Better: Instead of depending on ttf-dejavu, move to recommends and add a note about

TrueType fonts to the description.

Also mention that the jbigi package also includes jcpuid on x86 platforms.
This commit is contained in:
kytv
2011-08-18 17:36:00 +00:00
parent c7b567891c
commit 674c202e88

10
debian/control vendored
View File

@@ -41,7 +41,7 @@ Priority: optional
Depends: ${misc:Depends}, ${shlibs:Depends} Depends: ${misc:Depends}, ${shlibs:Depends}
Homepage: http://www.i2p2.de/jbigi Homepage: http://www.i2p2.de/jbigi
Description: Java Big Integer library Description: Java Big Integer library
This Package contains the libjbigi JNI library This Package contains the libjbigi JNI library (and on x86 platforms, jcpuid).
. .
libjbigi is a math library that is part of the I2P installation. Use of this libjbigi is a math library that is part of the I2P installation. Use of this
library greatly enhances the efficiency of cryptographic algorithms, such as library greatly enhances the efficiency of cryptographic algorithms, such as
@@ -65,11 +65,10 @@ Package: i2p-router
Architecture: all Architecture: all
Section: net Section: net
Priority: optional Priority: optional
Depends: ${misc:Depends}, ${java:Depends}, ${shlibs:Depends}, default-jre-headless | java5-runtime-headless | java6-runtime-headless, Depends: ${misc:Depends}, ${java:Depends}, ${shlibs:Depends}, default-jre-headless | java5-runtime-headless | java6-runtime-headless
ttf-dejavu-core, ttf-dejavu-extra
Replaces: i2p ( << 0.8.6-5) Replaces: i2p ( << 0.8.6-5)
Breaks: i2p (<< 0.8.6-5) Breaks: i2p (<< 0.8.6-5)
Recommends: libjbigi-jni (>= ${source:Version}), libjbigi-jni (<< ${source:Version}.1~) Recommends: libjbigi-jni (>= ${source:Version}), libjbigi-jni (<< ${source:Version}.1~), ttf-dejavu
Suggests: tor, Suggests: tor,
i2p-messenger, i2p-messenger,
i2phex, i2phex,
@@ -92,3 +91,6 @@ Description: Load-balanced unspoofable packet switching network
applications can use to securely communicate. All data is wrapped with several applications can use to securely communicate. All data is wrapped with several
layers of encryption, and the network is both distributed and dynamic, with no layers of encryption, and the network is both distributed and dynamic, with no
trusted parties. trusted parties.
.
TrueType fonts (such as those provided in the package ttf-dejavu) are required
in order to generate graphs.