Package Details: network-ups-tools 2.7.4-5

Git Clone URL: (read-only)
Package Base: network-ups-tools
Description: NUT is a collection of programs for monitoring and administering UPS hardware
Upstream URL:
Licenses: GPL2
Submitter: Atsutane
Maintainer: The-Compiler
Last Packager: The-Compiler
Votes: 79
Popularity: 0.467475
First Submitted: 2010-09-21 19:10
Last Updated: 2017-04-28 20:10

Latest Comments

« First ‹ Previous 1 2 3 4 5 6 7 8 Next › Last »

rdoursenaud commented on 2015-05-05 14:12

You may be experiencing the same issue I had because of a systemd unit dependency change.
See my comments on

The-Compiler commented on 2015-04-27 06:59

Whoops! Fixed, thanks a lot!

max.bra commented on 2015-04-27 06:53

Hi The-Compiler,
you should modify

--with-systemdsystemunitdir=/lib/systemd/system \


--with-systemdsystemunitdir=/usr/lib/systemd/system \

or it will generate a conflict with filesystem package. /lib is a symlink.

zman0900 commented on 2015-02-11 17:18

I doubt it. The rhino binary here appears to be a used for one specific model of ups, and it has been in this package for some time. The rhino package has been around for over 6 years too, so I assume this conflict has existed for a long time. I just happened to notice it now because I tried and failed to install rhino because of the file conflict.

fdservices commented on 2015-02-11 15:28

Is that why my UPS software stopped communicating with my UPS today?

zman0900 commented on 2015-02-11 08:33

I just discovered that /usr/bin/rhino in this package conflicts with extra/rhino package. Not sure what if anything can actually be done about this.

TheRealSoup commented on 2014-02-27 17:22

All good now.
Thank you for your awesome response.

The-Compiler commented on 2014-02-27 11:58

I guess you're getting this, right?

==> Verifying source file signatures with gpg...
nut-2.7.1.tar.gz ... FAILED (unknown public key DB6414CA204DDF1B)
==> WARNING: Warnings have occurred while verifying the signatures.
Please make sure you really trust them.

This is because I added GPG signature verification to the package. You basically have three options:

- Ignore the warning, then you'll not benifit from the signature verification but nothing changes for you compared to the package before.

- Configure GPG to auto-fetch keys, by setting "keyserver = ..." and "keyserver-options = auto-key-retrieve" in your ~/.gnupg/gpg.conf, then it'll fetch the public key and verify it automatically.

- Fetch the key yourself by doing:
$ gpg --fetch-keys

TheRealSoup commented on 2014-02-27 09:37

Anyone else getting this?

==> Verifying source file signatures with gpg...
nut-2.7.1.tar.gz ... FAILED

The-Compiler commented on 2014-02-24 12:25

Adopted and updated to 2.7.1. I adopted some of zman0900's fixes, although I won't include arm* as architecture as it's not an official architecture.