[ubuntu/karmic-proposed] cryptsetup 2:1.0.6+20090405.svn49-1ubuntu7.2 (Accepted)
Steve Langasek
steve.langasek at ubuntu.com
Wed Dec 23 10:16:17 GMT 2009
cryptsetup (2:1.0.6+20090405.svn49-1ubuntu7.2) karmic-proposed; urgency=low
* Depend on watershed.
* cryptdisks.functions: do_tmp should mount under /var/run/cryptsetup for
changing the permissions of the filesystem root, not directly on /tmp,
since mounting on /tmp a) is racy, b) confuses mountall something fierce.
LP: #475936.
cryptsetup (2:1.0.6+20090405.svn49-1ubuntu7.1) karmic-proposed; urgency=low
* debian/cryptdisks.functions:
- wrap the call to /lib/cryptsetup/askpass with watershed, to make sure
we only ever have one of these running at a time; otherwise multiple
invocations could steal each other's input and/or write over each
other's output
- new function, crypttab_start_one_disk, to look for the named source
device in /etc/crypttab (by device name, UUID, or label) and start it
if configured to do so
* debian/cryptdisks-udev.upstart: new, additional upstart job run once for
each block device, using the new crypttab_start_one_disk function,
triggered by udev; this doesn't eliminate the possibility of a race with
gdm when the decrypted volume isn't a 'bootwait' mount point (since gdm
kills usplash), but it does eliminate the race between udev and
cryptsetup. LP: #454898.
The other cryptdisks-enable job is still needed as well, to give us the
second pass needed to cover devices that are decrypted using keys stored
on other encrypted disks. LP: #443980.
* debian/cryptdisk.functions: initially create the device under a temporary
name and rename it only at the end using 'dmsetup rename', to ensure that
upstart/mountall doesn't see our device before it's ready to go.
LP: #475936.
* Make the 'start' action of the init script a no-op, this should be
handled entirely by the upstart job now; ad remove any symlinks from
/etc/rcS.d on upgrade. LP: #473615.
Date: Tue, 22 Dec 2009 23:29:32 +0000
Changed-By: Steve Langasek <steve.langasek at ubuntu.com>
Maintainer: Ubuntu Core Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Signed-By: Steve Langasek <steve.langasek at canonical.com>
https://edge.launchpad.net/ubuntu/karmic/+source/cryptsetup/2:1.0.6+20090405.svn49-1ubuntu7.2
-------------- next part --------------
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Format: 1.8
Date: Tue, 22 Dec 2009 23:29:32 +0000
Source: cryptsetup
Binary: cryptsetup cryptsetup-udeb
Architecture: source
Version: 2:1.0.6+20090405.svn49-1ubuntu7.2
Distribution: karmic-proposed
Urgency: low
Maintainer: Ubuntu Core Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Changed-By: Steve Langasek <steve.langasek at ubuntu.com>
Description:
cryptsetup - configures encrypted block devices
cryptsetup-udeb - configures encrypted block devices (udeb)
Changes:
cryptsetup (2:1.0.6+20090405.svn49-1ubuntu7.2) karmic-proposed; urgency=low
.
* Depend on watershed.
* cryptdisks.functions: do_tmp should mount under /var/run/cryptsetup for
changing the permissions of the filesystem root, not directly on /tmp,
since mounting on /tmp a) is racy, b) confuses mountall something fierce.
LP: #475936.
.
cryptsetup (2:1.0.6+20090405.svn49-1ubuntu7.1) karmic-proposed; urgency=low
.
* debian/cryptdisks.functions:
- wrap the call to /lib/cryptsetup/askpass with watershed, to make sure
we only ever have one of these running at a time; otherwise multiple
invocations could steal each other's input and/or write over each
other's output
- new function, crypttab_start_one_disk, to look for the named source
device in /etc/crypttab (by device name, UUID, or label) and start it
if configured to do so
* debian/cryptdisks-udev.upstart: new, additional upstart job run once for
each block device, using the new crypttab_start_one_disk function,
triggered by udev; this doesn't eliminate the possibility of a race with
gdm when the decrypted volume isn't a 'bootwait' mount point (since gdm
kills usplash), but it does eliminate the race between udev and
cryptsetup. LP: #454898.
The other cryptdisks-enable job is still needed as well, to give us the
second pass needed to cover devices that are decrypted using keys stored
on other encrypted disks. LP: #443980.
* debian/cryptdisk.functions: initially create the device under a temporary
name and rename it only at the end using 'dmsetup rename', to ensure that
upstart/mountall doesn't see our device before it's ready to go.
LP: #475936.
* Make the 'start' action of the init script a no-op, this should be
handled entirely by the upstart job now; ad remove any symlinks from
/etc/rcS.d on upgrade. LP: #473615.
Checksums-Sha1:
2be565ad25e1f62d45ed02bb77a59fc7b15b85a3 2262 cryptsetup_1.0.6+20090405.svn49-1ubuntu7.2.dsc
f488244bd6c86bf60414f385ecc339f794f38871 445439 cryptsetup_1.0.6+20090405.svn49-1ubuntu7.2.diff.gz
Checksums-Sha256:
31fb9b944113b2fcab89be4e7fe2df5a7643c4f2a75b4bbebc90b3f76ff67ed4 2262 cryptsetup_1.0.6+20090405.svn49-1ubuntu7.2.dsc
0756f6af5f84fa1a2d0541a5a52ee0df9dc240897e9b4b4ffb8a40bb8e3ab731 445439 cryptsetup_1.0.6+20090405.svn49-1ubuntu7.2.diff.gz
Files:
064153f338747b2f3a25c78900c50d58 2262 admin optional cryptsetup_1.0.6+20090405.svn49-1ubuntu7.2.dsc
f7ff4b1aeb062d48f3471b9142c10684 445439 admin optional cryptsetup_1.0.6+20090405.svn49-1ubuntu7.2.diff.gz
Launchpad-Bugs-Fixed: 443980 454898 473615 475936 475936
Original-Maintainer: Debian Cryptsetup Team <pkg-cryptsetup-devel at lists.alioth.debian.org>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)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=sr/C
-----END PGP SIGNATURE-----
More information about the Karmic-changes
mailing list