parcimonie 0.8-1 source package in Ubuntu

Changelog

parcimonie (0.8-1) unstable; urgency=medium


  * New upstream release (Closes: #722220):
    - Migrate to Moo, Type::Tiny and MooX::Options, thanks to MooX::late.
    - Use Moo::Role before loading other libraries: exports all methods
      declared after it's used.
    - Adapt syntax to newer Gtk3 bindings, and depend on it.
    - Documentation fixes: fix help urls about HKPS, use pools instead
      of specific keyservers, fix typos.
    - Move from the deprecated CriticTests to Test::Perl::Critic.
    - Use D::Z::P::ChangelogFromGit, rename old Changes, and stop using
      Dist::Zilla's CheckChangeLog.
    - Stop using OurPkgVersion, drop VERSION placeholders.
    - Bump copyright years, don't add copyright info to libraries.
  * Update long description.
  * Draft new debian/changelog entry.
  * Update copyright years in debian/copyright.
  * Update dependencies to match upstream changes.
  * Declare compliance with Standards-Version 3.9.5.
  * Drop obsolete Lintian overrides: these were fixed in Lintian
    two years ago.

 -- intrigeri <email address hidden>  Sun, 15 Dec 2013 13:52:26 +0100

Upload details

Uploaded by:
intrigeri
Uploaded to:
Sid
Original maintainer:
intrigeri
Architectures:
all
Section:
perl
Urgency:
Medium Urgency

See full publishing history Publishing

Series Pocket Published Component Section
Trusty release universe perl

Builds

Trusty: [FULLYBUILT] i386

Downloads

File Size SHA-256 Checksum
parcimonie_0.8-1.dsc 2.6 KiB 072ec259ef578a07800bb71c9cbf1bbd1fbbe83ff1a5ae128759fe466ae9692d
parcimonie_0.8.orig.tar.gz 66.6 KiB 5969c2993887a01010a6c19cd4ac660b1adfd21f9aa1501f77d0f177ac3b2869
parcimonie_0.8-1.debian.tar.gz 5.1 KiB 18a37f4dbb27874c10f7c7c8bf7808c6206b8cadeb8b5f775262892acf29b0d1

Available diffs

No changes file available.

Binary packages built by this source

parcimonie: privacy-friendly helper to refresh a GnuPG keyring

 parcimonie is a daemon that slowly refreshes a GnuPG public keyring
 from a keyserver.
 .
 Its refreshes one key at a time; between every key update, parcimonie
 sleeps a random amount of time, long enough for the previously used
 Tor circuit to expire.
 .
 This process is meant to make it hard for an attacker to correlate
 the multiple performed key update operations.
 .
 See the included design document to learn more about the threat
 and risk models parcimonie attempts to help coping with.