On Fri, May 10, 2013 at 3:49 AM, Lars Wirzenius wrote:
* An attitude change: we decide that releases are important, and that
they're the job of the entire project, not just the release team.
I already believe that. I would find it quite surprising if people
actually believe that releases are
On Fri, 10 May 2013, Paul Wise wrote:
On Fri, May 10, 2013 at 4:33 AM, Russ Allbery wrote:
That level of security isn't great, though. GPG keys are much more secure
than that password. What we would want for equivalent security in a web
interface is personal X.509 certificates.
I
On Fri, May 10, 2013 at 2:16 PM, Raphael Hertzog wrote:
I don't think that you're speaking of the same thing. I see no information
about X.509 client certificates in Monkeysphere. It offers ways to
validate the server certificate (if it's not signed by known CA) but it
doesn't seem to offer
Package: general
Severity: wishlist
Dear Debian,
At the end of a slow line it would still be nice to be able to download only
the actual binary differences between versions of a package during an upgrade.
Especially for larger packages.
I'm sure it is possible to do technically, but it may
Your message dated Fri, 10 May 2013 14:47:04 +0800
with message-id
CAKTje6HMgRrKYjZdX_0Yz501PWhBTosF_Dw4rs6j2o_nxeC=4...@mail.gmail.com
and subject line Re: Bug#707672: general: binary diffs of large packages
has caused the Debian Bug report #707672,
regarding general: binary diffs of large
Package: wnpp
Severity: wishlist
Owner: Guo Yixuan culu@gmail.com
X-Debbugs-Cc: debian-devel@lists.debian.org
* Package name: gcc-4.8-doc
Version : 4.8.0-1
Upstream Author : FSF
* URL : http://gcc.gnu.org/
* License : GFDL-1.3+, with invariant sections
Control: reopen -1
Control: reassign -1 release-notes
On Vi, 10 mai 13, 02:43:28, ant wrote:
Package: general
Severity: wishlist
Dear Debian,
At the end of a slow line it would still be nice to be able to download only
the actual binary differences between versions of a package during
Processing control commands:
reopen -1
Bug #707672 {Done: Paul Wise p...@debian.org} [general] general: binary diffs
of large packages
Bug reopened
Ignoring request to alter fixed versions of bug #707672 to the same values
previously set
reassign -1 release-notes
Bug #707672 [general]
On Thu, 9 May 2013 15:50:45 +0200, Philipp Kern pk...@debian.org
wrote:
On Thu, May 09, 2013 at 10:32:09AM +0200, Marc Haber wrote:
That's how I do it for new installs. However, this is vastly more
complex than the traditional setup, and it doesn't help for systems in
maintenance mode that, for
On Thu, 9 May 2013 18:17:29 +0200, m...@linux.it (Marco d'Itri) wrote:
On May 09, Bernhard R. Link brl...@debian.org wrote:
Or in other words: to make essential functionality not available if
/usr is broken.
Again: this is not we are discussing. Essential functionality is moving
to /usr anyway
Hi,
On Wed, May 08, 2013 at 05:28:58PM +0100, Neil Williams wrote:
Other steps to take as preventative measures:
* Make it a *MUST* that all transitions, no matter how small, are
checked with the release team starting from as soon as the freeze is
announced (not just after it starts) such
Package: wnpp
Severity: wishlist
Owner: Benjamin Drung bdr...@debian.org
* Package name: nemo-fileroller
Version : 1.8.0
Upstream Author : Linux Mint Project r...@linuxmint.com
* URL : https://github.com/linuxmint/nemo-extensions/
* License : GPL-3 vs LGPL-2+
Package: wnpp
Severity: wishlist
Owner: Oleg Gashev o...@gashev.net
* Package name: libmodule-faker-perl
Version : 0.014
Upstream Author : Ricardo Signes r...@cpan.org
* URL : https://metacpan.org/release/Module-Faker/
* License : Artistic or GPL-1+
On May 10, Marc Haber mh+debian-de...@zugschlus.de wrote:
Having the rescue image _this_ independent is not really desireable
since one would probably have to deal with outdated or non-existing
rescue tools in the independent image while the correct software in
the correct version is on the
Package: wnpp
Severity: wishlist
Owner: Steven Hamilton o...@scorch.net
* Package name: mr.rescue
Version : 1.01
Upstream Author : Tangram Games wearetang...@gmail.com
* URL : http://tangramgames.dk
* License : Zlib, BY-NC-SA 3.0 Unported License, Custom Public
On Fri, May 10, 2013 at 11:48:37AM +0200, Marco d'Itri wrote:
[ reiterating the same arguments seen numerous times before ]
I suggest that we leave practical implications of the /usr merge aside
for a moment. The pros and cons have been discussed at lengths. If there
is value in further
NEWSLETTER
Boutique
Bienvenue à la newsletter de la maison de disques So Much
Distribution, Distribution Numérique, Téléchargement MusiqueDécouvrez notre
espace boutique pour acheter les CDs de nos Artistes.Bonne visite...
NOUVEAUTE A TELECHARGER
Ricardo
On Fri, 10 May 2013 11:24:30 +0200
Ivo De Decker ivo.dedec...@ugent.be wrote:
Hi,
On Wed, May 08, 2013 at 05:28:58PM +0100, Neil Williams wrote:
Other steps to take as preventative measures:
* Make it a *MUST* that all transitions, no matter how small, are
checked with the release
On Fri, 10 May 2013 11:24:30 +0200
Ivo De Decker ivo.dedec...@ugent.be wrote:
Hi,
On Wed, May 08, 2013 at 05:28:58PM +0100, Neil Williams wrote:
Other steps to take as preventative measures:
* Make it a *MUST* that all transitions, no matter how small, are
checked with the release
Le mercredi 08 mai 2013 à 16:51 +0100, Ian Jackson a écrit :
* Try to identify the main ways in which bugs can be hard (which
might be technical, political, or a mixture)
One of the general problems I have been running into include several
(sometimes all) of the following patterns.
*
On Thu, 2013-05-09 at 08:43 +0200, Niels Thykier wrote:
On 2013-05-09 07:56, Paul Wise wrote:
On Thu, May 9, 2013 at 1:08 PM, Andreas Beckmann wrote:
I just noticed that we have the first amd64 package in the archive that
has dependencies on :i386 qualified libraries:
Package:
[Charles Plessy, 2013-05-09]
For a large number of packages if not all, we should allow the
package maintainers to manually migrate their packages to Testing during the
Freeze, within boundaries set on debian-devel-announce by the release team.
+1
or a soft freeze (as described
On Thu, May 09, 2013 at 02:08:05PM +0200, Marc Haber wrote:
You have a point here. The problem is that people need to change their
operations, which is hard for many people, let alone the case when
emergency manuals need to be changed just for the sake of satisfying
Lennart.
There are various
On Tue, May 07, 2013 at 10:23:52PM +, Thorsten Glaser wrote:
Gah! Just because the other FLOS idiots are doing it doesn’t mean
Debian should follow.
Do you also have technical objections or some kind of reasoning behind
this?
--
Regards,
Olav
--
To UNSUBSCRIBE, email to
On 2013-05-10 14:48, Ben Hutchings wrote:
On Thu, 2013-05-09 at 08:43 +0200, Niels Thykier wrote:
On 2013-05-09 07:56, Paul Wise wrote:
On Thu, May 9, 2013 at 1:08 PM, Andreas Beckmann wrote:
I just noticed that we have the first amd64 package in the archive that
has dependencies on :i386
On Fri, May 10, 2013 at 03:04:34PM +0200, Olav Vitters wrote:
On Thu, May 09, 2013 at 02:08:05PM +0200, Marc Haber wrote:
You have a point here. The problem is that people need to change their
operations, which is hard for many people, let alone the case when
emergency manuals need to be
On Wednesday, May 08, 2013 04:51:14 PM Ian Jackson wrote:
So I would like to suggest that we should have a thread where we:
* Try to identify the main ways in which bugs can be hard (which
might be technical, political, or a mixture)
* Try to think of workflows which might overcome
On Fri, 2013-05-10 at 14:46 +0100, Roger Leigh wrote:
On Fri, May 10, 2013 at 03:04:34PM +0200, Olav Vitters wrote:
On Thu, May 09, 2013 at 02:08:05PM +0200, Marc Haber wrote:
You have a point here. The problem is that people need to change their
operations, which is hard for many people,
On Fri, 10 May 2013 10:03:46 -0400
Scott Kitterman deb...@kitterman.com wrote:
On Wednesday, May 08, 2013 04:51:14 PM Ian Jackson wrote:
So I would like to suggest that we should have a thread where we:
* Try to identify the main ways in which bugs can be hard (which
might be
Raphaël wrote:
I don't think that you're speaking of the same thing. I see no
information about X.509 client certificates in Monkeysphere. It
offers ways to validate the server certificate (if it's not signed by
known CA) but it doesn't seem to offer any solution to manage client
Paul Wise p...@debian.org writes:
On Fri, May 10, 2013 at 3:49 AM, Lars Wirzenius wrote:
* Keep testing free of RC bugs.
I keep packages I (co-)maintain free of RC bugs.
The point isn't what individual developers do, particularly developers who
are extremely well-engaged with the project.
Package: wnpp
Severity: wishlist
Owner: Victor Seva linuxman...@torreviejawireless.com
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
* Package name: lua-lemock
Version : 0.6
Upstream Author : Tommy Petterson p...@lysator.liu.se
* URL :
On Fri, 10 May 2013 11:48:37 +0200, m...@linux.it (Marco d'Itri) wrote:
On May 10, Marc Haber mh+debian-de...@zugschlus.de wrote:
Having the rescue image _this_ independent is not really desireable
since one would probably have to deal with outdated or non-existing
rescue tools in the
On May 10, Marc Haber mh+debian-de...@zugschlus.de wrote:
Additional work necessary to satisfy upstream's bizarre ideas. Why not
keeping things the way they are now? They work. No need to waste
developer time.
Why make new releases? bo worked fine, there is no need for new features.
People
I started a thread[1] on maven-user yesterday to try and understand
whether Maven's convenience with binary artifacts extrapolates to
convenience working with source
One of the first answers even suggested I should go and see the Debian
folks (the FTP master's reputation for keeping binary
On Fri, 10 May 2013 19:38:22 +0200, m...@linux.it (Marco d'Itri) wrote:
So this confirms that a live system like GRML is a good replacement for
a rescue system, looks like we solved another use case.
You are trying to turn my word around. Bad style of discussion. EOD on
my part, it's another
Dear developers,
I am considering activating encryption of popularity-contest submissions
using public key cryptography to protect popcon submission while in transit.
This means
- The popularity-contest package will include a public key that will be used to
encrypt
report.
- The
On May 03, 2013, at 04:38 PM, Josselin Mouette wrote:
- source-only uploads
They are pushed to the buildds, and the produced binaries
(including arch:all) are put in a staging area (much like
incoming.d.o). These binaries can be downloaded, but
the .changes cannot
Bill Allombert writes (encrypted popcon submissions):
The drawback is the computing cost on the server. Currently we are
processing about 25000 report each days, which would require about 2
hours of 'real' CPU time to decrypt, which is too much for
popov.debian.org. On the other hand this is
On Fri, 10 May 2013, Bill Allombert wrote:
I am considering activating encryption of popularity-contest submissions
using public key cryptography to protect popcon submission while in transit.
Do you think the benefits outweight the drawback that the admin no
longer can be certain we don't
Package: general
Severity: normal
-- System Information:
Debian Release: 6.0.7
APT prefers oldstable
APT policy: (500, 'oldstable')
Architecture: i386 (x86_64)
Kernel: Linux 2.6.32-5-amd64 (SMP w/4 CPU cores)
Locale: LANG=es_MX.utf8, LC_CTYPE=es_MX.utf8 (charmap=UTF-8)
Shell: /bin/sh
Peter Palfrader writes (Re: encrypted popcon submissions):
Do you think the benefits outweight the drawback that the admin no
longer can be certain we don't send anything we shouldn't?
This is a very good point but it can be easily dealt with: the
encrypted message should have two recipients,
On May 05, 2013, at 01:12 AM, Roger Leigh wrote:
There's definitely an open bug for adding this, and I'll be happy
for it to be added. It shouldn't be too hard to implement, though
we would probably want to make it configurable whether the repeat
build failing should fail the build as a whole.
* Peter Palfrader wea...@debian.org, 2013-05-10, 22:44:
On Fri, 10 May 2013, Bill Allombert wrote:
I am considering activating encryption of popularity-contest
submissions using public key cryptography to protect popcon submission
while in transit.
I think encrypting popcon submissions in
Le Fri, May 10, 2013 at 10:02:06PM +0200, Bill Allombert a écrit :
I am considering activating encryption of popularity-contest submissions
using public key cryptography to protect popcon submission while in transit.
Hello Bill,
sorry if it is a naive question: by public key cryptography, do
On Fri, May 10, 2013 at 11:24 PM, Russ Allbery wrote:
The point isn't what individual developers do, particularly developers who
are extremely well-engaged with the project. The point is to find ways to
do this at another level up. Obviously, given the number of RC bugs that
we had to fix
I think you want to discuss this on the debian-java list instead.
--
bye,
pabs
http://wiki.debian.org/PaulWise
--
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive:
Paul Wise p...@debian.org writes:
On Fri, May 10, 2013 at 11:24 PM, Russ Allbery wrote:
The point isn't what individual developers do, particularly developers
who are extremely well-engaged with the project. The point is to find
ways to do this at another level up. Obviously, given the
On Sat, May 11, 2013 at 8:40 AM, Charles Plessy wrote:
sorry if it is a naive question: by public key cryptography, do you mean GPG
or TLS ?
He is talking about OpenPGP and gpg, TLS wouldn't be helpful since
popcon uses either SMTP or HTTP.
--
bye,
pabs
http://wiki.debian.org/PaulWise
--
On Sat, May 11, 2013 at 10:42 AM, Russ Allbery wrote:
I would need to do some research, since I'm not personally familiar with
everything that's in a blend or a task at the moment. Just off the top of
my head, though, to pick an area of personal expertise, I don't think
there's an existing
On Thu, May 09, 2013 at 08:49:51PM +0100, Lars Wirzenius wrote:
* Remove RC buggy packages sooner rather than later. An RC buggy
package should be removed at soon as possible: when the bug
is identified, allow a bit of time for the bug to be verified
(was it actually an RC bug?), but
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Fri, 10 May 2013 00:03:06 +0530
Source: ruby-bcat
Binary: ruby-bcat
Architecture: source all
Version: 0.6.2-2
Distribution: unstable
Urgency: low
Maintainer: Debian Ruby Extras Maintainers
-BEGIN PGP SIGNED MESSAGE-
Hash: RIPEMD160
Format: 1.8
Date: Fri, 10 May 2013 08:19:36 +0200
Source: hugin
Binary: hugin hugin-tools hugin-data
Architecture: source i386 all
Version: 2013.0.0~beta1+dfsg-2
Distribution: experimental
Urgency: low
Maintainer: Debian PhotoTools Maintainers
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Fri, 10 May 2013 08:19:32 +0200
Source: pygobject-2
Binary: python-gobject-2 python-gobject-2-dev python-gobject-2-dbg
Architecture: source amd64 all
Version: 2.28.6-12
Distribution: unstable
Urgency: low
Maintainer: Josselin
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Thu, 09 May 2013 20:04:51 +0200
Source: ceve
Binary: ceve
Architecture: source all
Version: 1:1.4-3
Distribution: unstable
Urgency: low
Maintainer: Debian OCaml Maintainers debian-ocaml-ma...@lists.debian.org
Changed-By: Ralf Treinen
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Fri, 10 May 2013 15:27:35 +0800
Source: geany
Binary: geany geany-common
Architecture: source amd64 all
Version: 1.23+dfsg-2
Distribution: unstable
Urgency: low
Maintainer: Geany Packaging Team pkg-geany-t...@lists.alioth.debian.org
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Thu, 09 May 2013 23:11:55 +0200
Source: ocsigenserver
Binary: ocsigenserver libocsigenserver-ocaml libocsigenserver-ocaml-dev
ocsigenserver-doc
Architecture: source amd64 all
Version: 2.2.0-1
Distribution: unstable
Urgency: low
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Fri, 10 May 2013 09:00:14 +0200
Source: bootcd
Binary: bootcd
Architecture: source all
Version: 4.00
Distribution: unstable
Urgency: low
Maintainer: Bernd Schumacher bernd.schumac...@hp.com
Changed-By: Bernd Schumacher
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Fri, 10 May 2013 15:45:38 +0800
Source: geany-plugins
Binary: geany-plugins geany-plugins-common geany-plugin-addons
geany-plugin-codenav geany-plugin-commander geany-plugin-debugger
geany-plugin-devhelp geany-plugin-doc
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Sun, 06 Jan 2013 22:01:59 +0100
Source: libhtml-parser-perl
Binary: libhtml-parser-perl
Architecture: source amd64
Version: 3.71-1
Distribution: unstable
Urgency: low
Maintainer: Debian Perl Group
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Fri, 10 May 2013 08:21:48 +0200
Source: php5
Binary: php5 php5-common libapache2-mod-php5 libapache2-mod-php5filter php5-cgi
php5-cli php5-fpm libphp5-embed php5-dev php5-dbg php-pear php5-curl
php5-enchant php5-gd php5-gmp
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Fri, 10 May 2013 11:14:25 +0200
Source: js-of-ocaml
Binary: js-of-ocaml libjs-of-ocaml-dev libjs-of-ocaml libjs-of-ocaml-doc
Architecture: source amd64 all
Version: 1.3.2-2
Distribution: unstable
Urgency: low
Maintainer: Debian
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Wed, 08 May 2013 08:06:25 +0200
Source: accountsservice
Binary: accountsservice libaccountsservice0 libaccountsservice-dev
gir1.2-accountsservice-1.0 libaccountsservice-dbg libaccountsservice-doc
Architecture: source amd64 all
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Fri, 10 May 2013 11:46:03 +0200
Source: linuxdoc-tools
Binary: linuxdoc-tools linuxdoc-tools-text linuxdoc-tools-latex
linuxdoc-tools-info
Architecture: source all i386
Version: 0.9.69-2
Distribution: unstable
Urgency: low
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Fri, 10 May 2013 12:39:39 +0200
Source: adequate
Binary: adequate
Architecture: source all
Version: 0.5.2
Distribution: unstable
Urgency: low
Maintainer: Jakub Wilk jw...@debian.org
Changed-By: Jakub Wilk jw...@debian.org
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Fri, 10 May 2013 11:28:56 +0200
Source: wdm
Binary: wdm
Architecture: source i386
Version: 1.28-14
Distribution: unstable
Urgency: low
Maintainer: Debian QA Group packa...@qa.debian.org
Changed-By: Agustin Martin Domingo
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Wed, 17 Apr 2013 08:12:28 +0900
Source: mozc
Binary: mozc-data ibus-mozc scim-mozc uim-mozc fcitx-mozc emacs-mozc
emacs-mozc-bin mozc-server mozc-utils-gui
Architecture: source all amd64
Version: 1.5.1090.102-5
Distribution:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Fri, 10 May 2013 14:23:29 +0200
Source: update-notifier
Binary: update-notifier update-notifier-common
Architecture: source all
Version: 0.99.3debian11+perrm1
Distribution: unstable
Urgency: low
Maintainer: Julian Andres Klode
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Fri, 10 May 2013 13:27:50 +0200
Source: zsh
Binary: zsh zsh-common zsh-doc zsh-static zsh-dev zsh-dbg zsh-beta zsh-beta-doc
Architecture: source all amd64
Version: 5.0.2-3
Distribution: unstable
Urgency: low
Maintainer: Debian Zsh
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Fri, 10 May 2013 14:27:47 +0200
Source: nfs-utils
Binary: nfs-kernel-server nfs-common
Architecture: source amd64
Version: 1:1.2.8-1
Distribution: unstable
Urgency: low
Maintainer: Debian kernel team debian-ker...@lists.debian.org
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Sun, 05 May 2013 21:09:24 +1000
Source: hplip
Binary: hplip hplip-data printer-driver-postscript-hp hplip-gui hplip-dbg
hplip-doc hpijs-ppds hpijs printer-driver-hpijs hplip-cups
printer-driver-hpcups libhpmud0 libhpmud-dev
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Fri, 03 May 2013 07:47:12 +0300
Source: i810switch
Binary: i810switch
Architecture: source amd64
Version: 0.6.5-7.1
Distribution: unstable
Urgency: low
Maintainer: James Bromberger j...@debian.org
Changed-By: Jari Aalto
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Fri, 10 May 2013 08:03:36 -0300
Source: racket
Binary: racket racket-common racket-doc plt-scheme plt-scheme-doc
Architecture: source all amd64
Version: 5.3.4+r2+dfsg1-1
Distribution: unstable
Urgency: low
Maintainer: David Bremner
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Wed, 08 May 2013 11:43:49 +0200
Source: django-markupfield
Binary: python-django-markupfield
Architecture: source all
Version: 1.1.1-1
Distribution: unstable
Urgency: low
Maintainer: Debian Python Modules Team
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Wed, 08 May 2013 08:10:53 +0200
Source: django-picklefield
Binary: python-django-picklefield
Architecture: source all
Version: 0.3.0-1
Distribution: unstable
Urgency: low
Maintainer: Debian Python Modules Team
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Fri, 03 May 2013 03:04:38 -0700
Source: bumblebee
Binary: bumblebee bumblebee-nvidia bumblebee-dbg
Architecture: source amd64
Version: 3.2.1-1
Distribution: unstable
Urgency: low
Maintainer: Debian NVIDIA Maintainers
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Thu, 25 Apr 2013 14:32:48 +0200
Source: pixelmed
Binary: pixelmed-java pixelmed-java-doc pixelmed-www
Architecture: source all
Version: 20130220-1
Distribution: experimental
Urgency: low
Maintainer: Debian Med Packaging Team
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Tue, 07 May 2013 22:38:49 +0200
Source: resiprocate
Binary: libresiprocate-1.8 libresiprocate-1.8-dev librecon-1.8 librecon-1.8-dev
libresiprocate-turn-client-1.8 libresiprocate-turn-client-1.8-dev repro
resiprocate-turn-server
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Sun, 05 May 2013 20:25:15 +0200
Source: flask
Binary: python-flask python-flask-doc
Architecture: source all
Version: 0.9-2
Distribution: unstable
Urgency: low
Maintainer: Piotr Ożarowski pi...@debian.org
Changed-By: Piotr
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Tue, 07 May 2013 22:47:51 +0200
Source: liggghts
Binary: liggghts libliggghts2 libliggghts-dev liggghts-doc libliggghts2-dbg
Architecture: source amd64 all
Version: 2.3.2-1
Distribution: unstable
Urgency: low
Maintainer: Debian
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Wed, 08 May 2013 14:27:23 +0200
Source: resiprocate
Binary: libresiprocate-1.8 libresiprocate-1.8-dev librecon-1.8 librecon-1.8-dev
libresiprocate-turn-client-1.8 libresiprocate-turn-client-1.8-dev repro
resiprocate-turn-server
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Fri, 03 May 2013 13:23:05 +0200
Source: italc
Binary: italc-master italc-client italc-management-console libitalccore
Architecture: source amd64
Version: 1:2.0.0-1
Distribution: sid
Urgency: low
Maintainer: Debian Edu Packaging Team
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Thu, 10 Jan 2013 14:46:34 +0100
Source: gsoap
Binary: libgsoap3 libgsoap-dev gsoap gsoap-doc libgsoap-dbg gsoap-dbg
Architecture: source amd64 all
Version: 2.8.12-1
Distribution: unstable
Urgency: low
Maintainer: Mattias Ellert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Sun, 05 May 2013 19:49:35 +0200
Source: liblivemedia
Binary: liblivemedia-dev libbasicusageenvironment0 libgroupsock0 liblivemedia7
libusageenvironment0 livemedia-utils
Architecture: source amd64
Version: 2013.04.30-1
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Fri, 03 May 2013 03:26:17 -0700
Source: primus
Binary: primus primus-libs primus-libs-ia32 primus-libs-dbg
Architecture: source amd64
Version: 0~20130427-1
Distribution: unstable
Urgency: low
Maintainer: Debian NVIDIA Maintainers
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Mon, 06 May 2013 20:02:14 +0200
Source: haproxy
Binary: haproxy vim-haproxy
Architecture: source amd64 all
Version: 1.4.23-1
Distribution: unstable
Urgency: low
Maintainer: Debian HAProxy Maintainers
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Fri, 10 May 2013 21:02:05 +0800
Source: between
Binary: between
Architecture: source amd64
Version: 6+dfsg1-3
Distribution: unstable
Urgency: low
Maintainer: Debian Games Team pkg-games-de...@lists.alioth.debian.org
Changed-By:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Fri, 10 May 2013 15:45:11 +0200
Source: fdm
Binary: fdm
Architecture: source amd64
Version: 1.7-2
Distribution: unstable
Urgency: low
Maintainer: Frank Terbeck f...@bewatermyfriend.org
Changed-By: Frank Terbeck
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Wed, 27 Mar 2013 12:35:55 -0500
Source: ocaml-lastfm
Binary: liblastfm-ocaml-dev
Architecture: source amd64
Version: 0.3.0-3
Distribution: unstable
Urgency: low
Maintainer: Debian OCaml Maintainers debian-ocaml-ma...@lists.debian.org
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Fri, 10 May 2013 16:20:25 +0200
Source: pconsole
Binary: pconsole
Architecture: source amd64
Version: 1.0-11
Distribution: unstable
Urgency: low
Maintainer: Axel Beckert a...@debian.org
Changed-By: Axel Beckert a...@debian.org
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Fri, 10 May 2013 15:23:55 +0200
Source: udpcast
Binary: udpcast
Architecture: source amd64
Version: 20120424-1
Distribution: unstable
Urgency: low
Maintainer: Michael Schutte mi...@debian.org
Changed-By: Michael Schutte
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Fri, 10 May 2013 07:47:16 -0430
Source: editra
Binary: editra
Architecture: source all
Version: 0.7.20-2
Distribution: unstable
Urgency: low
Maintainer: Alejandro Garrido Mota alejan...@debian.org
Changed-By: Alejandro Garrido Mota
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Fri, 10 May 2013 17:24:46 +0200
Source: libffi
Binary: libffi-dev lib32ffi-dev lib64ffi-dev libn32ffi-dev libffi6 lib32ffi6
lib64ffi6 libn32ffi6 libffi6-dbg libffi6-udeb
Architecture: source amd64
Version: 3.0.13-4
Distribution:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Mon, 04 May 2013 09:40:22 +1000
Source: speech-tools
Binary: libestools2.1 libestools2.1-dev speech-tools
Architecture: source amd64
Version: 1:2.1~release-6
Distribution: unstable
Urgency: low
Maintainer: Jean-Philippe MENGUAL
-BEGIN PGP SIGNED MESSAGE-
Hash: RIPEMD160
Format: 1.8
Date: Fri, 10 May 2013 16:39:17 +0200
Source: gnutls28
Binary: libgnutls28-dev libgnutls28 libgnutls28-dbg gnutls-bin gnutls-doc
guile-gnutls libgnutlsxx28 libgnutls-xssl0
Architecture: source all i386
Version: 3.1.11-1
Distribution:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Fri, 10 May 2013 17:27:44 +0200
Source: jalv
Binary: jalv
Architecture: source amd64
Version: 1.2.0~dfsg0-2
Distribution: unstable
Urgency: low
Maintainer: Debian Multimedia Maintainers
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Fri, 10 May 2013 10:05:46 +0200
Source: llvm-defaults
Binary: llvm llvm-runtime llvm-dev libllvm-ocaml-dev clang lldb
Architecture: source amd64
Version: 0.16
Distribution: unstable
Urgency: low
Maintainer: LLVM Packaging Team
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Thu, 09 May 2013 20:31:30 +0100
Source: sdl-net1.2
Binary: libsdl-net1.2 libsdl-net1.2-dbg libsdl-net1.2-dev
Architecture: source amd64
Version: 1.2.8-3
Distribution: unstable
Urgency: low
Maintainer: Debian SDL packages maintainers
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Wed, 08 May 2013 01:34:40 -0700
Source: conky
Binary: conky conky-std conky-std-dbg conky-cli conky-cli-dbg
Architecture: source all amd64
Version: 1.9.0-3
Distribution: unstable
Urgency: low
Maintainer: Vincent Cheng
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Thu, 09 May 2013 12:21:51 +0100
Source: metaconfig
Binary: python-metaconfig python3-metaconfig
Architecture: source i386
Version: 0.1.4a1-2
Distribution: unstable
Urgency: low
Maintainer: Alastair McKinstry mckins...@debian.org
1 - 100 of 171 matches
Mail list logo