[ubuntu/raring-proposed] ecryptfs-utils 102-0ubuntu1 (Accepted)

Dustin Kirkland kirkland at ubuntu.com
Tue Jan 22 22:10:40 UTC 2013


ecryptfs-utils (102-0ubuntu1) raring; urgency=low

  [ Dustin Kirkland ]
  * debian/control:
    - bump standards, no change
  * precise

  [ Tyler Hicks ]
  * autogen.sh, scripts/release.sh, Makefile.am:
    - Break out the autoreconf and intltoolize commands from release.sh into
      an executable autogen.sh
    - Use the --copy option when invoking intltoolize
    - Include the new autogen.sh script in the release tarball
  * debian/rules, debian/control:
    - Use dh-autoreconf so that upstream sources can easily be used to build
      packages for all the stable Ubuntu releases in the ecryptfs-utils daily
      build PPA
    - Override the dh_autoreconf target by running the autogen.sh script
    - Drop Build-Depends on autotools-dev since dh-autoreconf is a superset of
      autotools-dev
    - Drop Build-Depends on autoconf, automake, and libtool since
      dh-autoreconf depends on all of these packages
  * m4/ac_python_devel.m4:
    - Fix FTBFS in Raring Ringtail due to multiarch Python. Be sure to include
      platform specific Python include directions in SWIG_PYTHON_CPPFLAGS.
  * src/utils/mount.ecryptfs_private.c:
    - Fix conditionals when checking whether to remove authentication tokens
      from the kernel keyring upon umount. This conditional was incorrectly
      modified in ecryptfs-utils-101, yet the authentication tokens still seem
      to be removed from the kernel keyring so it isn't clear if there was
      actually a user-facing regression.
    - Pass the FEKEK sig, rather than the FNEK sig, to
      ecryptfs_private_is_mounted()
    - Restore behavior of not printing error messages to syslog when
      unmounting and keys cannot be found in the kernel keyring.
    - Restore behavior of printing a useful error message about
      ecryptfs-mount-private when mounting and keys cannot be found in the
      kernel keyring
    - Fix memory leak and clean up free()'s in an error path
    - Use pointer assignment tests, rather than strlen(), to determine which
      key signatures were fetched
  * src/daemon/main.c, src/include/ecryptfs.h,
    src/libecryptfs/{Makefile.am,messaging.c,miscdev.c,netlink.c,sysfs.c},
    doc/manpage/ecryptfsd.8, doc/design_doc/ecryptfs_design_doc_v0_2.tex:
    - Remove netlink messaging interface support
    - Netlink messaging support was superceded by the miscdev interface
      (/dev/ecryptfs) in upstream kernel version 2.6.26 in July, 2008
    - Netlink messaging support was completely removed from the upstream
      kernel starting with version 2.6.32 in December, 2009
  * src/jprobes/*, scripts/delete-cruft.sh:
    - Remove all jprobes code, as I don't use jprobes to debug eCryptfs kernel
      issues and I don't like the idea of maintaining these jprobes outside of
      the kernel tree
  * src/escrow/*:
    - Remove all escrow code, as it isn't used or maintained
  * tests/kernel/llseek.sh, tests/kernel/llseek/test.c,
    tests/userspace/wrap-unwrap.sh, tests/userspace/wrap-unwrap/test.c:
    - Migrate some old testcases over to the modern test framework
  * tests/lib/etl_funcs.sh:
    - Update etl_create_test_dir() to allow a parent directory to be specified
      when creating the directory
  * src/testcases:
    - Delete old testcases that were either too basic, covered by more
      extensive tests in the modern test framework, or just didn't work

  [ Nobuto MURATA ]
  * src/desktop/ecryptfs-record-passphrase:

Date: Tue, 22 Jan 2013 16:04:11 -0600
Changed-By: Dustin Kirkland <kirkland at ubuntu.com>
https://launchpad.net/ubuntu/raring/+source/ecryptfs-utils/102-0ubuntu1
-------------- next part --------------
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Tue, 22 Jan 2013 16:04:11 -0600
Source: ecryptfs-utils
Binary: ecryptfs-utils ecryptfs-utils-dbg libecryptfs0 libecryptfs-dev python-ecryptfs
Architecture: source
Version: 102-0ubuntu1
Distribution: raring
Urgency: low
Maintainer: Dustin Kirkland <kirkland at ubuntu.com>
Changed-By: Dustin Kirkland <kirkland at ubuntu.com>
Description: 
 ecryptfs-utils - ecryptfs cryptographic filesystem (utilities)
 ecryptfs-utils-dbg - ecryptfs cryptographic filesystem (utilities; debug)
 libecryptfs-dev - ecryptfs cryptographic filesystem (development)
 libecryptfs0 - ecryptfs cryptographic filesystem (library)
 python-ecryptfs - ecryptfs cryptographic filesystem (python)
Changes: 
 ecryptfs-utils (102-0ubuntu1) raring; urgency=low
 .
   [ Dustin Kirkland ]
   * debian/control:
     - bump standards, no change
   * precise
 .
   [ Tyler Hicks ]
   * autogen.sh, scripts/release.sh, Makefile.am:
     - Break out the autoreconf and intltoolize commands from release.sh into
       an executable autogen.sh
     - Use the --copy option when invoking intltoolize
     - Include the new autogen.sh script in the release tarball
   * debian/rules, debian/control:
     - Use dh-autoreconf so that upstream sources can easily be used to build
       packages for all the stable Ubuntu releases in the ecryptfs-utils daily
       build PPA
     - Override the dh_autoreconf target by running the autogen.sh script
     - Drop Build-Depends on autotools-dev since dh-autoreconf is a superset of
       autotools-dev
     - Drop Build-Depends on autoconf, automake, and libtool since
       dh-autoreconf depends on all of these packages
   * m4/ac_python_devel.m4:
     - Fix FTBFS in Raring Ringtail due to multiarch Python. Be sure to include
       platform specific Python include directions in SWIG_PYTHON_CPPFLAGS.
   * src/utils/mount.ecryptfs_private.c:
     - Fix conditionals when checking whether to remove authentication tokens
       from the kernel keyring upon umount. This conditional was incorrectly
       modified in ecryptfs-utils-101, yet the authentication tokens still seem
       to be removed from the kernel keyring so it isn't clear if there was
       actually a user-facing regression.
     - Pass the FEKEK sig, rather than the FNEK sig, to
       ecryptfs_private_is_mounted()
     - Restore behavior of not printing error messages to syslog when
       unmounting and keys cannot be found in the kernel keyring.
     - Restore behavior of printing a useful error message about
       ecryptfs-mount-private when mounting and keys cannot be found in the
       kernel keyring
     - Fix memory leak and clean up free()'s in an error path
     - Use pointer assignment tests, rather than strlen(), to determine which
       key signatures were fetched
   * src/daemon/main.c, src/include/ecryptfs.h,
     src/libecryptfs/{Makefile.am,messaging.c,miscdev.c,netlink.c,sysfs.c},
     doc/manpage/ecryptfsd.8, doc/design_doc/ecryptfs_design_doc_v0_2.tex:
     - Remove netlink messaging interface support
     - Netlink messaging support was superceded by the miscdev interface
       (/dev/ecryptfs) in upstream kernel version 2.6.26 in July, 2008
     - Netlink messaging support was completely removed from the upstream
       kernel starting with version 2.6.32 in December, 2009
   * src/jprobes/*, scripts/delete-cruft.sh:
     - Remove all jprobes code, as I don't use jprobes to debug eCryptfs kernel
       issues and I don't like the idea of maintaining these jprobes outside of
       the kernel tree
   * src/escrow/*:
     - Remove all escrow code, as it isn't used or maintained
   * tests/kernel/llseek.sh, tests/kernel/llseek/test.c,
     tests/userspace/wrap-unwrap.sh, tests/userspace/wrap-unwrap/test.c:
     - Migrate some old testcases over to the modern test framework
   * tests/lib/etl_funcs.sh:
     - Update etl_create_test_dir() to allow a parent directory to be specified
       when creating the directory
   * src/testcases:
     - Delete old testcases that were either too basic, covered by more
       extensive tests in the modern test framework, or just didn't work
 .
   [ Nobuto MURATA ]
   * src/desktop/ecryptfs-record-passphrase:
Checksums-Sha1: 
 8b6d7d5d1c080f6edd5611a0542c4d56e1764e37 2298 ecryptfs-utils_102-0ubuntu1.dsc
 d8a5dd86d2e2a2fa59e7722c5e6654283c0b2d4e 620301 ecryptfs-utils_102.orig.tar.gz
 7000a4da569b321ed81590e60c2437855aef07cd 25250 ecryptfs-utils_102-0ubuntu1.debian.tar.gz
Checksums-Sha256: 
 7db813ef7d65ed2ed7aeb81b7f71748dd81b051b0f93e659ccbc7e2c6c144c56 2298 ecryptfs-utils_102-0ubuntu1.dsc
 9907acfe3cc315743d4cf4688940450ae79c6bbe7de399ab90744b74bb3ac59d 620301 ecryptfs-utils_102.orig.tar.gz
 54548c53a022244f84b2cfb0a354b0c5e12d4cd062740b9c23e5397bfdd2b06b 25250 ecryptfs-utils_102-0ubuntu1.debian.tar.gz
Files: 
 2aa26fa01afffa7140d4a7523f822a63 2298 misc optional ecryptfs-utils_102-0ubuntu1.dsc
 ea7158c37fe1cb5fc7d2053b775c7c27 620301 misc optional ecryptfs-utils_102.orig.tar.gz
 46e9f49961a654dc30dbfe08348fc407 25250 misc optional ecryptfs-utils_102-0ubuntu1.debian.tar.gz
Original-Maintainer: Daniel Baumann <daniel at debian.org>

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)
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=s25s
-----END PGP SIGNATURE-----


More information about the Raring-changes mailing list