ributions
Ack.Thanks
--
-
| ,''`. Victor Seva |
| : :' : linuxman...@torreviejawireless.org |
| `. `' PGP: 8F19 CADC D42A 42D4 5563 730C 51A0 9B18 CF5A 5068 |
|`-
Package: wnpp
Severity: wishlist
Owner: Victor Seva
X-Debbugs-Cc: debian-de...@lists.debian.org, debian-packag...@sipwise.com,
vs...@debian.org
* Package name: lua-cmsgpack
Version : 0.4.0
Upstream Contact: Salvatore Sanfilippo
* URL : https://github.com/antirez
in prosody source.
Cheers
--
-
| ,''`. Victor Seva |
| : :' : linuxman...@torreviejawireless.org |
| `. `' PGP: 8F19 CADC D42A 42D4 5563 730C 51A0 9B18 CF5A 5068 |
|`-
/issues/438
[2]
https://github.com/irontec/sngrep/commit/ad1daf15c8387bfbb48097c25197bf330d2d98fc
--
-
| ,''`. Victor Seva |
| : :' : linuxman...@torreviejawireless.org
forwarded 978760 https://github.com/lunarmodules/busted/pull/704
thanks
--
-
| ,''`. Victor Seva |
| : :' : linuxman...@torreviejawireless.org
--
-
| ,''`. Victor Seva |
| : :' : linuxman...@torreviejawireless.org |
| `. `' PGP Key ID: 0x51A09B18CF5A5068
Package: wnpp
Severity: wishlist
Owner: Victor Seva
* Package name: golang-github-gomagedon-expectate
Version : 1.1.0-1
Upstream Author : Steven C Kaufman
* URL : https://github.com/gomagedon/expectate
* License : Expat
Programming Lang: Go
Description
.
--
-
| ,''`. |
| : :' : |
| `. `' Victor Seva |
|`-PGP Key ID: 0x51A09B18CF5A5068
Package: wnpp
Severity: wishlist
Owner: Victor Seva
X-Debbugs-Cc: debian-de...@lists.debian.org
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
* Package name: nats.c
Version : 2.5.1
Upstream Author : Derek Collison de...@nats.io
* URL : https://github.com/nats-io
Hi
On 5/19/21 6:44 AM, J. Fahrner wrote:
Package: prosody
Version: 0.11.2-1+deb10u1
After latest security update prosodys websocket aborts with the
following error:
May 18 08:33:07 general error Top-level error, please report:
/usr/lib/prosody/net/websocket/frames.lua:76: bad argument #1
y-0.11.8/debian/changelog 2021-02-16 14:26:08.0 +0100
+++ prosody-0.11.9/debian/changelog 2021-05-14 09:17:12.0 +0200
@@ -1,3 +1,16 @@
+prosody (0.11.9-1) unstable; urgency=high
+
+ * New upstream version 0.11.9 addressing several security issues
+ - https://prosody.im/secu
Package: wnpp
Severity: wishlist
Owner: Victor Seva
X-Debbugs-Cc: debian-de...@lists.debian.org
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
* Package name: secsipidx
Version : 1.0.0
Upstream Author : Daniel-Constantin Mierla
* URL : https://github.com/asipto
Package: smuxi-frontend-gnome
Followup-For: Bug #962042
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Works in my buster installation
- -- System Information:
Debian Release: 10.4
APT prefers stable-updates
APT policy: (500, 'stable-updates'), (500, 'stable'), (1, 'unstable'), (1,
package kamailio-java-modules
tags 929803 wontfix
--
Hi,
> I need a kamailio_java package for kamailio 5 's buster without the
gcj dependancy.
app_java packaging was removed due [0]. There are several problems with
it [1][2]. If you need it, maybe you can help upstream to get it working.
Can you please check if this issue still happens with prosody
0.11.4-1~bpo10+1?
Cheers,
Victor
On Thu, 13 Jun 2019 at 14:50, Jonas Smedegaard wrote:
> I am not familiar with Puppet so cannot help review that.
>
> It seems to me noone else in the team is familiar with it either -
> including Victor who wrote previously that he has "no idea how to test
> this and see what the result would
On Thu, 13 Jun 2019 at 13:09, gustavo panizzo wrote:
> I've been working on how to maintain and update the prosody config
>
> this was my initial attempt using a Makefile
> https://salsa.debian.org/rtc-team/prosody-configuration
>
> this is my current attempt using puppet and the module Victor
> Is it already too late to consider changing name?
Not at all, there is only one room 'rtc' and this is us.
>
> id="d55828bd-6b97-4326-8b12-b9619147181b" from="
> vs...@debian.org/gajim.BA9QCKUE">
> http://jabber.org/protocol/disco#items; />
>
>
>
>
> type="result"
MUC service is already enabled for debian.org as conference.debian.org. The
only problem with this is that users from outside debian.org can't use it.
This was my initial decision in order not to get more spam and noise that
was already high at that moment.
deba...@debian.org suggested to open
Initial work, just adding the prosody module is here [0]. Next step would
be to use the module to generate the configs We need. And modify it if
something is missing and try to push those changes upstream.
But, I have no idea how to test this and see what the result would be. I
would need to
On Fri, 1 Feb 2019 at 14:25, PICCORO McKAY Lenz
wrote:
> Hi victor, you didnt noted tha i mentiones that i use buster, and i
> mention that only happened when kamailio need to comunicate
> internally.. this means with many modules enables and asterisk in the
> game... and i noted that build from
severity 921015 normal
--
thanks
Hello,
*You didn't mentioned if you are using systemd or sysv. Both have rules to
create and set permissions for /var/run/kamailio dir:*
*# debian/kamailio.init*
*HOMEDIR=/var/run/$NAME[..]USER=kamailioGROUP=kamailio[..]*
*# /var/run can be a tmpfsif [ !
Hi Cyril,
Can you please confirm that this error does not exist in the current
version of prosody 0.11.1-1?
Thanks,
Victor Seva
proposed change to stretch #917880
(Closes: #902452)
+so TLS can be used again via kamailio-tls-modules
+
+ -- Victor Seva Mon, 31 Dec 2018 10:28:23 +0100
+
kamailio (4.4.4-2+deb9u3) stretch-security; urgency=high
* Non-maintainer upload by the Security Team.
diff -Nru kamailio-4.4.4/debian/patches/series
kamailio-4.4.4
upstream fix included at 4.4.6
https://github.com/kamailio/kamailio/commit/406c02f7b76ada56d6e1f73e763fecb05c1f51c5
> kamailio[4041]: INFO: tls [tls_init.c:633]: init_tls_h(): tls:
_init_tls_h: compiled with openssl version "OpenSSL 1.1.0f 25 May
2017" (0x1010006f), kerberos support: on, compression: on
kamailio[4041]: INFO: tls [tls_init.c:641]: init_tls_h(): tls: init_tls_h:
installed openssl library
Thanks for the report,
I didn't find the time to investigate but
I think this info is relevant here
https://github.com/kamailio/kamailio/issues/1050
Will try to look into this in the next few days,
Victor Seva
Hi Daniel,
can you please test this patch.
Cheers,
Victor
From: Victor Seva
Date: Thu, 20 Dec 2018 11:08:55 +0100
Subject: don't set global lualdap on lua > 5.1
---
src/lualdap.c | 2 ++
1 file changed, 2 insertions(+)
diff --git a/src/lualdap.c b/src/lualdap.c
index f2404b8..5dd5971 100
I have just started to update the repo in salsa [0] to the new 1.0.4
upstream version.
Help getting the package in shape for inclusion in Debian is appreciated
:-)
[0] https://salsa.debian.org/pkg-voip-team/bcg729/
Package: wnpp
Severity: wishlist
Owner: Victor Seva
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
* Package name: rtpengine
Version : mr6.5.2.1
Upstream Author : Sipwise Development Team
* URL : https://github.com/sipwise/rtpengine/
* License : GPL-3
Hi,
sorry for the late reply.
On Sat, 5 May 2018 at 22:27, Tim Duesterhus
wrote:
> this package cannot be used with lua5.3 out of the box, because
> it is not installed into the LUA_PATH:
>
>
according to upstream [0]:
> This library is tested and works with Lua 5.1, Lua 5.2 (using a
Package: ftp.debian.org
Severity: normal
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
As the maintainer of this package, please remove it. Is no longer
relevant for the version we provide this days of asterisk.
Thanks,
Victor Seva
-BEGIN PGP SIGNATURE
Hi,
On Sun, Oct 7, 2018, 20:09 W. Martin Borgert wrote:
> On 2018-10-07 18:05, Boris Pek wrote:
> > I would suggest you to reconsider all pros and cons of this decision.
>
> Sorry for already uploading my change. I should have waited for
> comments, esp. after asking! I'm absolutely open to
Package: wnpp
Severity: wishlist
Owner: Victor Seva
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
* Package name: kamcli
Version : 1.1.0
Upstream Author : Daniel-Constantin Mierla
* URL : https://github.com/kamailio/kamcli
* License : GPL-2+
Programming
Package: wnpp
Severity: wishlist
Owner: Victor Seva
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
* Package name: messagingmenu-sharp
Version : 1.0.1-1
Upstream Author : Mirco Bauer
* URL : https://www.meebey.net/projects/messagingmenu-sharp/
* License
Package: lua-dbi
Severity: wishlist
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Dear Maintainer,
the project seems to live now at [0] and there's even a 0.6 version
released.
[0] https://github.com/mwild1/
[1] https://github.com/mwild1/luadbi/releases/tag/v0.6
- -- System Information:
Patch reworked to be applied upstream [0].
Will be included in my next upload, thanks! :-)
[0]
https://github.com/kamailio/kamailio/commit/4cc60ede961554220cd265bd212407f42d5b8262
I don't see any reference of bcrypt at [0]
[0] https://prosody.im/doc/modules/mod_auth_internal_hashed
And I would assume you meant lua bcrypt [1] witch is not even packaged
[1] https://github.com/mikejsavage/lua-bcrypt
tags 868096 + fixed-upstream pending
signature.asc
Description: OpenPGP digital signature
Reported upstream [0]
[0] https://github.com/nils-ohlmeier/sipsak/pull/39
signature.asc
Description: OpenPGP digital signature
On 07/12/2017 02:27 AM, Jorge Daniel Sequeira Matias wrote:
> Package: sipsak
> Version: 0.9.6+git20160713-2
> Severity: important
>
> Dear Maintainer,
>
> I'm using sipsak in my Nagios monitoring system configuration to check if my
> VoIP (SIP) server is authenticating users correctly.
>
Package: wnpp
Severity: wishlist
Owner: Victor Seva <vs...@debian.org>
* Package name: libusrsctp
Version : 0.9.3~gitd5f916d
Upstream Author : Randall Stewart and Michael Tuexen
* URL : https://github.com/sctplab/usrsctp/
* License : BSD
Programming L
) is used, 'use_libevent = true' in config.
This bug will make prosody fail to connect to any other XMPP server
using a domain. This is quite important for a IM service.
The fix is coming from upstream and I did test it.
Thanks in advance,
Victor Seva
unblock prosody/0.9.12-2
-- System
Package: wnpp
Severity: wishlist
Owner: Victor Seva <vs...@debian.org>
* Package name: lua-argparse
Version : 0.5.0
Upstream Author : Peter Melnichenko
* URL : https://github.com/mpeterv/argparse
* License : Expat
Programming Lang: Lua
Descr
tags 844548 - fixed-upstream + confirmed
thanks
rebuild with a newer version doesn't help.
> Mar 31 11:20:41 spce lb[17194]: INFO: tls [tls_init.c:633]: init_tls_h():
> tls: _init_tls_h: compiled with openssl version "OpenSSL 1.1.0e 16 Feb
> 2017" (0x1010005f), kerberos support: on,
El 13 mar. 2017 20:14, "Jonas Smedegaard" escribió:
I am ready to release Janus now. You wanted notice first?
Pong.
Go ahead, great work.
2017-02-05 15:53 GMT+01:00 Jonas Smedegaard <d...@jones.dk>:
> Quoting Victor Seva (2016-12-22 14:05:03)
>
> Concretely for Janus the better solution than waiting (in vein) for
> libsrtp 1.5 is to instead link with libsrtp2.
>
> I have a succesful build with a few ups
On 12/22/2016 01:52 PM, Jonas Smedegaard wrote:
> Excerpts from Victor Seva's message of December 22, 2016 10:44 am:
>> I'm working on packaging janus WebRTC gateway [0] but it depends
>> on a newer version of srtp. I notice that some work was done [1]
>> last year in experimental. Is there a plan
Package: srtp
Severity: wishlist
I'm working on packaging janus WebRTC gateway [0] but it depends
on a newer version of srtp. I notice that some work was done [1]
last year in experimental. Is there a plan to upload that version
to unstable before the stretch freeze?
[0]
Package: wnpp
Severity: wishlist
Owner: Victor Seva <vs...@debian.org>
* Package name: janus
Version : 0.2.1
Upstream Author : Meetecho
* URL : http://janus.conf.meetecho.com/
* License : GPL3
Programming Lang: C
Description : WebRTC gateway
fe0e66000+184000]
>
Yes, I just notice the security update is broken.
I have prepared the fix for this and I was planing to contact the
security team about this.
Thanks for reporting,
Victor Seva
From ee30a7dff71a579d32c6744c38834a5808b10c3f Mon Sep 17 00:00:00 2001
From: Victor Seva <linu
On 11/28/2016 02:28 PM, W. Martin Borgert wrote:
> Package: rtc.debian.org
> Severity: wishlist
>
> I get a lot of spam on my Debian XMPP account.
> Please enable some kind of spam blocking.
> I suggest to use mod_block_strangers, which works fine for me.
mod_block_strangers has been added to
prosody_0.9.10-1~bpo8+1 uploaded to jessie-backports
Forwarded Message
Subject: prosody_0.9.10-1~bpo8+1_amd64.changes is NEW
Date: Mon, 07 Nov 2016 09:07:40 +
From: Debian FTP Masters <ftpmas...@ftp-master.debian.org>
To: Victor Seva <vs...@debian.org>, Matthe
prosody 0.9.11-1 was uploaded at Date: Fri, 04 Nov 2016 08:53:23 +0100 [0]
[0] https://tracker.debian.org/news/812339
signature.asc
Description: OpenPGP digital signature
m/prosody-0-9-9-security-release/
> http://blog.prosody.im/prosody-0-9-10-released/
>
> It would be nice to let users of Debian stable enjoy them.
>
I've just pushed jessie-backports to the repo. I will build and push
this version if you have no objections next week.
Regards
Victor Seva
ebian and the prosody-modules package.
> In experimental, not unstable, of course.
>
> AFAIK, some people already use 0.10 in production, e.g. yax.im.
>
Yes, I'll try to start working at 0.10 in the next days
Regards,
Victor Seva
signature.asc
Description: OpenPGP digital signature
Package: gnome-control-center
Version: 1:3.21.90-1
Followup-For: Bug #836835
Same crash here. If I remove the network config via terminal:
$ nmcli connection del
Then add a new wired connection, as soon as I want to add a DNS like 127.0.0.1
when I introduce the last 1 the panel just crash
dates; urgency=medium
+
+ * use my DD account \o/
+ * add upstream fix for:
+proper check of libssl versions used for compilation
+and available on system (Closes: #833973)
+
+ -- Victor Seva <vs...@debian.org> Wed, 07 Sep 2016 10:00:32 +0200
+
kamailio (4.2.0-2+deb8u1) jessie-securi
Package: release.debian.org
Severity: normal
Tags: jessie
User: release.debian@packages.debian.org
Usertags: pu
kamailio in jessie has a bug described at #833973 that makes impossible
to use TLS with kamailio without downgrading openssl.
The issue was reported by me [0] to upstream and a fix
fixed 83397 4.4.2-1
forwarded 83397 https://github.com/kamailio/kamailio/issues/662
2016-08-11 2:07 GMT+02:00 Ben Sartor :
> Package: kamailio-tls-modules
> Version: 4.2.0-2+deb8u1
> Severity: normal
>
> --- Please enter the report below this line. ---
> Hi,
>
> recently I noticed kamailio does not
Hi Daniel,
are you aware of #825121 [0]? Do you have any plans to work on that?
Regards,
Victor Seva
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=825121 [0]
fixed 815796 0.9.8-1
thanks
--
On 02/24/2016 03:36 PM, Kim Alvefur (Zash) wrote:
> Package: prosody
> Version: 0.9.7-2+deb8u3
> Severity: minor
>
> Hi,
>
> The prosody package creates a symlink /etc/prosody/certs/localhost.cert,
> but the default config uses "certs/localhost.crt", note the file
The thing is that using a SQL server is not mandatory.
So adapt LSB headers to your needs is the solution.
signature.asc
Description: OpenPGP digital signature
forwarded 810960 https://github.com/irontec/sngrep/issues/81
thanks
signature.asc
Description: OpenPGP digital signature
Package: wnpp
Severity: wishlist
Owner: Victor Seva <linuxman...@torreviejawireless.org>
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
* Package name: lua-unbound
Version : 0.0+hg~14fd7a2875e4
Upstream Author : Kim Alvefur <z...@zash.se>
* URL : https:/
Package: rtc.debian.org
Severity: wishlist
In order to get mod_s2s_auth_dane [0] luaunbound [1] needs to be
packaged [2].
[0] http://modules.prosody.i/mod_s2s_auth_dane.html
[1] https://www.zash.se/luaunbound.html
[2] https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=805311
signature.asc
Source: kamailio
Version: 4.3.3-2
/usr/bin/make all quiet=verbose
make[1]: Entering directory '/«PKGBUILDDIR»'
config.mak loaded
Makefile.defs defs skipped
config.mak loaded
Makefile.defs defs skipped
gcc -funroll-loops -march=r3000 -ftree-vectorize -fno-strict-overflow
-Wall -D_FORTIFY_SOURCE=2
On 11/11/2015 07:46 AM, Daniel Pocock wrote:
> Package: rtc.debian.org
> Severity: important
>
> Users sometimes access the Internet through wifi networks in large
> hotels and airports and other unusual networks where only port 80 and
> 443 are working and other ports are not working. Sometimes
> --- DSA tasks ---
>
> 2. installing the prosody-modules package from jessie-backports and
> verify that /usr/lib/prosody/modules/mod_auth_ha1.lua is working
> (the version of mod_auth_ha1.lua that we developed and tested at
> DebConf15 is in ~pocock/prosody-mod/mod_auth_ha1.lua)
Done. After
This seems like a good idea to me, so +1 from me.
signature.asc
Description: OpenPGP digital signature
Source: unittest-xml-reporting
Severity: wishlist
There is several new upstream versions available. Last upload to
Debian was on 2013. First and only.
I tried to access the svn but the unittest-xml-reporting is even not
there [0]
[0]
For the history: kamailio[0] is already packaged and included in Jessie.
Maintained under the pkg-voip team.
I will add some links for the context:
https://en.wikipedia.org/wiki/SIP_Express_Router
https://www.kamailio.org/w/openser-renamed-to-kamailio/
https://www.kamailio.org/w/history/
[0]
Control: tags 779803 + fixed pending
Upstream fix to not reveal realname:
https://github.com/meebey/smuxi/commit/f21cc42e087e93f621b1a368770f46e41d6cff2f
trivial on purpose in order to not introduce regressions
signature.asc
Description: OpenPGP digital signature
retitle 795365 ITP: intel-processor-trace -- Intel Processor Trace
Decoder Library
thanks
--
On 08/16/2015 12:05 AM, Henrique de Moraes Holschuh wrote:
On Thu, 13 Aug 2015, Victor Seva wrote:
* Package name: processor-trace
Upstream Author : Intel Corporation
Intel's reference
://mentors.debian.net/debian/pool/main/p/pkwalify/pkwalify_1.22-1.dsc
More information about hello can be obtained from http://www.example.com.
Changes since the last upload:
pkwalify (1.22-1) unstable; urgency=low
* Initial Release (closes: #792031).
-- Victor Seva linuxman...@torreviejawireless.org Fri
Initial work at [0]
[0] https://anonscm.debian.org/cgit/users/maniac-guest/pkwalify.git/
signature.asc
Description: OpenPGP digital signature
Package: wnpp
Severity: wishlist
Owner: Victor Seva linuxman...@torreviejawireless.org
* Package name: processor-trace
Version : 1.4.0
Upstream Author : Intel Corporation
* URL : https://github.com/01org/processor-trace/
* License : Expat
Programming Lang: C
Package: ftp.debian.org
Severity: normal
package valid for an old version of asterisk. No upstream release since 2009 and
it seems the now support the propietary version only
We would like to remove it, anyhow it's not in stable
--
To UNSUBSCRIBE, email to
Hi Felipe,
Is this bug still reproducible with smuxi 1.0-1?
Thanks,
Victor
signature.asc
Description: OpenPGP digital signature
Package: wnpp
Severity: wishlist
Owner: Victor Seva linuxman...@torreviejawireless.org
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
* Package name: lua-lanes
Version : 3.10.0
Upstream Author : Benoit Germain bnt.germ...@gmail.com
* URL : https://github.com/LuaLanes
0.11.0 released
initial? work http://blog.torreviejawireless.org/debian/lua-check/
signature.asc
Description: OpenPGP digital signature
Package: wnpp
Severity: wishlist
Owner: Victor Seva linuxman...@torreviejawireless.org
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
* Package name: golang-github-ugorji-go-codec
Version : 0.0~git20150815.821cda7e
Upstream Author : Ugorji Nwoke
* URL : https
Package: wnpp
Severity: wishlist
Owner: Victor Seva linuxman...@torreviejawireless.org
* Package name: pkwalify
Version : 1.22
Upstream Author : Slaven Rezic sla...@rezic.de
* URL : https://github.com/eserte/p5-Kwalify/
* License : Artistic-2.0
Programming
Package: wnpp
Severity: wishlist
Owner: Victor Seva linuxman...@torreviejawireless.org
* Package name: golang-cronexpr-dev
Version : 1.0.0-1
Upstream Author : Raymond Hill
* URL : https://github.com/gorhill/cronexpr
* License : GPL-3
Programming Lang: Golang
Package: wnpp
Severity: wishlist
* Package name: golang-mysql-dev
Version : 1.2-1
Upstream Author : Julien Schmidt go-sql-driver at julienschmidt.com
* URL : https://github.com/go-sql-driver/mysql
* License : MPL 2.0
Programming Lang: Go
Description :
Package: wnpp
Severity: wishlist
Owner: Victor Seva linuxman...@torreviejawireless.org
* Package name: cgrates
Version : 0.9.1~rc5
Upstream Author : ITsysCOM GmbH
* URL : https://github.com/cgrates/cgrates
* License : GPL-3
Programming Lang: Golang
On 05/16/2015 12:11 PM, Ivan Alonso [Kaian] wrote:
Hi Victor,
Of course!
Right now I have some repositories with version 0.3.1-1 [1] and I'll soon
release 0.3.2 which will solve a couple of minor bugs.
Ok. Upgrading. Please ping me when 0.3.2 is released.
It will be nice if
Hi Ivan,
I would like to see sngrep entering Debian repositories. I saw that
you're still looking for a sponsor for it [1]. Are you willing to
maintain it under the Debian pkg-voip [0] umbrella?
Cheers,
Victor
[0] https://wiki.debian.org/Teams/VoIP
[1] http://mentors.debian.net/package/sngrep
Hi,
I've created [0] the git repo and commit some changes in order to get
sngrep built.
Cheers,
Victor
[0] http://anonscm.debian.org/cgit/pkg-voip/sngrep.git/
signature.asc
Description: OpenPGP digital signature
0.10.0 released
initial work http://blog.torreviejawireless.org/debian/lua-check/
signature.asc
Description: OpenPGP digital signature
Package: debian-maintainers
Severity: normal
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Hi this is my annual ping for debian-maintainers
- -- System Information:
Debian Release: 8.0
APT prefers testing-updates
APT policy: (500, 'testing-updates'), (500, 'testing')
Architecture: amd64
tags 606138 + fixed pending
signature.asc
Description: OpenPGP digital signature
0.9.0 released
initial work http://blog.torreviejawireless.org/debian/lua-check/
signature.asc
Description: OpenPGP digital signature
Package: gcj-jdk
Severity: normal
Tags: patch
# dpkg -L gcj-jdk | grep libgcj.pc
/usr/lib/pkgconfig/x86_64-linux-gnu/libgcj.pc
# ls -la /usr/lib/pkgconfig/x86_64-linux-gnu/libgcj.pc
lrwxrwxrwx 1 root root 11 Oct 18 09:03
/usr/lib/pkgconfig/x86_64-linux-gnu/libgcj.pc - libgcj15.pc
# ls -la
Hi Enrico,
On 01/17/2015 02:07 PM, Enrico Tassi wrote:
A git repo pkg-lua/lua5.3 on alioth was created, help is very welcome.
I would like to help here, is there any TODO or plan here?
Cheers,
Victor
signature.asc
Description: OpenPGP digital signature
Package: wnpp
Severity: wishlist
Owner: Victor Seva linuxman...@torreviejawireless.org
* Package name: luacheck
Version : 0.8.0
Upstream Author : Peter Melnichenko mpeter...@gmail.com
* URL : https://github.com/mpeterv/luacheck/
* License : Expat
Programming
fifo and ctl defaults pointing to unsecure /tmp dir
+Closes: #775681
+
+ -- Victor Seva linuxman...@torreviejawireless.org Wed, 28 Jan 2015 20:43:44 +0100
+
+kamailio (4.2.0-1.1) unstable; urgency=low
+
+ * Non-maintainer upload.
+ * Fix FTBFS on mipsel and mips.
+Add mips/mipsel arch
On 01/25/2015 09:52 PM, Helmut Grohne wrote:
On Sat, Jan 24, 2015 at 02:30:37PM +0100, Victor Seva wrote:
On 01/18/2015 05:16 PM, Helmut Grohne wrote:
[snip]
All of these fixes are appropriate for a Debian Security Advisory. Thus
they should also be appropriate for a freeze unblock. Please
1 - 100 of 298 matches
Mail list logo