I2P Address: [http://git.idk.i2p]

Skip to content
Snippets Groups Projects
Commit 8cf241f6 authored by zzz's avatar zzz
Browse files

Debian: Remove fonts-dejavu as package recommendation,

not needed for rrd4j with our patch
parent 6774af69
No related branches found
No related tags found
No related merge requests found
...@@ -85,7 +85,7 @@ Depends: ${misc:Depends}, ${java:Depends}, ${shlibs:Depends}, ...@@ -85,7 +85,7 @@ Depends: ${misc:Depends}, ${java:Depends}, ${shlibs:Depends},
famfamfam-flag-png famfamfam-flag-png
Replaces: i2p ( << 0.8.6-5) Replaces: i2p ( << 0.8.6-5)
Breaks: i2p (<< 0.8.6-5) Breaks: i2p (<< 0.8.6-5)
Recommends: libjbigi-jni, fonts-dejavu Recommends: libjbigi-jni
Suggests: apparmor Suggests: apparmor
,privoxy ,privoxy
,syndie ,syndie
...@@ -94,6 +94,3 @@ Description: Invisible Internet Project (I2P) - Router ...@@ -94,6 +94,3 @@ Description: Invisible Internet Project (I2P) - Router
applications can use to securely communicate. All data is wrapped with several applications can use to securely communicate. All data is wrapped with several
layers of encryption, and the network is both distributed and dynamic, with no layers of encryption, and the network is both distributed and dynamic, with no
trusted parties. trusted parties.
.
TrueType fonts (such as those provided in the package fonts-dejavu) are required
in order to generate graphs.
...@@ -79,7 +79,7 @@ Depends: ${misc:Depends}, ${java:Depends}, ${shlibs:Depends}, ...@@ -79,7 +79,7 @@ Depends: ${misc:Depends}, ${java:Depends}, ${shlibs:Depends},
glassfish-javaee glassfish-javaee
Replaces: i2p ( << 0.8.6-5) Replaces: i2p ( << 0.8.6-5)
Breaks: i2p (<< 0.8.6-5) Breaks: i2p (<< 0.8.6-5)
Recommends: libjbigi-jni, fonts-dejavu Recommends: libjbigi-jni
Suggests: apparmor Suggests: apparmor
,privoxy ,privoxy
,syndie ,syndie
...@@ -88,6 +88,3 @@ Description: Invisible Internet Project (I2P) - Router ...@@ -88,6 +88,3 @@ Description: Invisible Internet Project (I2P) - Router
applications can use to securely communicate. All data is wrapped with several applications can use to securely communicate. All data is wrapped with several
layers of encryption, and the network is both distributed and dynamic, with no layers of encryption, and the network is both distributed and dynamic, with no
trusted parties. trusted parties.
.
TrueType fonts (such as those provided in the package fonts-dejavu) are required
in order to generate graphs.
...@@ -83,7 +83,7 @@ Depends: ${misc:Depends}, ${java:Depends}, ${shlibs:Depends}, ...@@ -83,7 +83,7 @@ Depends: ${misc:Depends}, ${java:Depends}, ${shlibs:Depends},
famfamfam-flag-png famfamfam-flag-png
Replaces: i2p ( << 0.8.6-5) Replaces: i2p ( << 0.8.6-5)
Breaks: i2p (<< 0.8.6-5) Breaks: i2p (<< 0.8.6-5)
Recommends: libjbigi-jni, fonts-dejavu Recommends: libjbigi-jni
Suggests: apparmor Suggests: apparmor
,privoxy ,privoxy
,syndie ,syndie
...@@ -92,6 +92,3 @@ Description: Invisible Internet Project (I2P) - Router ...@@ -92,6 +92,3 @@ Description: Invisible Internet Project (I2P) - Router
applications can use to securely communicate. All data is wrapped with several applications can use to securely communicate. All data is wrapped with several
layers of encryption, and the network is both distributed and dynamic, with no layers of encryption, and the network is both distributed and dynamic, with no
trusted parties. trusted parties.
.
TrueType fonts (such as those provided in the package fonts-dejavu) are required
in order to generate graphs.
...@@ -80,7 +80,7 @@ Depends: ${misc:Depends}, ${java:Depends}, ${shlibs:Depends}, ...@@ -80,7 +80,7 @@ Depends: ${misc:Depends}, ${java:Depends}, ${shlibs:Depends},
glassfish-javaee glassfish-javaee
Replaces: i2p ( << 0.8.6-5) Replaces: i2p ( << 0.8.6-5)
Breaks: i2p (<< 0.8.6-5) Breaks: i2p (<< 0.8.6-5)
Recommends: libjbigi-jni, fonts-dejavu Recommends: libjbigi-jni
Suggests: apparmor Suggests: apparmor
,privoxy ,privoxy
,syndie ,syndie
...@@ -89,6 +89,3 @@ Description: Router for I2P ...@@ -89,6 +89,3 @@ Description: Router for I2P
applications can use to securely communicate. All data is wrapped with several applications can use to securely communicate. All data is wrapped with several
layers of encryption, and the network is both distributed and dynamic, with no layers of encryption, and the network is both distributed and dynamic, with no
trusted parties. trusted parties.
.
TrueType fonts (such as those provided in the package fonts-dejavu) are required
in order to generate graphs.
...@@ -87,7 +87,7 @@ Depends: ${misc:Depends}, ${java:Depends}, ${shlibs:Depends}, ...@@ -87,7 +87,7 @@ Depends: ${misc:Depends}, ${java:Depends}, ${shlibs:Depends},
famfamfam-flag-png famfamfam-flag-png
Replaces: i2p ( << 0.8.6-5) Replaces: i2p ( << 0.8.6-5)
Breaks: i2p (<< 0.8.6-5) Breaks: i2p (<< 0.8.6-5)
Recommends: libjbigi-jni, fonts-dejavu Recommends: libjbigi-jni
Suggests: apparmor Suggests: apparmor
,privoxy ,privoxy
,syndie ,syndie
...@@ -96,6 +96,3 @@ Description: Invisible Internet Project (I2P) - Router ...@@ -96,6 +96,3 @@ Description: Invisible Internet Project (I2P) - Router
applications can use to securely communicate. All data is wrapped with several applications can use to securely communicate. All data is wrapped with several
layers of encryption, and the network is both distributed and dynamic, with no layers of encryption, and the network is both distributed and dynamic, with no
trusted parties. trusted parties.
.
TrueType fonts (such as those provided in the package fonts-dejavu) are required
in order to generate graphs.
...@@ -90,7 +90,7 @@ Depends: ${misc:Depends}, ${java:Depends}, ${shlibs:Depends}, ...@@ -90,7 +90,7 @@ Depends: ${misc:Depends}, ${java:Depends}, ${shlibs:Depends},
sensible-utils sensible-utils
Replaces: i2p ( << 0.8.6-5) Replaces: i2p ( << 0.8.6-5)
Breaks: i2p (<< 0.8.6-5) Breaks: i2p (<< 0.8.6-5)
Recommends: libjbigi-jni, fonts-dejavu Recommends: libjbigi-jni
Suggests: apparmor Suggests: apparmor
,privoxy ,privoxy
,syndie ,syndie
...@@ -99,6 +99,3 @@ Description: Invisible Internet Project (I2P) - Router ...@@ -99,6 +99,3 @@ Description: Invisible Internet Project (I2P) - Router
applications can use to securely communicate. All data is wrapped with several applications can use to securely communicate. All data is wrapped with several
layers of encryption, and the network is both distributed and dynamic, with no layers of encryption, and the network is both distributed and dynamic, with no
trusted parties. trusted parties.
.
TrueType fonts (such as those provided in the package fonts-dejavu) are required
in order to generate graphs.
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment