This web site, called Puszcza, is a central point for development, distribution and maintainance of software projects in gnu.org.ua domain.
For convenience, this site is available under several names:
- пуща.gnu.org.ua
- puszcza.gnu.org.ua
- ps.gnu.org.ua
It is not our intention to compete with savannah.gnu.org or gna.org. Rather, this site is intended to complement them.
If you would like to use these facilities to host your project, then go to the Register new project menu entry that is displayed after login.
If you wish to register yourself as a user, please send a request to puszcza-hackers at gnu.org.ua.
When using SSL for the first time, your browser may complain that it is unable to verify the certificate. To pacify it, download our X.509 root certificate. Most modern browsers will prompt you to install it when you click on the link above. Alternatively, if you are a Firefox user, you may consider using the Perspectives add-on, which securely bypasses security errors by verifying certificates.
While there are a few separate documents explaining the usage of the site, most of the documentation is included in the pages themselves (the place where you are most likely to need it).
The software used to run this site has been developed by the Savane project, the floating GNU logo is a GPL'ed image provided by Nevrax.
posted by gray, Thu 12 Mar 2015 02:07:09 PM EET - 0 replies
Second stage of maintenance works is scheduled for March, 14 at 11:00 UTC. During this stage, among other tasks, one of the storage devices will be replaced. Planned downtime is 2 hours.
posted by gray, Thu 12 Mar 2015 02:04:30 PM EET - 0 replies
Maintenance works on main puszcza server are scheduled on this Saturday, March 7. The server will be unavailable between 10:00 - 12:00 UTC.
posted by gray, Wed 19 Feb 2014 11:17:56 AM EET - 0 replies
An out-of-band notification service is created: https://pumprock.net/puszcza. Notices about outages (planned or unplanned) and other important information regarding Puszcza will be posted there. Please bookmark https://pumprock.net/puszcza and visit it for additional information in case you have problems accessing the service.
posted by gray, Tue 22 Oct 2013 08:54:51 AM EEST - 0 replies
The CA certificate for Puszcza has changed. The new certificate is available for download from http://ulysses.gnu.org.ua/upcaseg.crt. Its SHA1 fingerprint is:
78:6A:83:51:CA:E5:A7:12:65:6A:F8:95:07:AF:DC:50:69:B0:86:18
posted by gray, Sat 02 Feb 2013 03:51:46 PM EET - 0 replies
The new Puszcza server is operational now. The hosting is provided by Odessa National Academy of Telecommunications. I'd like to express my special appreciation and thanks to the ONAT sysadmin crew for their help and cooperation.
Please note that the server SSH keys have changed. The SSHv2 public key fingerprints are: ...
[Read more]
posted by gray, Thu 31 Jan 2013 02:30:32 PM EET - 0 replies
A new server for Puszcza and related services is going to be installed on 2013-02-02. To preserve consistency of the user data, all services will be switched to read-only mode between 2013-02-01 23:00 UTC and 2013-02-02 12:00 UTC. No major downtime is expected, although short interruptions of services are possible between 08:00 and 10:00 UTC on 2013-02-02.
posted by gray, Sat 21 Apr 2012 03:09:53 PM EEST - 0 replies
The server is finally online. This was the most critical outage it ever suffered and the longest downtime (7 days) in its history! Its recovery would have been impossible without the generous help from my friends: Adrian Baran, Andrew Bryndzak and Olena Malchik. I wish to thank them all here!
...
[Read more]
posted by gray, Fri 23 Sep 2011 11:45:41 PM EEST - 0 replies
Project administrators can now edit repository owner, description and about page, visible in cgit and gitweb browsing interfaces.
Additional (a.k.a. subordinate) repositories can also be created from the project's admin page.
See these detailed instructions for more information.
posted by gray, Sun 03 Jan 2010 12:53:20 PM EET - 0 replies
In response to the discovery of a potential security problem in Automake versions up to 1.11 (CVE-2009-4029), Puszcza now enforces a security verification procedure on distribution uploads. Any uploaded tarball whose top-level Makefile.in contains this security hole will be rejected. Please, make sure the tarballs you upload are created using Automake v. 1.11.1 (or later).
For more information on CVE-2009-4029, refer to http://thread.gmane.org/gmane.comp.sysutils.autotools.announce/131.
[23 news in archive]

