summaryrefslogtreecommitdiff
path: root/debian/control
blob: 537293a1733d3a6c3e78f069bbd6583a1547478d (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
Source: bitmask
Section: misc
Priority: extra
Maintainer: Ben Carrillo <ben@futeisha.org>
Standards-Version: 3.9.4
Uploaders: Micah Anderson <micah@debian.org>
Homepage: https://leap.se
#Vcs-Git: git://git.debian.org/python-applications-team/leap-client.git
#Vcs-Browser: http://git.debian.org/?p=python-applications-team/leap-client.git;a=summary
Build-Depends: debhelper (>= 8.0.0), python-support, python (>=2.6), python-setuptools,
               pep8,
               python-sphinx (>= 1.0.7+dfsg), docutils-common, python-nose, python-mock,
               python-requests, python-srp, python-crypto, python-keyring, python-xdg,
               python-jsonschema (>= 0.7.0), python-psutil, python-openssl,
               python-dateutil, python-argparse, python-netifaces, pyside-tools,
               xvfb, xauth
X-Python-Version: >= 2.6

Package: bitmask
Architecture: all
Depends:
  ${misc:Depends}, ${python:Depends},
  python-openssl,
  python-crypto,
  python-keyring (>= 0.9.2),
  python-srp,
  python-dateutil,
  python-argparse,
  python-psutil,
  python-netifaces,
  python-requests,
  python-xdg,
  python-jsonschema (>= 0.7.0),
  python-setuptools,
  pep8,
  openvpn,
#polkit-gnome should not be a hard dep, but a recommends
  policykit-1-gnome,
  python-pyside, 
  python-pyside.qtcore, 
  python-pyside.qtgui,
  python-leap-common,
  leap-mail,
  soledad-client
Recommends: xul-ext-bitmask
Suggests: resolvconf
Conflicts: autoresolv
Enhances: openvpn
Description: Provides the desktop client for the LEAP Encryption Access Project Platform.
 LEAP (LEAP Encryption Access Project) develops a plan to secure everyday
 communication, breaking down into discrete services.
 .
 The client for the current phase gives support to the EIP Service. The
 Encrypted Internet Proxy) provides circumvention, location anonymization, and
 traffic encryption in a hassle-free, automatically self-configuring fashion,
 and has an enhanced level of security.