parcimonie 0.8-1 source package in Ubuntu
Changelog
parcimonie (0.8-1) unstable; urgency=medium * New upstream release (Closes: #722220): - Migrate to Moo, Type::Tiny and MooX::Options, thanks to MooX::late. - Use Moo::Role before loading other libraries: exports all methods declared after it's used. - Adapt syntax to newer Gtk3 bindings, and depend on it. - Documentation fixes: fix help urls about HKPS, use pools instead of specific keyservers, fix typos. - Move from the deprecated CriticTests to Test::Perl::Critic. - Use D::Z::P::ChangelogFromGit, rename old Changes, and stop using Dist::Zilla's CheckChangeLog. - Stop using OurPkgVersion, drop VERSION placeholders. - Bump copyright years, don't add copyright info to libraries. * Update long description. * Draft new debian/changelog entry. * Update copyright years in debian/copyright. * Update dependencies to match upstream changes. * Declare compliance with Standards-Version 3.9.5. * Drop obsolete Lintian overrides: these were fixed in Lintian two years ago. -- intrigeri <email address hidden> Sun, 15 Dec 2013 13:52:26 +0100
See full publishing history Publishing
Series | Published | Component | Section | |
---|---|---|---|---|
Trusty | release | universe | perl |
Downloads
File | Size | SHA-256 Checksum |
---|---|---|
parcimonie_0.8-1.dsc | 2.6 KiB | 072ec259ef578a07800bb71c9cbf1bbd1fbbe83ff1a5ae128759fe466ae9692d |
parcimonie_0.8.orig.tar.gz | 66.6 KiB | 5969c2993887a01010a6c19cd4ac660b1adfd21f9aa1501f77d0f177ac3b2869 |
parcimonie_0.8-1.debian.tar.gz | 5.1 KiB | 18a37f4dbb27874c10f7c7c8bf7808c6206b8cadeb8b5f775262892acf29b0d1 |
Available diffs
- diff from 0.7.1-1 to 0.8-1 (22.4 KiB)
No changes file available.
Binary packages built by this source
- parcimonie: privacy-friendly helper to refresh a GnuPG keyring
parcimonie is a daemon that slowly refreshes a GnuPG public keyring
from a keyserver.
.
Its refreshes one key at a time; between every key update, parcimonie
sleeps a random amount of time, long enough for the previously used
Tor circuit to expire.
.
This process is meant to make it hard for an attacker to correlate
the multiple performed key update operations.
.
See the included design document to learn more about the threat
and risk models parcimonie attempts to help coping with.