forked from I2P_Developers/i2p.i2p
Debian: Update package descriptions, allow Java 9
This commit is contained in:
@ -33,7 +33,7 @@ Depends: ${java:Depends}, ${shlibs:Depends},
|
||||
libjbigi-jni,
|
||||
lsb-base,
|
||||
service-wrapper
|
||||
Description: Load-balanced unspoofable packet switching network
|
||||
Description: I2P anonymous network
|
||||
I2P is an anonymizing network, offering a simple layer that identity-sensitive
|
||||
applications can use to securely communicate. All data is wrapped with several
|
||||
layers of encryption, and the network is both distributed and dynamic, with no
|
||||
@ -48,7 +48,7 @@ Section: java
|
||||
Priority: optional
|
||||
Depends: ${shlibs:Depends}, i2p-router
|
||||
Homepage: https://geti2p.net/
|
||||
Description: Java Big Integer library
|
||||
Description: I2P libjbigi library
|
||||
This Package contains the libjbigi JNI library (and on x86 platforms, jcpuid).
|
||||
.
|
||||
libjbigi is a math library that is part of the I2P installation. Use of this
|
||||
@ -61,7 +61,7 @@ Architecture: all
|
||||
Section: doc
|
||||
Depends: ${misc:Depends}
|
||||
Suggests: i2p, default-jdk-doc
|
||||
Description: Documentation for I2P
|
||||
Description: I2P developer documentation
|
||||
I2P is an anonymizing network, offering a simple layer that identity-sensitive
|
||||
applications can use to securely communicate. All data is wrapped with several
|
||||
layers of encryption, and the network is both distributed and dynamic, with no
|
||||
@ -100,7 +100,7 @@ Suggests: tor
|
||||
,syndie
|
||||
,www-browser
|
||||
,xul-ext-torbutton
|
||||
Description: Load-balanced unspoofable packet switching network
|
||||
Description: I2P router
|
||||
I2P is an anonymizing network, offering a simple layer that identity-sensitive
|
||||
applications can use to securely communicate. All data is wrapped with several
|
||||
layers of encryption, and the network is both distributed and dynamic, with no
|
||||
|
@ -29,7 +29,7 @@ Depends: ${java:Depends}, ${shlibs:Depends},
|
||||
libjbigi-jni,
|
||||
lsb-base,
|
||||
service-wrapper
|
||||
Description: Load-balanced unspoofable packet switching network
|
||||
Description: I2P anonymous network
|
||||
I2P is an anonymizing network, offering a simple layer that identity-sensitive
|
||||
applications can use to securely communicate. All data is wrapped with several
|
||||
layers of encryption, and the network is both distributed and dynamic, with no
|
||||
@ -44,7 +44,7 @@ Section: java
|
||||
Priority: optional
|
||||
Depends: ${shlibs:Depends}, i2p-router
|
||||
Homepage: http://www.i2p2.de/jbigi
|
||||
Description: Java Big Integer library
|
||||
Description: I2P libjbigi library
|
||||
This Package contains the libjbigi JNI library (and on x86 platforms, jcpuid).
|
||||
.
|
||||
libjbigi is a math library that is part of the I2P installation. Use of this
|
||||
@ -57,7 +57,7 @@ Architecture: all
|
||||
Section: doc
|
||||
Depends: ${misc:Depends}
|
||||
Suggests: i2p, default-jdk-doc
|
||||
Description: Documentation for I2P
|
||||
Description: I2P developer documentation
|
||||
I2P is an anonymizing network, offering a simple layer that identity-sensitive
|
||||
applications can use to securely communicate. All data is wrapped with several
|
||||
layers of encryption, and the network is both distributed and dynamic, with no
|
||||
@ -91,7 +91,7 @@ Suggests: tor
|
||||
,syndie
|
||||
,www-browser
|
||||
,xul-ext-torbutton
|
||||
Description: Load-balanced unspoofable packet switching network
|
||||
Description: I2P router
|
||||
I2P is an anonymizing network, offering a simple layer that identity-sensitive
|
||||
applications can use to securely communicate. All data is wrapped with several
|
||||
layers of encryption, and the network is both distributed and dynamic, with no
|
||||
|
10
debian/control
vendored
10
debian/control
vendored
@ -32,7 +32,7 @@ Depends: ${java:Depends}, ${shlibs:Depends},
|
||||
libjbigi-jni,
|
||||
lsb-base,
|
||||
service-wrapper
|
||||
Description: Load-balanced unspoofable packet switching network
|
||||
Description: I2P anonymous network
|
||||
I2P is an anonymizing network, offering a simple layer that identity-sensitive
|
||||
applications can use to securely communicate. All data is wrapped with several
|
||||
layers of encryption, and the network is both distributed and dynamic, with no
|
||||
@ -47,7 +47,7 @@ Section: java
|
||||
Priority: optional
|
||||
Depends: ${shlibs:Depends}, i2p-router
|
||||
Homepage: https://geti2p.net/
|
||||
Description: Java Big Integer library
|
||||
Description: I2P libjbigi library
|
||||
This Package contains the libjbigi JNI library (and on x86 platforms, jcpuid).
|
||||
.
|
||||
libjbigi is a math library that is part of the I2P installation. Use of this
|
||||
@ -60,7 +60,7 @@ Architecture: all
|
||||
Section: doc
|
||||
Depends: ${misc:Depends}
|
||||
Suggests: i2p, default-jdk-doc
|
||||
Description: Documentation for I2P
|
||||
Description: I2P developer documentation
|
||||
I2P is an anonymizing network, offering a simple layer that identity-sensitive
|
||||
applications can use to securely communicate. All data is wrapped with several
|
||||
layers of encryption, and the network is both distributed and dynamic, with no
|
||||
@ -73,7 +73,7 @@ Architecture: all
|
||||
Section: net
|
||||
Priority: optional
|
||||
Depends: ${misc:Depends}, ${java:Depends}, ${shlibs:Depends},
|
||||
openjdk-8-jre-headless | openjdk-7-jre-headless | default-jre-headless | java8-runtime-headless | java7-runtime-headless,
|
||||
openjdk-9-jre-headless | openjdk-8-jre-headless | openjdk-7-jre-headless | default-jre-headless | java9-runtime-headless | java8-runtime-headless | java7-runtime-headless,
|
||||
libecj-java,
|
||||
geoip-database,
|
||||
gettext-base,
|
||||
@ -100,7 +100,7 @@ Suggests: tor
|
||||
,syndie
|
||||
,www-browser
|
||||
,xul-ext-torbutton
|
||||
Description: Load-balanced unspoofable packet switching network
|
||||
Description: I2P router
|
||||
I2P is an anonymizing network, offering a simple layer that identity-sensitive
|
||||
applications can use to securely communicate. All data is wrapped with several
|
||||
layers of encryption, and the network is both distributed and dynamic, with no
|
||||
|
Reference in New Issue
Block a user