[ubuntu/precise] ecryptfs-utils 94-0ubuntu1 (Accepted)

Dustin Kirkland dustin.kirkland at gazzang.com
Wed Dec 14 18:00:19 UTC 2011


ecryptfs-utils (94-0ubuntu1) precise; urgency=low

  [ Dustin Kirkland ]
  * scripts/release.sh:
    - fix release script
    - bump ubuntu release
  * doc/manpage/ecryptfs-recover-private.1, src/utils/ecryptfs-migrate-
    home (properties changed: -x to +x), src/utils/ecryptfs-recover-
    private:
    - add a --rw option for ecryptfs-recover-private
  * src/utils/ecryptfs-migrate-home: LP: #820416
    - show progress on rsync
  * debian/ecryptfs-utils.ecryptfs-utils-restore.upstart,
    debian/ecryptfs-utils.ecryptfs-utils-save.upstart,
    src/utils/ecryptfs-migrate-home,
    src/utils/ecryptfs-setup-private: LP: #883238
    - remove 2 upstart scripts, which attempted to "save" users who didn't
      login after migrating their home; instead, we now require the root
      user to enter user passwords at migration time
  * debian/copyright, debian/ecryptfs-utils.ecryptfs-utils-
    restore.upstart, debian/ecryptfs-utils.ecryptfs-utils-save.upstart,
    doc/manpage/ecryptfs.7, doc/manpage/ecryptfs-add-passphrase.1,
    doc/manpage/ecryptfs-generate-tpm-key.1, doc/manpage/ecryptfs-
    insert-wrapped-passphrase-into-keyring.1, doc/manpage/ecryptfs-
    mount-private.1, doc/manpage/ecryptfs-recover-private.1,
    doc/manpage/ecryptfs-rewrap-passphrase.1, doc/manpage/ecryptfs-
    rewrite-file.1, doc/manpage/ecryptfs-setup-private.1,
    doc/manpage/ecryptfs-setup-swap.1, doc/manpage/ecryptfs-stat.1,
    doc/manpage/ecryptfs-umount-private.1, doc/manpage/ecryptfs-unwrap-
    passphrase.1, doc/manpage/ecryptfs-wrap-passphrase.1,
    doc/manpage/fr/ecryptfs-add-passphrase.1, doc/manpage/fr/ecryptfs-
    generate-tpm-key.1, doc/manpage/fr/ecryptfs-insert-wrapped-
    passphrase-into-keyring.1, doc/manpage/fr/ecryptfs-mount-private.1,
    doc/manpage/fr/ecryptfs-rewrap-passphrase.1,
    doc/manpage/fr/ecryptfs-setup-private.1, doc/manpage/fr/ecryptfs-
    umount-private.1, doc/manpage/fr/ecryptfs-unwrap-passphrase.1,
    doc/manpage/fr/ecryptfs-wrap-passphrase.1, doc/manpage/fr/ecryptfs-
    zombie-kill.1, doc/manpage/fr/ecryptfs-zombie-list.1,
    doc/manpage/mount.ecryptfs_private.1, doc/manpage/pam_ecryptfs.8,
    doc/manpage/umount.ecryptfs.8,
    doc/manpage/umount.ecryptfs_private.1,
    src/pam_ecryptfs/pam_ecryptfs.c,
    src/utils/ecryptfs_add_passphrase.c,
    src/utils/ecryptfs_insert_wrapped_passphrase_into_keyring.c,
    src/utils/ecryptfs-migrate-home, src/utils/ecryptfs-mount-private,
    src/utils/ecryptfs-recover-private,
    src/utils/ecryptfs_rewrap_passphrase.c, src/utils/ecryptfs-rewrite-
    file, src/utils/ecryptfs-setup-private, src/utils/ecryptfs-setup-
    swap, src/utils/ecryptfs-umount-private,
    src/utils/ecryptfs_unwrap_passphrase.c,
    src/utils/ecryptfs_wrap_passphrase.c:
    - update some email addresses, moving kirkland at canonical.com ->
      kirkland at ubuntu.com (which I can still read)
  * src/libecryptfs/key_management.c: LP: #715066
    - fix 2 places where we were handling
      ecryptfs_add_passphrase_key_to_keyring() inconsistently
    - if we're trying to add a key to the keyring, and it's already there,
      treat that as "success"
  * debian/control:
    - ecryptfs-setup-swap is strongly recommended, which depends on
      cryptsetup; so promote cryptsetup from suggests -> recommends
  * precise

  [ Stephan Ritscher and Tyler Hicks ]
  * src/libecryptfs/cmd_ln_parser.c: LP: #683535
    - fix passphrase_passwd_fd for pipes
    - handle memory allocation failures
    - free memory in error paths

  [ Arfrever Frehtes Taifersar Arahesis ]
  * configure.ac: LP: #893327
    - no need to check for python, if --disable-pywrap is passed

Date: Wed, 14 Dec 2011 11:49:10 -0600
Changed-By: Dustin Kirkland <dustin.kirkland at gazzang.com>
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
https://launchpad.net/ubuntu/precise/+source/ecryptfs-utils/94-0ubuntu1
-------------- next part --------------
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Wed, 14 Dec 2011 11:49:10 -0600
Source: ecryptfs-utils
Binary: ecryptfs-utils libecryptfs0 libecryptfs-dev
Architecture: source
Version: 94-0ubuntu1
Distribution: precise
Urgency: low
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Changed-By: Dustin Kirkland <dustin.kirkland at gazzang.com>
Description: 
 ecryptfs-utils - ecryptfs cryptographic filesystem (utilities)
 libecryptfs-dev - ecryptfs cryptographic filesystem (development)
 libecryptfs0 - ecryptfs cryptographic filesystem (library)
Launchpad-Bugs-Fixed: 683535 715066 820416 883238 893327
Changes: 
 ecryptfs-utils (94-0ubuntu1) precise; urgency=low
 .
   [ Dustin Kirkland ]
   * scripts/release.sh:
     - fix release script
     - bump ubuntu release
   * doc/manpage/ecryptfs-recover-private.1, src/utils/ecryptfs-migrate-
     home (properties changed: -x to +x), src/utils/ecryptfs-recover-
     private:
     - add a --rw option for ecryptfs-recover-private
   * src/utils/ecryptfs-migrate-home: LP: #820416
     - show progress on rsync
   * debian/ecryptfs-utils.ecryptfs-utils-restore.upstart,
     debian/ecryptfs-utils.ecryptfs-utils-save.upstart,
     src/utils/ecryptfs-migrate-home,
     src/utils/ecryptfs-setup-private: LP: #883238
     - remove 2 upstart scripts, which attempted to "save" users who didn't
       login after migrating their home; instead, we now require the root
       user to enter user passwords at migration time
   * debian/copyright, debian/ecryptfs-utils.ecryptfs-utils-
     restore.upstart, debian/ecryptfs-utils.ecryptfs-utils-save.upstart,
     doc/manpage/ecryptfs.7, doc/manpage/ecryptfs-add-passphrase.1,
     doc/manpage/ecryptfs-generate-tpm-key.1, doc/manpage/ecryptfs-
     insert-wrapped-passphrase-into-keyring.1, doc/manpage/ecryptfs-
     mount-private.1, doc/manpage/ecryptfs-recover-private.1,
     doc/manpage/ecryptfs-rewrap-passphrase.1, doc/manpage/ecryptfs-
     rewrite-file.1, doc/manpage/ecryptfs-setup-private.1,
     doc/manpage/ecryptfs-setup-swap.1, doc/manpage/ecryptfs-stat.1,
     doc/manpage/ecryptfs-umount-private.1, doc/manpage/ecryptfs-unwrap-
     passphrase.1, doc/manpage/ecryptfs-wrap-passphrase.1,
     doc/manpage/fr/ecryptfs-add-passphrase.1, doc/manpage/fr/ecryptfs-
     generate-tpm-key.1, doc/manpage/fr/ecryptfs-insert-wrapped-
     passphrase-into-keyring.1, doc/manpage/fr/ecryptfs-mount-private.1,
     doc/manpage/fr/ecryptfs-rewrap-passphrase.1,
     doc/manpage/fr/ecryptfs-setup-private.1, doc/manpage/fr/ecryptfs-
     umount-private.1, doc/manpage/fr/ecryptfs-unwrap-passphrase.1,
     doc/manpage/fr/ecryptfs-wrap-passphrase.1, doc/manpage/fr/ecryptfs-
     zombie-kill.1, doc/manpage/fr/ecryptfs-zombie-list.1,
     doc/manpage/mount.ecryptfs_private.1, doc/manpage/pam_ecryptfs.8,
     doc/manpage/umount.ecryptfs.8,
     doc/manpage/umount.ecryptfs_private.1,
     src/pam_ecryptfs/pam_ecryptfs.c,
     src/utils/ecryptfs_add_passphrase.c,
     src/utils/ecryptfs_insert_wrapped_passphrase_into_keyring.c,
     src/utils/ecryptfs-migrate-home, src/utils/ecryptfs-mount-private,
     src/utils/ecryptfs-recover-private,
     src/utils/ecryptfs_rewrap_passphrase.c, src/utils/ecryptfs-rewrite-
     file, src/utils/ecryptfs-setup-private, src/utils/ecryptfs-setup-
     swap, src/utils/ecryptfs-umount-private,
     src/utils/ecryptfs_unwrap_passphrase.c,
     src/utils/ecryptfs_wrap_passphrase.c:
     - update some email addresses, moving kirkland at canonical.com ->
       kirkland at ubuntu.com (which I can still read)
   * src/libecryptfs/key_management.c: LP: #715066
     - fix 2 places where we were handling
       ecryptfs_add_passphrase_key_to_keyring() inconsistently
     - if we're trying to add a key to the keyring, and it's already there,
       treat that as "success"
   * debian/control:
     - ecryptfs-setup-swap is strongly recommended, which depends on
       cryptsetup; so promote cryptsetup from suggests -> recommends
   * precise
 .
   [ Stephan Ritscher and Tyler Hicks ]
   * src/libecryptfs/cmd_ln_parser.c: LP: #683535
     - fix passphrase_passwd_fd for pipes
     - handle memory allocation failures
     - free memory in error paths
 .
   [ Arfrever Frehtes Taifersar Arahesis ]
   * configure.ac: LP: #893327
     - no need to check for python, if --disable-pywrap is passed
Checksums-Sha1: 
 26da696e768c768613f1cc9ed39083af541c4877 2120 ecryptfs-utils_94-0ubuntu1.dsc
 93c52022159b7131ea3a2e4a0d7979adfa12139e 567614 ecryptfs-utils_94.orig.tar.gz
 daa30c7af58df7b8ace4cf9964d161b663c0d4ea 19251 ecryptfs-utils_94-0ubuntu1.debian.tar.gz
Checksums-Sha256: 
 90abd3768d142f2ed2431df6472c796d7afcfe03cf6cc5ca88416639f8f0998e 2120 ecryptfs-utils_94-0ubuntu1.dsc
 cc4a8c629545fcdf20bb9f0313bca8444d1fea8964546dc6e4a39cdcf37a1180 567614 ecryptfs-utils_94.orig.tar.gz
 14021ee64e79ad4b2575ec3f1d48f2705a25190e5e01ec763cd0b4d892211e4f 19251 ecryptfs-utils_94-0ubuntu1.debian.tar.gz
Files: 
 11d0782e4abd0cb076cd0ed96c0896bc 2120 misc optional ecryptfs-utils_94-0ubuntu1.dsc
 476dcbc08f30ad69a4a7e945c846acdd 567614 misc optional ecryptfs-utils_94.orig.tar.gz
 be2e354169f19e6a8a90bca68e1fa7ce 19251 misc optional ecryptfs-utils_94-0ubuntu1.debian.tar.gz
Original-Maintainer: Daniel Baumann <daniel at debian.org>

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)
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=tJes
-----END PGP SIGNATURE-----


More information about the Precise-changes mailing list