Le jeudi, 4 décembre 2014, 07.46:25 Bart Martens a écrit :
On Wed, Dec 03, 2014 at 10:42:54AM +0100, Didier 'OdyX' Raboud wrote:
Le mercredi, 3 décembre 2014, 10.20:32 W. Martin Borgert a écrit :
Would it be OK to abuse experimental for new upstreams during
freeze?
during freezes,
On Thu, Dec 04, 2014 at 10:00:38AM +0100, Didier 'OdyX' Raboud wrote:
Le jeudi, 4 décembre 2014, 07.46:25 Bart Martens a écrit :
On Wed, Dec 03, 2014 at 10:42:54AM +0100, Didier 'OdyX' Raboud wrote:
Le mercredi, 3 décembre 2014, 10.20:32 W. Martin Borgert a écrit :
Would it be OK to
Control: reassign -1 wnpp
On Jo, 04 dec 14, 15:16:30, Syam G Krishnan wrote:
package: perfect-scrollbar
Severity: wishlist
Owner: 'syam' syamg...@gmail.com
*Package Name : perfect-scrollbar
Version : 2.1.2
Upstream Author : Hyunje Alex Jun (Author name/s of the Gem).
*URL :
Package: wnpp
Severity: wishlist
Owner: Vincent Bernat ber...@debian.org
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
* Package name: kafkacat
Version : 1.0.0
Upstream Author : Magnus Edenhill mag...@edenhill.se
* URL : https://github.com/edenhill/kafkacat
*
On Fri, 2014-11-28 at 12:56 +0100, Svante Signell wrote:
Hello,
In summary:
a) Upgrades should _not_ change init: whatever is installed should be
kept.
b) New installs should get systemd-sysv as default init with a debconf
message about alternative init systems.
More detailed:
1) Fix
Package: wnpp
Severity: wishlist
Owner: Thomas Goirand z...@debian.org
* Package name: python-proliantutils
Version : 0.1.1
Upstream Author : Nisha Agarwal agarwalnisha1...@gmail.com
* URL : https://github.com/hpproliant/proliantutils
* License : Apache-2.0
On another note, is it just me or the links in the following line of the
bug report are wrong?
*Bug reassigned from package 'listarchives
https://bugs.debian.org/cgi-bin/%3Ca%20href=%22pkgreport.cgi?package=listarchives%22%3Elistarchives%3C/a%3E'
to 'lists.debian.org
Package: wnpp
Severity: wishlist
Owner: Dmitry Bogatov kact...@gnu.org
* Package name: blogliterately
Version : 0.7.1.7
Upstream Author : Brent Yorgey byor...@cis.upenn.edu
* URL : http://byorgey.wordpress.com/blogliterately/
* License : GPL3+
Programming
Ian R Leamonth,
In Debian GNU/linux they NEVER discussed to port other packages, infact in
different situations i discuss this on debian-hamradio and on #fsf where
they said that there was not any necessity to port the packages, and that
is left to the user the freedom, to take the packages in
On 29.11.2014 20:43, Svante Signell wrote:
The best for kFreeBSD and Hurd would be to abandoning the Debian ship.
It is sinking :( (just let the devuan people get things in order first)
Well, I'll also put my projecsts on getting rid of polkit into that
direction. Why ? Because I've got the
On 29.11.2014 20:45, Ivan Shmakov wrote:
As for Systemd being the default (on Debian GNU/Linux,
specifically), – I guess I shouldn’t bother. GNOME is also the
default, but I cannot readily recall ever having it running on
my Debian installs.
By the way: didn't
Firstly, I should say that I agree with Peter and Tollef's objectives.
I'm not an expert on TLS but I was under the impression that this
behaviour - requiring that TLS authentication be done by a nontrivial
certificate chain - was specified by the standards (presumably X.509
rather than TLS). I
On 28.11.2014 19:09, Christoph Anton Mitterer wrote:
For many things, CGI is actually the only way to run them securely,
since it's the only way to run foreign processes in a container
environment (chroots, etc.) or with user privilege separation.
Not entirely true. About a decade ago, I've
Hi Paolo,
(Removing debian-blends@lists.d.o from CC as this topic is not relevant there.)
On Thu, Dec 04, 2014 at 02:40:06PM -, iw0...@riseup.net wrote:
here i upload as attachment the file hamradio
Thanks for this list of software. Looking through the list I can see a lot
of good
* Matthias Urlichs matth...@urlichs.de [141130 09:22]:
But on a multi-user system, we can't depend on the first user being any
sort of special owner; it might just as well be the person whose desk
the machine is hidden under
I strongly disagree with this. The person performing the
Hi,
Christoph Anton Mitterer:
For many things, CGI is actually the only way to run them securely,
since it's the only way to run foreign processes in a container
environment (chroots, etc.) or with user privilege separation.
?
If you can run a CGI inside a chroot/container/whatever, you can
]] Ian Jackson
Tollef Fog Heen writes (Re: curl and certificate verification in jessie):
No, it doesn't necessarily. As dkg points out, I can no longer say
«this service should have this particular cert». This makes us
vulnerable to compromises of the CA that provides the cert for a
Tollef Fog Heen writes (Re: curl and certificate verification in jessie):
Ian Jackson:
Each time you generate an EE key which you intend to use this way,
also create an ad-hoc single-shot CA. Generate one EE certificate
using the CA, on the EE public key, and then throw the CA private key
On 12/04/2014 10:41 AM, Ian Jackson wrote:
I'm not an expert on TLS but I was under the impression that this
behaviour - requiring that TLS authentication be done by a nontrivial
certificate chain - was specified by the standards (presumably X.509
rather than TLS). I could be wrong.
FWIW,
Nikos Andrikos wrote:
On another note, is it just me or the links in the following line of the
bug report are wrong?
*Bug reassigned from package 'listarchives
https://bugs.debian.org/cgi-bin/%3Ca%20href=%22pkgreport.cgi?package=listarchives%22%3Elistarchives%3C/a%3E'
to 'lists.debian.org
Package: wnpp
Severity: normal
I request assistance with maintaining the pgpool2 package in the
PostgreSQL team. I'm not using the package myself - someone with more
experience in actually running pgpool2 would be welcome to take care
of getting the more advanced features (e.g. memcached support)
On Thu, 04 Dec 2014, Nikos Andrikos wrote:
On another note, is it just me or the links in the following line of
the bug report are wrong?
Yeah, this is a bug which I've actually fixed in my code branch, and
will need to update shortly. [Basically, the precise html escape used
changed, and the
Daniel Kahn Gillmor writes (Re: curl and certificate verification in jessie):
So, the idea is that when you accept an EE cert, you need to do it
with an explicit associate to a specific peer's name, not just the cert
itself. newer versions of GnuTLS provide this facility, but it's not
the
On 12/04/2014 01:48 PM, Ian Jackson wrote:
Daniel Kahn Gillmor writes (Re: curl and certificate verification in
jessie):
So, the idea is that when you accept an EE cert, you need to do it
with an explicit associate to a specific peer's name, not just the cert
itself. newer versions of
Daniel Kahn Gillmor writes (Re: curl and certificate verification in jessie):
It seems to narrowly solve the case in question, but possibly at the
risk of making the semantics of the API even more confusing than it
already is.
If they didn't want the API to be full of confusing
Ian Jackson writes (Re: curl and certificate verification in jessie):
Daniel Kahn Gillmor writes (Re: curl and certificate verification in
jessie):
It seems to narrowly solve the case in question, but possibly at the
risk of making the semantics of the API even more confusing than it
On Thu, Nov 27, 2014 at 03:06:17PM +0100, David Kalnischkies wrote:
Hi Tomas,
Great you like it! Many people are busy working on smoothing the edges
uncovered by all the inflowing bugreports, so the occasional thanks!
is a nice boost to troop morale. :)
I will second the thank you.. I got
]] Daniel Kahn Gillmor
On 12/04/2014 10:41 AM, Ian Jackson wrote:
I'm not an expert on TLS but I was under the impression that this
behaviour - requiring that TLS authentication be done by a nontrivial
certificate chain - was specified by the standards (presumably X.509
rather than
On Thu, Nov 27, 2014 at 03:06:17PM +0100, David Kalnischkies wrote:
Hi Tomas,
Great you like it! Many people are busy working on smoothing the edges
uncovered by all the inflowing bugreports, so the occasional thanks!
is a nice boost to troop morale. :)
Btw, debian is the only complex
On Dec 04, Matthias Urlichs matth...@urlichs.de wrote:
If you can run a CGI inside a chroot/container/whatever, you can run a
small web server on a local port / Unix socket, and reverse-proxy it,
just as easily.
While using many more times the resources. You obviously have no idea of
the
Hi,
Marco d'Itri:
On Dec 04, Matthias Urlichs matth...@urlichs.de wrote:
If you can run a CGI inside a chroot/container/whatever, you can run a
small web server on a local port / Unix socket, and reverse-proxy it,
just as easily.
While using many more times the resources.
Which many
On 2014-12-04 08:46, Bart Martens wrote:
On Wed, Dec 03, 2014 at 10:42:54AM +0100, Didier 'OdyX' Raboud wrote:
Le mercredi, 3 décembre 2014, 10.20:32 W. Martin Borgert a écrit :
Would it be OK to abuse experimental for new upstreams during
freeze?
during freezes, where unstable should only
On Thu, 2014-12-04 at 17:03 +0100, Matthias Urlichs wrote:
If you can run a CGI inside a chroot/container/whatever, you can run a
small web server on a local port / Unix socket, and reverse-proxy it,
just as easily.
Well that's probably roughly the same, although I'd still feel better if
On Thu, 2014-12-04 at 21:14 +0100, Marco d'Itri wrote:
While using many more times the resources. You obviously have no idea of
the challenges of providing secure web hosting for non-trivial
quantities of web sites.
So what do you want to imply would be secure?
Apart from that, when you
On Dec 04, Christoph Anton Mitterer cales...@scientia.net wrote:
While using many more times the resources. You obviously have no idea of
the challenges of providing secure web hosting for non-trivial
quantities of web sites.
So what do you want to imply would be secure?
The point is not
On Thu, 04 Dec 2014 22:23:15 +0100, Christoph Anton Mitterer
cales...@scientia.net wrote:
Apart from that, when you speak of non-trivial quantities - I'd
probably say that running gazillion websites from different entities on
one host is generally a really bad idea.
Gazillions of websites are
Christoph Anton Mitterer cales...@scientia.net writes:
On Thu, 2014-12-04 at 21:14 +0100, Marco d'Itri wrote:
FastCGI is another thing that almost nobody can afford when hosting a
significant number of web sites.
Why not?
When I've investigated in mod-php vs. cgi vs. fcgi, the fcgi turned
The following is a listing of packages for which help has been requested
through the WNPP (Work-Needing and Prospective Packages) system in the
last week.
Total number of orphaned packages: 655 (new: 10)
Total number of packages offered up for adoption: 147 (new: 0)
Total number of packages
On 02.12.2014 06:01, Paul Wise wrote:
gnome depends on apache ?
gnome-user-share uses apache2 to share files on the local network via WebDAV.
Is this an purely optional program, or does gnome itself depend on it ?
seriously ?
Sharing files with other computers on the local network seems
On 04.12.2014 22:23, Christoph Anton Mitterer wrote:
Apart from that, when you speak of non-trivial quantities - I'd
probably say that running gazillion websites from different entities on
one host is generally a really bad idea.
No, it's not, and it's pretty cheap, if done right.
Several
On 25.11.2014 18:30, Stephen Gran wrote:
Excellent. I'm sure that if they can create a deb, they can install
sysvinit, or runit, or some BSD, or whatever else they want. A default
is only a default, after all.
Just curious about the term default:
Can I still install a system w/o systemd
On Fri, Dec 5, 2014 at 10:25 AM, Enrico Weigelt wrote:
Is this an purely optional program, or does gnome itself depend on it ?
Please review the dependencies of the gnome metapackage.
--
bye,
pabs
https://wiki.debian.org/PaulWise
--
To UNSUBSCRIBE, email to
On 27.11.2014 00:29, Noel Torres wrote:
manpower required to maintain a distribution with more than one init
system widey installed, manpower to perform the required changes to
support multiple init systems in Jessie, centered about the most
important question: our users.
Just curious: how
On 27.11.2014 11:18, Martin Steigerwald wrote:
Desktops (not only GNOME) use a very tiny bit of systemd, interfaces
that could be provided elsewhere. The real purpose of systemd is to
provide a modern init system.
I still wonder why there are provided within systemd then.
Same for me. If
On 27.11.2014 11:53, Matthias Urlichs wrote:
Yes, the logind-related parte _could_ be provided elsewhere, but part of
the features logind needs is already implemented in systemd.
Can you understand, that this method is exactly one of the major reason
why many people dont like the systemd
Enrico Weigelt, metux IT consult enrico.weig...@gr13.net writes:
On 27.11.2014 00:29, Noel Torres wrote:
manpower required to maintain a distribution with more than one init
system widey installed, manpower to perform the required changes to
support multiple init systems in Jessie, centered
On Fri, Dec 05, 2014 at 05:02:27AM +0100, Enrico Weigelt, metux IT consult
wrote:
On 27.11.2014 11:53, Matthias Urlichs wrote:
Yes, the logind-related parte _could_ be provided elsewhere, but part of
the features logind needs is already implemented in systemd.
Can you understand, that
On Fri, Dec 05, 2014 at 03:58:53AM +0100, Enrico Weigelt, metux IT consult
wrote:
On 25.11.2014 18:30, Stephen Gran wrote:
Excellent. I'm sure that if they can create a deb, they can install
sysvinit, or runit, or some BSD, or whatever else they want. A default
is only a default, after
On Thu, Dec 04, 2014 at 10:08:38PM +0100, Niels Thykier wrote:
Unfortunately, it is equally disruptive when people (despite best
efforts) misjudge the consequences of their upload. In such a case, you
would be depriving your fellow co-Debianites from the opportunity of
getting some patches
Package: wnpp
Severity: wishlist
Owner: Tim Potter t...@hp.com
* Package name: mimepull
Version : 1.9.4
Upstream Author : Jitendra Kotamraju and Martin Grebac
* URL : https://mimepull.java.net
* License : CDDL 1.1, GPL2
Programming Lang: Java
Description
Enrico Weigelt, metux IT consult enrico.weig...@gr13.net writes:
Same for me. If there really is some functionality which some DEs really
need, why not having an entirely separate tool for that ?
Anyways, I still didn't understand why udev is bundled within systemd.
And I don't understand
This one time, at band camp, Enrico Weigelt, metux IT consult said:
On 25.11.2014 18:30, Stephen Gran wrote:
Excellent. I'm sure that if they can create a deb, they can install
sysvinit, or runit, or some BSD, or whatever else they want. A default
is only a default, after all.
Just
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Thu, 04 Dec 2014 11:33:58 +0300
Source: gnome-flashback
Binary: gnome-flashback gnome-flashback-common gnome-flashback-dbg
Architecture: source all
Version: 3.10.0-2
Distribution: unstable
Urgency: medium
Maintainer: Debian GNOME
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Thu, 04 Dec 2014 10:14:48 +0100
Source: transmageddon
Binary: transmageddon
Architecture: source all
Version: 1.5-1
Distribution: experimental
Urgency: medium
Maintainer: Maintainers of GStreamer packages
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Thu, 04 Dec 2014 10:56:49 +0100
Source: db5.3
Binary: db5.3-doc libdb5.3-dev libdb5.3 db5.3-util db5.3-sql-util libdb5.3++
libdb5.3++-dev libdb5.3-tcl libdb5.3-dbg libdb5.3-java-jni libdb5.3-java
libdb5.3-java-gcj
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Thu, 04 Dec 2014 00:24:35 +0100
Source: phamm
Binary: phamm phamm-ldap phamm-ldap-vacation phamm-ldap-amavis
Architecture: source all
Version: 0.6.2-1.2
Distribution: unstable
Urgency: medium
Maintainer: Phamm Team t...@phamm.org
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Thu, 04 Dec 2014 12:32:18 +0100
Source: atril
Binary: atril atril-dbg atril-common libatrilview3 libatrilview-dev
libatrilview3-dbg libatrildocument3 libatrildocument-dev libatrildocument3-dbg
Architecture: source all amd64
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Thu, 04 Dec 2014 08:59:20 +
Source: lava-dispatcher
Binary: lava-dispatcher
Architecture: source amd64
Version: 2014.12-1
Distribution: experimental
Urgency: medium
Maintainer: Debian LAVA team
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Thu, 04 Dec 2014 08:59:39 +
Source: lava-server
Binary: lava-server lava lava-dev lava-server-doc
Architecture: source all
Version: 2014.12-1
Distribution: experimental
Urgency: medium
Maintainer: Debian LAVA team
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Wed, 03 Dec 2014 17:47:26 +
Source: cross-gcc-4.9-ppc64el
Binary: cpp-4.9-powerpc64le-linux-gnu gcc-4.9-powerpc64le-linux-gnu
g++-4.9-powerpc64le-linux-gnu gfortran-4.9-powerpc64le-linux-gnu
Architecture: source amd64
Version: 6
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Thu, 04 Dec 2014 13:53:51 +0100
Source: ini4j
Binary: libini4j-java libini4j-java-doc
Architecture: source all
Version: 0.5.2-SNAPSHOT-5
Distribution: unstable
Urgency: medium
Maintainer: Debian Java Maintainers
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Thu, 04 Dec 2014 09:41:50 -0200
Source: redmine
Binary: redmine redmine-mysql redmine-pgsql redmine-sqlite
Architecture: source all
Version: 3.0~20140825-3
Distribution: unstable
Urgency: medium
Maintainer: Jérémy Lal
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Thu, 04 Dec 2014 14:07:10 +0100
Source: needrestart
Binary: needrestart
Architecture: source all
Version: 1.2-6
Distribution: unstable
Urgency: high
Maintainer: Patrick Matthäi pmatth...@debian.org
Changed-By: Patrick Matthäi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Thu, 04 Dec 2014 01:11:22 -0500
Source: gnupg
Binary: gnupg gnupg-curl gpgv gnupg-udeb gpgv-udeb gpgv-win32
Architecture: source all
Version: 1.4.18-5
Distribution: unstable
Urgency: medium
Maintainer: Debian GnuPG-Maintainers
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Thu, 04 Dec 2014 15:01:48 +0100
Source: libcatmandu-perl
Binary: libcatmandu-perl
Architecture: source all
Version: 0.9209-1
Distribution: unstable
Urgency: medium
Maintainer: Debian Perl Group
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Wed, 03 Dec 2014 09:37:08 +0100
Source: virtualbox
Binary: virtualbox-qt virtualbox virtualbox-dbg virtualbox-dkms
virtualbox-source virtualbox-guest-dkms virtualbox-guest-source
virtualbox-guest-x11 virtualbox-guest-utils
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Thu, 04 Dec 2014 00:10:43 +0300
Source: qemu
Binary: qemu qemu-system qemu-system-common qemu-system-misc qemu-system-arm
qemu-system-mips qemu-system-ppc qemu-system-sparc qemu-system-x86 qemu-user
qemu-user-static
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Wed, 03 Dec 2014 09:55:53 +0100
Source: virtualbox-guest-additions-iso
Binary: virtualbox-guest-additions-iso
Architecture: source all
Version: 4.3.20-1
Distribution: experimental
Urgency: medium
Maintainer: Debian Virtualbox Team
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Thu, 04 Dec 2014 16:31:12 +0100
Source: libcatmandu-importer-getjson-perl
Binary: libcatmandu-importer-getjson-perl
Architecture: source all
Version: 0.41-1
Distribution: unstable
Urgency: medium
Maintainer: Debian Perl Group
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Thu, 04 Dec 2014 17:23:10 +0100
Source: mcollective
Binary: mcollective mcollective-client mcollective-common mcollective-doc
Architecture: source all
Version: 2.6.0+dfsg-2
Distribution: unstable
Urgency: low
Maintainer: Puppet
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Thu, 04 Dec 2014 17:41:37 +0100
Source: claws-mail
Binary: claws-mail claws-mail-dbg libclaws-mail-dev claws-mail-plugins
claws-mail-spamassassin claws-mail-pgpmime claws-mail-pgpinline
claws-mail-smime-plugin
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Thu, 04 Dec 2014 18:41:28 +0100
Source: localepurge
Binary: localepurge
Architecture: source all
Version: 0.7.3.4
Distribution: unstable
Urgency: medium
Maintainer: Niels Thykier ni...@thykier.net
Changed-By: Niels Thykier
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Sun, 30 Nov 2014 15:38:10 +0100
Source: ocsinventory-server
Binary: ocsinventory-server ocsinventory-reports
Architecture: source all
Version: 2.0.5-1.2
Distribution: unstable
Urgency: low
Maintainer: Pierre Chifflier
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Thu, 04 Dec 2014 09:56:40 +0100
Source: libgtksourceviewmm
Binary: libgtksourceviewmm-3.0-0 libgtksourceviewmm-3.0-dev
libgtksourceviewmm-3.0-dbg libgtksourceviewmm-3.0-doc
Architecture: source all amd64
Version: 3.2.0-2
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Thu, 04 Dec 2014 18:51:09 +0100
Source: xterm
Binary: xterm
Architecture: source
Version: 313-1
Distribution: experimental
Urgency: low
Maintainer: Debian X Strike Force debia...@lists.debian.org
Changed-By: Sven Joachim
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Thu, 04 Dec 2014 12:57:59 -0500
Source: icedove
Binary: icedove icedove-dev icedove-dbg iceowl-extension
calendar-google-provider
Architecture: source amd64 all
Version: 31.3.0-1
Distribution: unstable
Urgency: low
Maintainer:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Thu, 04 Dec 2014 11:30:30 +0100
Source: watchdog
Binary: watchdog
Architecture: source amd64
Version: 5.14-3
Distribution: unstable
Urgency: medium
Maintainer: Michael Meskes mes...@debian.org
Changed-By: Michael Meskes
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Thu, 04 Dec 2014 17:45:42 +0100
Source: cloog
Binary: libcloog-isl-dev libcloog-isl4 cloog-isl
Architecture: source amd64
Version: 0.18.2-3
Distribution: experimental
Urgency: medium
Maintainer: Debian GCC Maintainers
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Sun, 09 Nov 2014 23:03:38 +0100
Source: pygments
Binary: python-pygments python3-pygments python-pygments-doc
Architecture: source all
Version: 2.0.1+dfsg-1
Distribution: unstable
Urgency: medium
Maintainer: Piotr Ożarowski
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Thu, 04 Dec 2014 21:09:07 +
Source: mutt
Binary: mutt mutt-patched mutt-dbg
Architecture: source amd64
Version: 1.5.23-3
Distribution: unstable
Urgency: medium
Maintainer: Antonio Radici anto...@dyne.org
Changed-By: Antonio
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Thu, 04 Dec 2014 15:50:59 -0500
Source: gnupg
Binary: gnupg gnupg-curl gpgv gnupg-udeb gpgv-udeb gpgv-win32
Architecture: source all
Version: 1.4.18-6
Distribution: unstable
Urgency: medium
Maintainer: Debian GnuPG-Maintainers
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Fri, 05 Dec 2014 10:17:37 +1300
Source: mythtv-status
Binary: mythtv-status
Architecture: source all
Version: 0.10.6-1
Distribution: unstable
Urgency: low
Maintainer: Andrew Ruthven and...@etc.gen.nz
Changed-By: Andrew Ruthven
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Thu, 04 Dec 2014 22:47:58 +0100
Source: hylafax
Binary: hylafax-server hylafax-client hylafax-server-dbg hylafax-client-dbg
Architecture: source amd64
Version: 3:6.0.6-6
Distribution: unstable
Urgency: medium
Maintainer: Giuseppe
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Thu, 04 Dec 2014 22:51:04 +0100
Source: gnome-online-accounts
Binary: gnome-online-accounts libgoa-1.0-0b libgoa-1.0-dev libgoa-backend-1.0-1
libgoa-backend-1.0-dev libgoa-1.0-common libgoa-1.0-doc gir1.2-goa-1.0
Architecture:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Wed, 03 Dec 2014 17:47:26 +
Source: cross-gcc-4.9-armhf
Binary: cpp-4.9-arm-linux-gnueabihf gcc-4.9-arm-linux-gnueabihf
g++-4.9-arm-linux-gnueabihf gfortran-4.9-arm-linux-gnueabihf
Architecture: source amd64
Version: 6
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Thu, 04 Dec 2014 10:47:04 +0100
Source: gnome-settings-daemon
Binary: gnome-settings-daemon gnome-settings-daemon-dev
Architecture: source amd64
Version: 3.14.2-2
Distribution: unstable
Urgency: medium
Maintainer: Debian GNOME
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Thu, 04 Dec 2014 23:21:16 +
Source: get-iplayer
Binary: get-iplayer
Architecture: source all
Version: 2.87-2
Distribution: unstable
Urgency: medium
Maintainer: Jonathan Wiltshire j...@debian.org
Changed-By: Jonathan Wiltshire
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Tue, 16 Sep 2014 14:17:30 +0900
Source: bluez
Binary: libbluetooth3 libbluetooth3-dbg libbluetooth-dev bluetooth bluez
bluez-dbg bluez-cups bluez-obexd bluez-hcidump bluez-test-scripts
Architecture: source amd64 all
Version:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Fri, 5 Dec 2014 01:27:51 +0100
Source: squid3
Binary: squid3 squid3-dbg squid3-common squidclient squid-cgi squid-purge
Architecture: source all i386
Version: 3.4.8-3
Distribution: unstable
Urgency: medium
Maintainer: Luigi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Thu, 04 Dec 2014 19:06:24 -0500
Source: serf
Binary: libserf-1-1 libserf-dev libserf1-dbg
Architecture: source amd64
Version: 1.3.8-1
Distribution: unstable
Urgency: medium
Maintainer: James McCoy james...@debian.org
Changed-By:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Wed, 03 Dec 2014 11:06:18 -0500
Source: statsmodels
Binary: python-statsmodels python-statsmodels-lib python-statsmodels-doc
python-scikits.statsmodels
Architecture: source amd64 all
Version: 0.6.1-1
Distribution: experimental
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Thu, 04 Dec 2014 21:05:34 -0500
Source: gcalcli
Binary: gcalcli
Architecture: source all
Version: 3.1-1
Distribution: experimental
Urgency: medium
Maintainer: Yaroslav Halchenko deb...@onerussian.com
Changed-By: Yaroslav Halchenko
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Thu, 04 Dec 2014 22:30:17 +0100
Source: clamav
Binary: clamav-base clamav-docs clamav-dbg clamav libclamav-dev libclamav6
clamav-daemon clamdscan clamav-testfiles clamav-freshclam clamav-milter
Architecture: source all amd64
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Fri, 05 Dec 2014 10:11:50 +0300
Source: gnome-flashback
Binary: gnome-flashback gnome-flashback-common gnome-flashback-dbg
Architecture: source all
Version: 3.10.0-3
Distribution: unstable
Urgency: medium
Maintainer: Debian GNOME
94 matches
Mail list logo