Next | Query returned 43 messages, browsing 21 to 30 | Previous

History of commit frequency

CVS Commit History:


   2019-02-27 14:27:22 by Adam Ciarcinski | Files touched by this commit (3) | Package updated
Log message:
py-keyring: updated to 18.0.0

18.0.0
* On macOS, the backend now raises a KeyringLocked
  when access to the keyring is denied (on get or set) instead
  of PasswordSetError or KeyringError. Any API users
  may need to account for this change, probably by catching
  the parent KeyringError.
  Additionally, the error message from the underying error is
  now included in any errors that occur.

17.1.1
* Update packaging technique to avoid 0.0.0 releases.

17.1.0
* When calling keyring.core.init_backend, if any
  limit function is supplied, it is saved and later honored by
  the ChainerBackend as well.

17.0.0
* Remove application attribute from stored passwords
  using SecretService, addressing regression introduced in
  10.5.0. Impacted Linux keyrings will once again
  prompt for a password for "Python program".

16.1.1
* Fix error on import due to circular imports
  on Python 3.4.

16.1.0
* Refactor ChainerBackend, introduced in 16.0 to function
  as any other backend, activating when relevant.

16.0.2
* In Windows backend, trap all exceptions when
  attempting to import pywin32.

16.0.1
* Once again allow all positive, non-zero priority
  keyrings to participate.

16.0.0
* Fix race condition in delete_password on Windows.
* All suitable backends (priority 1 and greater) are
  allowed to participate.

15.2.0
* Added new API for get_credentials, for backends
  that can resolve both a username and password for a service.

15.1.0
* Add the Null keyring, disabled by default.
* Added --disable option to command-line
  interface.
* Now honor a PYTHON_KEYRING_BACKEND
  environment variable to select a backend. Environments
  may set to keyring.backends.null.Keyring to disable
  keyring.
   2017-12-21 15:06:32 by Adam Ciarcinski | Files touched by this commit (2) | Package updated
Log message:
py-keyring: updated to 10.5.1

10.5.1:
Prevent AttributeError on import when Debian has created broken dbus installs.
   2017-11-27 14:05:44 by Adam Ciarcinski | Files touched by this commit (2) | Package updated
Log message:
py-keyring: updated to 10.5.0

10.5.0
* Added ``--list-backends`` option to command-line interface.
* Removed ``logger`` from ``keyring``.
* Set the appid for SecretService & KWallet to something meaningful.
   2017-10-18 09:22:53 by Adam Ciarcinski | Files touched by this commit (3) | Package updated
Log message:
py-keyring: update to 10.4.0

10.4.0
In Kwallet, pass mainloop to SessionBus.
Unpin pywin32-ctypes, but blacklist known incompatible versions.
   2017-01-03 14:23:05 by Jonathan Perkin | Files touched by this commit (52)
Log message:
Use "${MV} || ${TRUE}" and "${RM} -f" consistently in \ 
post-install targets.
   2016-08-28 17:48:37 by Thomas Klausner | Files touched by this commit (112)
Log message:
Remove unnecessary PLIST_SUBST and FILES_SUBST that are now provided
by the infrastructure.

Mark a couple more packages as not ready for python-3.x.
   2016-06-08 19:43:49 by Thomas Klausner | Files touched by this commit (356)
Log message:
Switch to MASTER_SITES_PYPI.
   2016-05-21 07:38:40 by Richard PALO | Files touched by this commit (1)
Log message:
post-extract chmod no longer necessary
   2015-12-11 12:36:44 by Thomas Klausner | Files touched by this commit (1)
Log message:
Fix ALTERNATIVES file. Bump PKGREVISION.
   2015-11-04 02:18:12 by Alistair G. Crooks | Files touched by this commit (434)
Log message:
Add SHA512 digests for distfiles for security category

Problems found locating distfiles:
	Package f-prot-antivirus6-fs-bin: missing distfile fp-NetBSD.x86.32-fs-6.2.3.tar.gz
	Package f-prot-antivirus6-ws-bin: missing distfile fp-NetBSD.x86.32-ws-6.2.3.tar.gz
	Package libidea: missing distfile libidea-0.8.2b.tar.gz
	Package openssh: missing distfile openssh-7.1p1-hpn-20150822.diff.bz2
	Package uvscan: missing distfile vlp4510e.tar.Z

Otherwise, existing SHA1 digests verified and found to be the same on
the machine holding the existing distfiles (morden).  All existing
SHA1 digests retained for now as an audit trail.

Next | Query returned 43 messages, browsing 21 to 30 | Previous