Le 16/05/2013 07:05, Eugene Zhukov a écrit :
I'm trying to download sources using d/watch and uscan. Here is the
output of uscan --verbose --force-download:
-- Scanning for watchfiles in .
-- Found watchfile in ./debian
-- In debian/watch, processing watchfile line:
Le 16/05/2013 05:04, Philip Hands a écrit :
Do you have any thoughts on how that compares with using
BrowserID/Persona? I'd got the impression that BrowserID has been put
together learning from mistakes of OpenID WebID, but perhaps I'm just
swallowing their marketing.
IIUC, there is no
On Sun, May 12, 2013 at 05:06:26PM +0200, Matthias Klose wrote:
Am 12.05.2013 16:18, schrieb Daniel Schepler:
Maybe we could have a release goal of dropping as many lib32* and lib64*
packages as possible in favor of multi-arch. (And also as many package
dependencies on libc6-[i386|amd64]
On Sun, May 12, 2013 at 12:17:06PM +0200, Vincent Lefevre wrote:
On 2013-05-07 23:53:07 +0800, Thomas Goirand wrote:
Now please, do the same reasoning with some other services,
like Apache, pure-ftpd, or bind, and explain to me why you would
like to have these installed, but not working.
On Lu, 06 mai 13, 14:49:57, Andreas Beckmann wrote:
Hi,
now might be the right time to start a discussion about release goals
for jessie.
How about setting default umask for users (uid = 1000) to 002?
Kind regards,
Andrei
--
http://wiki.debian.org/FAQsFromDebianUser
Offtopic discussions
On Wed, May 15, 2013 at 09:43:02PM +0200, Christoph Biedl wrote:
Christoph Anton Mitterer wrote...
2) No more packages that bypass the package management system and secure
apt:
a) There are still several (typically non-free) packages which download
stuff from the web, install or at
On Sat, May 11, 2013 at 05:29:45PM +0200, Sven Joachim wrote:
On 2013-05-11 11:22 +0200, Goswin von Brederlow wrote:
While that might be of some interest the real goal of the change was
to be able to have more than *2* packages provide /bin/sh.
Currently, due to the totaly screwed up
On Sun, May 12, 2013 at 02:40:39AM +0100, Wookey wrote:
+++ Steve Langasek [2013-05-11 09:33 -0700]:
On Sat, May 11, 2013 at 11:22:10AM +0200, Goswin von Brederlow wrote:
While that might be of some interest the real goal of the change was
to be able to have more than *2* packages
On Sat, May 11, 2013 at 08:44:30PM +0100, Roger Leigh wrote:
On Sat, May 11, 2013 at 08:52:29PM +0200, Josselin Mouette wrote:
Being able to choose between two entirely different desktop
environments, with different user experiences, is a good thing.
Being able to choose between two /bin/sh
On Tue, May 14, 2013 at 12:21:33PM -0500, Steve Langasek wrote:
On Tue, May 14, 2013 at 10:03:34AM -0700, Russ Allbery wrote:
I think that, to convince people that flexibility won't cause stability
and complexity problems, you're going to need to present a complete and
fairly bulletproof
On Sun, May 12, 2013 at 02:40:39AM +0100, Wookey wrote:
+++ Steve Langasek [2013-05-11 09:33 -0700]:
On Sat, May 11, 2013 at 11:22:10AM +0200, Goswin von Brederlow wrote:
While that might be of some interest the real goal of the change was
to be able to have more than *2* packages
On Thu, May 16, 2013 at 7:05 AM, Eugene Zhukov jevgeni...@gmail.com wrote:
Hello,
I'm trying to download sources using d/watch and uscan. Here is the
output of uscan --verbose --force-download:
-- Scanning for watchfiles in .
-- Found watchfile in ./debian
-- In debian/watch, processing
Hi Thorsten
On 11-05-13 20:26, Thorsten Glaser wrote:
Steve Langasek vorlon at debian.org writes:
This is not a sensible goal. Choice of /bin/sh should *not* be the goal,
the goal should be to get a good, fast, minimal, policy-compliant /bin/sh
for *everyone*.
Sure. We just disagree
On 12-05-13 04:03, Paul Wise wrote:
On Sun, May 12, 2013 at 1:03 AM, Wookey wrote:
I'd vote for that too, as it would be very helpful for
cross-toolchain building. I hadn't realised that source build-deps
was a possibility. Is it? Does anyone have a proposal for how it might
work?
It
On 15-05-13 17:39, Thorsten Glaser wrote:
As for your requests of data: I do not provide them. As I said above,
I’m pushing for freedom of choice, not switching the default; of course
I’d be happy with the latter, even more so actually, but it must be a
thing not driven by me;
I see.
In that
On 13-05-13 06:16, Paul Wise wrote:
On Mon, May 13, 2013 at 1:01 AM, Philip Hands wrote:
I don't know about you, but I find it quite reassuring to be able to
confirm that the first half of an install is going pretty well when I
get to see the useless dummy page from Apache. I'd imagine
Thomas Goirand z...@debian.org writes:
Now please, do the same reasoning with some other services,
like Apache, pure-ftpd, or bind, and explain to me why you would
like to have these installed, but not working.
As a developer I have often found use for having Apache installed, just
so I can
Package: wnpp
Severity: wishlist
Owner: Joao Eriberto Mota Filho eribe...@eriberto.pro.br
* Package name: mac-robber
Version : 1.02
Upstream Author : Brian Carrier carr...@sleuthkit.org
* URL : http://www.sleuthkit.org/mac-robber
* License : GPL2
Programming
On Thu, May 16, 2013 at 10:30 AM, Eugene Zhukov jevgeni...@gmail.com wrote:
On Thu, May 16, 2013 at 9:53 AM, Mathieu Malaterre ma...@debian.org wrote:
On Thu, May 16, 2013 at 7:05 AM, Eugene Zhukov jevgeni...@gmail.com wrote:
Hello,
I'm trying to download sources using d/watch and uscan. Here
On Thu, May 16, 2013 at 9:53 AM, Mathieu Malaterre ma...@debian.org wrote:
On Thu, May 16, 2013 at 7:05 AM, Eugene Zhukov jevgeni...@gmail.com wrote:
Hello,
I'm trying to download sources using d/watch and uscan. Here is the
output of uscan --verbose --force-download:
-- Scanning for
On Wed, May 15, 2013 at 03:39:54PM +, Thorsten Glaser wrote:
As for your requests of data: I do not provide them. As I said above,
I???m pushing for freedom of choice, not switching the default; of course
I???d be happy with the latter, even more so actually, but it must be a
thing not
Quoting Stéphane Glondu (2013-05-16 10:57:19)
Le 16/05/2013 05:04, Philip Hands a écrit :
Do you have any thoughts on how that compares with using
BrowserID/Persona? I'd got the impression that BrowserID has been
put together learning from mistakes of OpenID WebID, but perhaps
I'm
On Thu, May 16, 2013 at 12:29:11AM +0200, Kurt Roeckx wrote:
One thing I'm wondering about, and you don't seem to talk about is
what versions end up in a release.
Some upstreams have a testing branch of there software and a
release branch. It's sometimes useful to have people test the
On 2013-05-15 20:27:09 +0200, Jean-Christophe Dubacq wrote:
No. Your server comes unconfigured, you do configure it while the other
is still working, and then you stop the service on the first, finish
syncing the mailboxes, switch the MX record, and then you can go to
rest.
This is not
Hi,
We are interested in buying non-standard ad placements on your site
- debian. org.
We offer flat CPM, long term partnership. Can discuss buying all
impressions.
Please contact me for more details.
Thanks,
Irene
--
Sales and Marketing Manager
*Nster, LLC*
*7709 Santa Monica Blvd.*
On Tue, 2013-05-14 at 08:50:39 +0800, Paul Wise wrote:
On Mon, May 13, 2013 at 11:17 PM, Stéphane Glondu wrote:
Le 13/05/2013 15:51, Paul Wise a écrit :
[...] as long
as there is a way to build-depend on the build-dependencies for a
source package, that should be fine. As a bonus we can
On Thu, May 16, 2013 at 12:29:11AM +0200, Kurt Roeckx wrote:
Some upstreams have a testing branch of there software and a
release branch. It's sometimes useful to have people test the
version in from the testing branch, and having it available in
Debian makes it easier for people to test it.
Jonas Smedegaard d...@jones.dk writes:
This seems similar as WebID: In principle ties to HTTPS - and therefore
the CA cartel - is only optional (other URIs than http ones suffice).
In reality alternatives to HTTP(S) is work in progress.
Changing the protocol doesn't help you get away from
On Jo, 16 mai 13, 10:52:05, Neil McGovern wrote:
On Thu, May 16, 2013 at 12:29:11AM +0200, Kurt Roeckx wrote:
Some upstreams have a testing branch of there software and a
release branch. It's sometimes useful to have people test the
version in from the testing branch, and having it
On 16/05/13 16:42, Russ Allbery wrote:
In essence, [WebID]
moves the authentication problem from user authentication to
URI endpoint authentication, under the theory that we already know how to
validate URI endpoints and that such validation is an easier problem.
... or to look at it another
On 16-05-13 17:42, Russ Allbery wrote:
You could, in theory, switch to DNSSEC, but now you're just replacing one
CA cartel with another.
Except that with DNSSEC (and DANE), the number of people you have to
trust is much smaller.
--
This end should point toward the ground if you want to go to
Wouter Verhelst wou...@debian.org writes:
On 16-05-13 17:42, Russ Allbery wrote:
You could, in theory, switch to DNSSEC, but now you're just replacing
one CA cartel with another.
Except that with DNSSEC (and DANE), the number of people you have to
trust is much smaller.
Right, it depends
On Tue, 2013-05-07 at 14:15:56 +0200, Guillem Jover wrote:
The “dpkg (= 1.15.4) | install-info” dependency can also be dropped
from packages providing an info file, because all info-browsers are
now guaranteed (due to the release) to Depend on install-info. I'll
file a bug on debhelper and
On Thu, May 16, 2013 at 08:03:33AM +0100, Lars Wirzenius wrote:
I'd use a PPA-style package repository of some sort, and then advertise
it to people might want to try that version of the package.
Then it makes more sense to upload it to experimental to me.
Kurt
--
To UNSUBSCRIBE, email
Hello,
I am having trouble with my package jquery-jplayer (a JavaScript library
with Flash fallback) and I would like to ask for advice on how to proceed
Major and minor releases are available as zip files from the official
website ( http://jplayer.org/download/ ) and they are tagged in the git
[ Cc'ing Daniel to help kill my misconceptions, as need be ]
Quoting Russ Allbery (2013-05-16 17:42:20)
Jonas Smedegaard d...@jones.dk writes:
This seems similar as WebID: In principle ties to HTTPS - and
therefore the CA cartel - is only optional (other URIs than http
ones suffice).
Jonas Smedegaard d...@jones.dk writes:
Quoting Russ Allbery (2013-05-16 17:42:20)
Jonas Smedegaard d...@jones.dk writes:
This seems similar as WebID: In principle ties to HTTPS - and
therefore the CA cartel - is only optional (other URIs than http ones
suffice). In reality alternatives to
Quoting Russ Allbery (2013-05-16 18:37:06)
So, again, it comes down to what problem we're trying to solve. If
the problem is just how do we authenticate Debian contributors to
Debian systems, then we're actually in the institutional case and we
don't have to trust anyone outside the
On 05/15/2013 11:04 PM, Philip Hands wrote:
Do you have any thoughts on how that compares with using
BrowserID/Persona? I'd got the impression that BrowserID has been put
together learning from mistakes of OpenID WebID, but perhaps I'm just
swallowing their marketing.
It looks to me like
On 05/16/2013 01:57 PM, Russ Allbery wrote:
If introduce Monkeysphere to do the URI endpoint verification, it seems to
me like you could just as easily introduce Monkeysphere to do the user
certificate verification directly, thus removing the need to introduce a
third party metadata provider.
Jonas Smedegaard d...@jones.dk writes:
Quoting Russ Allbery (2013-05-16 18:37:06)
but it's not clear to me why we'd bother as opposed to just issuing
client X.509 certificates with the metadata already included.
Because the very separation of identifiers from the identified makes the
Package: wnpp
Severity: wishlist
Owner: Oleg Gashev o...@gashev.net
* Package name: libmoosex-classattribute-perl
Version : 0.27
Upstream Author : Dave Rolsky auta...@urth.org
* URL : https://metacpan.org/release/MooseX-ClassAttribute/
* License : Artistic-2.0
Quoting Russ Allbery (2013-05-16 19:57:59)
Jonas Smedegaard d...@jones.dk writes:
Quoting Russ Allbery (2013-05-16 17:42:20)
Jonas Smedegaard d...@jones.dk writes:
This seems similar as WebID: In principle ties to HTTPS - and
therefore the CA cartel - is only optional (other URIs than
Package: wnpp
Severity: wishlist
Owner: Oleg Gashev o...@gashev.net
* Package name: libmoosex-role-strict-perl
Version : 0.05
Upstream Author : Curtis Ovid Poe o...@cpan.org
* URL : https://metacpan.org/release/MooseX-Role-Strict/
* License : Artistic or GPL-1+
Quoting Daniel Kahn Gillmor (2013-05-16 20:38:41)
On 05/16/2013 01:57 PM, Russ Allbery wrote:
If introduce Monkeysphere to do the URI endpoint verification, it
seems to me like you could just as easily introduce Monkeysphere to
do the user certificate verification directly, thus removing
Quoting Russ Allbery (2013-05-16 20:40:24)
Jonas Smedegaard d...@jones.dk writes:
Quoting Russ Allbery (2013-05-16 18:37:06)
but it's not clear to me why we'd bother as opposed to just issuing
client X.509 certificates with the metadata already included.
Because the very separation
Excerpts from Wouter Verhelst's message of 2013-05-14 03:22:14 -0700:
On 13-05-13 05:59, Mark Symonds wrote:
Can we keep the distribution simple enough for nearly anyone to understand?
No.
The goal of Debian is not to be simple. While we should document
things as much as possible so
Christoph Biedl debian.a...@manchmal.in-ulm.de schrieb:
Another thing: Hardening already has been a release goal but there
still are packages around without.
Agreed. I made a concentrated effort for Wheezy by submitting lots of
patches for crucial packages and the general adoption among
Moritz Mühlenhoff j...@inutil.org writes:
Agreed. I made a concentrated effort for Wheezy by submitting lots of
patches for crucial packages and the general adoption among maintainers
is increasing. Also, Simon Ruderich's blhc tool has been very useful and
hardening checks are now also part
Put git updates as a patch, e. g. debian/patches/git-update.patch
Bump debian part of version as usual.
AFAIK python is packaged in this way
--
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive:
Hi,
I filed bug #708299 [1] but realize that it's not really an issue with
that package: dpkg doesn't like it when buildd adds an architecture
specific entry to changelog.Debian:
snip
Preparing to replace libgl1-mesa-dri:amd64 8.0.5-4 (using
.../libgl1-mesa-dri_8.0.5-4+b1_amd64.deb) ...
Jonas Smedegaard d...@jones.dk writes:
Quoting Russ Allbery (2013-05-16 19:57:59)
Sure, but if you have control over the server certificate and are tying
the server certificate to the user certificate via some mechanism like
Monkeysphere, why do the whole indirection dance through a URI at
On Tue, May 7, 2013 at 4:23 PM, Thorsten Glaser t...@debian.org wrote:
Andreas Beckmann anbe at debian.org writes:
now might be the right time to start a discussion about release goals
for jessie. Here are some points that come into my mind right now (and
* Resolve that /bin/sh issue (see
Hi David,
David Mohr damaili...@mcbf.net (16/05/2013):
I filed bug #708299 [1] but realize that it's not really an issue
with that package: dpkg doesn't like it when buildd adds an
architecture specific entry to changelog.Debian: […]
everyone knows:
Joshuah Hurst dixit:
Solaris 11, OpenSolaris and Illumos use ksh93 as /bin/sh
Yeah, but it’s not eligible for that in Debian, as Debian guarantees
the usability of “local” even for /bin/sh scripts. I wrote about that
already, IIRC even in this thread.
/usr/bin/sh
Yuk, Solaris abomination.
and
On 05/16/2013 03:52 PM, Jonas Smedegaard wrote:
I think you are missing the potential for third-parties to make use of
identifiers without needing authentication.
well, they still need to do authentication. For example, consider three
(not necessarily incompatible) channels to tie
Hello everybody,
For those interested in learning more about triggers, including the noawait
forms, which Guillem reminded us that they should be the ones to use in most of
the cases, I recommend to have a look to the patch in preparation for the
Debian Policy.
I have a C shared library that takes a pointer to an opaque struct as the
first argument to most of its API calls. The internal layout of that
opaque struct is changing (to add new members). The only way to create
the opaque state struct is via a call to remctl_new(), which returns a
pointer to
The following is a listing of packages for which help has been requested
through the WNPP (Work-Needing and Prospective Packages) system in the
last week.
Total number of orphaned packages: 514 (new: 1)
Total number of packages offered up for adoption: 140 (new: 5)
Total number of packages
On 17/05/2013 01:01, Pau Garcia i Quiles wrote:
Patch releases are NOT available as zip files and the list of wrongdoings is
long:
- Patch releases are only available from the git repository
Maybe I'm daft, but I can't seem to find any patch releases, actually. Where are
they stored?
--
On May 16, Russ Allbery r...@debian.org wrote:
DNSSEC isn't going to help. I think it's best to assume that both the US
and Chinese governments, at least, can make DNSSEC say what they want it
to if they ever needed to.
Maybe, but I think it's also safe to assume that the USG has no way of
Hi!
[ Just saw while drafting this, that you filed the bug on policy, so
sending a copy there too, let's continue the discussion there then. ]
On Wed, 2013-05-15 at 09:51:23 -0700, Russ Allbery wrote:
Andreas Beckmann a...@debian.org writes:
On 2013-05-15 09:58, Ondřej Surý wrote:
The '2'
On Fri, May 17, 2013 at 1:01 AM, Pau Garcia i Quiles wrote:
I am having trouble with my package jquery-jplayer (a JavaScript library
with Flash fallback) and I would like to ask for advice on how to proceed
I would suggest asking upstream again to properly git tag patch
releases, make branches
Hi!
On Thu, 2013-05-16 at 17:35:10 -0700, Russ Allbery wrote:
I have a C shared library that takes a pointer to an opaque struct as the
first argument to most of its API calls. The internal layout of that
opaque struct is changing (to add new members). The only way to create
the opaque
Le jeudi 16 mai 2013 à 17:35 -0700, Russ Allbery a écrit :
I have a C shared library that takes a pointer to an opaque struct as the
first argument to most of its API calls. The internal layout of that
opaque struct is changing (to add new members). The only way to create
the opaque state
On Fri, May 17, 2013 at 2:35 AM, Russ Allbery r...@debian.org wrote:
I have a C shared library that takes a pointer to an opaque struct as the
first argument to most of its API calls. The internal layout of that
opaque struct is changing (to add new members). The only way to create
the
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Thu, 16 May 2013 00:06:54 +0200
Source: alglib
Binary: libalglib-dev libalglib3 libalglib3-dbg
Architecture: source amd64
Version: 3.7.0-2
Distribution: unstable
Urgency: low
Maintainer: Debian Science Team
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Tue, 07 May 2013 13:49:15 +0200
Source: bird
Binary: bird bird6 bird-dbg
Architecture: source amd64
Version: 1.3.10-1
Distribution: unstable
Urgency: low
Maintainer: Ondřej Surý ond...@debian.org
Changed-By: Ondřej Surý
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Thu, 16 May 2013 05:53:43 +
Source: python-quantumclient
Binary: python-quantumclient
Architecture: source all
Version: 1:2.1-2
Distribution: unstable
Urgency: low
Maintainer: PKG OpenStack openstack-de...@lists.alioth.debian.org
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Thu, 16 May 2013 01:09:24 +0200
Source: ruby-minitest
Binary: ruby-minitest
Architecture: source all
Version: 5.0.1-1
Distribution: unstable
Urgency: low
Maintainer: Debian Ruby Extras Maintainers
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Tue, 14 May 2013 11:18:36 +0200
Source: libntlm
Binary: libntlm0-dev libntlm0
Architecture: source amd64
Version: 1.2-3
Distribution: unstable
Urgency: low
Maintainer: Debian XMPP Maintainers pkg-xmpp-de...@lists.alioth.debian.org
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Wed, 15 May 2013 10:18:59 +0200
Source: libjogl2-java
Binary: libjogl2-java libjogl2-jni libjogl2-java-doc libjogl2-toolkits
Architecture: source all amd64
Version: 2.0-rc11-1
Distribution: unstable
Urgency: low
Maintainer: Debian
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Fri, 10 May 2013 10:22:18 +0800
Source: keystone
Binary: python-keystone keystone keystone-doc
Architecture: source all
Version: 2013.1.1-2
Distribution: unstable
Urgency: low
Maintainer: PKG OpenStack
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Sun, 31 Mar 2013 14:00:02 +0200
Source: vdr-plugin-dvd
Binary: vdr-plugin-dvd
Architecture: source amd64
Version: 0.3.6~b03+cvs20090426.0013-19
Distribution: unstable
Urgency: low
Maintainer: Debian VDR Team
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Mon, 22 Apr 2013 19:22:08 +0200
Source: vdr-plugin-femon
Binary: vdr-plugin-femon
Architecture: source amd64
Version: 2.0.0-1
Distribution: unstable
Urgency: low
Maintainer: Debian VDR Team pkg-vdr-dvb-de...@lists.alioth.debian.org
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Sun, 31 Mar 2013 14:00:08 +0200
Source: vdr-plugin-games
Binary: vdr-plugin-games
Architecture: source amd64
Version: 0.6.3-44
Distribution: unstable
Urgency: low
Maintainer: Debian VDR Team pkg-vdr-dvb-de...@lists.alioth.debian.org
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Sun, 31 Mar 2013 14:00:11 +0200
Source: vdr-plugin-mp3
Binary: vdr-plugin-mp3 vdr-plugin-mplayer
Architecture: source amd64
Version: 0.10.2-19
Distribution: unstable
Urgency: low
Maintainer: Debian VDR Team
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Sun, 31 Mar 2013 14:00:20 +0200
Source: vdr-plugin-sudoku
Binary: vdr-plugin-sudoku
Architecture: source amd64
Version: 0.3.5-17
Distribution: unstable
Urgency: low
Maintainer: Debian VDR Team
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Sun, 31 Mar 2013 14:00:18 +0200
Source: vdr-plugin-spider
Binary: vdr-plugin-spider
Architecture: source amd64
Version: 0.2.2-19
Distribution: unstable
Urgency: low
Maintainer: Debian VDR Team
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Sun, 31 Mar 2013 14:00:23 +0200
Source: vdr-plugin-svdrpservice
Binary: vdr-plugin-svdrpservice svdrpservice-dev
Architecture: source amd64 all
Version: 0.0.4-19
Distribution: unstable
Urgency: low
Maintainer: Debian VDR Team
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Sun, 31 Mar 2013 14:00:04 +0200
Source: vdr-plugin-epgsync
Binary: vdr-plugin-epgsync
Architecture: source amd64
Version: 0.0.4-17
Distribution: unstable
Urgency: low
Maintainer: Debian VDR Team
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Sun, 31 Mar 2013 14:00:16 +0200
Source: vdr-plugin-remoteosd
Binary: vdr-plugin-remoteosd
Architecture: source amd64
Version: 0.1.1-10
Distribution: unstable
Urgency: low
Maintainer: Debian VDR Team
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Sun, 31 Mar 2013 14:00:12 +0200
Source: vdr-plugin-osdserver
Binary: vdr-plugin-osdserver
Architecture: source amd64
Version: 0.1.3-12
Distribution: unstable
Urgency: low
Maintainer: Debian VDR Team
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Sun, 31 Mar 2013 14:00:22 +0200
Source: vdr-plugin-svdrposd
Binary: vdr-plugin-svdrposd vdr-plugin-svdrpext
Architecture: source amd64 all
Version: 0.1.1-13
Distribution: unstable
Urgency: low
Maintainer: Debian VDR Team
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Wed, 24 Apr 2013 00:09:42 +0800
Source: glance
Binary: python-glance glance python-glance-doc glance-common glance-api
glance-registry
Architecture: source all
Version: 2013.1-2
Distribution: unstable
Urgency: low
Maintainer: PKG
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Wed, 15 May 2013 22:32:52 +0800
Source: swift
Binary: python-swift swift swift-proxy swift-object swift-container
swift-account swift-doc
Architecture: source all
Version: 1.8.0-2
Distribution: unstable
Urgency: low
Maintainer: PKG
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Thu, 11 Apr 2013 22:30:47 +0800
Source: cinder
Binary: python-cinder cinder-common cinder-api cinder-volume cinder-scheduler
cinder-backup
Architecture: source all
Version: 2013.1.1-1
Distribution: unstable
Urgency: low
Maintainer:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Wed, 15 May 2013 17:33:13 +0200
Source: boinc
Binary: boinc libboinc7 boinc-nvidia-cuda boinc-amd-opencl boinc-client
boinc-manager boinc-dev libboinc-app-dev libboinc-app7 boinc-dbg
Architecture: source all amd64
Version:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Thu, 16 May 2013 07:44:07 +
Source: ceilometer
Binary: python-ceilometer ceilometer-common ceilometer-collector ceilometer-api
ceilometer-agent-compute ceilometer-agent-central
Architecture: source all
Version: 2013.1-2
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Thu, 16 May 2013 10:06:26 +0200
Source: clzip
Binary: clzip clzip-dbg
Architecture: source i386
Version: 1.5~pre1-1
Distribution: experimental
Urgency: low
Maintainer: Daniel Baumann m...@daniel-baumann.ch
Changed-By: Daniel Baumann
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Thu, 16 May 2013 10:46:00 +0200
Source: irker
Binary: irker
Architecture: source all
Version: 1.19+dfsg-1
Distribution: experimental
Urgency: low
Maintainer: Daniel Baumann m...@daniel-baumann.ch
Changed-By: Daniel Baumann
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Sun, 10 Mar 2013 20:04:13 +0100
Source: libgmpada
Binary: libgmpada4-dev libgmpada2 libgmpada-dbg
Architecture: source amd64
Version: 0.0.20121109-2
Distribution: unstable
Urgency: low
Maintainer: Nicolas Boulenguez
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Thu, 16 May 2013 10:10:21 +0200
Source: lunzip
Binary: lunzip lunzip-dbg
Architecture: source i386
Version: 1.2-4
Distribution: experimental
Urgency: low
Maintainer: Daniel Baumann m...@daniel-baumann.ch
Changed-By: Daniel Baumann
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Thu, 16 May 2013 10:19:29 +0200
Source: lzip
Binary: lzip lzip-dbg
Architecture: source i386
Version: 1.15~pre2-1
Distribution: experimental
Urgency: low
Maintainer: Daniel Baumann m...@daniel-baumann.ch
Changed-By: Daniel Baumann
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Thu, 16 May 2013 10:23:12 +0200
Source: lziprecover
Binary: lziprecover lziprecover-dbg
Architecture: source i386
Version: 1.14~rc3-1
Distribution: experimental
Urgency: low
Maintainer: Daniel Baumann m...@daniel-baumann.ch
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Thu, 16 May 2013 10:26:15 +0200
Source: pdlzip
Binary: pdlzip pdlzip-dbg
Architecture: source i386
Version: 1.4~rc2-2
Distribution: experimental
Urgency: low
Maintainer: Daniel Baumann m...@daniel-baumann.ch
Changed-By: Daniel
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Thu, 16 May 2013 10:32:35 +0200
Source: plzip
Binary: plzip plzip-dbg
Architecture: source i386
Version: 1.0~rc1-2
Distribution: experimental
Urgency: low
Maintainer: Daniel Baumann m...@daniel-baumann.ch
Changed-By: Daniel Baumann
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Wed, 15 May 2013 08:54:32 +0200
Source: pygobject
Binary: python-gi python3-gi python-gi-cairo python-gi-dbg python3-gi-dbg
python-gi-dev python3-gi-cairo python-gobject python-gobject-dbg
python-gobject-dev
Architecture: source
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Thu, 16 May 2013 10:42:30 +0200
Source: python-irc
Binary: python-irc
Architecture: source all
Version: 8.3+dfsg-1
Distribution: experimental
Urgency: low
Maintainer: Daniel Baumann m...@daniel-baumann.ch
Changed-By: Daniel Baumann
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Wed, 15 May 2013 22:24:49 +0200
Source: python-ws4py
Binary: python-ws4py python3-ws4py
Architecture: source all
Version: 0.2.4-2
Distribution: unstable
Urgency: low
Maintainer: Stein Magnus Jodal stein.mag...@jodal.no
Changed-By:
1 - 100 of 256 matches
Mail list logo