Re: Packaging releases without a tarball (sometimes)

2013-05-17 Thread Pau Garcia i Quiles
On Fri, May 17, 2013 at 4:31 AM, Chow Loong Jin hyper...@debian.org wrote: On 17/05/2013 01:01, Pau Garcia i Quiles wrote: Patch releases are NOT available as zip files and the list of wrongdoings is long: - Patch releases are only available from the git repository

Re: Do opaque struct changes break C library ABIs

2013-05-17 Thread Russ Allbery
Josselin Mouette j...@debian.org writes: Le jeudi 16 mai 2013 à 17:35 -0700, Russ Allbery a écrit : I have a C shared library that takes a pointer to an opaque struct as the first argument to most of its API calls. The internal layout of that opaque struct is changing (to add new members).

Re: Web ID as passwordless authentication for debian web services

2013-05-17 Thread Stéphane Glondu
Le 16/05/2013 18:37, Russ Allbery a écrit : You could, in theory, switch to DNSSEC, but now you're just replacing one CA cartel with another. Except that with DNSSEC (and DANE), the number of people you have to trust is much smaller. Right, it depends on what your risk model is. If

Re: Apport for Debian

2013-05-17 Thread Ritesh Raj Sarraf
On Monday 13 May 2013 11:26 PM, Thomas Goirand wrote: On 05/13/2013 03:06 PM, Ritesh Raj Sarraf wrote: 1) Duplicate bug reports: There are high possibilities that we could see a sudden increase in the number of bug reports, many duplicates. This is something I'm not sure how we want to

Re: Web ID as passwordless authentication for debian web services

2013-05-17 Thread Stéphane Glondu
Le 16/05/2013 20:40, Russ Allbery a écrit : What am I missing? I suppose one thing that I could be missing is that, with a certificate, you have no privacy controls over what metadata you release. Whatever you put in the certificate is visible to anyone who looks at the certificate. (Well,

Re: systemd^wfoo on linux, bar on bsd,so what (Re: /bin/sh (was Re: jessie release goals)

2013-05-17 Thread Marc Haber
On Mon, 13 May 2013 02:31:02 +0200, m...@linux.it (Marco d'Itri) wrote: Maybe kfreebsd will do, but as I explained at FOSDEM I plan to make udev depend on either upstart or systemd. I would rather not be the one who will choose which one of them, so I hope that we will get to a consensus about

Re: Apport for Debian

2013-05-17 Thread Raphael Hertzog
Hi, On Fri, 17 May 2013, Ritesh Raj Sarraf wrote: That is a good point. Thanks Thomas. We could submit apport reports with the tag Apport and instruct reportbug to forward the report to pack...@qa.debian.org. This way we avoid the flood of bug reports in general while at the same time the

Re: Web ID as passwordless authentication for debian web services [was: Re: Developer repositories for Debian]

2013-05-17 Thread Olivier Berger
Hi. Philip Hands p...@hands.com writes: Do you have any thoughts on how that compares with using BrowserID/Persona? I'd got the impression that BrowserID has been put together learning from mistakes of OpenID WebID, but perhaps I'm just swallowing their marketing. AFAIU, I guess that,

Re: Web ID as passwordless authentication for debian web services

2013-05-17 Thread Jonas Smedegaard
Quoting Stéphane Glondu (2013-05-17 08:14:13) Le 16/05/2013 18:37, Russ Allbery a écrit : You could, in theory, switch to DNSSEC, but now you're just replacing one CA cartel with another. Except that with DNSSEC (and DANE), the number of people you have to trust is much smaller.

Re: Developer repositories for Debian

2013-05-17 Thread obergix
Hi. Sorry to be a bit late in the discussion. Russ Allbery r...@debian.org writes: I'd never heard of WebID before this thread, but looking briefly at the spec, I share Daniel's concerns. I don't see how this eliminates reliance on the normal CAs. You still have to do certificate

Re: Web ID as passwordless authentication for debian web services

2013-05-17 Thread Olivier Berger
Russ Allbery r...@debian.org writes: Jonas Smedegaard d...@jones.dk writes: Quoting Russ Allbery (2013-05-16 18:37:06) but it's not clear to me why we'd bother as opposed to just issuing client X.509 certificates with the metadata already included. Because the very separation of

Re: Web ID as passwordless authentication for debian web services

2013-05-17 Thread Olivier Berger
Hi again. Russ Allbery r...@debian.org writes: I can understand why you may want to externalize the metadata if you have no control over the certificate creation process and therefore can't put metadata directly in it. I don't understand what you gain (other than complexity) by

Re: Do opaque struct changes break C library ABIs

2013-05-17 Thread Thomas Preud'homme
Le vendredi 17 mai 2013 07:17:48, Guillem Jover a écrit : (…) I agree dlopen()ing shared libraries in general should not be supported (I'd even go further and say this should be outright banned, given the pain it causes, and optional library support should always be implemented by loading a

Re: Web ID as passwordless authentication for debian web services

2013-05-17 Thread obergix
Hi again. Russ Allbery r...@debian.org writes: Jonas Smedegaard d...@jones.dk writes: Quoting Russ Allbery (2013-05-16 19:57:59) Sure, but if you have control over the server certificate and are tying the server certificate to the user certificate via some mechanism like Monkeysphere, why

Re: Do opaque struct changes break C library ABIs

2013-05-17 Thread Chow Loong Jin
On 17/05/2013 13:17, Guillem Jover wrote: Yeah that should be the case, the dynamic linker should not be loading the same SONAME multiple times, so there should be no race here, and I agree dlopen()ing shared libraries in general should not be supported (I'd even go further and say this should

Re: Web ID as passwordless authentication for debian web services

2013-05-17 Thread Jonas Smedegaard
Quoting Russ Allbery (2013-05-16 22:24:34) Jonas Smedegaard d...@jones.dk writes: Quoting Russ Allbery (2013-05-16 19:57:59) Sure, but if you have control over the server certificate and are tying the server certificate to the user certificate via some mechanism like Monkeysphere, why

Re: Web ID as passwordless authentication for debian web services

2013-05-17 Thread Olivier Berger
Hi again. Just in case it helps a bit more, let me forward you this message from Andrei Sambra, a Debian user and WebID working group member (who's also the developer of MyProfile, a killer demo service of WebID at [1] - project/code at [0]). Andrei read the thread an wanted to provide some

Re: Temporary solution for changelog problem in binNMUs

2013-05-17 Thread Dominique Dumont
On Monday 13 May 2013 11:14:07 Ansgar Burchardt wrote: There have been previous discussions how to fix this[2]. The dpkg maintainers would like to treat changelogs and copyright files as metadata and move them out of /usr/share/doc[3]. [2]

Re: Do opaque struct changes break C library ABIs

2013-05-17 Thread Simon McVittie
On 17/05/13 10:43, Chow Loong Jin wrote: On 17/05/2013 13:17, Guillem Jover wrote: I agree dlopen()ing shared libraries in general should not be supported (I'd even go further and say this should be outright banned, given the pain it causes, and optional library support should always be

Re: systemd^wfoo on linux, bar on bsd,so what (Re: /bin/sh (was Re: jessie release goals)

2013-05-17 Thread Holger Levsen
Hi Marc, On Freitag, 17. Mai 2013, Marc Haber wrote: We're going to have a TC decision or a GR about this anyway. why do you think so? cheers, Holger signature.asc Description: This is a digitally signed message part.

Re: Temporary solution for changelog problem in binNMUs

2013-05-17 Thread Thomas Preud'homme
Le vendredi 17 mai 2013 13:40:13, Dominique Dumont a écrit : This may be a dumb question, but looking at this example of different binNMU changelogs [1], I wonder what is the point of having a log specific to each build system ... In other word, can't we have a binNMU log generated by

Re: Do opaque struct changes break C library ABIs

2013-05-17 Thread Sune Vuorela
On 2013-05-17, Simon McVittie s...@debian.org wrote: dlopen()'d. However, GNU/anything and Windows (and also Mac OS, I think) are among the platforms where either works, so in practice most You can't link plugins on windows, I'm told. /Sune -- To UNSUBSCRIBE, email to

Re: Do opaque struct changes break C library ABIs

2013-05-17 Thread Stéphane Glondu
Le 17/05/2013 13:50, Simon McVittie a écrit : According to libtool documentation, on some platforms this distinction is really significant, and real shared libraries can't be dlopen()'d. However, GNU/anything and Windows (and also Mac OS, I think) are among the platforms where either works, so

Re: Do opaque struct changes break C library ABIs

2013-05-17 Thread Stéphane Glondu
Le 17/05/2013 14:18, Sune Vuorela a écrit : On 2013-05-17, Simon McVittie s...@debian.org wrote: dlopen()'d. However, GNU/anything and Windows (and also Mac OS, I think) are among the platforms where either works, so in practice most You can't link plugins on windows, I'm told. Indeed. Some

Re: /bin/sh (was Re: jessie release goals)

2013-05-17 Thread Vincent Lefevre
On 2013-05-07 14:23:47 +, Thorsten Glaser wrote: Shells suitable for /bin/sh are currently bash, dash, mksh. I forgot about that (partly because of workarounds), but due to the SIGINT problem, I think that *currently*, among these 3 shells, bash is the most suitable one, and mksh is a bit

Re: Temporary solution for changelog problem in binNMUs

2013-05-17 Thread Julien Cristau
On Fri, May 17, 2013 at 14:14:20 +0200, Thomas Preud'homme wrote: Also, it wouldn't help for the case of a binNMU on a subset of all arches since only some of them would have the entry. The solution proposed by ansgar cover this case. No it doesn't. dpkg will still refuse to install a m-a

Re: Temporary solution for changelog problem in binNMUs

2013-05-17 Thread Thomas Preud'homme
Le vendredi 17 mai 2013 15:36:02, Julien Cristau a écrit : On Fri, May 17, 2013 at 14:14:20 +0200, Thomas Preud'homme wrote: Also, it wouldn't help for the case of a binNMU on a subset of all arches since only some of them would have the entry. The solution proposed by ansgar cover this

Re: Do opaque struct changes break C library ABIs

2013-05-17 Thread Chow Loong Jin
On 17/05/2013 19:50, Simon McVittie wrote: On 17/05/13 10:43, Chow Loong Jin wrote: On 17/05/2013 13:17, Guillem Jover wrote: I agree dlopen()ing shared libraries in general should not be supported (I'd even go further and say this should be outright banned, given the pain it causes, and

Bug#708654: ITP: unittest-xml-reporting -- Python unittest-based test runner with Ant/JUnit like XML reporting

2013-05-17 Thread Jonathan Wiltshire
Package: wnpp Severity: wishlist Owner: Jonathan Wiltshire j...@tiger-computing.co.uk * Package name: unittest-xml-reporting Version : 1.4.3 Upstream Author : Daniel Fernandes Martins * URL : https://pypi.python.org/pypi/unittest-xml-reporting * License :

Re: Do opaque struct changes break C library ABIs

2013-05-17 Thread Stéphane Glondu
Le 17/05/2013 15:45, Chow Loong Jin a écrit : But how do you load a plugin without using dlopen()? [...] Okay, so real shared libraries can't be dlopen()'d on some systems, and plugins still have to be dlopen()'d. That doesn't answer my question, really. It kind of does, actually :-) You

Re: Web ID as passwordless authentication for debian web services

2013-05-17 Thread Russ Allbery
Stéphane Glondu glo...@debian.org writes: Le 16/05/2013 18:37, Russ Allbery a écrit : Right, it depends on what your risk model is. If you're defending against incompetence and/or commercial greed overriding security practices, DNSSEC looks a lot more appealing than the CA cartel, since

Re: Developer repositories for Debian

2013-05-17 Thread Russ Allbery
ober...@debian.org writes: Russ Allbery r...@debian.org writes: I'd never heard of WebID before this thread, but looking briefly at the spec, I share Daniel's concerns. I don't see how this eliminates reliance on the normal CAs. You still have to do certificate validation to be able to

Re: Developer repositories for Debian

2013-05-17 Thread Stéphane Glondu
Le 17/05/2013 17:43, Russ Allbery a écrit : [...] 4. Hijack that metadata identity request so that it goes to their server instead of mine. This can be done in any number of ways (DNS cache poisoning, compromise of www.eyrie.org, compromise of my account on www.eyrie.org, TCP active

Re: Developer repositories for Debian

2013-05-17 Thread Russ Allbery
Stéphane Glondu glo...@debian.org writes: Le 17/05/2013 17:43, Russ Allbery a écrit : [...] 4. Hijack that metadata identity request so that it goes to their server instead of mine. This can be done in any number of ways (DNS cache poisoning, compromise of www.eyrie.org, compromise of

Re: WebID as passwordless authentication for debian web services

2013-05-17 Thread Olivier Berger
Hi. Russ Allbery r...@debian.org writes: ober...@debian.org writes: I'm not sure I understand all aspects of the recent evolutions of the WebID auth protocols nor the big picture, but my understanding is that to auth to a server using a WebID (i.e. a URI pointing to a RDF document which

Re: /bin/sh

2013-05-17 Thread Steve Langasek
On Thu, May 16, 2013 at 01:10:06PM +0200, Goswin von Brederlow wrote: On Tue, May 14, 2013 at 12:21:33PM -0500, Steve Langasek wrote: On Tue, May 14, 2013 at 10:03:34AM -0700, Russ Allbery wrote: I think that, to convince people that flexibility won't cause stability and complexity

Re: WebID as passwordless authentication for debian web services

2013-05-17 Thread Simon McVittie
On 17/05/13 17:36, Olivier Berger wrote: The only way to prevent this attack in WebID that I see is to either do leap-of-faith permanent caching [...] or to secure the connection to my identity URI. I wonder how OpenID, for instance, is supposed to resist to such attacks, in comparison...

Re: WebID as passwordless authentication for debian web services

2013-05-17 Thread Russ Allbery
Olivier Berger olivier.ber...@it-sudparis.eu writes: Russ Allbery r...@debian.org writes: ober...@debian.org writes: I'm not sure I understand all aspects of the recent evolutions of the WebID auth protocols nor the big picture, but my understanding is that to auth to a server using a WebID

Re: WebID as passwordless authentication for debian web services

2013-05-17 Thread Russ Allbery
Simon McVittie s...@debian.org writes: By way of context, OpenID originated on Livejournal as a way to have federation between blogging platforms (e.g. other sites running the Livejournal codebase). At the time, https was considered sufficiently expensive that LJ didn't even use it to secure

Re: Depends: libfoo:foreign ???

2013-05-17 Thread The Wanderer
On 05/14/2013 09:40 AM, Goswin von Brederlow wrote: Could you build a 32bit only, a 64bit only and a 32+64bit wine, run make install for each case and generate a file list for each? Including file output so it shows what is 32bit and what 64bit in the mixed case. I have these file lists now,

Re: Depends: libfoo:foreign ???

2013-05-17 Thread Adam Borowski
On Fri, May 17, 2013 at 07:12:26PM -0400, The Wanderer wrote: I can already say that it won't be binary identical to the 64+32 build, because even the 64-bit standalone build isn't binary identical to the 64-bit side of a combined build (even though they're configured the exact same way). I'm

Re: jessie release goals

2013-05-17 Thread Bob Proulx
Andrei POPESCU wrote: Andreas Beckmann wrote: now might be the right time to start a discussion about release goals for jessie. How about setting default umask for users (uid = 1000) to 002? +1. It would be a useful default. Bob signature.asc Description: Digital signature

Re: Debian development and release: always releasable (essay)

2013-05-17 Thread Michael Gilbert
On Thu, May 16, 2013 at 5:52 AM, Neil McGovern wrote: On Thu, May 16, 2013 at 12:29:11AM +0200, Kurt Roeckx wrote: Some upstreams have a testing branch of there software and a release branch. It's sometimes useful to have people test the version in from the testing branch, and having it

Re: Web ID as passwordless authentication for debian web services [was: Re: Developer repositories for Debian]

2013-05-17 Thread Francois Marier
On 2013-05-16 at 14:12:33, Daniel Kahn Gillmor wrote: It looks to me like BrowserID/Persona will only work in web browsers with a functional javascript stack (and eventually, with a functional javascript crypto stack). The client authentication happens inside the TLS layer, over the HTTP

Re: Web ID as passwordless authentication for debian web services [was: Re: Developer repositories for Debian]

2013-05-17 Thread Francois Marier
On 2013-05-17 at 10:08:20, Olivier Berger wrote: AFAIU, I guess that, at least from the user-friendliness POV, the main perceptible difference, is : - OpenID uses a URL as a person's identifier : may or not be easily copied/remembered/dictated - WebID uses a URL too, same problems (there

Re: jessie release goals

2013-05-17 Thread Charles Plessy
Le Fri, May 17, 2013 at 08:29:42PM -0600, Bob Proulx a écrit : Andrei POPESCU wrote: Andreas Beckmann wrote: now might be the right time to start a discussion about release goals for jessie. How about setting default umask for users (uid = 1000) to 002? +1. It would be a useful

Accepted cgsi-gsoap 1.3.5-2 (source amd64)

2013-05-17 Thread Mattias Ellert
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Wed, 15 May 2013 16:59:13 +0200 Source: cgsi-gsoap Binary: libcgsi-gsoap1 libcgsi-gsoap-dev Architecture: source amd64 Version: 1.3.5-2 Distribution: unstable Urgency: low Maintainer: Mattias Ellert mattias.ell...@fysast.uu.se

Accepted xmp 3.4.0-3 (source all amd64)

2013-05-17 Thread Salvatore Bonaccorso
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Fri, 17 May 2013 08:51:40 +0200 Source: xmp Binary: xmp-common xmp xmp-audacious Architecture: source all amd64 Version: 3.4.0-3 Distribution: unstable Urgency: low Maintainer: Debian QA Group packa...@qa.debian.org Changed-By:

Accepted camlzip 1.05-1 (source i386)

2013-05-17 Thread Ralf Treinen
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Tue, 14 May 2013 16:05:24 +0200 Source: camlzip Binary: libzip-ocaml libzip-ocaml-dev Architecture: source i386 Version: 1.05-1 Distribution: unstable Urgency: low Maintainer: Debian OCaml Maintainers

Accepted evolution 3.8.2-1 (source all amd64)

2013-05-17 Thread Sjoerd Simons
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Fri, 17 May 2013 10:35:34 +0200 Source: evolution Binary: evolution libevolution evolution-common evolution-dev evolution-dbg evolution-plugins evolution-plugins-experimental Architecture: source all amd64 Version: 3.8.2-1

Accepted horizon 2013.1.1-1 (source all)

2013-05-17 Thread Thomas Goirand
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Thu, 16 May 2013 14:14:58 + Source: horizon Binary: python-django-horizon openstack-dashboard openstack-dashboard-apache Architecture: source all Version: 2013.1.1-1 Distribution: unstable Urgency: low Maintainer: PKG OpenStack

Accepted libdivecomputer 0.4.0-1 (source amd64)

2013-05-17 Thread Sylvestre Ledru
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Tue, 07 May 2013 15:59:53 +0200 Source: libdivecomputer Binary: libdivecomputer-dev libdivecomputer0 Architecture: source amd64 Version: 0.4.0-1 Distribution: unstable Urgency: low Maintainer: Debian running development group

Accepted libgusb 0.1.6-2 (source amd64 all)

2013-05-17 Thread Michal Čihař
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Format: 1.8 Date: Fri, 17 May 2013 10:38:30 +0200 Source: libgusb Binary: libgusb-dev libgusb-doc libgusb2 gir1.2-gusb-1.0 Architecture: source amd64 all Version: 0.1.6-2 Distribution: unstable Urgency: low Maintainer: Michal Čihař ni...@debian.org

Accepted r-cran-plotrix 3.4-7-1 (source all)

2013-05-17 Thread Andreas Tille
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Fri, 17 May 2013 10:21:57 +0200 Source: r-cran-plotrix Binary: r-cran-plotrix Architecture: source all Version: 3.4-7-1 Distribution: unstable Urgency: low Maintainer: Debian Science Team

Accepted swift-plugin-s3 1.7-2 (source all)

2013-05-17 Thread Thomas Goirand
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Fri, 17 May 2013 08:09:11 + Source: swift-plugin-s3 Binary: swift-plugin-s3 Architecture: source all Version: 1.7-2 Distribution: unstable Urgency: low Maintainer: PKG OpenStack openstack-de...@lists.alioth.debian.org Changed-By:

Accepted epson-inkjet-printer-escpr 1.2.2-2 (source amd64 all)

2013-05-17 Thread Didier Raboud
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Format: 1.8 Date: Thu, 16 May 2013 22:45:51 +0200 Source: epson-inkjet-printer-escpr Binary: printer-driver-escpr epson-escpr Architecture: source amd64 all Version: 1.2.2-2 Distribution: unstable Urgency: low Maintainer: Debian Printing Team

Accepted gifsicle 1.70-1 (source amd64)

2013-05-17 Thread Francois Marier
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Format: 1.8 Date: Thu, 16 May 2013 21:23:51 +1200 Source: gifsicle Binary: gifsicle Architecture: source amd64 Version: 1.70-1 Distribution: unstable Urgency: low Maintainer: Francois Marier franc...@debian.org Changed-By: Francois Marier

Accepted liblog-handler-perl 0.78-1 (source all)

2013-05-17 Thread Salvatore Bonaccorso
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Fri, 17 May 2013 10:31:13 +0200 Source: liblog-handler-perl Binary: liblog-handler-perl Architecture: source all Version: 0.78-1 Distribution: unstable Urgency: low Maintainer: Debian Perl Group

Accepted mesa 8.0.5-5 (source amd64)

2013-05-17 Thread Julien Cristau
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Format: 1.8 Date: Fri, 17 May 2013 10:10:05 +0200 Source: mesa Binary: libgl1-mesa-swx11 libgl1-mesa-swx11-dbg libgl1-mesa-swx11-i686 libgl1-mesa-swx11-dev libxatracker1 libxatracker1-dbg libxatracker-dev libgbm1 libgbm1-dbg libgbm-dev

Accepted foo2zjs 20130513dfsg0-1 (source amd64 all)

2013-05-17 Thread Didier Raboud
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Format: 1.8 Date: Fri, 17 May 2013 11:21:27 +0200 Source: foo2zjs Binary: printer-driver-foo2zjs foo2zjs Architecture: source amd64 all Version: 20130513dfsg0-1 Distribution: unstable Urgency: low Maintainer: Debian Printing Team

Accepted live-installer 41 (source i386)

2013-05-17 Thread Christian Perrier
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Fri, 17 May 2013 10:48:47 +0200 Source: live-installer Binary: live-installer Architecture: source i386 Version: 41 Distribution: unstable Urgency: low Maintainer: Debian Install System Team debian-b...@lists.debian.org Changed-By:

Accepted kbd-chooser 1.66 (source i386)

2013-05-17 Thread Christian Perrier
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Fri, 17 May 2013 11:39:45 +0200 Source: kbd-chooser Binary: kbd-chooser Architecture: source i386 Version: 1.66 Distribution: unstable Urgency: low Maintainer: Debian Install System Team debian-b...@lists.debian.org Changed-By:

Accepted libcroco 0.6.8-2 (source amd64)

2013-05-17 Thread Michael Biebl
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Format: 1.8 Date: Fri, 17 May 2013 12:04:13 +0200 Source: libcroco Binary: libcroco3-dev libcroco3 libcroco-tools Architecture: source amd64 Version: 0.6.8-2 Distribution: unstable Urgency: low Maintainer: Debian GNOME Maintainers

Accepted telepathy-mission-control-5 1:5.14.1-2 (source amd64 all)

2013-05-17 Thread Simon McVittie
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Format: 1.8 Date: Fri, 17 May 2013 10:19:41 +0100 Source: telepathy-mission-control-5 Binary: telepathy-mission-control-5 telepathy-mission-control-5-dbg libmission-control-plugins0 libmission-control-plugins-dev libmission-control-plugins-doc

Accepted wordnet 1:3.0-30 (source all amd64)

2013-05-17 Thread Andreas Tille
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Fri, 17 May 2013 09:39:14 +0200 Source: wordnet Binary: wordnet wordnet-gui wordnet-dev wordnet-base wordnet-sense-index wordnet-grind dict-wn goldendict-wordnet Architecture: source all amd64 Version: 1:3.0-30 Distribution:

Accepted gtkhtml4.0 4.6.5-1 (source all amd64)

2013-05-17 Thread Jordi Mallach
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Fri, 17 May 2013 12:06:39 +0200 Source: gtkhtml4.0 Binary: libgtkhtml-4.0-0 libgtkhtml-4.0-dev libgtkhtml-4.0-dbg libgtkhtml-editor-4.0-0 libgtkhtml-4.0-common libgtkhtml-editor-4.0-dev Architecture: source all amd64 Version:

Accepted openvpn 2.3.1-1 (source amd64)

2013-05-17 Thread Alberto Gonzalez Iniesta
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Fri, 17 May 2013 11:54:31 +0200 Source: openvpn Binary: openvpn Architecture: source amd64 Version: 2.3.1-1 Distribution: unstable Urgency: low Maintainer: Alberto Gonzalez Iniesta a...@inittab.org Changed-By: Alberto Gonzalez

Accepted newt 0.52.15-1 (source i386)

2013-05-17 Thread Alastair McKinstry
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Format: 1.8 Date: Thu, 16 May 2013 20:56:57 +0100 Source: newt Binary: libnewt-dev libnewt-pic newt-tcl python-newt python3-newt python-newt-dbg python3-newt-dbg libnewt0.52 whiptail Architecture: source i386 Version: 0.52.15-1 Distribution:

Accepted libgd2 2.1.0~alpha1-2 (source amd64 all)

2013-05-17 Thread Ondřej Surý
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Wed, 15 May 2013 13:42:49 +0200 Source: libgd2 Binary: libgd-tools libgd-dev libgd3 libgd-dbg libgd2-xpm-dev libgd2-noxpm-dev Architecture: source amd64 all Version: 2.1.0~alpha1-2 Distribution: unstable Urgency: low Maintainer: GD

Accepted libgee-0.8 0.10.1-1 (source amd64)

2013-05-17 Thread Michael Biebl
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Format: 1.8 Date: Mon, 13 May 2013 02:42:43 +0200 Source: libgee-0.8 Binary: libgee-0.8-2 libgee-0.8-dev libgee-0.8-2-dbg gir1.2-gee-0.8 Architecture: source amd64 Version: 0.10.1-1 Distribution: unstable Urgency: low Maintainer: Maintainers of Vala

Accepted dcmtk 3.6.1~20121102-1 (source amd64 all)

2013-05-17 Thread Mathieu Malaterre
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Wed, 15 May 2013 10:34:58 +0200 Source: dcmtk Binary: dcmtk libdcmtk3 libdcmtk3-dev dcmtk-www dcmtk-doc libdcmtk3-dbg Architecture: source amd64 all Version: 3.6.1~20121102-1 Distribution: experimental Urgency: low Maintainer: Debian

Accepted vdr-plugin-xineliboutput 1.0.7+cvs20130223.2117-6 (source amd64)

2013-05-17 Thread Tobias Grimm
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Mon, 01 Apr 2013 19:20:55 +0200 Source: vdr-plugin-xineliboutput Binary: vdr-plugin-xineliboutput vdr-plugin-xineliboutput-dbg libxineliboutput-fbfe libxineliboutput-fbfe-dbg libxineliboutput-sxfe libxineliboutput-sxfe-dbg

Accepted zathura-extras 0.2-3 (source amd64)

2013-05-17 Thread Sebastian Ramacher
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Format: 1.8 Date: Thu, 16 May 2013 20:45:52 +0200 Source: zathura-extras Binary: zathura-djvu zathura-ps zathura-cb Architecture: source amd64 Version: 0.2-3 Distribution: experimental Urgency: low Maintainer: Sebastian Ramacher sramac...@debian.org

Accepted libbluedevil 1.9.3-1 (source amd64)

2013-05-17 Thread Pino Toscano
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Fri, 17 May 2013 12:58:52 +0200 Source: libbluedevil Binary: libbluedevil-dev libbluedevil1 Architecture: source amd64 Version: 1.9.3-1 Distribution: unstable Urgency: low Maintainer: Debian KDE Extras Team

Accepted libtext-autoformat-perl 1.669003-1 (source all)

2013-05-17 Thread Salvatore Bonaccorso
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Fri, 17 May 2013 12:44:10 +0200 Source: libtext-autoformat-perl Binary: libtext-autoformat-perl Architecture: source all Version: 1.669003-1 Distribution: unstable Urgency: low Maintainer: Debian Perl Group

Accepted cdebconf-terminal 0.20 (source i386)

2013-05-17 Thread Christian Perrier
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Fri, 17 May 2013 12:35:10 +0200 Source: cdebconf-terminal Binary: cdebconf-gtk-terminal cdebconf-newt-terminal Architecture: source i386 Version: 0.20 Distribution: unstable Urgency: low Maintainer: Debian Install System Team

Accepted libtest-class-perl 0.39-1 (source all)

2013-05-17 Thread Salvatore Bonaccorso
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Fri, 17 May 2013 13:21:34 +0200 Source: libtest-class-perl Binary: libtest-class-perl Architecture: source all Version: 0.39-1 Distribution: unstable Urgency: low Maintainer: Debian Perl Group

Accepted libtap-formatter-html-perl 0.11+dfsg-1 (source all)

2013-05-17 Thread Salvatore Bonaccorso
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Fri, 17 May 2013 13:39:56 +0200 Source: libtap-formatter-html-perl Binary: libtap-formatter-html-perl Architecture: source all Version: 0.11+dfsg-1 Distribution: unstable Urgency: low Maintainer: Debian Perl Group

Accepted mklibs 0.1.37 (source all i386)

2013-05-17 Thread Colin Watson
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Format: 1.8 Date: Fri, 17 May 2013 12:43:08 +0100 Source: mklibs Binary: mklibs mklibs-copy Architecture: source all i386 Version: 0.1.37 Distribution: unstable Urgency: low Maintainer: Debian Install System Team debian-b...@lists.debian.org

Accepted r-cran-spc 1:0.4.2-1 (source amd64)

2013-05-17 Thread Andreas Tille
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Fri, 17 May 2013 13:42:08 +0200 Source: r-cran-spc Binary: r-cran-spc Architecture: source amd64 Version: 1:0.4.2-1 Distribution: unstable Urgency: low Maintainer: Debian Science Team

Accepted bluedevil 1.3.1-1 (source amd64)

2013-05-17 Thread Pino Toscano
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Fri, 17 May 2013 14:05:21 +0200 Source: bluedevil Binary: bluedevil Architecture: source amd64 Version: 1.3.1-1 Distribution: unstable Urgency: low Maintainer: Debian KDE Extras Team pkg-kde-ext...@lists.alioth.debian.org Changed-By:

Accepted os-prober 1.60 (source i386)

2013-05-17 Thread Colin Watson
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Format: 1.8 Date: Fri, 17 May 2013 13:02:41 +0100 Source: os-prober Binary: os-prober-udeb os-prober Architecture: source i386 Version: 1.60 Distribution: unstable Urgency: low Maintainer: Debian Install System Team debian-b...@lists.debian.org

Accepted r-cran-teachingdemos 2.9-1 (source all)

2013-05-17 Thread Andreas Tille
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Fri, 17 May 2013 13:54:08 +0200 Source: r-cran-teachingdemos Binary: r-cran-teachingdemos Architecture: source all Version: 2.9-1 Distribution: unstable Urgency: low Maintainer: Debian Science Team

Accepted alsa-utils 1.0.27-3 (source amd64)

2013-05-17 Thread Jordi Mallach
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Fri, 17 May 2013 14:10:42 +0200 Source: alsa-utils Binary: alsa-utils alsa-utils-udeb Architecture: source amd64 Version: 1.0.27-3 Distribution: unstable Urgency: low Maintainer: Debian ALSA Maintainers

Accepted gtk+2.0 2.24.18-1 (source all amd64)

2013-05-17 Thread Michael Biebl
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Format: 1.8 Date: Fri, 17 May 2013 14:15:18 +0200 Source: gtk+2.0 Binary: libgtk2.0-0 libgtk2.0-0-udeb libgtk2.0-common libgtk2.0-bin libgtk2.0-dev libgtk2.0-0-dbg libgtk2.0-doc gtk2.0-examples gtk2-engines-pixbuf gir1.2-gtk-2.0 libgail18

Accepted avogadro 1.0.3-6.1 (source amd64 all)

2013-05-17 Thread Matthias Klose
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Fri, 17 May 2013 14:40:59 +0200 Source: avogadro Binary: avogadro avogadro-data libavogadro1 libavogadro-dev python-avogadro Architecture: source amd64 all Version: 1.0.3-6.1 Distribution: unstable Urgency: low Maintainer: Debichem

Accepted debootstrap 1.0.50 (source all)

2013-05-17 Thread Christian Perrier
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Fri, 17 May 2013 13:34:34 +0200 Source: debootstrap Binary: debootstrap debootstrap-udeb Architecture: source all Version: 1.0.50 Distribution: unstable Urgency: low Maintainer: Debian Install System Team debian-b...@lists.debian.org

Accepted fonts-sil-andika 1.002-4 (source all)

2013-05-17 Thread Sebastian Bator
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Fri, 17 May 2013 14:45:41 +0200 Source: fonts-sil-andika Binary: fonts-sil-andika Architecture: source all Version: 1.002-4 Distribution: unstable Urgency: low Maintainer: Debian Fonts Task Force

Accepted libpam-abl 0.5.1~git8f1be9-1 (source amd64)

2013-05-17 Thread Alexandre Mestiashvili
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Format: 1.8 Date: Wed, 15 May 2013 11:08:19 +0200 Source: libpam-abl Binary: libpam-abl Architecture: source amd64 Version: 0.5.1~git8f1be9-1 Distribution: unstable Urgency: low Maintainer: Alexandre Mestiashvili a...@biotec.tu-dresden.de

Accepted llvm-toolchain-3.2 1:3.2repack-4 (source amd64 all)

2013-05-17 Thread Sylvestre Ledru
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Wed, 15 May 2013 12:04:24 +0200 Source: llvm-toolchain-3.2 Binary: clang-3.2 clang-3.2-doc libclang1 libclang1-dbg libclang-dev libclang-common-dev libllvm3.2 libllvm3.2-dbg llvm-3.2 llvm-3.2-runtime llvm-3.2-dev

Accepted rheolef 6.4-1 (source all amd64)

2013-05-17 Thread Pierre Saramito
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Thu, 30 Apr 2013 11:29:51 +0200 Source: rheolef Binary: librheolef1 librheolef-dev rheolef-doc rheolef Architecture: source all amd64 Version: 6.4-1 Distribution: unstable Urgency: low Maintainer: Debian Science Maintainers

Accepted totalopenstation 0.3-2 (source all)

2013-05-17 Thread Matteo F. Vescovi
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Fri, 17 May 2013 11:10:05 +0200 Source: totalopenstation Binary: totalopenstation Architecture: source all Version: 0.3-2 Distribution: unstable Urgency: low Maintainer: Debian GIS Project pkg-grass-de...@lists.alioth.debian.org

Accepted r-bioc-edger 3.2.3~dfsg-1 (source amd64)

2013-05-17 Thread Andreas Tille
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Fri, 17 May 2013 14:36:51 +0200 Source: r-bioc-edger Binary: r-bioc-edger Architecture: source amd64 Version: 3.2.3~dfsg-1 Distribution: unstable Urgency: low Maintainer: Debian Med Packaging Team

Accepted 3depict 0.0.13-1 (source amd64)

2013-05-17 Thread D Haley
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Fri, 17 May 2013 00:52:39 +0200 Source: 3depict Binary: 3depict Architecture: source amd64 Version: 0.0.13-1 Distribution: unstable Urgency: low Maintainer: Debian Science Maintainers

Accepted gdb-msp430 7.2a~mspgcc-20111205-2 (source amd64)

2013-05-17 Thread Luca Bruno
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Thu, 16 May 2013 16:37:15 +0200 Source: gdb-msp430 Binary: gdb-msp430 Architecture: source amd64 Version: 7.2a~mspgcc-20111205-2 Distribution: unstable Urgency: medium Maintainer: Luca Bruno lu...@debian.org Changed-By: Luca Bruno

Accepted openstack-meta-packages 0.3 (source all)

2013-05-17 Thread Thomas Goirand
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Tue, 16 Apr 2013 17:55:20 + Source: openstack-meta-packages Binary: openstack-clients openstack-cloud-services openstack-cloud-identity openstack-proxy-node openstack-compute-node openstack-toaster Architecture: source all

Accepted r-cran-deal 1:1.2-37-1 (source amd64)

2013-05-17 Thread Andreas Tille
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Fri, 17 May 2013 15:30:24 +0200 Source: r-cran-deal Binary: r-cran-deal Architecture: source amd64 Version: 1:1.2-37-1 Distribution: unstable Urgency: low Maintainer: Debian Med Packaging Team

Accepted akonadi 1.9.2-2 (source amd64 all)

2013-05-17 Thread Pino Toscano
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Fri, 17 May 2013 15:39:30 +0200 Source: akonadi Binary: akonadi-server libakonadiprotocolinternals1 libakonadi-dev akonadi-backend-mysql akonadi-backend-postgresql akonadi-backend-sqlite akonadi-dbg Architecture: source amd64 all

Accepted cliff-tablib 1.0-2 (source all)

2013-05-17 Thread Thomas Goirand
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Fri, 17 May 2013 15:01:41 + Source: cliff-tablib Binary: cliff-tablib Architecture: source all Version: 1.0-2 Distribution: unstable Urgency: low Maintainer: PKG OpenStack openstack-de...@lists.alioth.debian.org Changed-By:

Accepted dichromat 2.0.0-2 (source all)

2013-05-17 Thread Andreas Tille
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Fri, 17 May 2013 16:09:23 +0200 Source: dichromat Binary: r-cran-dichromat Architecture: source all Version: 2.0.0-2 Distribution: unstable Urgency: low Maintainer: Debian Med Packaging Team

  1   2   >