[ubuntu/trusty-proposed] cryptsetup 2:1.6.1-1ubuntu1 (Accepted)
Dmitrijs Ledkovs
dmitrij.ledkov at ubuntu.com
Fri Nov 1 17:49:13 UTC 2013
cryptsetup (2:1.6.1-1ubuntu1) trusty; urgency=low
* Merge from debian unstable, remaining changes:
- debian/control:
+ Bump initramfs-tools Suggests to Depends: so system is not
potentially rendered unbootable.
+ Depend on plymouth.
- Invert the "busybox | busybox-static" Recommends, as the latter is
the one we ship in main as part of the ubuntu-standard task.
- Remove hardcoded paths to udevadm (LP: #1184066).
- debian/initramfs/cryptroot-hook:
+ Do not unconditionally include cryptsetup utils in the initramfs.
+ Do not include any modules or utils in the initramfs, unless
rootfs/resume devices are encrypted or CRYPTSETUP is set to 'y' in
the initramfs.conf configuration file.
- debian/cryptsetup.maintscripts:
+ Migrate upstart jobs to new names.
cryptsetup (2:1.6.1-1) unstable; urgency=low
[ Milan Broz ]
* new upstream version. (closes: #704827, 707997)
- default LUKS encryption mode is XTS (aes-xts-plain64) (closes: #714331)
- adds native support for Truecrypt and compatible on-disk format
- adds benchmark command
- adds cryptsetup-reencrypt, a tool to offline reencrypt LUKS device
- adds veritysetup, a tool for dm-verity block device verification module
* install docs/examples into docs at cryptsetup-dev package.
* fix compilation warnings in askpass.c.
[ Steve Langasek ]
* fix upstart jobs to not cause boot hangs when actually used in
conjunction with startpar. (closes: #694499, #677712).
* in connection with the above, make the cryptdisks-early job explicitly
wait for 'umountfs' on shutdown just like cryptdisks does; otherwise,
the teardown of the cryptdisks upstart job may cause the cryptdisks-early
init script run before we're done unmounting filesystems.
[ Jonas Meurer ]
* minor wording fixes to README.initramfs, suggested by intrigeri and Adam
D. Barrett.
* add bash-completion script for cryptdisks_{start,stop}. Thanks to Claudius
Hubig for providing a patch. (closes: #700777)
* support specifying key-slot in crypttab. Thanks to Kevin Locke for the
patch. (closes: #704470)
* remove evms support code from cryptroot initramfs script. (closes: #713918)
* fix location of keyscripts in initramfs documentation. (closes: #697446)
* fix a typo in decrypt_ssl script that prevented stdout from beeing
redirected to /dev/null. (closes: #700285)
* give full path to blkid in crytproot initramfs script. (closes: #697155)
* export number of previous tries from cryptroot and cryptdisks to
keyscript. Thanks to Laurens Blankers for the idea. Opens the possibility
to fallback after a given number of tries for keyscripts. (closes: #438481,
#471729, #697455)
* improve check for cpu hardware encryption support in initramfs cryptroot
hook. (closes: #714326)
Date: Fri, 01 Nov 2013 16:48:57 +0000
Changed-By: Dmitrijs Ledkovs <dmitrij.ledkov at ubuntu.com>
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
https://launchpad.net/ubuntu/trusty/+source/cryptsetup/2:1.6.1-1ubuntu1
-------------- next part --------------
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Format: 1.8
Date: Fri, 01 Nov 2013 16:48:57 +0000
Source: cryptsetup
Binary: cryptsetup cryptsetup-bin libcryptsetup4 libcryptsetup-dev cryptsetup-udeb libcryptsetup4-udeb
Architecture: source
Version: 2:1.6.1-1ubuntu1
Distribution: trusty
Urgency: low
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Changed-By: Dmitrijs Ledkovs <dmitrij.ledkov at ubuntu.com>
Description:
cryptsetup - disk encryption support - startup scripts
cryptsetup-bin - disk encryption support - command line tools
cryptsetup-udeb - disk encryption support - commandline tools (udeb) (udeb)
libcryptsetup-dev - disk encryption support - development files
libcryptsetup4 - disk encryption support - shared library
libcryptsetup4-udeb - disk encryption support - shared library (udeb) (udeb)
Closes: 438481 471729 677712 694499 697155 697446 697455 700285 700777 704470 704827 707997 713918 714326 714331
Launchpad-Bugs-Fixed: 1184066
Changes:
cryptsetup (2:1.6.1-1ubuntu1) trusty; urgency=low
.
* Merge from debian unstable, remaining changes:
- debian/control:
+ Bump initramfs-tools Suggests to Depends: so system is not
potentially rendered unbootable.
+ Depend on plymouth.
.
- Invert the "busybox | busybox-static" Recommends, as the latter is
the one we ship in main as part of the ubuntu-standard task.
.
- Remove hardcoded paths to udevadm (LP: #1184066).
.
- debian/initramfs/cryptroot-hook:
+ Do not unconditionally include cryptsetup utils in the initramfs.
+ Do not include any modules or utils in the initramfs, unless
rootfs/resume devices are encrypted or CRYPTSETUP is set to 'y' in
the initramfs.conf configuration file.
.
- debian/cryptsetup.maintscripts:
+ Migrate upstart jobs to new names.
.
cryptsetup (2:1.6.1-1) unstable; urgency=low
.
[ Milan Broz ]
* new upstream version. (closes: #704827, 707997)
- default LUKS encryption mode is XTS (aes-xts-plain64) (closes: #714331)
- adds native support for Truecrypt and compatible on-disk format
- adds benchmark command
- adds cryptsetup-reencrypt, a tool to offline reencrypt LUKS device
- adds veritysetup, a tool for dm-verity block device verification module
* install docs/examples into docs at cryptsetup-dev package.
* fix compilation warnings in askpass.c.
.
[ Steve Langasek ]
* fix upstart jobs to not cause boot hangs when actually used in
conjunction with startpar. (closes: #694499, #677712).
* in connection with the above, make the cryptdisks-early job explicitly
wait for 'umountfs' on shutdown just like cryptdisks does; otherwise,
the teardown of the cryptdisks upstart job may cause the cryptdisks-early
init script run before we're done unmounting filesystems.
.
[ Jonas Meurer ]
* minor wording fixes to README.initramfs, suggested by intrigeri and Adam
D. Barrett.
* add bash-completion script for cryptdisks_{start,stop}. Thanks to Claudius
Hubig for providing a patch. (closes: #700777)
* support specifying key-slot in crypttab. Thanks to Kevin Locke for the
patch. (closes: #704470)
* remove evms support code from cryptroot initramfs script. (closes: #713918)
* fix location of keyscripts in initramfs documentation. (closes: #697446)
* fix a typo in decrypt_ssl script that prevented stdout from beeing
redirected to /dev/null. (closes: #700285)
* give full path to blkid in crytproot initramfs script. (closes: #697155)
* export number of previous tries from cryptroot and cryptdisks to
keyscript. Thanks to Laurens Blankers for the idea. Opens the possibility
to fallback after a given number of tries for keyscripts. (closes: #438481,
#471729, #697455)
* improve check for cpu hardware encryption support in initramfs cryptroot
hook. (closes: #714326)
Checksums-Sha1:
4e8cecba141d9319a7b5806a25d6344aa1868d09 2587 cryptsetup_1.6.1-1ubuntu1.dsc
11f0bf2b3536589ca63dde4196877d0beed211c7 1175052 cryptsetup_1.6.1.orig.tar.bz2
950e60f7d8716c54c25961298a270249c024b431 104838 cryptsetup_1.6.1-1ubuntu1.debian.tar.gz
Checksums-Sha256:
7aceca39edc2145677eca44250657693961be466dde695f65b76ecaeeb43e55f 2587 cryptsetup_1.6.1-1ubuntu1.dsc
baf36e663c03eb6440482d91c486d61ed47ce5c9268ad04c18ca09082755149c 1175052 cryptsetup_1.6.1.orig.tar.bz2
21345f44cffa88dbb454369b661d0e5df759e6a8444d1e9c3041aff4bd6b0ff6 104838 cryptsetup_1.6.1-1ubuntu1.debian.tar.gz
Files:
eeac44dce4f24eafa99d828c02d5bbd6 2587 admin optional cryptsetup_1.6.1-1ubuntu1.dsc
f374d11e3b0e7ca0f805756fd02e34ff 1175052 admin optional cryptsetup_1.6.1.orig.tar.bz2
be2a25c65eacd097b751418b7f54753b 104838 admin optional cryptsetup_1.6.1-1ubuntu1.debian.tar.gz
Original-Maintainer: Debian Cryptsetup Team <pkg-cryptsetup-devel at lists.alioth.debian.org>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (GNU/Linux)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=K3mJ
-----END PGP SIGNATURE-----
More information about the Trusty-changes
mailing list