[ubuntu/quantal] cryptsetup 2:1.4.3-2ubuntu1 (Accepted)
Dmitrijs Ledkovs
dmitrij.ledkov at ubuntu.com
Tue Aug 21 12:50:19 UTC 2012
cryptsetup (2:1.4.3-2ubuntu1) quantal; urgency=low
* Merge from debian unstable (LP: #1015753), remaining changes:
- debian/control:
+ Bump initramfs-tools Suggests to Depends: so system is not
potentially rendered unbootable.
+ Depend on plymouth.
- init/upstart jobs:
+ Add debian/cryptdisks-{enable,udev}.upstart for bootup.
+ debian/cryptdisks{,-early}.init: Make the 'start' action of the init
script a no-op, this should be handled entirely by the upstart job;
and fix the LSB header to not declare this should be started in
runlevel 'S'.
+ Do not install start symlinks for init scripts
+ NB! shutdown is still handled by the SystemV init scripts
* Rename cryptddisks{,-early}.upstart jobs back to
cryptdisks-{enable,udev}.upstart, as we need both init & upstart jobs
for now.
* Dropped Changes, included in Debian:
- debian/control:
+ Split up package in cryptsetup and cryptsetup-bin. (LP: #343363).
- debian/cryptdisks.functions:
+ Do not overwrite existing filesystems when creating swap (LP: #474258).
+ Add aesni module when we have hardware encryption.
+ Call 'udevadm settle' before 'dmsetup rename' http://pad.lv/874774
+ Suppress "Starting init crypto disks" message in "init" phase, to
avoid writing over fsck progress text.
+ new function, crypttab_start_one_disk, to look for the named source
device in /etc/crypttab (by device name, UUID, or label) and start it
if configured to do so
+ handle the case where crypttab contains a name for the source
device that is not the kernel's preferred name for it (as is the case
for LVs).
- debian/initramfs/cryptroot-hook:
+ Quiet warnings from find on arches that don't have all the
kernel/{arch,crypto} bits we're testing for.
cryptsetup (2:1.4.3-2) unstable; urgency=medium
* fix the shared library symbols magic: so far, the symbols file for
libcryptsetup4 included just a wildcard for all exported symbols, with
libcrypsetup4 (>= 2:1.4) as minimum version. This was wrong. Symbols
that were added later need adjusted minimum versions. Thanks for the
great help in #debian-mentors. (closes: #677127)
* remove emtpy directory /lib from cryptsetup-bin package.
* compile askpass and passdev with CFLAGS, CPPFLAGS and LDFLAGS.
cryptsetup (2:1.4.3-1) unstable; urgency=low
[ Jonas Meurer ]
* mention limitations for keyscripts in crypttab(5) manpage: keyscripts
must not depend on binaries/files which are part of the to-be-unlocked
device. (closes: #665494)
* bump versioned build-dependency on debhelper now that we install
upstart initscripts in debian as well.
* change versioned breaks/replaces for cryptsetup-bin on cryptsetup to
1.4.3-1~, fixing upgrades in debian.
[ Jean-Louis Dupond ]
* New upstream version. (closes: #670071)
- Fix keyslot removal (closes: #672299)
- Add -r to cryptsetup.8 (closes: #674027)
* Split up package in cryptsetup and cryptsetup-bin.
* I'm now co-maintainer (closes: #600777).
* Start cryptdisks-enable upstart job on 'or container', to let us
simplify the udevtrigger job.
* debian/cryptdisks.functions: handle the case where crypttab contains a
name for the source device that is not the kernel's preferred name for
it (as is the case for LVs). (Thanks Steve Langasek)
* debian/cryptdisks.functions: fix a race condition in some cases by
adding and udevadm settle before rename.
* debian/cryptdisks.functions: add UUID & LABEL support to do_start.
* debian/copyright: really fix lintian warning.
* debian/rules: also include upstart files in debian.
cryptsetup (2:1.4.1-3) unstable; urgency=low
[ Jonas Meurer ]
* finally add back support for configuration of custom rootfs-devices through
the boot parameter 'root' to initramfs cryptroot script. Thanks a lot to
August Martin for the bugreport as well as continuously debugging and
providing patches. (closes: #546610)
* use blkid instead of fstype to detect the content of devices in initramfs
cryptroot script. Unfortunately fstype doesn't recognize md-raid devices,
which leads to errors with encrypted devices on top of software raid.
* check whether $NEWROOT already exists before actually invoking cryptsetup
in initramfs cryptroot script. (closes: #653241)
* fix conditions for prechecks at do_noluks() in cryptdisks.functions. Should
prevent data loss with encrypted swap in most cases. (closes: #652497)
* change default value for tmpfs and examples from ext2 to ext4.
* minor code cleanup.
* update debconf translations:
- russian, thanks to Yuri Kozlov. (closes: #661303)
- spanish, thanks to Camaleón. (closes: #661316)
[ Jean-Louis Dupond ]
* fix watch file.
* always add aesni module to initramfs if we have hardware aes support.
(closes: #639832).
* debian/copyright: fix lintain warning.
* add upstart scripts for ubuntu.
* silent warnings on kernels without kernel/{arch,crypto}.
* add crypttab_start_one_disk in function script to handle udev startup
in ubuntu.
* bump standards-version to 3.9.3, no changes needed.
Date: Tue, 21 Aug 2012 11:57:28 +0100
Changed-By: Dmitrijs Ledkovs <dmitrij.ledkov at ubuntu.com>
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
https://launchpad.net/ubuntu/quantal/+source/cryptsetup/2:1.4.3-2ubuntu1
-------------- next part --------------
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Format: 1.8
Date: Tue, 21 Aug 2012 11:57:28 +0100
Source: cryptsetup
Binary: cryptsetup cryptsetup-bin libcryptsetup4 libcryptsetup-dev cryptsetup-udeb libcryptsetup4-udeb
Architecture: source
Version: 2:1.4.3-2ubuntu1
Distribution: quantal
Urgency: medium
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Changed-By: Dmitrijs Ledkovs <dmitrij.ledkov at ubuntu.com>
Description:
cryptsetup - disk encryption support - startup scripts
cryptsetup-bin - disk encryption support - command line tools
cryptsetup-udeb - disk encryption support - commandline tools (udeb) (udeb)
libcryptsetup-dev - disk encryption support - development files
libcryptsetup4 - disk encryption support - shared library
libcryptsetup4-udeb - disk encryption support - shared library (udeb) (udeb)
Closes: 546610 600777 639832 652497 653241 661303 661316 665494 670071 672299 674027 677127
Launchpad-Bugs-Fixed: 343363 474258 1015753
Changes:
cryptsetup (2:1.4.3-2ubuntu1) quantal; urgency=low
.
* Merge from debian unstable (LP: #1015753), remaining changes:
- debian/control:
+ Bump initramfs-tools Suggests to Depends: so system is not
potentially rendered unbootable.
+ Depend on plymouth.
.
- init/upstart jobs:
+ Add debian/cryptdisks-{enable,udev}.upstart for bootup.
+ debian/cryptdisks{,-early}.init: Make the 'start' action of the init
script a no-op, this should be handled entirely by the upstart job;
and fix the LSB header to not declare this should be started in
runlevel 'S'.
+ Do not install start symlinks for init scripts
+ NB! shutdown is still handled by the SystemV init scripts
.
* Rename cryptddisks{,-early}.upstart jobs back to
cryptdisks-{enable,udev}.upstart, as we need both init & upstart jobs
for now.
.
* Dropped Changes, included in Debian:
- debian/control:
+ Split up package in cryptsetup and cryptsetup-bin. (LP: #343363).
.
- debian/cryptdisks.functions:
+ Do not overwrite existing filesystems when creating swap (LP: #474258).
+ Add aesni module when we have hardware encryption.
+ Call 'udevadm settle' before 'dmsetup rename' http://pad.lv/874774
+ Suppress "Starting init crypto disks" message in "init" phase, to
avoid writing over fsck progress text.
+ new function, crypttab_start_one_disk, to look for the named source
device in /etc/crypttab (by device name, UUID, or label) and start it
if configured to do so
+ handle the case where crypttab contains a name for the source
device that is not the kernel's preferred name for it (as is the case
for LVs).
.
- debian/initramfs/cryptroot-hook:
+ Quiet warnings from find on arches that don't have all the
kernel/{arch,crypto} bits we're testing for.
.
cryptsetup (2:1.4.3-2) unstable; urgency=medium
.
* fix the shared library symbols magic: so far, the symbols file for
libcryptsetup4 included just a wildcard for all exported symbols, with
libcrypsetup4 (>= 2:1.4) as minimum version. This was wrong. Symbols
that were added later need adjusted minimum versions. Thanks for the
great help in #debian-mentors. (closes: #677127)
* remove emtpy directory /lib from cryptsetup-bin package.
* compile askpass and passdev with CFLAGS, CPPFLAGS and LDFLAGS.
.
cryptsetup (2:1.4.3-1) unstable; urgency=low
.
[ Jonas Meurer ]
* mention limitations for keyscripts in crypttab(5) manpage: keyscripts
must not depend on binaries/files which are part of the to-be-unlocked
device. (closes: #665494)
* bump versioned build-dependency on debhelper now that we install
upstart initscripts in debian as well.
* change versioned breaks/replaces for cryptsetup-bin on cryptsetup to
1.4.3-1~, fixing upgrades in debian.
.
[ Jean-Louis Dupond ]
* New upstream version. (closes: #670071)
- Fix keyslot removal (closes: #672299)
- Add -r to cryptsetup.8 (closes: #674027)
* Split up package in cryptsetup and cryptsetup-bin.
* I'm now co-maintainer (closes: #600777).
* Start cryptdisks-enable upstart job on 'or container', to let us
simplify the udevtrigger job.
* debian/cryptdisks.functions: handle the case where crypttab contains a
name for the source device that is not the kernel's preferred name for
it (as is the case for LVs). (Thanks Steve Langasek)
* debian/cryptdisks.functions: fix a race condition in some cases by
adding and udevadm settle before rename.
* debian/cryptdisks.functions: add UUID & LABEL support to do_start.
* debian/copyright: really fix lintian warning.
* debian/rules: also include upstart files in debian.
.
cryptsetup (2:1.4.1-3) unstable; urgency=low
.
[ Jonas Meurer ]
* finally add back support for configuration of custom rootfs-devices through
the boot parameter 'root' to initramfs cryptroot script. Thanks a lot to
August Martin for the bugreport as well as continuously debugging and
providing patches. (closes: #546610)
* use blkid instead of fstype to detect the content of devices in initramfs
cryptroot script. Unfortunately fstype doesn't recognize md-raid devices,
which leads to errors with encrypted devices on top of software raid.
* check whether $NEWROOT already exists before actually invoking cryptsetup
in initramfs cryptroot script. (closes: #653241)
* fix conditions for prechecks at do_noluks() in cryptdisks.functions. Should
prevent data loss with encrypted swap in most cases. (closes: #652497)
* change default value for tmpfs and examples from ext2 to ext4.
* minor code cleanup.
* update debconf translations:
- russian, thanks to Yuri Kozlov. (closes: #661303)
- spanish, thanks to Camaleón. (closes: #661316)
.
[ Jean-Louis Dupond ]
* fix watch file.
* always add aesni module to initramfs if we have hardware aes support.
(closes: #639832).
* debian/copyright: fix lintain warning.
* add upstart scripts for ubuntu.
* silent warnings on kernels without kernel/{arch,crypto}.
* add crypttab_start_one_disk in function script to handle udev startup
in ubuntu.
* bump standards-version to 3.9.3, no changes needed.
Checksums-Sha1:
15a201f13eeea586afdbcf83600eb2667a5bc6dd 2584 cryptsetup_1.4.3-2ubuntu1.dsc
90de7c413847f9da55c85ad8e50ba42c74b30078 798101 cryptsetup_1.4.3.orig.tar.bz2
12899589f53314a47f38ad1d8632d932f647bc7d 101481 cryptsetup_1.4.3-2ubuntu1.debian.tar.gz
Checksums-Sha256:
f7d8eff0f2a3c18f6b258c598ff6fef76587447a33fd6a61c4e0aab1a7fb2085 2584 cryptsetup_1.4.3-2ubuntu1.dsc
d5ff2c00f6f791d77fa5636a02ae43ddbb46c6c793bdeafdec5e38fd15f99d0a 798101 cryptsetup_1.4.3.orig.tar.bz2
47f9c347c5f643cd03d191bc2d1d9b7b1714592088a6e66e2631a95f8891503e 101481 cryptsetup_1.4.3-2ubuntu1.debian.tar.gz
Files:
2b16879c8d4c3eb23c74f12ed226806c 2584 admin optional cryptsetup_1.4.3-2ubuntu1.dsc
9b9fc9ab1ad2c04d4886bbd5640df90f 798101 admin optional cryptsetup_1.4.3.orig.tar.bz2
30aa1e55b9d5c5f377a1ea2a75f1fd5b 101481 admin optional cryptsetup_1.4.3-2ubuntu1.debian.tar.gz
Original-Maintainer: Debian Cryptsetup Team <pkg-cryptsetup-devel at lists.alioth.debian.org>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)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=UZMK
-----END PGP SIGNATURE-----
More information about the Quantal-changes
mailing list