[ubuntu/precise] ecryptfs-utils 96-0ubuntu1 (Accepted)

Dustin Kirkland kirkland at ubuntu.com
Thu Feb 16 20:25:22 UTC 2012


ecryptfs-utils (96-0ubuntu1) precise; urgency=low

  [ Dustin Kirkland ]
  * CONTRIBUTING:
    - added a new file to describe how to contribute to ecryptfs
  * === added directory img/old, img/old/ecryptfs_14.png,
    img/old/ecryptfs_192.png, img/old/ecryptfs_64.png:
    - saving the old logos/branding for posterity
  * debian/copyright, img/COPYING:
    - added CC-by-SA 3.0 license
    - use the text version
  * img/ecryptfs_14.png, img/ecryptfs_192.png, img/ecryptfs_64.png:
    - added scaled copies of images used for Launchpad.net branding
  * src/utils/ecryptfs-recover-private: LP: #847505
    - add an option to allow user to enter the mount passphrase,
      in case they've recorded that, but forgotten their login
      passphrase
  * src/libecryptfs/sysfs.c: LP: #802197
    - default sysfs to /sys, if not found in /etc/mtab
    - it seems that reading /etc/mtab for this is outdated
    - ensure that ecryptfs works even if there is no sysfs entry
      in /etc/mtab
  * src/key_mod/ecryptfs_key_mod_tspi.c: LP: #462225
    - fix TPM and string_to_uuid 64bits issue
    - thanks to Janos for the patch
  * precise

  [ Tyler Hicks ]
  * CONTRIBUTING:
    - clarified how to contribute to the ecryptfs kernel module
  * tests/lib/etl_funcs.sh:
    - created eCryptfs test library of bash functions for use in test
      cases and test harnesses
  * test/etl_add_passphrase_key_to_keyring.c:
    - created a C helper program to allow bash scripts to interface to
      the libecryptfs function that adds passphrase-based keys to the
      kernel keyring
  * tests/kernel/tests.rc, tests/userspace/tests.rc:
    - created a test case category files for test harnesses to source
      when running testcases of a certain category (destructive, safe,
      etc.)
  * tests/run_tests.sh:
    - created a test harness to run eCryptfs test cases
  * tests/kernel/miscdev-bad-count.sh,
    tests/kernel/miscdev-bad-count/test.c:
    - created test case for miscdev issue reported to mailing list
  * tests/kernel/lp-885744.sh:
    - created test case for pathconf bug
  * tests/kernel/lp-926292.sh:
    - created test case for checking stale inode attrs after setxattr
  * tests/new.sh:
    - created new test case template to copy from
  * tests/userspace/verify-passphrase-sig.sh,
    tests/userspace/verify-passphrase-sig/test.c:
    - created test case, for make check, to test the creation of
      passphrase-based fekeks and signatures
  * configure.ac, Makefile.am, tests/Makefile.am, tests/lib/Makefile.am,
    tests/kernel/Makefile.am, tests/userspace/Makefile.am:
    - updated and created autoconf/automake files to build the new tests
      directory
    - added make check target

  [ Eddie Garcia ]
  * img/*: LP: #907131
    - contributing a new set of logos and branding under the CC-by-SA3.0
      license

  [ Colin King ]
  * tests/kernel/extend-file-random.sh,
    tests/kernel/extend-file-random/test.c:
    - Test to randomly extend file size, read/write + unlink
  * tests/kernel/trunc-file.sh, tests/kernel/trunc-file/test.c:
    - Test to exercise file truncation
  * tests/kernel/directory-concurrent.sh,
    tests/kernel/directory-concurrent/test.c:
    - test for directory creation/deletion races with multiple processes
  * tests/kernel/file-concurrent.sh,
    tests/kernel/file-concurrent/test.c:
    - test for file creation/truncation/unlink races with multiple
      processes
  * tests/kernel/inotify.sh, tests/kernel/inotify/test.c:
    - test for proper inotify support
  * tests/kernel/mmap-dir.sh, tests/kernel/mmap-dir/test.c:
    - test that directory files cannot be mmap'ed
  * tests/kernel/read-dir.sh, tests/kernel/read-dir/test.c:
    - test that read() on directory files returns the right error
  * tests/kernel/setattr-flush-dirty.sh:
    - test that the modified timestamp isn't clobbered in writeback
  * tests/kernel/inode-race-stat.sh, tests/kernel/inode-race-stat/test.c:
    - test for inode initialization race condition

Date: Thu, 16 Feb 2012 14:22:09 -0600
Changed-By: Dustin Kirkland <kirkland at ubuntu.com>
https://launchpad.net/ubuntu/precise/+source/ecryptfs-utils/96-0ubuntu1
-------------- next part --------------
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Thu, 16 Feb 2012 14:22:09 -0600
Source: ecryptfs-utils
Binary: ecryptfs-utils ecryptfs-utils-dbg libecryptfs0 libecryptfs-dev python-ecryptfs
Architecture: source
Version: 96-0ubuntu1
Distribution: precise
Urgency: low
Maintainer: Dustin Kirkland <kirkland at ubuntu.com>
Changed-By: Dustin Kirkland <kirkland at ubuntu.com>
Description: 
 ecryptfs-utils - ecryptfs cryptographic filesystem (utilities)
 ecryptfs-utils-dbg - ecryptfs cryptographic filesystem (utilities; debug)
 libecryptfs-dev - ecryptfs cryptographic filesystem (development)
 libecryptfs0 - ecryptfs cryptographic filesystem (library)
 python-ecryptfs - ecryptfs cryptographic filesystem (python)
Launchpad-Bugs-Fixed: 462225 802197 847505 907131
Changes: 
 ecryptfs-utils (96-0ubuntu1) precise; urgency=low
 .
   [ Dustin Kirkland ]
   * CONTRIBUTING:
     - added a new file to describe how to contribute to ecryptfs
   * === added directory img/old, img/old/ecryptfs_14.png,
     img/old/ecryptfs_192.png, img/old/ecryptfs_64.png:
     - saving the old logos/branding for posterity
   * debian/copyright, img/COPYING:
     - added CC-by-SA 3.0 license
     - use the text version
   * img/ecryptfs_14.png, img/ecryptfs_192.png, img/ecryptfs_64.png:
     - added scaled copies of images used for Launchpad.net branding
   * src/utils/ecryptfs-recover-private: LP: #847505
     - add an option to allow user to enter the mount passphrase,
       in case they've recorded that, but forgotten their login
       passphrase
   * src/libecryptfs/sysfs.c: LP: #802197
     - default sysfs to /sys, if not found in /etc/mtab
     - it seems that reading /etc/mtab for this is outdated
     - ensure that ecryptfs works even if there is no sysfs entry
       in /etc/mtab
   * src/key_mod/ecryptfs_key_mod_tspi.c: LP: #462225
     - fix TPM and string_to_uuid 64bits issue
     - thanks to Janos for the patch
   * precise
 .
   [ Tyler Hicks ]
   * CONTRIBUTING:
     - clarified how to contribute to the ecryptfs kernel module
   * tests/lib/etl_funcs.sh:
     - created eCryptfs test library of bash functions for use in test
       cases and test harnesses
   * test/etl_add_passphrase_key_to_keyring.c:
     - created a C helper program to allow bash scripts to interface to
       the libecryptfs function that adds passphrase-based keys to the
       kernel keyring
   * tests/kernel/tests.rc, tests/userspace/tests.rc:
     - created a test case category files for test harnesses to source
       when running testcases of a certain category (destructive, safe,
       etc.)
   * tests/run_tests.sh:
     - created a test harness to run eCryptfs test cases
   * tests/kernel/miscdev-bad-count.sh,
     tests/kernel/miscdev-bad-count/test.c:
     - created test case for miscdev issue reported to mailing list
   * tests/kernel/lp-885744.sh:
     - created test case for pathconf bug
   * tests/kernel/lp-926292.sh:
     - created test case for checking stale inode attrs after setxattr
   * tests/new.sh:
     - created new test case template to copy from
   * tests/userspace/verify-passphrase-sig.sh,
     tests/userspace/verify-passphrase-sig/test.c:
     - created test case, for make check, to test the creation of
       passphrase-based fekeks and signatures
   * configure.ac, Makefile.am, tests/Makefile.am, tests/lib/Makefile.am,
     tests/kernel/Makefile.am, tests/userspace/Makefile.am:
     - updated and created autoconf/automake files to build the new tests
       directory
     - added make check target
 .
   [ Eddie Garcia ]
   * img/*: LP: #907131
     - contributing a new set of logos and branding under the CC-by-SA3.0
       license
 .
   [ Colin King ]
   * tests/kernel/extend-file-random.sh,
     tests/kernel/extend-file-random/test.c:
     - Test to randomly extend file size, read/write + unlink
   * tests/kernel/trunc-file.sh, tests/kernel/trunc-file/test.c:
     - Test to exercise file truncation
   * tests/kernel/directory-concurrent.sh,
     tests/kernel/directory-concurrent/test.c:
     - test for directory creation/deletion races with multiple processes
   * tests/kernel/file-concurrent.sh,
     tests/kernel/file-concurrent/test.c:
     - test for file creation/truncation/unlink races with multiple
       processes
   * tests/kernel/inotify.sh, tests/kernel/inotify/test.c:
     - test for proper inotify support
   * tests/kernel/mmap-dir.sh, tests/kernel/mmap-dir/test.c:
     - test that directory files cannot be mmap'ed
   * tests/kernel/read-dir.sh, tests/kernel/read-dir/test.c:
     - test that read() on directory files returns the right error
   * tests/kernel/setattr-flush-dirty.sh:
     - test that the modified timestamp isn't clobbered in writeback
   * tests/kernel/inode-race-stat.sh, tests/kernel/inode-race-stat/test.c:
     - test for inode initialization race condition
Checksums-Sha1: 
 6d8609459a4b47e43ecca6d94c0ef29f341492a0 2137 ecryptfs-utils_96-0ubuntu1.dsc
 43234bd09a1c4d5293c9f6a35817472c21aab7b7 608135 ecryptfs-utils_96.orig.tar.gz
 b3f688e181a771f538fc10c331f1864add28dc0f 20424 ecryptfs-utils_96-0ubuntu1.debian.tar.gz
Checksums-Sha256: 
 a101cf08021953eb24feed670a885a7480863722c7934e4c6b4c79de4453f1e2 2137 ecryptfs-utils_96-0ubuntu1.dsc
 04c43b6e7a2f6b3644a24bcf718bfde6384e74bb4266c053ac78b9cc852f2c0c 608135 ecryptfs-utils_96.orig.tar.gz
 6f6c3cc7de45736ddb59cdaed5b99a4494402c834dc27930cf471d23521faad4 20424 ecryptfs-utils_96-0ubuntu1.debian.tar.gz
Files: 
 2b90fcd40ed86641ac3eafd2e4d7000e 2137 misc optional ecryptfs-utils_96-0ubuntu1.dsc
 4f92c9f6e8f62ac00ca7e2c4e480f1d7 608135 misc optional ecryptfs-utils_96.orig.tar.gz
 d3fad0426859f25cc37b8f1df32379a6 20424 misc optional ecryptfs-utils_96-0ubuntu1.debian.tar.gz
Original-Maintainer: Daniel Baumann <daniel at debian.org>

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)
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=+ZyB
-----END PGP SIGNATURE-----


More information about the Precise-changes mailing list