git dangerous operations on alioth

2013-02-28 Thread Daniel Pocock
There was recently some discussion in pkg-javascript about how to give more people access to the VCS (e.g. keeping the git repositories logically organised under the pkg-javascript tree, but making write access available to all DDs + alioth guest users and not just those in the pkg-javascript

Re: git dangerous operations on alioth

2013-02-28 Thread Tollef Fog Heen
]] Daniel Pocock Has anybody had experience controlling access to git repositories, for example, to give users access but prevent some of the following dangerous operations? - prevent users pushing with the `--force' option (from the man page for git-push: This can cause the remote

Re: git dangerous operations on alioth

2013-02-28 Thread Dmitrijs Ledkovs
On 28 February 2013 09:39, Daniel Pocock dan...@pocock.com.au wrote: There was recently some discussion in pkg-javascript about how to give more people access to the VCS (e.g. keeping the git repositories logically organised under the pkg-javascript tree, but making write access available to

Re: git dangerous operations on alioth

2013-02-28 Thread Andrey Rahmatullin
On Thu, Feb 28, 2013 at 10:45:35AM +0100, Tollef Fog Heen wrote: Has anybody had experience controlling access to git repositories, for example, to give users access but prevent some of the following dangerous operations? - prevent users pushing with the `--force' option (from the man

Re: git dangerous operations on alioth

2013-02-28 Thread Stefano Zacchiroli
On Thu, Feb 28, 2013 at 10:39:26AM +0100, Daniel Pocock wrote: Has anybody had experience controlling access to git repositories, for example, to give users access but prevent some of the following dangerous operations? Related to this, there is also the risk that a user will ssh on alioth and

Re: git dangerous operations on alioth

2013-02-28 Thread Arno Töll
Hi, On 28.02.2013 11:07, Stefano Zacchiroli wrote: On Thu, Feb 28, 2013 at 10:39:26AM +0100, Daniel Pocock wrote: Has anybody had experience controlling access to git repositories, for example, to give users access but prevent some of the following dangerous operations? Related to this,

Re: git dangerous operations on alioth

2013-02-28 Thread Simon McVittie
On 28/02/13 09:39, Daniel Pocock wrote: Has anybody had experience controlling access to git repositories, for example, to give users access but prevent some of the following dangerous operations? Do you consider this to be a strong security measure against malicious changes, or a weak safety

Re: git dangerous operations on alioth

2013-02-28 Thread Andrew Shadura
Hello. On 28 February 2013 12:51, Arno Töll a...@debian.org wrote: Having that said the risk is real and it may be time to reconsider some choices including the use of Alioth itself for those who do not believe in openness. Chances are #700630 is going to rescue us all on that. Maybe we could

Bug#701883: general: error in the load driver displaylink_drv.so in configuration for two displays with Xinerama

2013-02-28 Thread Pablo Zuniga
Package: general Severity: important Dear Maintainer, *** Please consider answering these questions, where appropriate *** * What led up to the situation? * What exactly did you do (or not do) that was effective (or ineffective)? * What was the outcome of this action? * What

Annual ping for Sergey B Kirpichev

2013-02-28 Thread Sergey B Kirpichev
Package: debian-maintainers This is my annual ping. CC'd to debian-devel@, as d-m pseudo-package has lots of stalled annual ping reports. Are we have need in such kind of bureaucracy? signature.asc Description: Digital signature

Re: Getting Intel Cedarview drivers into Debian

2013-02-28 Thread Mikko Rasa
On 25.02.2013 17:06, Carlos Alberto Lopez Perez wrote: On 25/02/13 15:09, Mikko Rasa wrote: On 21.02.2013 19:42, Carlos Alberto Lopez Perez wrote: On 21/12/12 14:23, Mikko Rasa wrote: Hi Debian developers, I'm working as a consultant on a project to develop drivers for the PowerVR graphics

Bug#701893: ITP: libapache2-mod-auth-mellon -- A SAML 2.0 authentication module for Apache

2013-02-28 Thread Thijs Kinkhorst
Package: wnpp Severity: wishlist Owner: Thijs Kinkhorst th...@debian.org * Package name: libapache2-mod-auth-mellon Version : 0.6.0 Upstream Author : Feide RND, Uninett * URL : http://code.google.com/p/modmellon/ * License : GPLv3 Programming Lang: C

Bug#701894: ITP: proot -- chroot, mount --bind, and binfmt_misc without privilege/setup

2013-02-28 Thread Rémi Duraffort
Package: wnpp Severity: wishlist Owner: Rémi Duraffort ivo...@videolan.org * Package name: proot Version : 2.3.1 Upstream Author : Cédric Vincent cedric.vinc...@st.com * URL : http://proot.me * License : GPL Programming Lang: C Description : chroot,

Processed: Re: Bug#701883: general: error in the load driver displaylink_drv.so in configuration for two displays with Xinerama

2013-02-28 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: reassign 701883 xserver-xorg Bug #701883 [general] general: error in the load driver displaylink_drv.so in configuration for two displays with Xinerama Bug reassigned from package 'general' to 'xserver-xorg'. Ignoring request to alter found

Re: Processed: Re: Bug#701883: general: error in the load driver displaylink_drv.so in configuration for two displays with Xinerama

2013-02-28 Thread Julien Cristau
On Thu, Feb 28, 2013 at 16:21:05 +, Debian Bug Tracking System wrote: Processing commands for cont...@bugs.debian.org: reassign 701883 xserver-xorg Bug #701883 [general] general: error in the load driver displaylink_drv.so in configuration for two displays with Xinerama Bug

Re: arm64 Debian/Ubuntu port image available

2013-02-28 Thread Michael K. Edwards
Nice work, Wookey! If experience cross-building for armhf is any guide, all you need for NSS is a host build of shlibsign; see https://github.com/mkedwards/crosstool-ng/blob/master/patches/nss/3.12.10/0001-Modify-shlibsign-wrapper-for-cross-compilation.patch. There's also scriptage in that repo

Re: git dangerous operations on alioth

2013-02-28 Thread gregor herrmann
On Thu, 28 Feb 2013 12:51:33 +0100, Arno Töll wrote: On 28.02.2013 11:07, Stefano Zacchiroli wrote: On Thu, Feb 28, 2013 at 10:39:26AM +0100, Daniel Pocock wrote: Has anybody had experience controlling access to git repositories, for example, to give users access but prevent some of the

Re: Getting Intel Cedarview drivers into Debian

2013-02-28 Thread Carlos Alberto Lopez Perez
On 28/02/13 15:54, Mikko Rasa wrote: We considered the possibility of updating the DDK to version 1.9, but in the end decided to stay with 1.7. An update of the DDK would involve an unknown amount of work in making the driver work with it, and that was deemed undesirable by the customer.

Re: git dangerous operations on alioth

2013-02-28 Thread Daniel Pocock
On 28/02/13 13:15, Simon McVittie wrote: On 28/02/13 09:39, Daniel Pocock wrote: Has anybody had experience controlling access to git repositories, for example, to give users access but prevent some of the following dangerous operations? If you look at it from the appropriate angle, the

Re: git dangerous operations on alioth

2013-02-28 Thread Jonas Smedegaard
Quoting Daniel Pocock (2013-02-28 19:20:09) On 28/02/13 13:15, Simon McVittie wrote: On 28/02/13 09:39, Daniel Pocock wrote: Has anybody had experience controlling access to git repositories, for example, to give users access but prevent some of the following dangerous operations?

Re: Getting Intel Cedarview drivers into Debian

2013-02-28 Thread Lisandro Damián Nicanor Pérez Meyer
On Thu 28 Feb 2013 14:46:28 Carlos Alberto Lopez Perez escribió: On 28/02/13 15:54, Mikko Rasa wrote: We considered the possibility of updating the DDK to version 1.9, but in the end decided to stay with 1.7. An update of the DDK would involve an unknown amount of work in making the driver

Re: Bulding 3.0.1 Under Ubuntu 10.04 i386

2013-02-28 Thread Cristian Ionescu-Idbohrn
Please Cc:, not subscribed to the debian-devel@lists.debian.org list. Hi there! Linus Torvalds is highly involved in this project :) On Thu, 28 Feb 2013, Dirk Hohndel wrote: The problem is that our target audience are divers, not hackers. Agreed. Someone who can build from those sources

Re: git dangerous operations on alioth

2013-02-28 Thread Daniel Pocock
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 28/02/13 20:20, Jonas Smedegaard wrote: Quoting Daniel Pocock (2013-02-28 19:20:09) On 28/02/13 13:15, Simon McVittie wrote: On 28/02/13 09:39, Daniel Pocock wrote: Has anybody had experience controlling access to git repositories, for

Debian / Ubuntu packages [was: Re: Bulding 3.0.1 Under Ubuntu 10.04 i386]

2013-02-28 Thread Dirk Hohndel
On Feb 28, 2013, at 12:03 PM, Cristian Ionescu-Idbohrn wrote: And for those I try to make their lives easier. Of course. Where do you get all that energy from? I'm impressed. Really. Actually, I just decided to give up. This is an utter waste of my time. Whatever. Someone who cares may

Re: git dangerous operations on alioth

2013-02-28 Thread Philipp Kern
On Thu, Feb 28, 2013 at 04:01:34PM +0600, Andrey Rahmatullin wrote: On Thu, Feb 28, 2013 at 10:45:35AM +0100, Tollef Fog Heen wrote: Has anybody had experience controlling access to git repositories, for example, to give users access but prevent some of the following dangerous

Re: git dangerous operations on alioth

2013-02-28 Thread Holger Levsen
Hi, signed commits, so you can identify unwanted bits and clean up in the very care case that's actually needed? cheer,s Holger -- To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive:

Re: Bulding 3.0.1 Under Ubuntu 10.04 i386

2013-02-28 Thread Dmitrijs Ledkovs
On 28 February 2013 20:03, Cristian Ionescu-Idbohrn cristian.ionescu-idbo...@axis.com wrote: Please Cc:, not subscribed to the debian-devel@lists.debian.org list. Hi there! Linus Torvalds is highly involved in this project :) On Thu, 28 Feb 2013, Dirk Hohndel wrote: The problem is that our

Re: Bulding 3.0.1 Under Ubuntu 10.04 i386

2013-02-28 Thread Dirk Hohndel
Dmitrijs Ledkovs x...@debian.org writes: I have only one dive of a whole 8m deep, but I am ubuntu debian developer and can upload this package to debian/ubuntu and a ppa. Is there any packaging done so far? Point me to it, if not just file Debian RFP and CC me on it. There are old packages

RE: Bulding 3.0.1 Under Ubuntu 10.04 i386

2013-02-28 Thread Dirk Hohndel
Robert Wolfe robert.wo...@robertwolfe.org writes: Um, forgot about me already, hmm? :)  And yes, libdivecomputer-3.0.1 in .DEB format is also available on my site if anyone wants to try that (in RPM format, too). Not at all. The problem with your approach to creating a package was that you

Re: Bulding 3.0.1 Under Ubuntu 10.04 i386

2013-02-28 Thread Cristian Ionescu-Idbohrn
On Thu, 28 Feb 2013, Robert Wolfe wrote: Um, forgot about me already, hmm? :) But, of course not. Do you want to be Cc:ed? And yes, libdivecomputer-3.0.1 in .DEB format That should probably be: subsurface-3.0.1 and libdivecomputer-0.3.0 I presume. Can you make the source

Work-needing packages report for Mar 1, 2013

2013-02-28 Thread wnpp
The following is a listing of packages for which help has been requested through the WNPP (Work-Needing and Prospective Packages) system in the last week. Total number of orphaned packages: 495 (new: 1) Total number of packages offered up for adoption: 143 (new: 0) Total number of packages

Re: git dangerous operations on alioth

2013-02-28 Thread Henrique de Moraes Holschuh
On Thu, 28 Feb 2013, Holger Levsen wrote: signed commits, so you can identify unwanted bits and clean up in the very care case that's actually needed? Indeed. Secure git workflows are possible, although it is a relatively new development. Signed commits and pull requests are a very big part

Re: Getting Intel Cedarview drivers into Debian

2013-02-28 Thread Paul Wise
On Fri, Mar 1, 2013 at 4:12 AM, Lisandro Damián Nicanor Pérez Meyer wrote: Is it just me or this thread about propietary stuff should not be happening here? http://www.debian.org/social_contract It may be just me, yes. It definitely isn't just you. -- bye, pabs

Re: Bulding 3.0.1 Under Ubuntu 10.04 i386

2013-02-28 Thread Christian PERRIER
Old debian source packages (subsurface-1.2-1 and libdivecomputer-0.1.0), could also be of some value. I'm really looking forward to see latest subsurface/libdivecomputer in debian, as soon as it can be done. It'll most probably be unstable, but This thread is interesting. I faced about

Accepted ust 2.1.1-2 (source amd64)

2013-02-28 Thread Jon Bernard
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Thu, 28 Feb 2013 03:48:49 -0500 Source: ust Binary: liblttng-ust0 libust0 liblttng-ust-dev libust-dev ust-bin Architecture: source amd64 Version: 2.1.1-2 Distribution: unstable Urgency: low Maintainer: Jon Bernard jbern...@debian.org

Accepted doxygen 1.8.1.2-2 (source amd64 all)

2013-02-28 Thread Helmut Grohne
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Thu, 28 Feb 2013 10:09:45 +0100 Source: doxygen Binary: doxygen doxygen-latex doxygen-doc doxygen-gui Architecture: source amd64 all Version: 1.8.1.2-2 Distribution: unstable Urgency: low Maintainer: Matthias Klose d...@debian.org

Accepted zookeeper 3.4.5+dfsg-1~exp2 (source all amd64)

2013-02-28 Thread James Page
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Format: 1.8 Date: Thu, 28 Feb 2013 09:26:11 + Source: zookeeper Binary: libzookeeper-java zookeeper zookeeperd libzookeeper-java-doc libzookeeper-mt2 libzookeeper-st2 libzookeeper2 libzookeeper-mt-dev libzookeeper-st-dev zookeeper-bin

Accepted harfbuzz 0.9.13-1 (source amd64)

2013-02-28 Thread Ahmed El-Mahmoudy
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Thu, 28 Feb 2013 09:29:37 +0200 Source: harfbuzz Binary: libharfbuzz0 libharfbuzz-dev libharfbuzz-bin Architecture: source amd64 Version: 0.9.13-1 Distribution: experimental Urgency: low Maintainer: أحمد المحمودي (Ahmed El-Mahmoudy)

Accepted bowtie2 2.1.0-1 (source amd64 all)

2013-02-28 Thread Alexandre Mestiashvili
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Format: 1.8 Date: Wed, 27 Feb 2013 15:58:40 +0100 Source: bowtie2 Binary: bowtie2 bowtie2-examples Architecture: source amd64 all Version: 2.1.0-1 Distribution: unstable Urgency: low Maintainer: Debian Med Packaging Team

Accepted fcitx 1:4.2.7-2 (source all amd64)

2013-02-28 Thread YunQiang Su
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Format: 1.8 Date: Thu, 28 Feb 2013 17:00:35 +0800 Source: fcitx Binary: fcitx fcitx-bin fcitx-data fcitx-libs fcitx-libs-gclient fcitx-libs-qt fcitx-libs-dev gir1.2-fcitx-1.0 fcitx-dbg fcitx-ui-classic fcitx-frontend-all fcitx-frontend-gtk2

Accepted chef 10.12.0-3 (source all)

2013-02-28 Thread Tollef Fog Heen
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Thu, 28 Feb 2013 13:56:32 +0100 Source: chef Binary: chef libchef-ruby libchef-ruby1.8 Architecture: source all Version: 10.12.0-3 Distribution: unstable Urgency: high Maintainer: Debian Ruby Extras Maintainers

Accepted bobot++ 1:2.2.3-0.1 (source amd64)

2013-02-28 Thread Dmitrijs Ledkovs
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Format: 1.8 Date: Thu, 28 Feb 2013 13:03:46 + Source: bobot++ Binary: bobot++ Architecture: source amd64 Version: 1:2.2.3-0.1 Distribution: experimental Urgency: low Maintainer: Sam Hocevar (Debian packages) sam+...@zoy.org Changed-By: Dmitrijs

Accepted dicom3tools 1.0~20130226-2 (source amd64)

2013-02-28 Thread Mathieu Malaterre
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Thu, 28 Feb 2013 13:55:53 +0100 Source: dicom3tools Binary: dicom3tools Architecture: source amd64 Version: 1.0~20130226-2 Distribution: unstable Urgency: low Maintainer: Debian Med Packaging Team

Accepted python-defaults 2.7.3-11 (source all amd64)

2013-02-28 Thread Matthias Klose
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Thu, 28 Feb 2013 14:43:06 +0100 Source: python-defaults Binary: python python-minimal python-examples python-dev libpython-dev idle python-doc python-dbg libpython-dbg python-all python-all-dev python-all-dbg Architecture: source

Accepted squid3 3.1.20-2.2 (source all amd64)

2013-02-28 Thread Salvatore Bonaccorso
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Sat, 23 Feb 2013 13:44:48 +0100 Source: squid3 Binary: squid3 squid3-dbg squid3-common squidclient squid-cgi Architecture: source all amd64 Version: 3.1.20-2.2 Distribution: unstable Urgency: low Maintainer: Luigi Gangitano

Accepted python-defaults 2.7.3-12 (source all amd64)

2013-02-28 Thread Matthias Klose
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Thu, 28 Feb 2013 15:58:09 +0100 Source: python-defaults Binary: python python-minimal python-examples python-dev libpython-dev idle python-doc python-dbg libpython-dbg python-all python-all-dev python-all-dbg Architecture: source

Accepted libapache2-mod-rpaf 0.6-9 (source amd64)

2013-02-28 Thread Sergey B Kirpichev
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Format: 1.8 Date: Thu, 28 Feb 2013 19:45:11 +0400 Source: libapache2-mod-rpaf Binary: libapache2-mod-rpaf Architecture: source amd64 Version: 0.6-9 Distribution: unstable Urgency: low Maintainer: Sergey B Kirpichev skirpic...@gmail.com Changed-By:

Accepted python-defaults 2.7.3-13 (source all amd64)

2013-02-28 Thread Matthias Klose
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Thu, 28 Feb 2013 16:46:08 +0100 Source: python-defaults Binary: python python-minimal python-examples python-dev libpython-dev idle python-doc python-dbg libpython-dbg python-all python-all-dev python-all-dbg Architecture: source

Accepted rrep 1.3.4-1 (source i386)

2013-02-28 Thread Arno Onken
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Thu, 28 Feb 2013 02:23:39 +0100 Source: rrep Binary: rrep Architecture: source i386 Version: 1.3.4-1 Distribution: experimental Urgency: low Maintainer: Arno Onken asn...@asnelt.org Changed-By: Arno Onken asn...@asnelt.org

Accepted hamexam 1.2.1-1 (source all)

2013-02-28 Thread John T. Nogatch
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Format: 1.8 Date: Thu, 28 Feb 2013 08:52:34 -0800 Source: hamexam Binary: hamexam Architecture: source all Version: 1.2.1-1 Distribution: unstable Urgency: low Maintainer: Debian Hamradio Maintainers debian-h...@lists.debian.org Changed-By: John T.

Accepted mozilla-gnome-keyring 0.6.8-1 (source amd64)

2013-02-28 Thread Ximin Luo
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Format: 1.8 Date: Sat, 23 Feb 2013 20:54:07 + Source: mozilla-gnome-keyring Binary: xul-ext-gnome-keyring Architecture: source amd64 Version: 0.6.8-1 Distribution: experimental Urgency: low Maintainer: Ximin Luo infini...@gmx.com Changed-By:

Accepted fadecut 0.1.2-1 (source all)

2013-02-28 Thread Marco Balmer
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Wed, 27 Feb 2013 11:49:57 +0100 Source: fadecut Binary: fadecut Architecture: source all Version: 0.1.2-1 Distribution: experimental Urgency: low Maintainer: Marco Balmer ma...@balmer.name Changed-By: Marco Balmer ma...@balmer.name

Accepted fccexam 1.0.4-1 (source all)

2013-02-28 Thread John T. Nogatch
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Format: 1.8 Date: Thu, 28 Feb 2013 09:22:53 -0800 Source: fccexam Binary: fccexam Architecture: source all Version: 1.0.4-1 Distribution: unstable Urgency: low Maintainer: Debian Hamradio Maintainers debian-h...@lists.debian.org Changed-By: John T.

Accepted globus-ftp-control 4.5-2 (source amd64 all)

2013-02-28 Thread Mattias Ellert
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Wed, 27 Feb 2013 16:48:21 +0100 Source: globus-ftp-control Binary: libglobus-ftp-control1 libglobus-ftp-control-dev libglobus-ftp-control-doc globus-ftp-control-dbg Architecture: source amd64 all Version: 4.5-2 Distribution:

Accepted libgee 0.8.4-1 (source amd64)

2013-02-28 Thread Sjoerd Simons
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Thu, 28 Feb 2013 20:25:25 +0100 Source: libgee Binary: libgee-0.8-2 libgee-0.8-dev libgee-0.8-2-dbg gir1.2-gee-0.8 Architecture: source amd64 Version: 0.8.4-1 Distribution: experimental Urgency: low Maintainer: Maintainers of Vala

Accepted pigz 2.2.4-3 (source amd64)

2013-02-28 Thread Eduard Bloch
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Thu, 28 Feb 2013 20:16:03 +0100 Source: pigz Binary: pigz Architecture: source amd64 Version: 2.2.4-3 Distribution: unstable Urgency: low Maintainer: Eduard Bloch bl...@debian.org Changed-By: Eduard Bloch bl...@debian.org

Accepted twclock 3.1-2 (source amd64)

2013-02-28 Thread Kamal Mostafa
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Format: 1.8 Date: Thu, 28 Feb 2013 11:42:51 -0800 Source: twclock Binary: twclock Architecture: source amd64 Version: 3.1-2 Distribution: unstable Urgency: high Maintainer: Debian Hamradio Maintainers debian-h...@lists.debian.org Changed-By: Kamal

Accepted sd 0.75-1 (source all)

2013-02-28 Thread Jonas Smedegaard
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Thu, 28 Feb 2013 21:51:04 +0100 Source: sd Binary: sd Architecture: source all Version: 0.75-1 Distribution: unstable Urgency: low Maintainer: Jonas Smedegaard d...@jones.dk Changed-By: Jonas Smedegaard d...@jones.dk Description:

Accepted gtkmm-documentation 3.4.0-2 (source all)

2013-02-28 Thread Julien Cristau
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Format: 1.8 Date: Thu, 28 Feb 2013 21:43:52 +0100 Source: gtkmm-documentation Binary: gtkmm-documentation Architecture: source all Version: 3.4.0-2 Distribution: unstable Urgency: medium Maintainer: Deng Xiyue manphiz-gu...@users.alioth.debian.org

Accepted elmerfem 6.1.0.svn.5396.dfsg2-2 (source i386 all)

2013-02-28 Thread Boris Pek
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Tue, 05 Feb 2013 21:50:05 +0200 Source: elmerfem Binary: elmer elmer-dbg elmer-common libelmersolver-6.1 libelmersolver-dbg libelmer-dev Architecture: source i386 all Version: 6.1.0.svn.5396.dfsg2-2 Distribution: unstable Urgency:

Accepted noweb 2.11b-7.1 (source all amd64)

2013-02-28 Thread Maximiliano Curia
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Format: 1.8 Date: Thu, 21 Feb 2013 21:43:25 +0100 Source: noweb Binary: noweb nowebm Architecture: source all amd64 Version: 2.11b-7.1 Distribution: unstable Urgency: low Maintainer: Hubert Chathi uho...@debian.org Changed-By: Maximiliano Curia

Accepted gtkmm-documentation 3.4.0-3 (source all)

2013-02-28 Thread Julien Cristau
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Format: 1.8 Date: Thu, 28 Feb 2013 22:29:54 +0100 Source: gtkmm-documentation Binary: gtkmm-documentation Architecture: source all Version: 3.4.0-3 Distribution: unstable Urgency: low Maintainer: Deng Xiyue manphiz-gu...@users.alioth.debian.org

Accepted twpsk 4.0-2 (source amd64)

2013-02-28 Thread Kamal Mostafa
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Format: 1.8 Date: Thu, 28 Feb 2013 13:30:31 -0800 Source: twpsk Binary: twpsk Architecture: source amd64 Version: 4.0-2 Distribution: unstable Urgency: low Maintainer: Debian Hamradio Maintainers debian-h...@lists.debian.org Changed-By: Kamal

Accepted vala-0.18 0.18.1-3 (source all amd64)

2013-02-28 Thread Sjoerd Simons
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Thu, 28 Feb 2013 23:15:13 +0100 Source: vala-0.18 Binary: valac-0.18 valac-0.18-vapi vala-0.18-doc libvala-0.18-0 libvala-0.18-dev valac-0.18-dbg libvala-0.18-0-dbg Architecture: source all amd64 Version: 0.18.1-3 Distribution:

Accepted glade 3.14.2-2 (source all amd64)

2013-02-28 Thread Andreas Henriksson
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Thu, 28 Feb 2013 23:46:44 +0100 Source: glade Binary: libgladeui-2-4 libgladeui-common libgladeui-dev libgladeui-doc gir1.2-gladeui-2.0 glade Architecture: source all amd64 Version: 3.14.2-2 Distribution: experimental Urgency: low

Accepted python-imaging 1.1.7+1.7.8-4 (source all amd64)

2013-02-28 Thread Matthias Klose
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Thu, 28 Feb 2013 14:59:19 +0100 Source: python-imaging Binary: python-imaging python-imaging-dbg python-imaging-tk python-imaging-tk-dbg python-imaging-sane python-imaging-sane-dbg python3-imaging python3-imaging-dbg

Accepted ltt-control 2.1.1-1 (source amd64)

2013-02-28 Thread Jon Bernard
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Thu, 28 Feb 2013 18:34:16 -0500 Source: ltt-control Binary: lttng-tools liblttng-ctl0 liblttng-ctl-dev ltt-bin liblttd0 liblttd-dev liblttctl0 liblttctl-dev Architecture: source amd64 Version: 2.1.1-1 Distribution: unstable Urgency:

Accepted libio-async-loop-glib-perl 0.20-3 (source all)

2013-02-28 Thread gregor herrmann
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Format: 1.8 Date: Fri, 01 Mar 2013 01:16:04 +0100 Source: libio-async-loop-glib-perl Binary: libio-async-loop-glib-perl Architecture: source all Version: 0.20-3 Distribution: unstable Urgency: low Maintainer: Debian Perl Group

Accepted debian-edu-doc 1.5~20130228~7.0 (source all)

2013-02-28 Thread David Prévot
~20130228~7.0 Distribution: unstable Urgency: low Maintainer: Debian Edu Developers debian-...@lists.debian.org Changed-By: David Prévot taf...@debian.org Description: debian-edu-doc-da - Danish documentation from the Debian Edu project debian-edu-doc-de - German documentation from the Debian Edu

Accepted sopwith 1.8.0-1 (source amd64)

2013-02-28 Thread Kenneth J. Pronovici
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Fri, 01 Mar 2013 00:49:47 + Source: sopwith Binary: sopwith Architecture: source amd64 Version: 1.8.0-1 Distribution: unstable Urgency: low Maintainer: Kenneth J. Pronovici prono...@debian.org Changed-By: Kenneth J. Pronovici

Accepted bmon 3.0+git20110323-1 (source amd64)

2013-02-28 Thread Dmitry Smirnov
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Format: 1.8 Date: Thu, 28 Feb 2013 15:35:15 +1100 Source: bmon Binary: bmon Architecture: source amd64 Version: 3.0+git20110323-1 Distribution: unstable Urgency: low Maintainer: Dmitry Smirnov only...@member.fsf.org Changed-By: Dmitry Smirnov

Accepted openconnect 3.20-4 (source amd64)

2013-02-28 Thread Mike Miller
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Format: 1.8 Date: Thu, 28 Feb 2013 23:42:31 -0500 Source: openconnect Binary: openconnect libopenconnect1 libopenconnect-dev Architecture: source amd64 Version: 3.20-4 Distribution: unstable Urgency: low Maintainer: Mike Miller mtmil...@ieee.org

Accepted sudo 1.8.5p2-1+nmu1 (source amd64)

2013-02-28 Thread Michael Gilbert
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Format: 1.8 Date: Fri, 01 Mar 2013 03:26:37 + Source: sudo Binary: sudo sudo-ldap Architecture: source amd64 Version: 1.8.5p2-1+nmu1 Distribution: unstable Urgency: high Maintainer: Bdale Garbee bd...@gag.com Changed-By: Michael Gilbert

Accepted erlang 1:16.b-dfsg-1 (source all i386)

2013-02-28 Thread Sergei Golovan
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Thu, 28 Feb 2013 09:08:37 +0400 Source: erlang Binary: erlang-base erlang-base-hipe erlang-appmon erlang-asn1 erlang-common-test erlang-corba erlang-crypto erlang-debugger erlang-dialyzer erlang-diameter erlang-doc erlang-edoc

Accepted gcc-4.8 4.8-20130228-1 (source all amd64)

2013-02-28 Thread Matthias Klose
-dbg libn32stdc++-4.8-dev libn32stdc++6-4.8-dbg libx32stdc++-4.8-dev libx32stdc++6-4.8-dbg libstdc++-4.8-doc gcc-4.8-soft-float fixincludes gcc-4.8-source Architecture: source all amd64 Version: 4.8-20130228-1 Distribution: experimental Urgency: low Maintainer: Debian GCC Maintainers debian

Accepted wiggle 0.8+dfsg1-2 (source amd64)

2013-02-28 Thread Jari Aalto
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Thu, 28 Feb 2013 10:59:53 +0200 Source: wiggle Binary: wiggle Architecture: source amd64 Version: 0.8+dfsg1-2 Distribution: unstable Urgency: low Maintainer: Jari Aalto jari.aa...@cante.net Changed-By: Jari Aalto jari.aa...@cante.net

Accepted slapos.core 0.35.1-1 (source all)

2013-02-28 Thread Arnaud Fontaine
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Thu, 28 Feb 2013 19:25:16 +0900 Source: slapos.core Binary: slapos-client slapos-node-unofficial Architecture: source all Version: 0.35.1-1 Distribution: unstable Urgency: low Maintainer: Arnaud Fontaine ar...@debian.org Changed-By: