Show feedback again
114 registered users
96 hosted projects
  + 0 registrations pending

Help Wanted

This web site, called Puszcza, is a central point for development, distribution and maintainance of software projects in gnu.org.ua domain.

For convenience, this site is available under several names:

  • пуща.gnu.org.ua
  • puszcza.gnu.org.ua
  • ps.gnu.org.ua

It is not our intention to compete with savannah.gnu.org or gna.org. Rather, this site is intended to complement them.

If you would like to use these facilities to host your project, then go to the Register new project menu entry that is displayed after login.

If you wish to register yourself as a user, please send a request to puszcza-hackers at gnu.org.ua.

When using SSL for the first time, your browser may complain that it is unable to verify the certificate. To pacify it, download our X.509 root certificate. Most modern browsers will prompt you to install it when you click on the link above. Alternatively, if you are a Firefox user, you may consider using the Perspectives add-on, which securely bypasses security errors by verifying certificates.

While there are a few separate documents explaining the usage of the site, most of the documentation is included in the pages themselves (the place where you are most likely to need it).

The software used to run this site has been developed by the Savane project, the floating GNU logo is a GPL'ed image provided by Nevrax.

 

Out-of-band notification service
     posted by gray, Wed 19 Feb 2014 11:17:56 AM EET - 0 replies

An out-of-band notification service is created: https://pumprock.net/puszcza. Notices about outages (planned or unplanned) and other important information regarding Puszcza will be posted there. Please bookmark https://pumprock.net/puszcza and visit it for additional information in case you have problems accessing the service.

New SSL certificate
     posted by gray, Tue 22 Oct 2013 08:54:51 AM EEST - 4 replies

The CA certificate for Puszcza has changed. The new certificate is available for download from http://ulysses.gnu.org.ua/upcaseg.crt. Its SHA1 fingerprint is:

78:6A:83:51:CA:E5:A7:12:65:6A:F8:95:07:AF:DC:50:69:B0:86:18

New server installed
     posted by gray, Sat 02 Feb 2013 03:51:46 PM EET - 4 replies

The new Puszcza server is operational now. The hosting is provided by Odessa National Academy of Telecommunications. I'd like to express my special appreciation and thanks to the ONAT sysadmin crew for their help and cooperation.

Please note that the server SSH keys have changed. The SSHv2 public key fingerprints are: ...


[Read more]
New server installation.
     posted by gray, Thu 31 Jan 2013 02:30:32 PM EET - 8 replies

A new server for Puszcza and related services is going to be installed on 2013-02-02. To preserve consistency of the user data, all services will be switched to read-only mode between 2013-02-01 23:00 UTC and 2013-02-02 12:00 UTC. No major downtime is expected, although short interruptions of services are possible between 08:00 and 10:00 UTC on 2013-02-02.

Puszcza is online again!
     posted by gray, Sat 21 Apr 2012 03:09:53 PM EEST - 24 replies

The server is finally online. This was the most critical outage it ever suffered and the longest downtime (7 days) in its history! Its recovery would have been impossible without the generous help from my friends: Adrian Baran, Andrew Bryndzak and Olena Malchik. I wish to thank them all here! ...


[Read more]
Git Repository Description and Subordinate Repositories
     posted by gray, Fri 23 Sep 2011 11:45:41 PM EEST - 6 replies

Project administrators can now edit repository owner, description and about page, visible in cgit and gitweb browsing interfaces.

Additional (a.k.a. subordinate) repositories can also be created from the project's admin page.

See these detailed instructions for more information.

Upload security verification
     posted by gray, Sun 03 Jan 2010 12:53:20 PM EET - 4 replies

In response to the discovery of a potential security problem in Automake versions up to 1.11 (CVE-2009-4029), Puszcza now enforces a security verification procedure on distribution uploads. Any uploaded tarball whose top-level Makefile.in contains this security hole will be rejected. Please, make sure the tarballs you upload are created using Automake v. 1.11.1 (or later).

For more information on CVE-2009-4029, refer to http://thread.gmane.org/gmane.comp.sysutils.autotools.announce/131.

Gnupload documentation
     posted by gray, Sat 24 Jan 2009 04:10:05 PM EET - 9 replies

An improved version of gnupload script is available for download. The documentation is available online.

Cgit
     posted by gray, Tue 20 Jan 2009 08:21:36 PM EET - 14 replies

A new git browser, called cgit, is installed at http://git.gnu.org.ua/cgit. It is written C and has a number of advantages over the traditional gitweb. In particular, it is much faster and uses less resources.


[21 news in archive]

Back to the top


Powered by Savane 3.1-cleanup+gray