Next | Query returned 6 messages, browsing 1 to 10 | previous

History of commit frequency

CVS Commit History:


   2015-12-27 22:06:49 by Thomas Klausner | Files touched by this commit (7) | Package removed
Log message:
Finish move of py-borg to py-borgbackup.
   2015-12-27 17:17:48 by Thomas Klausner | Files touched by this commit (1)
Log message:
Improve HOMEPAGE.
   2015-12-21 01:33:47 by Sevan Janiyan | Files touched by this commit (1)
Log message:
Account file installed on FreeBSD specifically

Reviewed by wiz@
   2015-11-04 02:32:42 by Alistair G. Crooks | Files touched by this commit (499)
Log message:
Add SHA512 digests for distfiles for sysutils category

Problems found with existing digests:
	Package memconf distfile memconf-2.16/memconf.gz
	b6f4b736cac388dddc5070670351cf7262aba048 [recorded]
	95748686a5ad8144232f4d4abc9bf052721a196f [calculated]

Problems found locating distfiles:
	Package dc-tools: missing distfile dc-tools/abs0-dc-burn-netbsd-1.5-0-gae55ec9
	Package ipw-firmware: missing distfile ipw2100-fw-1.2.tgz
	Package iwi-firmware: missing distfile ipw2200-fw-2.3.tgz
	Package nvnet: missing distfile nvnet-netbsd-src-20050620.tgz
	Package syslog-ng: missing distfile syslog-ng-3.7.2.tar.gz

Otherwise, existing SHA1 digests verified and found to be the same on
the machine holding the existing distfiles (morden).  All existing
SHA1 digests retained for now as an audit trail.
   2015-08-28 13:25:52 by Thomas Klausner | Files touched by this commit (4)
Log message:
Simplify. Fix packaging on NetBSD.
   2015-08-22 16:47:55 by Benny Siegert | Files touched by this commit (5)
Log message:
Add a package for py-borg, aka Borg Backup. It is a successor of
sysutils/py-attic, which is no longer being developed upstream.

BorgBackup (short: Borg) is a deduplicating backup program. Optionally,
it supports compression and authenticated encryption.

The main goal of Borg is to provide an efficient and secure way to
backup data. The data deduplication technique used makes Borg suitable
for daily backups since only changes are stored. The authenticated
encryption technique makes it suitable for backups to not fully trusted
targets.

Next | Query returned 6 messages, browsing 1 to 10 | previous