Re: uscan connection error

2013-05-16 Thread Stéphane Glondu
Le 16/05/2013 07:05, Eugene Zhukov a écrit : I'm trying to download sources using d/watch and uscan. Here is the output of uscan --verbose --force-download: -- Scanning for watchfiles in . -- Found watchfile in ./debian -- In debian/watch, processing watchfile line:

Re: Web ID as passwordless authentication for debian web services [was: Re: Developer repositories for Debian]

2013-05-16 Thread Stéphane Glondu
Le 16/05/2013 05:04, Philip Hands a écrit : Do you have any thoughts on how that compares with using BrowserID/Persona? I'd got the impression that BrowserID has been put together learning from mistakes of OpenID WebID, but perhaps I'm just swallowing their marketing. IIUC, there is no

Re: jessie release goals

2013-05-16 Thread Goswin von Brederlow
On Sun, May 12, 2013 at 05:06:26PM +0200, Matthias Klose wrote: Am 12.05.2013 16:18, schrieb Daniel Schepler: Maybe we could have a release goal of dropping as many lib32* and lib64* packages as possible in favor of multi-arch. (And also as many package dependencies on libc6-[i386|amd64]

Re: jessie release goals

2013-05-16 Thread Goswin von Brederlow
On Sun, May 12, 2013 at 12:17:06PM +0200, Vincent Lefevre wrote: On 2013-05-07 23:53:07 +0800, Thomas Goirand wrote: Now please, do the same reasoning with some other services, like Apache, pure-ftpd, or bind, and explain to me why you would like to have these installed, but not working.

Re: jessie release goals

2013-05-16 Thread Andrei POPESCU
On Lu, 06 mai 13, 14:49:57, Andreas Beckmann wrote: Hi, now might be the right time to start a discussion about release goals for jessie. How about setting default umask for users (uid = 1000) to 002? Kind regards, Andrei -- http://wiki.debian.org/FAQsFromDebianUser Offtopic discussions

Re: jessie release goals

2013-05-16 Thread Goswin von Brederlow
On Wed, May 15, 2013 at 09:43:02PM +0200, Christoph Biedl wrote: Christoph Anton Mitterer wrote... 2) No more packages that bypass the package management system and secure apt: a) There are still several (typically non-free) packages which download stuff from the web, install or at

Re: /bin/sh (was Re: jessie release goals)

2013-05-16 Thread Goswin von Brederlow
On Sat, May 11, 2013 at 05:29:45PM +0200, Sven Joachim wrote: On 2013-05-11 11:22 +0200, Goswin von Brederlow wrote: While that might be of some interest the real goal of the change was to be able to have more than *2* packages provide /bin/sh. Currently, due to the totaly screwed up

Re: /bin/sh (was Re: jessie release goals)

2013-05-16 Thread Goswin von Brederlow
On Sun, May 12, 2013 at 02:40:39AM +0100, Wookey wrote: +++ Steve Langasek [2013-05-11 09:33 -0700]: On Sat, May 11, 2013 at 11:22:10AM +0200, Goswin von Brederlow wrote: While that might be of some interest the real goal of the change was to be able to have more than *2* packages

Re: /bin/sh (was Re: jessie release goals)

2013-05-16 Thread Goswin von Brederlow
On Sat, May 11, 2013 at 08:44:30PM +0100, Roger Leigh wrote: On Sat, May 11, 2013 at 08:52:29PM +0200, Josselin Mouette wrote: Being able to choose between two entirely different desktop environments, with different user experiences, is a good thing. Being able to choose between two /bin/sh

Re: /bin/sh

2013-05-16 Thread Goswin von Brederlow
On Tue, May 14, 2013 at 12:21:33PM -0500, Steve Langasek wrote: On Tue, May 14, 2013 at 10:03:34AM -0700, Russ Allbery wrote: I think that, to convince people that flexibility won't cause stability and complexity problems, you're going to need to present a complete and fairly bulletproof

Re: /bin/sh (was Re: jessie release goals)

2013-05-16 Thread Goswin von Brederlow
On Sun, May 12, 2013 at 02:40:39AM +0100, Wookey wrote: +++ Steve Langasek [2013-05-11 09:33 -0700]: On Sat, May 11, 2013 at 11:22:10AM +0200, Goswin von Brederlow wrote: While that might be of some interest the real goal of the change was to be able to have more than *2* packages

Re: uscan connection error

2013-05-16 Thread Mathieu Malaterre
On Thu, May 16, 2013 at 7:05 AM, Eugene Zhukov jevgeni...@gmail.com wrote: Hello, I'm trying to download sources using d/watch and uscan. Here is the output of uscan --verbose --force-download: -- Scanning for watchfiles in . -- Found watchfile in ./debian -- In debian/watch, processing

Re: /bin/sh (was Re: jessie release goals)

2013-05-16 Thread Wouter Verhelst
Hi Thorsten On 11-05-13 20:26, Thorsten Glaser wrote: Steve Langasek vorlon at debian.org writes: This is not a sensible goal. Choice of /bin/sh should *not* be the goal, the goal should be to get a good, fast, minimal, policy-compliant /bin/sh for *everyone*. Sure. We just disagree

Re: Source build-dependencies

2013-05-16 Thread Wouter Verhelst
On 12-05-13 04:03, Paul Wise wrote: On Sun, May 12, 2013 at 1:03 AM, Wookey wrote: I'd vote for that too, as it would be very helpful for cross-toolchain building. I hadn't realised that source build-deps was a possibility. Is it? Does anyone have a proposal for how it might work? It

Re: /bin/sh (was Re: jessie release goals)

2013-05-16 Thread Wouter Verhelst
On 15-05-13 17:39, Thorsten Glaser wrote: As for your requests of data: I do not provide them. As I said above, I’m pushing for freedom of choice, not switching the default; of course I’d be happy with the latter, even more so actually, but it must be a thing not driven by me; I see. In that

Re: jessie release goals

2013-05-16 Thread Wouter Verhelst
On 13-05-13 06:16, Paul Wise wrote: On Mon, May 13, 2013 at 1:01 AM, Philip Hands wrote: I don't know about you, but I find it quite reassuring to be able to confirm that the first half of an install is going pretty well when I get to see the useless dummy page from Apache. I'd imagine

Re: jessie release goals

2013-05-16 Thread Peter Makholm
Thomas Goirand z...@debian.org writes: Now please, do the same reasoning with some other services, like Apache, pure-ftpd, or bind, and explain to me why you would like to have these installed, but not working. As a developer I have often found use for having Apache installed, just so I can

Bug#708528: ITP: mac-robber -- collects data about allocated files in mounted filesystems

2013-05-16 Thread Joao Eriberto Mota Filho
Package: wnpp Severity: wishlist Owner: Joao Eriberto Mota Filho eribe...@eriberto.pro.br * Package name: mac-robber Version : 1.02 Upstream Author : Brian Carrier carr...@sleuthkit.org * URL : http://www.sleuthkit.org/mac-robber * License : GPL2 Programming

Re: uscan connection error

2013-05-16 Thread Eugene Zhukov
On Thu, May 16, 2013 at 10:30 AM, Eugene Zhukov jevgeni...@gmail.com wrote: On Thu, May 16, 2013 at 9:53 AM, Mathieu Malaterre ma...@debian.org wrote: On Thu, May 16, 2013 at 7:05 AM, Eugene Zhukov jevgeni...@gmail.com wrote: Hello, I'm trying to download sources using d/watch and uscan. Here

Re: uscan connection error

2013-05-16 Thread Eugene Zhukov
On Thu, May 16, 2013 at 9:53 AM, Mathieu Malaterre ma...@debian.org wrote: On Thu, May 16, 2013 at 7:05 AM, Eugene Zhukov jevgeni...@gmail.com wrote: Hello, I'm trying to download sources using d/watch and uscan. Here is the output of uscan --verbose --force-download: -- Scanning for

Re: /bin/sh (was Re: jessie release goals)

2013-05-16 Thread Helmut Grohne
On Wed, May 15, 2013 at 03:39:54PM +, Thorsten Glaser wrote: As for your requests of data: I do not provide them. As I said above, I???m pushing for freedom of choice, not switching the default; of course I???d be happy with the latter, even more so actually, but it must be a thing not

Re: Web ID as passwordless authentication for debian web services [was: Re: Developer repositories for Debian]

2013-05-16 Thread Jonas Smedegaard
Quoting Stéphane Glondu (2013-05-16 10:57:19) Le 16/05/2013 05:04, Philip Hands a écrit : Do you have any thoughts on how that compares with using BrowserID/Persona? I'd got the impression that BrowserID has been put together learning from mistakes of OpenID WebID, but perhaps I'm

Re: Debian development and release: always releasable (essay)

2013-05-16 Thread Lars Wirzenius
On Thu, May 16, 2013 at 12:29:11AM +0200, Kurt Roeckx wrote: One thing I'm wondering about, and you don't seem to talk about is what versions end up in a release. Some upstreams have a testing branch of there software and a release branch. It's sometimes useful to have people test the

Re: jessie release goals

2013-05-16 Thread Vincent Lefevre
On 2013-05-15 20:27:09 +0200, Jean-Christophe Dubacq wrote: No. Your server comes unconfigured, you do configure it while the other is still working, and then you stop the service on the first, finish syncing the mailboxes, switch the MX record, and then you can go to rest. This is not

Advertising on Debian.org

2013-05-16 Thread Irene Rivera
Hi, We are interested in buying non-standard ad placements on your site - debian. org. We offer flat CPM, long term partnership. Can discuss buying all impressions. Please contact me for more details. Thanks, Irene -- Sales and Marketing Manager *Nster, LLC* *7709 Santa Monica Blvd.*

Re: Source build-dependencies

2013-05-16 Thread Guillem Jover
On Tue, 2013-05-14 at 08:50:39 +0800, Paul Wise wrote: On Mon, May 13, 2013 at 11:17 PM, Stéphane Glondu wrote: Le 13/05/2013 15:51, Paul Wise a écrit : [...] as long as there is a way to build-depend on the build-dependencies for a source package, that should be fine. As a bonus we can

Re: Debian development and release: always releasable (essay)

2013-05-16 Thread Neil McGovern
On Thu, May 16, 2013 at 12:29:11AM +0200, Kurt Roeckx wrote: Some upstreams have a testing branch of there software and a release branch. It's sometimes useful to have people test the version in from the testing branch, and having it available in Debian makes it easier for people to test it.

Re: Web ID as passwordless authentication for debian web services

2013-05-16 Thread Russ Allbery
Jonas Smedegaard d...@jones.dk writes: This seems similar as WebID: In principle ties to HTTPS - and therefore the CA cartel - is only optional (other URIs than http ones suffice). In reality alternatives to HTTP(S) is work in progress. Changing the protocol doesn't help you get away from

Re: Debian development and release: always releasable (essay)

2013-05-16 Thread Andrei POPESCU
On Jo, 16 mai 13, 10:52:05, Neil McGovern wrote: On Thu, May 16, 2013 at 12:29:11AM +0200, Kurt Roeckx wrote: Some upstreams have a testing branch of there software and a release branch. It's sometimes useful to have people test the version in from the testing branch, and having it

Re: Web ID as passwordless authentication for debian web services

2013-05-16 Thread Simon McVittie
On 16/05/13 16:42, Russ Allbery wrote: In essence, [WebID] moves the authentication problem from user authentication to URI endpoint authentication, under the theory that we already know how to validate URI endpoints and that such validation is an easier problem. ... or to look at it another

Re: Web ID as passwordless authentication for debian web services

2013-05-16 Thread Wouter Verhelst
On 16-05-13 17:42, Russ Allbery wrote: You could, in theory, switch to DNSSEC, but now you're just replacing one CA cartel with another. Except that with DNSSEC (and DANE), the number of people you have to trust is much smaller. -- This end should point toward the ground if you want to go to

Re: Web ID as passwordless authentication for debian web services

2013-05-16 Thread Russ Allbery
Wouter Verhelst wou...@debian.org writes: On 16-05-13 17:42, Russ Allbery wrote: You could, in theory, switch to DNSSEC, but now you're just replacing one CA cartel with another. Except that with DNSSEC (and DANE), the number of people you have to trust is much smaller. Right, it depends

Re: Removal of install-info from dpkg

2013-05-16 Thread Guillem Jover
On Tue, 2013-05-07 at 14:15:56 +0200, Guillem Jover wrote: The “dpkg (= 1.15.4) | install-info” dependency can also be dropped from packages providing an info file, because all info-browsers are now guaranteed (due to the release) to Depend on install-info. I'll file a bug on debhelper and

Re: Debian development and release: always releasable (essay)

2013-05-16 Thread Kurt Roeckx
On Thu, May 16, 2013 at 08:03:33AM +0100, Lars Wirzenius wrote: I'd use a PPA-style package repository of some sort, and then advertise it to people might want to try that version of the package. Then it makes more sense to upload it to experimental to me. Kurt -- To UNSUBSCRIBE, email

Packaging releases without a tarball (sometimes)

2013-05-16 Thread Pau Garcia i Quiles
Hello, I am having trouble with my package jquery-jplayer (a JavaScript library with Flash fallback) and I would like to ask for advice on how to proceed Major and minor releases are available as zip files from the official website ( http://jplayer.org/download/ ) and they are tagged in the git

Re: Web ID as passwordless authentication for debian web services

2013-05-16 Thread Jonas Smedegaard
[ Cc'ing Daniel to help kill my misconceptions, as need be ] Quoting Russ Allbery (2013-05-16 17:42:20) Jonas Smedegaard d...@jones.dk writes: This seems similar as WebID: In principle ties to HTTPS - and therefore the CA cartel - is only optional (other URIs than http ones suffice).

Re: Web ID as passwordless authentication for debian web services

2013-05-16 Thread Russ Allbery
Jonas Smedegaard d...@jones.dk writes: Quoting Russ Allbery (2013-05-16 17:42:20) Jonas Smedegaard d...@jones.dk writes: This seems similar as WebID: In principle ties to HTTPS - and therefore the CA cartel - is only optional (other URIs than http ones suffice). In reality alternatives to

Re: Web ID as passwordless authentication for debian web services

2013-05-16 Thread Jonas Smedegaard
Quoting Russ Allbery (2013-05-16 18:37:06) So, again, it comes down to what problem we're trying to solve. If the problem is just how do we authenticate Debian contributors to Debian systems, then we're actually in the institutional case and we don't have to trust anyone outside the

Re: Web ID as passwordless authentication for debian web services [was: Re: Developer repositories for Debian]

2013-05-16 Thread Daniel Kahn Gillmor
On 05/15/2013 11:04 PM, Philip Hands wrote: Do you have any thoughts on how that compares with using BrowserID/Persona? I'd got the impression that BrowserID has been put together learning from mistakes of OpenID WebID, but perhaps I'm just swallowing their marketing. It looks to me like

Re: Web ID as passwordless authentication for debian web services

2013-05-16 Thread Daniel Kahn Gillmor
On 05/16/2013 01:57 PM, Russ Allbery wrote: If introduce Monkeysphere to do the URI endpoint verification, it seems to me like you could just as easily introduce Monkeysphere to do the user certificate verification directly, thus removing the need to introduce a third party metadata provider.

Re: Web ID as passwordless authentication for debian web services

2013-05-16 Thread Russ Allbery
Jonas Smedegaard d...@jones.dk writes: Quoting Russ Allbery (2013-05-16 18:37:06) but it's not clear to me why we'd bother as opposed to just issuing client X.509 certificates with the metadata already included. Because the very separation of identifiers from the identified makes the

Bug#708569: ITP: libmoosex-classattribute-perl -- module to declare class attributes Moose-style

2013-05-16 Thread Oleg Gashev
Package: wnpp Severity: wishlist Owner: Oleg Gashev o...@gashev.net * Package name: libmoosex-classattribute-perl Version : 0.27 Upstream Author : Dave Rolsky auta...@urth.org * URL : https://metacpan.org/release/MooseX-ClassAttribute/ * License : Artistic-2.0

Re: Web ID as passwordless authentication for debian web services

2013-05-16 Thread Jonas Smedegaard
Quoting Russ Allbery (2013-05-16 19:57:59) Jonas Smedegaard d...@jones.dk writes: Quoting Russ Allbery (2013-05-16 17:42:20) Jonas Smedegaard d...@jones.dk writes: This seems similar as WebID: In principle ties to HTTPS - and therefore the CA cartel - is only optional (other URIs than

Bug#708571: ITP: libmoosex-role-strict-perl -- use strict 'roles'

2013-05-16 Thread Oleg Gashev
Package: wnpp Severity: wishlist Owner: Oleg Gashev o...@gashev.net * Package name: libmoosex-role-strict-perl Version : 0.05 Upstream Author : Curtis Ovid Poe o...@cpan.org * URL : https://metacpan.org/release/MooseX-Role-Strict/ * License : Artistic or GPL-1+

Re: Web ID as passwordless authentication for debian web services

2013-05-16 Thread Jonas Smedegaard
Quoting Daniel Kahn Gillmor (2013-05-16 20:38:41) On 05/16/2013 01:57 PM, Russ Allbery wrote: If introduce Monkeysphere to do the URI endpoint verification, it seems to me like you could just as easily introduce Monkeysphere to do the user certificate verification directly, thus removing

Re: Web ID as passwordless authentication for debian web services

2013-05-16 Thread Jonas Smedegaard
Quoting Russ Allbery (2013-05-16 20:40:24) Jonas Smedegaard d...@jones.dk writes: Quoting Russ Allbery (2013-05-16 18:37:06) but it's not clear to me why we'd bother as opposed to just issuing client X.509 certificates with the metadata already included. Because the very separation

Re: jessie release goals

2013-05-16 Thread Clint Byrum
Excerpts from Wouter Verhelst's message of 2013-05-14 03:22:14 -0700: On 13-05-13 05:59, Mark Symonds wrote: Can we keep the distribution simple enough for nearly anyone to understand? No. The goal of Debian is not to be simple. While we should document things as much as possible so

Re: jessie release goals

2013-05-16 Thread Moritz Mühlenhoff
Christoph Biedl debian.a...@manchmal.in-ulm.de schrieb: Another thing: Hardening already has been a release goal but there still are packages around without. Agreed. I made a concentrated effort for Wheezy by submitting lots of patches for crucial packages and the general adoption among

blhc and hardening flags (was: Re: jessie release goals)

2013-05-16 Thread Russ Allbery
Moritz Mühlenhoff j...@inutil.org writes: Agreed. I made a concentrated effort for Wheezy by submitting lots of patches for crucial packages and the general adoption among maintainers is increasing. Also, Simon Ruderich's blhc tool has been very useful and hardening checks are now also part

Re: Packaging releases without a tarball (sometimes)

2013-05-16 Thread Игорь Пашев
Put git updates as a patch, e. g. debian/patches/git-update.patch Bump debian part of version as usual. AFAIK python is packaged in this way -- To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive:

nmu builds breaking multiarch

2013-05-16 Thread David Mohr
Hi, I filed bug #708299 [1] but realize that it's not really an issue with that package: dpkg doesn't like it when buildd adds an architecture specific entry to changelog.Debian: snip Preparing to replace libgl1-mesa-dri:amd64 8.0.5-4 (using .../libgl1-mesa-dri_8.0.5-4+b1_amd64.deb) ...

Re: Web ID as passwordless authentication for debian web services

2013-05-16 Thread Russ Allbery
Jonas Smedegaard d...@jones.dk writes: Quoting Russ Allbery (2013-05-16 19:57:59) Sure, but if you have control over the server certificate and are tying the server certificate to the user certificate via some mechanism like Monkeysphere, why do the whole indirection dance through a URI at

Re: /bin/sh (was Re: jessie release goals)

2013-05-16 Thread Joshuah Hurst
On Tue, May 7, 2013 at 4:23 PM, Thorsten Glaser t...@debian.org wrote: Andreas Beckmann anbe at debian.org writes: now might be the right time to start a discussion about release goals for jessie. Here are some points that come into my mind right now (and * Resolve that /bin/sh issue (see

Re: nmu builds breaking multiarch

2013-05-16 Thread Cyril Brulebois
Hi David, David Mohr damaili...@mcbf.net (16/05/2013): I filed bug #708299 [1] but realize that it's not really an issue with that package: dpkg doesn't like it when buildd adds an architecture specific entry to changelog.Debian: […] everyone knows:

Re: /bin/sh

2013-05-16 Thread Thorsten Glaser
Joshuah Hurst dixit: Solaris 11, OpenSolaris and Illumos use ksh93 as /bin/sh Yeah, but it’s not eligible for that in Debian, as Debian guarantees the usability of “local” even for /bin/sh scripts. I wrote about that already, IIRC even in this thread. /usr/bin/sh Yuk, Solaris abomination. and

Re: Web ID as passwordless authentication for debian web services

2013-05-16 Thread Daniel Kahn Gillmor
On 05/16/2013 03:52 PM, Jonas Smedegaard wrote: I think you are missing the potential for third-parties to make use of identifiers without needing authentication. well, they still need to do authentication. For example, consider three (not necessarily incompatible) channels to tie

Re: Switching packages to non-awaiting triggers

2013-05-16 Thread Charles Plessy
Hello everybody, For those interested in learning more about triggers, including the noawait forms, which Guillem reminded us that they should be the ones to use in most of the cases, I recommend to have a look to the patch in preparation for the Debian Policy.

Do opaque struct changes break C library ABIs

2013-05-16 Thread Russ Allbery
I have a C shared library that takes a pointer to an opaque struct as the first argument to most of its API calls. The internal layout of that opaque struct is changing (to add new members). The only way to create the opaque state struct is via a call to remctl_new(), which returns a pointer to

Work-needing packages report for May 17, 2013

2013-05-16 Thread wnpp
The following is a listing of packages for which help has been requested through the WNPP (Work-Needing and Prospective Packages) system in the last week. Total number of orphaned packages: 514 (new: 1) Total number of packages offered up for adoption: 140 (new: 5) Total number of packages

Re: Packaging releases without a tarball (sometimes)

2013-05-16 Thread Chow Loong Jin
On 17/05/2013 01:01, Pau Garcia i Quiles wrote: Patch releases are NOT available as zip files and the list of wrongdoings is long: - Patch releases are only available from the git repository Maybe I'm daft, but I can't seem to find any patch releases, actually. Where are they stored? --

Re: Web ID as passwordless authentication for debian web services

2013-05-16 Thread Marco d'Itri
On May 16, Russ Allbery r...@debian.org wrote: DNSSEC isn't going to help. I think it's best to assume that both the US and Chinese governments, at least, can make DNSSEC say what they want it to if they ever needed to. Maybe, but I think it's also safe to assume that the USG has no way of

Bug#708566: library -dev naming policy encourages unnecessary transitions (was: Re: Upcoming libgd2-{xpm,noxpm}-dev - libgd2-dev transition)

2013-05-16 Thread Guillem Jover
Hi! [ Just saw while drafting this, that you filed the bug on policy, so sending a copy there too, let's continue the discussion there then. ] On Wed, 2013-05-15 at 09:51:23 -0700, Russ Allbery wrote: Andreas Beckmann a...@debian.org writes: On 2013-05-15 09:58, Ondřej Surý wrote: The '2'

Re: Packaging releases without a tarball (sometimes)

2013-05-16 Thread Paul Wise
On Fri, May 17, 2013 at 1:01 AM, Pau Garcia i Quiles wrote: I am having trouble with my package jquery-jplayer (a JavaScript library with Flash fallback) and I would like to ask for advice on how to proceed I would suggest asking upstream again to properly git tag patch releases, make branches

Re: Do opaque struct changes break C library ABIs

2013-05-16 Thread Guillem Jover
Hi! On Thu, 2013-05-16 at 17:35:10 -0700, Russ Allbery wrote: I have a C shared library that takes a pointer to an opaque struct as the first argument to most of its API calls. The internal layout of that opaque struct is changing (to add new members). The only way to create the opaque

Re: Do opaque struct changes break C library ABIs

2013-05-16 Thread Josselin Mouette
Le jeudi 16 mai 2013 à 17:35 -0700, Russ Allbery a écrit : I have a C shared library that takes a pointer to an opaque struct as the first argument to most of its API calls. The internal layout of that opaque struct is changing (to add new members). The only way to create the opaque state

Re: Do opaque struct changes break C library ABIs

2013-05-16 Thread Mathieu Malaterre
On Fri, May 17, 2013 at 2:35 AM, Russ Allbery r...@debian.org wrote: I have a C shared library that takes a pointer to an opaque struct as the first argument to most of its API calls. The internal layout of that opaque struct is changing (to add new members). The only way to create the

Accepted alglib 3.7.0-2 (source amd64)

2013-05-16 Thread Anton Gladky
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Thu, 16 May 2013 00:06:54 +0200 Source: alglib Binary: libalglib-dev libalglib3 libalglib3-dbg Architecture: source amd64 Version: 3.7.0-2 Distribution: unstable Urgency: low Maintainer: Debian Science Team

Accepted bird 1.3.10-1 (source amd64)

2013-05-16 Thread Ondřej Surý
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Tue, 07 May 2013 13:49:15 +0200 Source: bird Binary: bird bird6 bird-dbg Architecture: source amd64 Version: 1.3.10-1 Distribution: unstable Urgency: low Maintainer: Ondřej Surý ond...@debian.org Changed-By: Ondřej Surý

Accepted python-quantumclient 1:2.1-2 (source all)

2013-05-16 Thread Thomas Goirand
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Thu, 16 May 2013 05:53:43 + Source: python-quantumclient Binary: python-quantumclient Architecture: source all Version: 1:2.1-2 Distribution: unstable Urgency: low Maintainer: PKG OpenStack openstack-de...@lists.alioth.debian.org

Accepted ruby-minitest 5.0.1-1 (source all)

2013-05-16 Thread Cédric Boutillier
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Format: 1.8 Date: Thu, 16 May 2013 01:09:24 +0200 Source: ruby-minitest Binary: ruby-minitest Architecture: source all Version: 5.0.1-1 Distribution: unstable Urgency: low Maintainer: Debian Ruby Extras Maintainers

Accepted libntlm 1.2-3 (source amd64)

2013-05-16 Thread Simon Josefsson
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Tue, 14 May 2013 11:18:36 +0200 Source: libntlm Binary: libntlm0-dev libntlm0 Architecture: source amd64 Version: 1.2-3 Distribution: unstable Urgency: low Maintainer: Debian XMPP Maintainers pkg-xmpp-de...@lists.alioth.debian.org

Accepted libjogl2-java 2.0-rc11-1 (source all amd64)

2013-05-16 Thread Sylvestre Ledru
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Wed, 15 May 2013 10:18:59 +0200 Source: libjogl2-java Binary: libjogl2-java libjogl2-jni libjogl2-java-doc libjogl2-toolkits Architecture: source all amd64 Version: 2.0-rc11-1 Distribution: unstable Urgency: low Maintainer: Debian

Accepted keystone 2013.1.1-2 (source all)

2013-05-16 Thread Thomas Goirand
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Fri, 10 May 2013 10:22:18 +0800 Source: keystone Binary: python-keystone keystone keystone-doc Architecture: source all Version: 2013.1.1-2 Distribution: unstable Urgency: low Maintainer: PKG OpenStack

Accepted vdr-plugin-dvd 0.3.6~b03+cvs20090426.0013-19 (source amd64)

2013-05-16 Thread Tobias Grimm
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Sun, 31 Mar 2013 14:00:02 +0200 Source: vdr-plugin-dvd Binary: vdr-plugin-dvd Architecture: source amd64 Version: 0.3.6~b03+cvs20090426.0013-19 Distribution: unstable Urgency: low Maintainer: Debian VDR Team

Accepted vdr-plugin-femon 2.0.0-1 (source amd64)

2013-05-16 Thread Tobias Grimm
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Mon, 22 Apr 2013 19:22:08 +0200 Source: vdr-plugin-femon Binary: vdr-plugin-femon Architecture: source amd64 Version: 2.0.0-1 Distribution: unstable Urgency: low Maintainer: Debian VDR Team pkg-vdr-dvb-de...@lists.alioth.debian.org

Accepted vdr-plugin-games 0.6.3-44 (source amd64)

2013-05-16 Thread Tobias Grimm
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Sun, 31 Mar 2013 14:00:08 +0200 Source: vdr-plugin-games Binary: vdr-plugin-games Architecture: source amd64 Version: 0.6.3-44 Distribution: unstable Urgency: low Maintainer: Debian VDR Team pkg-vdr-dvb-de...@lists.alioth.debian.org

Accepted vdr-plugin-mp3 0.10.2-19 (source amd64)

2013-05-16 Thread Tobias Grimm
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Sun, 31 Mar 2013 14:00:11 +0200 Source: vdr-plugin-mp3 Binary: vdr-plugin-mp3 vdr-plugin-mplayer Architecture: source amd64 Version: 0.10.2-19 Distribution: unstable Urgency: low Maintainer: Debian VDR Team

Accepted vdr-plugin-sudoku 0.3.5-17 (source amd64)

2013-05-16 Thread Tobias Grimm
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Sun, 31 Mar 2013 14:00:20 +0200 Source: vdr-plugin-sudoku Binary: vdr-plugin-sudoku Architecture: source amd64 Version: 0.3.5-17 Distribution: unstable Urgency: low Maintainer: Debian VDR Team

Accepted vdr-plugin-spider 0.2.2-19 (source amd64)

2013-05-16 Thread Tobias Grimm
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Sun, 31 Mar 2013 14:00:18 +0200 Source: vdr-plugin-spider Binary: vdr-plugin-spider Architecture: source amd64 Version: 0.2.2-19 Distribution: unstable Urgency: low Maintainer: Debian VDR Team

Accepted vdr-plugin-svdrpservice 0.0.4-19 (source amd64 all)

2013-05-16 Thread Tobias Grimm
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Sun, 31 Mar 2013 14:00:23 +0200 Source: vdr-plugin-svdrpservice Binary: vdr-plugin-svdrpservice svdrpservice-dev Architecture: source amd64 all Version: 0.0.4-19 Distribution: unstable Urgency: low Maintainer: Debian VDR Team

Accepted vdr-plugin-epgsync 0.0.4-17 (source amd64)

2013-05-16 Thread Tobias Grimm
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Sun, 31 Mar 2013 14:00:04 +0200 Source: vdr-plugin-epgsync Binary: vdr-plugin-epgsync Architecture: source amd64 Version: 0.0.4-17 Distribution: unstable Urgency: low Maintainer: Debian VDR Team

Accepted vdr-plugin-remoteosd 0.1.1-10 (source amd64)

2013-05-16 Thread Tobias Grimm
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Sun, 31 Mar 2013 14:00:16 +0200 Source: vdr-plugin-remoteosd Binary: vdr-plugin-remoteosd Architecture: source amd64 Version: 0.1.1-10 Distribution: unstable Urgency: low Maintainer: Debian VDR Team

Accepted vdr-plugin-osdserver 0.1.3-12 (source amd64)

2013-05-16 Thread Tobias Grimm
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Sun, 31 Mar 2013 14:00:12 +0200 Source: vdr-plugin-osdserver Binary: vdr-plugin-osdserver Architecture: source amd64 Version: 0.1.3-12 Distribution: unstable Urgency: low Maintainer: Debian VDR Team

Accepted vdr-plugin-svdrposd 0.1.1-13 (source amd64 all)

2013-05-16 Thread Tobias Grimm
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Sun, 31 Mar 2013 14:00:22 +0200 Source: vdr-plugin-svdrposd Binary: vdr-plugin-svdrposd vdr-plugin-svdrpext Architecture: source amd64 all Version: 0.1.1-13 Distribution: unstable Urgency: low Maintainer: Debian VDR Team

Accepted glance 2013.1-2 (source all)

2013-05-16 Thread Thomas Goirand
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Wed, 24 Apr 2013 00:09:42 +0800 Source: glance Binary: python-glance glance python-glance-doc glance-common glance-api glance-registry Architecture: source all Version: 2013.1-2 Distribution: unstable Urgency: low Maintainer: PKG

Accepted swift 1.8.0-2 (source all)

2013-05-16 Thread Thomas Goirand
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Wed, 15 May 2013 22:32:52 +0800 Source: swift Binary: python-swift swift swift-proxy swift-object swift-container swift-account swift-doc Architecture: source all Version: 1.8.0-2 Distribution: unstable Urgency: low Maintainer: PKG

Accepted cinder 2013.1.1-1 (source all)

2013-05-16 Thread Thomas Goirand
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Thu, 11 Apr 2013 22:30:47 +0800 Source: cinder Binary: python-cinder cinder-common cinder-api cinder-volume cinder-scheduler cinder-backup Architecture: source all Version: 2013.1.1-1 Distribution: unstable Urgency: low Maintainer:

Accepted boinc 7.0.65+dfsg-3 (source all amd64)

2013-05-16 Thread Gianfranco Costamagna
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Wed, 15 May 2013 17:33:13 +0200 Source: boinc Binary: boinc libboinc7 boinc-nvidia-cuda boinc-amd-opencl boinc-client boinc-manager boinc-dev libboinc-app-dev libboinc-app7 boinc-dbg Architecture: source all amd64 Version:

Accepted ceilometer 2013.1-2 (source all)

2013-05-16 Thread Thomas Goirand
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Thu, 16 May 2013 07:44:07 + Source: ceilometer Binary: python-ceilometer ceilometer-common ceilometer-collector ceilometer-api ceilometer-agent-compute ceilometer-agent-central Architecture: source all Version: 2013.1-2

Accepted clzip 1.5~pre1-1 (source i386)

2013-05-16 Thread Daniel Baumann
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Thu, 16 May 2013 10:06:26 +0200 Source: clzip Binary: clzip clzip-dbg Architecture: source i386 Version: 1.5~pre1-1 Distribution: experimental Urgency: low Maintainer: Daniel Baumann m...@daniel-baumann.ch Changed-By: Daniel Baumann

Accepted irker 1.19+dfsg-1 (source all)

2013-05-16 Thread Daniel Baumann
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Thu, 16 May 2013 10:46:00 +0200 Source: irker Binary: irker Architecture: source all Version: 1.19+dfsg-1 Distribution: experimental Urgency: low Maintainer: Daniel Baumann m...@daniel-baumann.ch Changed-By: Daniel Baumann

Accepted libgmpada 0.0.20121109-2 (source amd64)

2013-05-16 Thread Nicolas Boulenguez
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Format: 1.8 Date: Sun, 10 Mar 2013 20:04:13 +0100 Source: libgmpada Binary: libgmpada4-dev libgmpada2 libgmpada-dbg Architecture: source amd64 Version: 0.0.20121109-2 Distribution: unstable Urgency: low Maintainer: Nicolas Boulenguez

Accepted lunzip 1.2-4 (source i386)

2013-05-16 Thread Daniel Baumann
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Thu, 16 May 2013 10:10:21 +0200 Source: lunzip Binary: lunzip lunzip-dbg Architecture: source i386 Version: 1.2-4 Distribution: experimental Urgency: low Maintainer: Daniel Baumann m...@daniel-baumann.ch Changed-By: Daniel Baumann

Accepted lzip 1.15~pre2-1 (source i386)

2013-05-16 Thread Daniel Baumann
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Thu, 16 May 2013 10:19:29 +0200 Source: lzip Binary: lzip lzip-dbg Architecture: source i386 Version: 1.15~pre2-1 Distribution: experimental Urgency: low Maintainer: Daniel Baumann m...@daniel-baumann.ch Changed-By: Daniel Baumann

Accepted lziprecover 1.14~rc3-1 (source i386)

2013-05-16 Thread Daniel Baumann
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Thu, 16 May 2013 10:23:12 +0200 Source: lziprecover Binary: lziprecover lziprecover-dbg Architecture: source i386 Version: 1.14~rc3-1 Distribution: experimental Urgency: low Maintainer: Daniel Baumann m...@daniel-baumann.ch

Accepted pdlzip 1.4~rc2-2 (source i386)

2013-05-16 Thread Daniel Baumann
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Thu, 16 May 2013 10:26:15 +0200 Source: pdlzip Binary: pdlzip pdlzip-dbg Architecture: source i386 Version: 1.4~rc2-2 Distribution: experimental Urgency: low Maintainer: Daniel Baumann m...@daniel-baumann.ch Changed-By: Daniel

Accepted plzip 1.0~rc1-2 (source i386)

2013-05-16 Thread Daniel Baumann
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Thu, 16 May 2013 10:32:35 +0200 Source: plzip Binary: plzip plzip-dbg Architecture: source i386 Version: 1.0~rc1-2 Distribution: experimental Urgency: low Maintainer: Daniel Baumann m...@daniel-baumann.ch Changed-By: Daniel Baumann

Accepted pygobject 3.8.2-1 (source amd64 all)

2013-05-16 Thread Martin Pitt
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Format: 1.8 Date: Wed, 15 May 2013 08:54:32 +0200 Source: pygobject Binary: python-gi python3-gi python-gi-cairo python-gi-dbg python3-gi-dbg python-gi-dev python3-gi-cairo python-gobject python-gobject-dbg python-gobject-dev Architecture: source

Accepted python-irc 8.3+dfsg-1 (source all)

2013-05-16 Thread Daniel Baumann
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Thu, 16 May 2013 10:42:30 +0200 Source: python-irc Binary: python-irc Architecture: source all Version: 8.3+dfsg-1 Distribution: experimental Urgency: low Maintainer: Daniel Baumann m...@daniel-baumann.ch Changed-By: Daniel Baumann

Accepted python-ws4py 0.2.4-2 (source all)

2013-05-16 Thread Stein Magnus Jodal
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Format: 1.8 Date: Wed, 15 May 2013 22:24:49 +0200 Source: python-ws4py Binary: python-ws4py python3-ws4py Architecture: source all Version: 0.2.4-2 Distribution: unstable Urgency: low Maintainer: Stein Magnus Jodal stein.mag...@jodal.no Changed-By:

  1   2   3   >