> On Mon, 10 Dec 2012, Sergei Trofimovich wrote:
> gentoo-x86/profiles/updates $ LANG=C ls -1 --sort=time
> [long list omitted]
> old entries are done in different context (comparing to 2012):
> - some packages change names 2 or 3 times
> - slots have different meaning
> moreover:
> - if
Due to limited time and resources these packages are up for grabs:
- app-shells/shish
- dev-db/mysqltuner
- dev-libs/dietlibc
- dev-libs/gecode
- net-analyzer/bwm-ng
- net-analyzer/nagios-check_mysql_health
These packages have been reduced to herd maintainers:
- media-libs/libraw
- media-libs/ge
On 12/10/2012 12:10 AM, "Paweł Hajdan, Jr." wrote:
>> I propose that we say, once a year, schedule a tree-cleaning of old
>> updates files. These updates files could be added to a tarball made
>> available for download. That way if they are needed to update a system
>> older than what the main t
Greg KH schrieb:
> On Mon, Dec 10, 2012 at 12:21:29AM +0100, Chí-Thanh Christopher Nguyễn wrote:
>> Greg KH schrieb:
No, all we need is to enable EFI stub support in the kernel, and
integrate the initramfs using CONFIG_INITRAMFS_SOURCE and place it in
some location where UEFI looks f
On Mon, Dec 10, 2012 at 2:52 AM, Rich Freeman wrote:
> I really would like Gentoo to support a self-signed secure boot
> framework (obviously this would be for after the system is installed).
https://bugs.gentoo.org/show_bug.cgi?id=444830
You can see how such framework works by booting Liberté L
On Sat, Dec 08, 2012 at 11:57:13PM -0500, Fernando Reyes wrote
> iirc the minimal install CD ISO is capable of booting from a USB device or
> any removable media by just running the following commands.
>
> # isohybrid image.ISO
> # did if=image.ISO of=/dev/sdb bs=8192k
>
> sdb being your remova
On Sun, Dec 09, 2012 at 06:37:56PM -0800, Greg KH wrote
> Not necessarily, as I'm finding out with real hardware. My only options
> on the box I have is to either zero out all keys, or specifically tell
> the BIOS what binary to run (doesn't need to be signed, and can not be
> changed after telli
On Mon, Dec 10, 2012 at 10:31:25AM -0500, Walter Dnes wrote:
> On Sun, Dec 09, 2012 at 06:37:56PM -0800, Greg KH wrote
>
> > Not necessarily, as I'm finding out with real hardware. My only options
> > on the box I have is to either zero out all keys, or specifically tell
> > the BIOS what binary
On Mon, Dec 10, 2012 at 8:36 PM, Greg KH wrote:
> Matthew's frontend "shim" code is nice and tiny, but the one I am
> referring to provides the ability to enroll your own keys in the BIOS,
> which shim does not.
I just tried shim in OVMF, and it provides an interface to enroll keys
/ signatures.
Hello,
I think we're mostly aware what the use and benefits
of the *use.stable.mask files are.
They would be at least really useful in Python ebuilds, where we
have to either:
a) forcedly stabilize a particular Python implementation (like pypy),
b) don't support it all,
c) or just keep two pac
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On 10/12/12 04:27 PM, Michał Górny wrote:
> Hello,
>
> I think we're mostly aware what the use and benefits of the
> *use.stable.mask files are.
>
> They would be at least really useful in Python ebuilds, where we
> have to either:
>
> a) forcedl
On Mon, 10 Dec 2012 21:01:34 -0500
Ian Stakenvicius wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA256
>
> On 10/12/12 04:27 PM, Michał Górny wrote:
> > Hello,
> >
> > I think we're mostly aware what the use and benefits of the
> > *use.stable.mask files are.
> >
> > They would be at l
On 12/10/2012 01:27 PM, Michał Górny wrote:
> 1) duplicate most of the major profiles. Make an EAPI 5-enabled wrapper
> profiles which will provide the *use.stable.mask files. Require users
> to migrate to those profiles after getting an EAPI 5 capable package
> manager (how?). Possibly mask the re
13 matches
Mail list logo