public inbox for gentoo-commits@lists.gentoo.org
 help / color / mirror / Atom feed
From: "David Seifert" <soap@gentoo.org>
To: gentoo-commits@lists.gentoo.org
Subject: [gentoo-commits] repo/gentoo:master commit in: www-servers/nginx/
Date: Sat,  8 Feb 2020 16:53:24 +0000 (UTC)	[thread overview]
Message-ID: <1581180773.3292fb668f9229f7a15ba3ef30ec596bcdfd286b.soap@gentoo> (raw)

commit:     3292fb668f9229f7a15ba3ef30ec596bcdfd286b
Author:     David Seifert <soap <AT> gentoo <DOT> org>
AuthorDate: Sat Feb  8 16:52:53 2020 +0000
Commit:     David Seifert <soap <AT> gentoo <DOT> org>
CommitDate: Sat Feb  8 16:52:53 2020 +0000
URL:        https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=3292fb66

www-servers/nginx: [QA] Fix UnnecessarySlashStrip

Signed-off-by: David Seifert <soap <AT> gentoo.org>

 www-servers/nginx/nginx-1.16.1-r1.ebuild | 20 ++++++++++----------
 www-servers/nginx/nginx-1.17.7.ebuild    | 20 ++++++++++----------
 www-servers/nginx/nginx-1.17.8.ebuild    | 20 ++++++++++----------
 3 files changed, 30 insertions(+), 30 deletions(-)

diff --git a/www-servers/nginx/nginx-1.16.1-r1.ebuild b/www-servers/nginx/nginx-1.16.1-r1.ebuild
index fcb191046b1..9c62c90db19 100644
--- a/www-servers/nginx/nginx-1.16.1-r1.ebuild
+++ b/www-servers/nginx/nginx-1.16.1-r1.ebuild
@@ -996,15 +996,15 @@ pkg_postinst() {
 			ewarn "following directories to mitigate a security bug"
 			ewarn "(CVE-2013-0337, bug #458726):"
 			ewarn ""
-			ewarn "  ${EPREFIX%/}/var/log/nginx"
-			ewarn "  ${EPREFIX%/}${NGINX_HOME_TMP}/{,client,proxy,fastcgi,scgi,uwsgi}"
+			ewarn "  ${EPREFIX}/var/log/nginx"
+			ewarn "  ${EPREFIX}${NGINX_HOME_TMP}/{,client,proxy,fastcgi,scgi,uwsgi}"
 			ewarn ""
 			ewarn "Check if this is correct for your setup before restarting nginx!"
 			ewarn "This is a one-time change and will not happen on subsequent updates."
-			ewarn "Furthermore nginx' temp directories got moved to '${EPREFIX%/}${NGINX_HOME_TMP}'"
+			ewarn "Furthermore nginx' temp directories got moved to '${EPREFIX}${NGINX_HOME_TMP}'"
 			chmod o-rwx \
-				"${EPREFIX%/}"/var/log/nginx \
-				"${EPREFIX%/}"${NGINX_HOME_TMP}/{,client,proxy,fastcgi,scgi,uwsgi} || \
+				"${EPREFIX}"/var/log/nginx \
+				"${EPREFIX}"${NGINX_HOME_TMP}/{,client,proxy,fastcgi,scgi,uwsgi} || \
 				_has_to_show_permission_warning=1
 		fi
 
@@ -1013,15 +1013,15 @@ pkg_postinst() {
 			ewarn "The permissions on the following directory have been reset in"
 			ewarn "order to mitigate a security bug (CVE-2016-1247, bug #605008):"
 			ewarn ""
-			ewarn "  ${EPREFIX%/}/var/log/nginx"
+			ewarn "  ${EPREFIX}/var/log/nginx"
 			ewarn ""
 			ewarn "Check if this is correct for your setup before restarting nginx!"
 			ewarn "Also ensure that no other log directory used by any of your"
 			ewarn "vhost(s) is not writeable for nginx user. Any of your log files"
 			ewarn "used by nginx can be abused to escalate privileges!"
 			ewarn "This is a one-time change and will not happen on subsequent updates."
-			chown 0:nginx "${EPREFIX%/}"/var/log/nginx || _has_to_show_permission_warning=1
-			chmod 710 "${EPREFIX%/}"/var/log/nginx || _has_to_show_permission_warning=1
+			chown 0:nginx "${EPREFIX}"/var/log/nginx || _has_to_show_permission_warning=1
+			chmod 710 "${EPREFIX}"/var/log/nginx || _has_to_show_permission_warning=1
 		fi
 
 		if [[ ${_has_to_show_permission_warning} -eq 1 ]]; then
@@ -1046,7 +1046,7 @@ pkg_postinst() {
 	# unmerged a affected installation on purpose in the past leaving
 	# /var/log/nginx on their system due to keepdir/non-empty folder
 	# and are now installing the package again.
-	local _sanity_check_testfile=$(mktemp --dry-run "${EPREFIX%/}"/var/log/nginx/.CVE-2016-1247.XXXXXXXXX)
+	local _sanity_check_testfile=$(mktemp --dry-run "${EPREFIX}"/var/log/nginx/.CVE-2016-1247.XXXXXXXXX)
 	su -s /bin/sh -c "touch ${_sanity_check_testfile}" nginx >&/dev/null
 	if [ $? -eq 0 ] ; then
 		# Cleanup -- no reason to die here!
@@ -1059,7 +1059,7 @@ pkg_postinst() {
 		ewarn "Looks like your installation is vulnerable to CVE-2016-1247"
 		ewarn "(bug #605008) because nginx user is able to create files in"
 		ewarn ""
-		ewarn "  ${EPREFIX%/}/var/log/nginx"
+		ewarn "  ${EPREFIX}/var/log/nginx"
 		ewarn ""
 		ewarn "Also ensure that no other log directory used by any of your"
 		ewarn "vhost(s) is not writeable for nginx user. Any of your log files"

diff --git a/www-servers/nginx/nginx-1.17.7.ebuild b/www-servers/nginx/nginx-1.17.7.ebuild
index 9b7d6b814db..266794ff8de 100644
--- a/www-servers/nginx/nginx-1.17.7.ebuild
+++ b/www-servers/nginx/nginx-1.17.7.ebuild
@@ -996,15 +996,15 @@ pkg_postinst() {
 			ewarn "following directories to mitigate a security bug"
 			ewarn "(CVE-2013-0337, bug #458726):"
 			ewarn ""
-			ewarn "  ${EPREFIX%/}/var/log/nginx"
-			ewarn "  ${EPREFIX%/}${NGINX_HOME_TMP}/{,client,proxy,fastcgi,scgi,uwsgi}"
+			ewarn "  ${EPREFIX}/var/log/nginx"
+			ewarn "  ${EPREFIX}${NGINX_HOME_TMP}/{,client,proxy,fastcgi,scgi,uwsgi}"
 			ewarn ""
 			ewarn "Check if this is correct for your setup before restarting nginx!"
 			ewarn "This is a one-time change and will not happen on subsequent updates."
-			ewarn "Furthermore nginx' temp directories got moved to '${EPREFIX%/}${NGINX_HOME_TMP}'"
+			ewarn "Furthermore nginx' temp directories got moved to '${EPREFIX}${NGINX_HOME_TMP}'"
 			chmod o-rwx \
-				"${EPREFIX%/}"/var/log/nginx \
-				"${EPREFIX%/}"${NGINX_HOME_TMP}/{,client,proxy,fastcgi,scgi,uwsgi} || \
+				"${EPREFIX}"/var/log/nginx \
+				"${EPREFIX}"${NGINX_HOME_TMP}/{,client,proxy,fastcgi,scgi,uwsgi} || \
 				_has_to_show_permission_warning=1
 		fi
 
@@ -1013,15 +1013,15 @@ pkg_postinst() {
 			ewarn "The permissions on the following directory have been reset in"
 			ewarn "order to mitigate a security bug (CVE-2016-1247, bug #605008):"
 			ewarn ""
-			ewarn "  ${EPREFIX%/}/var/log/nginx"
+			ewarn "  ${EPREFIX}/var/log/nginx"
 			ewarn ""
 			ewarn "Check if this is correct for your setup before restarting nginx!"
 			ewarn "Also ensure that no other log directory used by any of your"
 			ewarn "vhost(s) is not writeable for nginx user. Any of your log files"
 			ewarn "used by nginx can be abused to escalate privileges!"
 			ewarn "This is a one-time change and will not happen on subsequent updates."
-			chown 0:nginx "${EPREFIX%/}"/var/log/nginx || _has_to_show_permission_warning=1
-			chmod 710 "${EPREFIX%/}"/var/log/nginx || _has_to_show_permission_warning=1
+			chown 0:nginx "${EPREFIX}"/var/log/nginx || _has_to_show_permission_warning=1
+			chmod 710 "${EPREFIX}"/var/log/nginx || _has_to_show_permission_warning=1
 		fi
 
 		if [[ ${_has_to_show_permission_warning} -eq 1 ]]; then
@@ -1046,7 +1046,7 @@ pkg_postinst() {
 	# unmerged a affected installation on purpose in the past leaving
 	# /var/log/nginx on their system due to keepdir/non-empty folder
 	# and are now installing the package again.
-	local _sanity_check_testfile=$(mktemp --dry-run "${EPREFIX%/}"/var/log/nginx/.CVE-2016-1247.XXXXXXXXX)
+	local _sanity_check_testfile=$(mktemp --dry-run "${EPREFIX}"/var/log/nginx/.CVE-2016-1247.XXXXXXXXX)
 	su -s /bin/sh -c "touch ${_sanity_check_testfile}" nginx >&/dev/null
 	if [ $? -eq 0 ] ; then
 		# Cleanup -- no reason to die here!
@@ -1059,7 +1059,7 @@ pkg_postinst() {
 		ewarn "Looks like your installation is vulnerable to CVE-2016-1247"
 		ewarn "(bug #605008) because nginx user is able to create files in"
 		ewarn ""
-		ewarn "  ${EPREFIX%/}/var/log/nginx"
+		ewarn "  ${EPREFIX}/var/log/nginx"
 		ewarn ""
 		ewarn "Also ensure that no other log directory used by any of your"
 		ewarn "vhost(s) is not writeable for nginx user. Any of your log files"

diff --git a/www-servers/nginx/nginx-1.17.8.ebuild b/www-servers/nginx/nginx-1.17.8.ebuild
index fe0559cad19..e950633e242 100644
--- a/www-servers/nginx/nginx-1.17.8.ebuild
+++ b/www-servers/nginx/nginx-1.17.8.ebuild
@@ -996,15 +996,15 @@ pkg_postinst() {
 			ewarn "following directories to mitigate a security bug"
 			ewarn "(CVE-2013-0337, bug #458726):"
 			ewarn ""
-			ewarn "  ${EPREFIX%/}/var/log/nginx"
-			ewarn "  ${EPREFIX%/}${NGINX_HOME_TMP}/{,client,proxy,fastcgi,scgi,uwsgi}"
+			ewarn "  ${EPREFIX}/var/log/nginx"
+			ewarn "  ${EPREFIX}${NGINX_HOME_TMP}/{,client,proxy,fastcgi,scgi,uwsgi}"
 			ewarn ""
 			ewarn "Check if this is correct for your setup before restarting nginx!"
 			ewarn "This is a one-time change and will not happen on subsequent updates."
-			ewarn "Furthermore nginx' temp directories got moved to '${EPREFIX%/}${NGINX_HOME_TMP}'"
+			ewarn "Furthermore nginx' temp directories got moved to '${EPREFIX}${NGINX_HOME_TMP}'"
 			chmod o-rwx \
-				"${EPREFIX%/}"/var/log/nginx \
-				"${EPREFIX%/}"${NGINX_HOME_TMP}/{,client,proxy,fastcgi,scgi,uwsgi} || \
+				"${EPREFIX}"/var/log/nginx \
+				"${EPREFIX}"${NGINX_HOME_TMP}/{,client,proxy,fastcgi,scgi,uwsgi} || \
 				_has_to_show_permission_warning=1
 		fi
 
@@ -1013,15 +1013,15 @@ pkg_postinst() {
 			ewarn "The permissions on the following directory have been reset in"
 			ewarn "order to mitigate a security bug (CVE-2016-1247, bug #605008):"
 			ewarn ""
-			ewarn "  ${EPREFIX%/}/var/log/nginx"
+			ewarn "  ${EPREFIX}/var/log/nginx"
 			ewarn ""
 			ewarn "Check if this is correct for your setup before restarting nginx!"
 			ewarn "Also ensure that no other log directory used by any of your"
 			ewarn "vhost(s) is not writeable for nginx user. Any of your log files"
 			ewarn "used by nginx can be abused to escalate privileges!"
 			ewarn "This is a one-time change and will not happen on subsequent updates."
-			chown 0:nginx "${EPREFIX%/}"/var/log/nginx || _has_to_show_permission_warning=1
-			chmod 710 "${EPREFIX%/}"/var/log/nginx || _has_to_show_permission_warning=1
+			chown 0:nginx "${EPREFIX}"/var/log/nginx || _has_to_show_permission_warning=1
+			chmod 710 "${EPREFIX}"/var/log/nginx || _has_to_show_permission_warning=1
 		fi
 
 		if [[ ${_has_to_show_permission_warning} -eq 1 ]]; then
@@ -1046,7 +1046,7 @@ pkg_postinst() {
 	# unmerged a affected installation on purpose in the past leaving
 	# /var/log/nginx on their system due to keepdir/non-empty folder
 	# and are now installing the package again.
-	local _sanity_check_testfile=$(mktemp --dry-run "${EPREFIX%/}"/var/log/nginx/.CVE-2016-1247.XXXXXXXXX)
+	local _sanity_check_testfile=$(mktemp --dry-run "${EPREFIX}"/var/log/nginx/.CVE-2016-1247.XXXXXXXXX)
 	su -s /bin/sh -c "touch ${_sanity_check_testfile}" nginx >&/dev/null
 	if [ $? -eq 0 ] ; then
 		# Cleanup -- no reason to die here!
@@ -1059,7 +1059,7 @@ pkg_postinst() {
 		ewarn "Looks like your installation is vulnerable to CVE-2016-1247"
 		ewarn "(bug #605008) because nginx user is able to create files in"
 		ewarn ""
-		ewarn "  ${EPREFIX%/}/var/log/nginx"
+		ewarn "  ${EPREFIX}/var/log/nginx"
 		ewarn ""
 		ewarn "Also ensure that no other log directory used by any of your"
 		ewarn "vhost(s) is not writeable for nginx user. Any of your log files"


             reply	other threads:[~2020-02-08 16:53 UTC|newest]

Thread overview: 277+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2020-02-08 16:53 David Seifert [this message]
  -- strict thread matches above, loose matches on Subject: below --
2024-10-22 22:31 [gentoo-commits] repo/gentoo:master commit in: www-servers/nginx/ Conrad Kostecki
2024-10-21 12:42 Joonas Niilola
2024-10-06  5:13 Patrick Lauer
2024-10-05 23:00 Conrad Kostecki
2024-10-05 23:00 Conrad Kostecki
2024-10-05 23:00 Conrad Kostecki
2024-08-30  7:50 Joonas Niilola
2024-08-15 20:43 Conrad Kostecki
2024-06-27 15:40 Conrad Kostecki
2024-05-30  6:54 Conrad Kostecki
2024-05-30  2:09 Sam James
2024-05-30  2:09 Sam James
2024-05-30  0:05 Sam James
2024-05-30  0:05 Sam James
2024-05-29 22:58 Conrad Kostecki
2024-05-29 22:58 Conrad Kostecki
2024-05-29 22:58 Conrad Kostecki
2024-05-24  2:46 Ionen Wolkens
2024-04-24 12:42 Conrad Kostecki
2024-04-24 12:42 Conrad Kostecki
2024-04-24 12:42 Conrad Kostecki
2024-04-23 22:47 Conrad Kostecki
2024-04-23 22:47 Conrad Kostecki
2024-04-23 22:47 Conrad Kostecki
2024-04-19 11:26 Sam James
2024-04-17 23:35 Sam James
2024-04-17 23:29 Sam James
2024-04-17 23:20 Yixun Lan
2024-04-17 22:10 Sam James
2024-04-17 22:10 Sam James
2024-04-17 22:10 Sam James
2024-04-17 22:01 Sam James
2024-04-17 11:08 Conrad Kostecki
2024-02-16 11:38 Joonas Niilola
2024-02-15 21:15 Sam James
2024-02-15 19:43 Jakov Smolić
2024-02-15 13:17 Joonas Niilola
2024-02-15 13:17 Joonas Niilola
2023-12-01 20:04 Arthur Zamarin
2023-12-01 20:04 Arthur Zamarin
2023-12-01 20:04 Arthur Zamarin
2023-12-01 20:04 Arthur Zamarin
2023-11-22 11:38 Sam James
2023-10-24 18:18 Conrad Kostecki
2023-09-29  7:27 WANG Xuerui
2023-08-19 22:29 Conrad Kostecki
2023-08-15 22:40 Conrad Kostecki
2023-07-15 21:14 Conrad Kostecki
2023-07-15 20:37 Conrad Kostecki
2023-07-15  3:10 Sam James
2023-07-15  0:53 Conrad Kostecki
2023-07-04 21:27 Conrad Kostecki
2023-07-04  8:30 Joonas Niilola
2023-07-03 13:47 Sam James
2023-07-03 13:30 Sam James
2023-07-02  1:18 Conrad Kostecki
2023-06-23 16:17 Joonas Niilola
2023-04-27 21:57 Conrad Kostecki
2023-04-27 21:57 Conrad Kostecki
2023-04-20  4:01 John Helmert III
2023-04-18 20:38 Conrad Kostecki
2023-04-01 16:30 Arthur Zamarin
2023-03-30 21:12 Conrad Kostecki
2023-02-01 11:36 Arthur Zamarin
2023-01-25  1:40 Sam James
2023-01-25  1:40 Sam James
2023-01-13 14:16 Arthur Zamarin
2023-01-08  6:59 Joonas Niilola
2022-12-30 23:41 Sam James
2022-12-13 21:58 Conrad Kostecki
2022-10-31 13:24 Conrad Kostecki
2022-10-31 13:24 Conrad Kostecki
2022-10-19 21:42 Conrad Kostecki
2022-10-19 14:43 Conrad Kostecki
2022-09-10  6:43 Jakov Smolić
2022-09-09  7:36 Agostino Sarubbo
2022-09-09  7:36 Agostino Sarubbo
2022-09-09  7:34 Agostino Sarubbo
2022-09-05 23:29 Conrad Kostecki
2022-09-05 23:29 Conrad Kostecki
2022-07-20  7:39 Conrad Kostecki
2022-07-19 19:38 Conrad Kostecki
2022-07-19 19:38 Conrad Kostecki
2022-07-19 17:44 Conrad Kostecki
2022-07-19 17:21 Conrad Kostecki
2022-07-19 17:21 Conrad Kostecki
2022-07-19 17:21 Conrad Kostecki
2022-07-15  7:25 Agostino Sarubbo
2022-07-15  7:22 Agostino Sarubbo
2022-07-15  7:21 Agostino Sarubbo
2022-07-15  6:00 Arthur Zamarin
2022-07-14 19:01 Conrad Kostecki
2022-07-09 21:30 Conrad Kostecki
2022-07-09 21:30 Conrad Kostecki
2022-06-08  8:46 Agostino Sarubbo
2022-06-08  8:43 Agostino Sarubbo
2022-06-08  8:43 Agostino Sarubbo
2022-06-08  8:42 Agostino Sarubbo
2022-03-23  0:45 Sam James
2022-01-26  2:31 Thomas Deutschmann
2022-01-06  9:07 David Seifert
2021-11-16 18:27 Thomas Deutschmann
2021-11-03  1:45 Thomas Deutschmann
2021-09-22 12:16 Thomas Deutschmann
2021-09-01 14:17 Thomas Deutschmann
2021-08-03 11:03 Sam James
2021-07-25 20:09 Sam James
2021-07-06 23:44 Thomas Deutschmann
2021-06-25 19:32 Sam James
2021-06-18 12:39 Thomas Deutschmann
2021-05-28  9:01 Thomas Deutschmann
2021-05-27  6:55 Agostino Sarubbo
2021-05-26 17:38 Thomas Deutschmann
2021-05-26 15:56 Thomas Deutschmann
2021-05-26 15:56 Thomas Deutschmann
2021-05-02  9:54 Mikle Kolyada
2021-04-13 18:16 Thomas Deutschmann
2021-04-13 18:16 Thomas Deutschmann
2021-04-05 13:45 Mike Gilbert
2021-03-30 17:45 Thomas Deutschmann
2021-03-09 18:46 Thomas Deutschmann
2021-02-21  2:17 Thomas Deutschmann
2021-02-03 21:44 Ben Kohler
2020-12-15 21:43 Thomas Deutschmann
2020-12-02 23:15 Thomas Deutschmann
2020-11-24 19:38 Thomas Deutschmann
2020-10-29 16:49 Thomas Deutschmann
2020-09-30 18:05 Thomas Deutschmann
2020-08-13 23:47 Thomas Deutschmann
2020-08-13 23:46 Thomas Deutschmann
2020-08-13 23:46 Thomas Deutschmann
2020-08-11 15:51 Thomas Deutschmann
2020-07-07 17:08 Thomas Deutschmann
2020-06-02 20:53 Thomas Deutschmann
2020-05-26 18:41 Thomas Deutschmann
2020-05-26 18:41 Thomas Deutschmann
2020-04-29 21:14 Thomas Deutschmann
2020-04-29 21:14 Thomas Deutschmann
2020-04-29 21:14 Thomas Deutschmann
2020-04-14 19:39 Thomas Deutschmann
2020-04-11 21:11 Thomas Deutschmann
2020-04-11 21:11 Thomas Deutschmann
2020-04-11 21:11 Thomas Deutschmann
2020-04-11 21:11 Thomas Deutschmann
2020-03-05  2:58 Thomas Deutschmann
2020-03-05  2:58 Thomas Deutschmann
2020-03-03 23:49 Thomas Deutschmann
2020-03-03 23:47 Thomas Deutschmann
2020-01-22 21:49 Thomas Deutschmann
2019-12-31  3:19 Thomas Deutschmann
2019-12-24 15:20 Thomas Deutschmann
2019-11-19 14:45 Thomas Deutschmann
2019-10-22 21:01 Thomas Deutschmann
2019-10-12 18:14 Mikle Kolyada
2019-09-24 15:30 Thomas Deutschmann
2019-08-15 17:10 Thomas Deutschmann
2019-08-13 20:12 Thomas Deutschmann
2019-08-13 20:12 Thomas Deutschmann
2019-08-13 20:12 Thomas Deutschmann
2019-08-13 20:12 Thomas Deutschmann
2019-07-23 21:12 Thomas Deutschmann
2019-06-25 13:29 Thomas Deutschmann
2019-05-21 15:12 Thomas Deutschmann
2019-05-21 15:12 Thomas Deutschmann
2019-05-21 15:12 Thomas Deutschmann
2019-05-21 15:12 Thomas Deutschmann
2019-04-24 22:27 Thomas Deutschmann
2019-04-24 22:27 Thomas Deutschmann
2019-04-24 22:27 Thomas Deutschmann
2019-04-16 15:50 Thomas Deutschmann
2019-04-13  3:48 Thomas Deutschmann
2019-04-13  3:48 Thomas Deutschmann
2019-03-26 14:46 Thomas Deutschmann
2019-02-26 19:04 Thomas Deutschmann
2019-02-26 19:04 Thomas Deutschmann
2019-02-26 19:04 Thomas Deutschmann
2018-12-25 16:07 Thomas Deutschmann
2018-12-25 15:13 Thomas Deutschmann
2018-12-07 16:11 Thomas Deutschmann
2018-11-27 15:27 Thomas Deutschmann
2018-11-07 23:44 Thomas Deutschmann
2018-11-06 21:33 Mikle Kolyada
2018-11-06 16:04 Thomas Deutschmann
2018-10-02 16:04 Thomas Deutschmann
2018-10-02 16:04 Thomas Deutschmann
2018-09-25 15:44 Thomas Deutschmann
2018-08-28 16:02 Thomas Deutschmann
2018-07-31 20:43 Thomas Deutschmann
2018-07-24 18:16 Thomas Deutschmann
2018-07-20 19:44 Thomas Deutschmann
2018-07-20 19:44 Thomas Deutschmann
2018-07-09  0:26 Mikle Kolyada
2018-07-04  3:17 Thomas Deutschmann
2018-07-03 16:01 Thomas Deutschmann
2018-07-03 15:56 Thomas Deutschmann
2018-06-22 10:37 Thomas Deutschmann
2018-06-22 10:37 Thomas Deutschmann
2018-06-21 14:04 Thomas Deutschmann
2018-04-17 17:24 Thomas Deutschmann
2018-04-17 16:37 Thomas Deutschmann
2018-04-10 19:29 Thomas Deutschmann
2018-04-03 15:52 Thomas Deutschmann
2018-02-20 15:24 Thomas Deutschmann
2018-02-01 20:49 Thomas Deutschmann
2018-01-02  0:00 Mikle Kolyada
2017-12-26 16:41 Thomas Deutschmann
2017-12-26 16:41 Thomas Deutschmann
2017-12-26 16:34 Thomas Deutschmann
2017-11-21 16:04 Thomas Deutschmann
2017-10-30  0:01 Jonas Stein
2017-10-17 16:23 Thomas Deutschmann
2017-10-10 18:58 Thomas Deutschmann
2017-09-13 15:05 Fabian Groffen
2017-09-05 16:50 Thomas Deutschmann
2017-07-12  8:18 Agostino Sarubbo
2017-07-12  8:17 Agostino Sarubbo
2017-07-11 16:30 Thomas Deutschmann
2017-06-27 16:39 Thomas Deutschmann
2017-05-30 15:42 Thomas Deutschmann
2017-04-26  8:29 Thomas Deutschmann
2017-04-14 10:51 Thomas Deutschmann
2017-04-04 18:25 Thomas Deutschmann
2017-04-04 18:25 Thomas Deutschmann
2017-03-27 10:25 Thomas Deutschmann
2017-03-22 14:22 Agostino Sarubbo
2017-02-14 17:06 Thomas Deutschmann
2017-01-31 17:51 Thomas Deutschmann
2017-01-31 17:51 Thomas Deutschmann
2017-01-24 17:58 Thomas Deutschmann
2017-01-16 14:26 Thomas Deutschmann
2017-01-10 15:22 Agostino Sarubbo
2017-01-10 14:56 Agostino Sarubbo
2017-01-07 23:43 Thomas Deutschmann
2016-11-15 21:49 Thomas Deutschmann
2016-10-19  0:01 Thomas Deutschmann
2016-10-15 19:04 Thomas Deutschmann
2016-10-12 19:48 Thomas Deutschmann
2016-09-03 21:35 Thomas Deutschmann
2016-09-03 21:10 Thomas Deutschmann
2016-08-15 11:35 Thomas Deutschmann
2016-08-10 20:44 Thomas Deutschmann
2016-07-26  9:51 Lars Wendler
2016-07-26  9:51 Lars Wendler
2016-06-13 12:27 Agostino Sarubbo
2016-06-13 12:26 Agostino Sarubbo
2016-06-11 15:48 Kristian Fiskerstrand
2016-06-11 15:48 Kristian Fiskerstrand
2016-05-07 22:34 Patrice Clement
2016-05-04 14:19 Manuel Rüger
2016-05-04 14:19 Manuel Rüger
2016-04-24 18:16 Manuel Rüger
2016-04-24 16:03 Manuel Rüger
2016-04-10  0:43 Manuel Rüger
2016-03-31  3:44 Ian Delaney
2016-03-06 17:21 Manuel Rüger
2016-03-03 10:35 Jason Donenfeld
2016-03-03  7:44 Patrice Clement
2016-03-02 16:17 Jason Donenfeld
2016-02-07 22:04 Manuel Rüger
2016-02-07 22:04 Manuel Rüger
2016-02-06 15:31 Manuel Rüger
2016-02-06 14:59 Manuel Rüger
2016-02-03 21:49 Manuel Rüger
2016-02-03 21:49 Manuel Rüger
2016-02-03 21:13 Manuel Rüger
2016-02-03 16:54 Agostino Sarubbo
2016-02-03 16:53 Agostino Sarubbo
2016-02-02 19:19 Manuel Rüger
2016-02-02 19:19 Manuel Rüger
2015-11-19 21:31 Manuel Rüger
2015-11-07 12:45 Manuel Rüger
2015-10-27 20:12 Manuel Rüger
2015-10-15 22:08 Manuel Rüger
2015-10-15 22:08 Manuel Rüger
2015-08-31 19:30 Manuel Rüger
2015-08-31 19:28 Manuel Rüger

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=1581180773.3292fb668f9229f7a15ba3ef30ec596bcdfd286b.soap@gentoo \
    --to=soap@gentoo.org \
    --cc=gentoo-commits@lists.gentoo.org \
    --cc=gentoo-dev@lists.gentoo.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox