Accepted cryptsetup 2:1.0.4-8ubuntu1 (source)

Reinhard Tartler siretart at tauware.de
Sun Nov 19 21:25:12 GMT 2006


Accepted:
 OK: cryptsetup_1.0.4-8ubuntu1.dsc
     -> Component: universe Section: admin
 OK: cryptsetup_1.0.4.orig.tar.gz
 OK: cryptsetup_1.0.4-8ubuntu1.diff.gz

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Sun, 19 Nov 2006 20:04:19 +0100
Source: cryptsetup
Binary: cryptsetup cryptsetup-udeb
Architecture: source
Version: 2:1.0.4-8ubuntu1
Distribution: feisty
Urgency: high
Maintainer: Debian Cryptsetup Team <pkg-cryptsetup-devel at lists.alioth.debian.org>
Changed-By: Reinhard Tartler <siretart at tauware.de>
Description: 
 cryptsetup - configures encrypted block devices
 cryptsetup-udeb - configures encrypted block devices
Closes: 370180 370302 375913 376941 378422 379084 379719 379723 379726 379737 379771 382280 385317 387158 388083 388871 389835 390354 390514 393473 393895 394134 394136 395357 396092 396126 397450 397454 397633 397651 397887 397888 398799
Changes: 
 cryptsetup (2:1.0.4-8ubuntu1) feisty; urgency=low
 .
   * merge debian changes, remaining patches:
     - Always output and read from the console.  Ubuntu: #58794.
   * other changes have been merged or do noy apply anymore
   * read password via usplash if available in initramfs for rootfs. based on a patch from
     Swen Thuemmler (Thanks for that!)  Ubuntu #62751
   * read password from initscript via usplash if running. should fix the
     rest of Ubuntu #62751. Only problem with that patch: It asks only once
     for the password! improvements welcome!
 .
 cryptsetup (2:1.0.4-8) unstable; urgency=high
 .
   [ Jonas Meurer ]
   * Add 'set -e' and 'if ...; then ... fi' to cryptdisks-early as well.
 .
   [ David Haerdeman ]
   * Make sure that a failed modprobe does not break with 'set -e'.
     (closes: #398799)
 .
 cryptsetup (2:1.0.4-7) unstable; urgency=low
 .
   [ David Haerdeman ]
   * Do not try to configure resume devices which we cant get the key for
     and also try harder to find resume devices.
     (closes: #397887, #397888)
   * Kill some more bashisms.
   * Only try three times per crypto device in initramfs scripts to avoid
     unbootable systems if a swap partition can't be setup.
   * Added decrypt_derived keyscript and improved documentation of latest
     changes, see README.initramfs for details.
 .
 cryptsetup (2:1.0.4-6) unstable; urgency=high
 .
   [ David Haerdeman ]
   * Improve LVM dependency checks in initramfs hook. Thanks to Loic
     Minier <lool at dooz.org> for the patch. (closes: #397633, #397651)
 .
 cryptsetup (2:1.0.4-5) unstable; urgency=high
 .
   [ David Haerdeman ]
   * Make sure that duplicate entries in initramfs do not block the boot
     (closes: #397454)
   * Do not check for the presence of a key if the keyscript option is
     set (closes: #397450)
 .
 cryptsetup (2:1.0.4-4) unstable; urgency=high
 .
   [ David Haerdeman ]
   * Readd and document the kernel boot argument "cryptopts" due to user
     demand
   * Implement support for multiple device setup in initramfs.
     (closes: #394136, #382280)
   * Remove bashisms. (closes: #396092)
   * Fix FTBFS by altering dpatch so that it is applied to Makefile.in.in
     before configure is executed. (closes: #396126)
 .
   [ Jonas Meurer ]
   * Only warn for insecure keyfile mode/owner. Add some information about
     insecure keys in README.Debian. (closes: #395357, #394134)
 .
 cryptsetup (2:1.0.4-3) unstable; urgency=medium
 .
   [ Jonas Meurer ]
   * Suggest dosfstools. Needed for the default settings in luksformat. Thanks
     to Loic Minier <lool at dooz.org>. (closes: #393473)
   * Suggest initramfs-tools (>= 0.60) | linux-initramfs-tool as well.
   * Still urgency=medium for the same reasons
 .
   [ David Haerdeman ]
   * Change the previous fix for #388871 to use the original patch from
     Loic Minier <lool at dooz.org>. This also removes the bogus UTF8 char.
     (closes: #393895)
 .
 cryptsetup (2:1.0.4-2) unstable; urgency=medium
 .
   [ Jonas Meurer ]
   * Fix postinst, use 'elif [ -z $foo] || [ -z $bar ]; then ...'
   * Fix a typo in cryptdisks.functions, change $opt to $opts for more
     consistency with the postinst script.
   * Fix mount_fs() in cryptdisks.functions to actually do what we want it to
     do. Up to now, the initscript stopped if a mountpoint failed to mount.
   * urgency=medium to get cryptsetup 1.0.4 into etch
 .
 cryptsetup (2:1.0.4-1) unstable; urgency=low
 .
   [ David Haerdeman ]
   * Always update the current initramfs when a new version is installed
   * Move the double-ssl decryption into a keyscript and change the ssl
     option to use that script instead
   * Move the gpg key decryption into a keyscript and change the gpg
     option to use that script instead
   * Clean up cryptdisks.functions
   * Let initramfs-tools know that we need busybox in the initramfs image
   * Fix bogus error message from initramfs hook, based on patch by
     Loic Minier <lool at dooz.org>. (closes: #388871)
   * Remove the undocumented kernel boot argument "cryptopts"
   * Always add some crypto modules/tools to the initramfs image unless
     MODULES=dep. (closes: #389835)
   * Update README.initramfs.
   * Add checks and warnings that the ssl and gpg options are going away
     in favour of the keyscript option
   * Fix the decrypt_ssl script (closes: #390514)
 .
   [ Jonas Meurer ]
   * New upstream release.
     - [01_terminal_output.dpatch] removed, finally went upstream
     - [02_docs_tries.dpatch] removed, went upstream
     - [03_fix_build_error.dpatch] renamed to 01_fix_build_error.dpatch
   * Fix SYNOPSIS in crypttab(5) manpage to show all arguments as mandatory.
     Thanks to Michael Steinfurth.
   * Check in postinst for entries with missing arguments in /etc/crypttab.
     Warn is one is found. Thanks to Michael Steinfurth (closes: #388083)
   * Fix pretest for encrypted swap. Allow unencrypted swap on the source
     device. Thanks to Dennis Furey. (closes: #387158)
   * Fix posttest for encrypted swap. Don't skip if a swap filesystem is found
     on the target device. Thanks to Sam Couter. (closes: #385317)
   * Use 'set -e' and 'if [ -r <file> ]; then ...; fi' in init script. Thanks
     to Goswin Brederlow. (closes: #390354)
   * change '... > &2' to ... >&2' in cryptdisks.functions
 .
 cryptsetup (2:1.0.4~rc2-1) unstable; urgency=low
 .
   [ Jonas Meurer ]
   * Add some more german translations to de.po.
   * Add a note to NEWS.Debian where the fix for #376393 is explained. thanks
     to Robert Bihlmeyer for the report. (closes: #379719)
   * Allow swap filesystems to be overwritten when the swap flag is set. thanks
     to Raphael Quinet for the report. (closes: #379771)
   * Update to upstream 1.0.4-rc2. (closes: #378422, #379726, closes: #379723)
   * removed patches 03-05, merged upstream.
   * [01_terminal_output.dpatch] updated for new upstream.
   * [02_docs_tries.dpatch] updated for new upstream, to fix luksDelKey
     documentation and to give more information about the keysize.
     (closes: #379084)
 .
   [ David Haerdeman ]
   * Make sure that README.initramfs is included in the package (closes
     #380048)
   * Replace panic calls in cryptsetup script with exit 1 to match the
     behaviour of other scripts. The regular initramfs script will panic
     later when root isn't detected anyway
   * Make all four fields in crypttab mandatory (closes: #370180,
     #376941)
   * Add UTF8 keyboard input support to initramfs image (closes: #379737)
   * Add a keyscript option (closes: #370302, #375913)
   * [03_fix_build_error.dpatch] patch po/Makefile with more recent
     gettext implementation.
Files: 
 b2b9eb906caf422fb25aec1d7d1a57a9 852 admin optional cryptsetup_1.0.4-8ubuntu1.dsc
 bc3fa31b2e743deb755b04ca8e582617 429504 admin optional cryptsetup_1.0.4.orig.tar.gz
 8428e986a35436c3c0593ab7f1ff4315 43042 admin optional cryptsetup_1.0.4-8ubuntu1.diff.gz
Package-Type: udeb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (GNU/Linux)
Comment: Debian Powered!

iD8DBQFFYMoxmAg1RJRTSKQRAo79AJ9YQhSVhScSI+12l/shOsH5kGW4sACfWDIo
rY5Pi10AquKgpDpipironh0=
=AobX
-----END PGP SIGNATURE-----





More information about the feisty-changes mailing list