Accepted duplicity 0.5.16-1~bpo50+1 (source i386)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Thu, 16 Jul 2009 13:11:00 +0000
Source: duplicity
Binary: duplicity
Architecture: source i386
Version: 0.5.16-1~bpo50+1
Distribution: lenny-backports
Urgency: low
Maintainer: Alexander Zangerl <az@debian.org>
Changed-By: Micah Anderson <micah@debian.org>
Description:
duplicity - encrypted bandwidth-efficient backup
Closes: 497071 502207 512798 513446 519576 524786
Changes:
duplicity (0.5.16-1~bpo50+1) lenny-backports; urgency=low
.
* Backport testing version for backports.org
.
duplicity (0.5.16-1) unstable; urgency=low
.
* New upstream release (closes: #524786)
* removed last remaining debian-local patch
.
duplicity (0.5.11-2) unstable; urgency=low
.
* changed the setup to temporarily include upstream's repaired copy of
GnuPGInterface.py: because of #509415 in python-gnupginterface
duplicity currently does not work with public key encryption,
no signing and archive dirs.
.
duplicity (0.5.11-1) unstable; urgency=low
.
* New upstream release (closes: #519576)
.
duplicity (0.5.06-2) unstable; urgency=low
.
* applied most recent upstream fixes
.
duplicity (0.5.06-1) unstable; urgency=low
.
* New upstream release
* built against sid, not etch (closes: #513446)
.
duplicity (0.5.02-2) unstable; urgency=low
.
* lifted standards version
* added homepage to control (closes: #512798)
.
duplicity (0.5.02-1) unstable; urgency=low
.
* New upstream release (closes: #502207)
.
duplicity (0.4.12-2) unstable; urgency=low
.
* applied upstream patch to repair --no-encryption option
(which wrongly requested a passphrase) (closes: #497071)
.
duplicity (0.4.12-1) unstable; urgency=low
.
* New upstream release
Checksums-Sha1:
ad57c182aad3ae144cb5c7798c14c910d59b0f90 1733 duplicity_0.5.16-1~bpo50+1.dsc
89fd75899e477523e8037f652a5c3a50d5e64db8 209858 duplicity_0.5.16.orig.tar.gz
16f6ab9b2031dacf7b7067eaf03e4f0546b20ad4 8666 duplicity_0.5.16-1~bpo50+1.diff.gz
fd2ee04fdf1142f4b59f268b4e10ba0467383d45 188926 duplicity_0.5.16-1~bpo50+1_i386.deb
Checksums-Sha256:
5703590ed947705635f63c670d6ec307a33ffac0cef902db38ef5359503ef256 1733 duplicity_0.5.16-1~bpo50+1.dsc
abccd962681d1a932f84131eae9fbab73c063ebef5eebf745b490cba0d4df931 209858 duplicity_0.5.16.orig.tar.gz
06aeaf419ccbc0b84a8f6afbffd2f569a4ea1eb3744c73497e76bcc143898cd1 8666 duplicity_0.5.16-1~bpo50+1.diff.gz
7e417c32a9c52856207be173c410358c8f2399aad95283a5a1bb79c9e41621c0 188926 duplicity_0.5.16-1~bpo50+1_i386.deb
Files:
0e2bfd4dedfcbe3c66f831935ac7ac05 1733 utils optional duplicity_0.5.16-1~bpo50+1.dsc
83e92b106a42c09e86447b1019f0a105 209858 utils optional duplicity_0.5.16.orig.tar.gz
3ba77fb8ca89967c238f4398275f8918 8666 utils optional duplicity_0.5.16-1~bpo50+1.diff.gz
2e599f7d43dab833c08a2652218ad2ae 188926 utils optional duplicity_0.5.16-1~bpo50+1_i386.deb
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)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=q545
-----END PGP SIGNATURE-----
Accepted:
duplicity_0.5.16-1~bpo50+1.diff.gz
to pool/main/d/duplicity/duplicity_0.5.16-1~bpo50+1.diff.gz
duplicity_0.5.16-1~bpo50+1.dsc
to pool/main/d/duplicity/duplicity_0.5.16-1~bpo50+1.dsc
duplicity_0.5.16-1~bpo50+1_i386.deb
to pool/main/d/duplicity/duplicity_0.5.16-1~bpo50+1_i386.deb
duplicity_0.5.16.orig.tar.gz
to pool/main/d/duplicity/duplicity_0.5.16.orig.tar.gz
Reply to: