06 +0200, Harald Dunkel wrote:
Especially if the NMU is properly done (eg documented in the BTS, uploaded
to
DELAYED-foo, etc) I've hardly seen any complaints in recent years.
Surely I could have done better in providing a clean
fix to #741415, making it more
Am 16.07.2014 23:42, schrieb Ansgar Burchardt:
c/ Upload a new version of the init package which does the actual switch
and changes the order via Pre-Depends: systemd-sysv |
sysvinit-core. Diff[4]
Why do a, and c, in two steps?
We want to have the safety measures in place before making the
Some sites (I mean, deployments) like to use a caching proxy, especially
if many machines use the same resource, and/or bandwidth is scarce. Or
even just one machine accessing the same resource often. Maybe this
won't apply to anything particular on people.d.o, but certainly a lot of
websites
Hi,
Steven Chamberlain ste...@pyro.eu.org writes:
And since BSD and GNU software are unable
to link against each other, [...]
Oops, I should have said there that BSD software *if now linking
against LibreSSL* couldn't link with GNU software any more.
On Mon, 14 Jul 2014 13:32:40 -0700, Russ
On Wed, 2014-07-16 at 13:17 -0700, Russ Allbery wrote:
Ben Hutchings b...@decadent.org.uk writes:
On Wed, 2014-07-16 at 12:47 -0700, Russ Allbery wrote:
It would be nice to have a reliable kernel interface for getting
randomness rather than relying on proper chroot configuration.
On Wed, Jul 16, 2014 at 11:43:17PM +0100, Steven Chamberlain wrote:
Some sites (I mean, deployments) like to use a caching proxy, especially
if many machines use the same resource, and/or bandwidth is scarce. Or
even just one machine accessing the same resource often. Maybe this
won't apply
On Wed, 2014-07-16 at 23:22 +0200, Tollef Fog Heen wrote:
[...]
New installations
=
The new init package will ensure that systemd-sysv is installed as
default init on Linux and by demoting the priority of sysvinit and
sysvinit-core to optional those packages will not be
Am 17.07.2014 02:31, schrieb Ben Hutchings:
On Wed, 2014-07-16 at 23:22 +0200, Tollef Fog Heen wrote:
[...]
New installations
=
The new init package will ensure that systemd-sysv is installed as
default init on Linux and by demoting the priority of sysvinit and
sysvinit-core
On 2014-07-16 13:46:12 +0200, Guillem Jover wrote:
On Wed, 2014-07-16 at 11:41:25 +0200, Vincent Lefevre wrote:
On 2014-07-13 13:17:24 +0200, Arno Töll wrote:
Unfortunately it turns out, that /a lot/ of people use aptitude
--purge-unused safe-upgrade, or the apt equivalent apt-get
* Wookey woo...@wookware.org [140716 23:48]:
BTW is there a reason why nmudiff doesn't actually do the upload, as
well as filing the bug? It's very easy to forget the upload and thus
confuse the maintainer by saying 'I have uploaded foo to delayed/X'
when in fact you've not.
It could easily
On 2014-07-16 14:28:00 +0200, David Kalnischkies wrote:
On Wed, Jul 16, 2014 at 11:36:32AM +0200, Vincent Lefevre wrote:
I do that too. I haven't seen any official documentation saying that
this is a bad thing to do.
aptitude actively warns against it as highlighted in this thread.
Wrong!
Hi Arno,
* Arno Töll a...@debian.org [140713 13:25]:
[..]
To summarize the bug reports: The problem is, that Apache package
maintainers at that time decided, that third party modules shall depend
on apache2.2-common, by guaranteeing ABIs remain stable as long as the
package name does not
On 2014-07-17 03:21:28 +0200, Christian Hofstaedtler wrote:
* Arno Töll a...@debian.org [140713 13:25]:
* Ignore the problem, and refer to the manpage of aptitude without
proper fix etc. which clearly says THIS OPTION CAN CAUSE DATA LOSS! DO
NOT USE IT UNLESS YOU KNOW WHAT YOU ARE DOING.
Package: wnpp
Severity: wishlist
Owner: Arnaud Fontaine ar...@debian.org
* Package name: ropemode
Version : 0.2
Upstream Author : Ali Gholami Rudi
* URL : http://rope.sf.net/
* License : GPL
Programming Lang: Python
Description : Helper for using rope
Package: wnpp
Severity: wishlist
Owner: Wookey woo...@debian.org
* Package name: rt-app
Version : 0.2_alpha
Upstream Author : Giacomo Bagnoli g.bagn...@asidev.com
* URL : https://github.com/gbagnoli/rt-app
* License : GPL2
Programming Lang: C
Description
On Thu, 2014-07-17 at 03:05 +0200, Michael Biebl wrote:
Am 17.07.2014 02:31, schrieb Ben Hutchings:
On Wed, 2014-07-16 at 23:22 +0200, Tollef Fog Heen wrote:
[...]
New installations
=
The new init package will ensure that systemd-sysv is installed as
default init on
]] Tobias Frost
On Thu, 2014-07-17 at 03:05 +0200, Michael Biebl wrote:
We are planning to update the priority of systemd and systemd-sysv to
required and demoting sysvinit and sysvinit-core to optional.
I'll amend the patch for sysvinit accordingly.
What are the reasons behind are you
]] Ansgar Burchardt
Tollef Fog Heen tfh...@err.no writes:
So we are proposing the following scheme:
a/ Upload a new init package. This is a new, essential package that
will replace sysvinit as the package that ensures your system has an
init system. We want to build this binary
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Mon, 14 Jul 2014 11:53:08 +0200
Source: felix-framework
Binary: libfelix-framework-java libfelix-framework-java-doc
Architecture: source all
Version: 4.4.0-1
Distribution: unstable
Urgency: medium
Maintainer: Debian Java
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Tue, 15 Jul 2014 22:20:04 +0200
Source: gnome-user-docs
Binary: gnome-user-guide
Architecture: source all
Version: 3.12.2-1
Distribution: unstable
Urgency: medium
Maintainer: Debian GNOME Maintainers
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Wed, 16 Jul 2014 15:58:31 +1000
Source: pcp
Binary: pcp pcp-conf libpcp3-dev libpcp3 libpcp-gui2-dev libpcp-gui2
libpcp-mmv1-dev libpcp-mmv1 libpcp-pmda3-dev libpcp-pmda3 libpcp-trace2-dev
libpcp-trace2 libpcp-import1-dev
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Wed, 16 Jul 2014 10:11:27 +0200
Source: babl
Binary: libbabl-0.1-0 libbabl-dev libbabl-doc libbabl-0.1-0-dbg
Architecture: source all amd64
Version: 0.1.10-2
Distribution: unstable
Urgency: medium
Maintainer: Matteo F. Vescovi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Wed, 16 Jul 2014 10:04:19 +0200
Source: erlang-ibrowse
Binary: erlang-ibrowse
Architecture: source amd64
Version: 4.1.1-1
Distribution: unstable
Urgency: medium
Maintainer: Philipp Huebner debala...@debian.org
Changed-By: Philipp
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Tue, 15 Jul 2014 14:19:22 +0200
Source: gcc-snapshot
Binary: gcc-snapshot
Architecture: source amd64
Version: 20140715-1
Distribution: unstable
Urgency: medium
Maintainer: Debian GCC Maintainers debian-...@lists.debian.org
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Wed, 16 Jul 2014 09:50:15 +0200
Source: gnome-bluetooth
Binary: gnome-bluetooth libgnome-bluetooth13 libgnome-bluetooth-dev
gir1.2-gnomebluetooth-1.0
Architecture: source amd64
Version: 3.12.0-5
Distribution: unstable
Urgency:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Wed, 16 Jul 2014 18:56:58 +0900
Source: pymacs
Binary: pymacs
Architecture: source all
Version: 0.25-1
Distribution: unstable
Urgency: low
Maintainer: Arnaud Fontaine ar...@debian.org
Changed-By: Arnaud Fontaine ar...@debian.org
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Wed, 16 Jul 2014 10:48:07 +0200
Source: bucardo
Binary: bucardo
Architecture: source all
Version: 5.1.0-1
Distribution: unstable
Urgency: medium
Maintainer: Nicholas Jefferson nicho...@pythonic.com.au
Changed-By: Michael Meskes
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Tue, 06 May 2014 20:04:16 +0200
Source: autoradio
Binary: autoradio
Architecture: source all
Version: 2.8.2-1
Distribution: unstable
Urgency: low
Maintainer: Andrea Capriotti capri...@debian.org
Changed-By: Andrea Capriotti
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Mon, 07 Jul 2014 22:17:28 +0200
Source: autoradio
Binary: autoradio
Architecture: source all
Version: 2.8.2-3
Distribution: unstable
Urgency: low
Maintainer: Andrea Capriotti capri...@debian.org
Changed-By: Andrea Capriotti
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Tue, 15 Jul 2014 21:57:00 -0400
Source: hy
Binary: hy python-hy python3-hy
Architecture: source all
Version: 0.10.0-2
Distribution: unstable
Urgency: medium
Maintainer: Tianon Gravi admwig...@gmail.com
Changed-By: Paul Tagliamonte
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Mon, 07 Jul 2014 16:52:07 +0200
Source: autoradio
Binary: autoradio
Architecture: source all
Version: 2.8.2-2
Distribution: unstable
Urgency: low
Maintainer: Andrea Capriotti capri...@debian.org
Changed-By: Andrea Capriotti
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Tue, 15 Jul 2014 13:31:03 +0300
Source: systempreferences.app
Binary: systempreferences.app libpreferencepanes-dev libpreferencepanes1
systempreferences.app-dbg
Architecture: source amd64
Version: 1.2.0-1
Distribution: unstable
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Wed, 16 Jul 2014 13:32:03 +0200
Source: python-dbusmock
Binary: python-dbusmock python3-dbusmock
Architecture: source all
Version: 0.10.3-1
Distribution: unstable
Urgency: medium
Maintainer: Debian Python Modules Team
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Wed, 16 Jul 2014 13:00:30 +0200
Source: redmine
Binary: redmine redmine-mysql redmine-pgsql redmine-sqlite
Architecture: source all
Version: 2.5.2-1
Distribution: unstable
Urgency: medium
Maintainer: Jérémy Lal kapo...@melix.org
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Tue, 15 Jul 2014 21:23:28 +0200
Source: gtk-sharp3
Binary: gtk-sharp3 gtk-sharp3-examples gtk-sharp3-gapi libatk3.0-cil
libcairo1.10-cil libgdk3.0-cil libgdk3.0-cil-dev libgio3.0-cil
libgio3.0-cil-dev libglib3.0-cil
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Wed, 16 Jul 2014 12:48:58 +0200
Source: libguestfs
Binary: guestfsd libguestfs-dev libguestfs0 libguestfs-gfs2 libguestfs-hfsplus
libguestfs-jfs libguestfs-nilfs libguestfs-reiserfs libguestfs-rescue
libguestfs-rsync libguestfs-xfs
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Wed, 16 Jul 2014 21:33:58 +0900
Source: birdfont
Binary: birdfont
Architecture: source amd64
Version: 0.41-1
Distribution: unstable
Urgency: medium
Maintainer: Debian Fonts Task Force pkg-fonts-de...@lists.alioth.debian.org
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Wed, 16 Jul 2014 14:59:46 +0200
Source: findutils
Binary: findutils locate
Architecture: source i386
Version: 4.5.13-1
Distribution: experimental
Urgency: low
Maintainer: Andreas Metzler ametz...@debian.org
Changed-By: Andreas
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Wed, 16 Jul 2014 13:51:22 +0200
Source: libapache-poi-java
Binary: libapache-poi-java libapache-poi-java-doc
Architecture: source all
Version: 3.10-2
Distribution: unstable
Urgency: medium
Maintainer: Debian Java Maintainers
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Wed, 16 Jul 2014 16:50:27 +0200
Source: boinc
Binary: boinc boinc-nvidia-cuda boinc-amd-opencl boinc-client boinc-manager
boinc-dev libboinc-app-dev libboinc-app7 libboinc7 boinc-server-maker
boinc-app-examples boinc-dbg
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Wed, 16 Jul 2014 17:29:07 +0200
Source: libdevel-repl-perl
Binary: libdevel-repl-perl
Architecture: source all
Version: 1.003026-1
Distribution: unstable
Urgency: medium
Maintainer: Debian Perl Group
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Wed, 16 Jul 2014 17:15:29 +0200
Source: libdancer-perl
Binary: libdancer-perl
Architecture: source all
Version: 1.3126+dfsg-1
Distribution: unstable
Urgency: medium
Maintainer: Debian Perl Group
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Wed, 16 Jul 2014 17:34:54 +0200
Source: libfailures-perl
Binary: libfailures-perl
Architecture: source all
Version: 0.004-1
Distribution: unstable
Urgency: medium
Maintainer: Debian Perl Group
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Wed, 16 Jul 2014 16:16:08 +0200
Source: cyrus-imapd-2.4
Binary: cyrus-common-2.4 cyrus-doc-2.4 cyrus-imapd-2.4 cyrus-pop3d-2.4
cyrus-admin-2.4 cyrus-murder-2.4 cyrus-replication-2.4 cyrus-nntpd-2.4
cyrus-caldav-2.4
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Wed, 16 Jul 2014 17:41:32 +0200
Source: liblog-contextual-perl
Binary: liblog-contextual-perl
Architecture: source all
Version: 0.006004-1
Distribution: unstable
Urgency: medium
Maintainer: Debian Perl Group
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Wed, 16 Jul 2014 15:48:54 +0200
Source: nagios-plugins-rabbitmq
Binary: nagios-plugins-rabbitmq
Architecture: source all
Version: 1:1.2.0-2
Distribution: unstable
Urgency: medium
Maintainer: Cyril Bouthors cy...@boutho.rs
Changed-By:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Wed, 16 Jul 2014 17:48:55 +0300
Source: pgbouncer
Binary: pgbouncer
Architecture: source amd64
Version: 1.5.4-6
Distribution: unstable
Urgency: low
Maintainer: Debian PostgreSQL Maintainers
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Fri, 04 Jul 2014 14:22:31 +0200
Source: boinc
Binary: boinc boinc-nvidia-cuda boinc-amd-opencl boinc-client boinc-manager
boinc-dev libboinc-app-dev libboinc-app7 libboinc7 boinc-dbg
Architecture: source all amd64
Version:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Sun, 13 Jul 2014 19:52:33 +0200
Source: libio-socket-ip-perl
Binary: libio-socket-ip-perl
Architecture: source all
Version: 0.31-1
Distribution: unstable
Urgency: low
Maintainer: Debian Perl Group
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Fri, 11 Jul 2014 19:57:58 +0300
Source: gnustep-performance
Binary: libperformance-dev libperformance0.5 libperformance0.5-dbg
Architecture: source amd64
Version: 0.5.0-1
Distribution: unstable
Urgency: low
Maintainer: Debian
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Sat, 12 Jul 2014 17:53:02 +0200
Source: libinline-c-perl
Binary: libinline-c-perl
Architecture: source all
Version: 0.58-1
Distribution: unstable
Urgency: low
Maintainer: Debian Perl Group
1 - 100 of 167 matches
Mail list logo