lp:ubuntu/wily/ecryptfs-utils

Created by Ubuntu Package Importer on 2015-05-06 and last modified on 2015-08-06
Get this branch:
bzr branch lp:ubuntu/wily/ecryptfs-utils
Members of Ubuntu branches can upload to this branch. Log in for directions.

Branch merges

Related bugs

Related blueprints

Branch information

Owner:
Ubuntu branches
Status:
Development

Recent revisions

50. By Dustin Kirkland  on 2015-08-06

[ Martin Pitt ]
* src/utils/ecryptfs-setup-swap:
  - Add setup-swap-check-links.patch: When commenting out existing swap, also
    consider device symlinks like /dev/mapper/ubuntu--vg-swap_1 or
    /dev/disks/by-uuid/ into account. Fixes broken cryptswap under LVM and
    manual setups. (LP: #1453738)
* src/utils/ecryptfs-setup-swap, debian/ecryptfs-utils.postinst:
  - On upgrade, uncomment underlying
    unencrypted swap partitions that are referred to by a device link when
    crypttab and fstab have a "cryptswap*" device referring to them.
* debian/control, debian/libecryptfs0.install,
  debian/libecryptfs0.links, debian/libecryptfs0.shlibs:
  - Rename libecryptfs0 to libecryptfs1 and adjust the packaging. It has
    actually shipped libecryptfs.so.1 since at least trusty. Add
    C/R/P: libecryptfs0 for smoother upgrades, this needs to be kept until
    after 16.04 LTS.

[ Tyler Hicks ]
* src/utils/mount.ecryptfs_private.c: Implement proper option parsing to
  restore the -f option when unmounting and display a helpful usage message
  (LP: #1454388)
* src/utils/mount.ecryptfs_private.c: Add an option, -d, to
  umount.ecryptfs_private to treat the situation where the encrypted private
  session counter is nonzero, after decrementing it, as a non-error
  situation. No error message is printed to stderr and the exit status is 0.
* src/pam_ecryptfs/pam_ecryptfs.c: Use the new umount.ecryptfs_private '-d'
  option to silence the error message that was printed to stderr when the
  encrypted private session counter is nonzero after being decremented.
  (LP: #1454319)
* src/utils/ecryptfs-umount-private: Return 1 if umount.ecryptfs_private
  encounters an error. The ecryptfs-umount-private script was previously
  returning 0 even when umount.ecryptfs_private exited upon error.
* debian/control: Fix 'Please add dh-python package to Build-Depends'
  build warning

[ Dustin Kirkland ]
* debian/libecryptfs1.install, debian/libecryptfs1.links,
  debian/libecryptfs1.shlibs:
  - fix ftbfs, add missing files
* wily

49. By Martin Pitt on 2015-07-09

Rename libecryptfs0 to libecryptfs1 and adjust the packaging. It has
actually shipped libecryptfs.so.1 since at least trusty. Add
C/R/P: libecryptfs0 for smoother upgrades, this needs to be kept until
after 16.04 LTS.

48. By Martin Pitt on 2015-07-09

* Add setup-swap-check-links.patch: When commenting out existing swap, also
  consider device symlinks like /dev/mapper/ubuntu--vg-swap_1 or
  /dev/disks/by-uuid/ into account. Fixes broken cryptswap under LVM and
  manual setups. (LP: #1453738)
* debian/ecryptfs-utils.postinst: On upgrade, uncomment underlying
  unencrypted swap partitions that are referred to by a device link when
  crypttab and fstab have a "cryptswap*" device referring to them.

47. By Martin Pitt on 2015-04-24

* Add setup-swap-mark-gpt-noauto.patch: In ecryptfs-setup-swap, mark the
  "fake" underlying unencrypted swap partition as no-auto Without that, the
  swap partition gets auto-activated under systemd as it cannot be told
  apart from a real unencrypted swap partition.
* debian/ecryptfs-utils.postinst: Fix existing GPT installations with
  cryptswap1 and an offset= for the above issue. (LP: #1447282)

46. By Dustin Kirkland  on 2015-03-26

[ Dustin Kirkland ]
* scripts/release.sh:
  - a few more release script improvements, build the source
    package for the Ubuntu development distro
* debian/control:
  - build depend on distro-info, which we use in our release script
* vivid

[ Tyler Hicks ]
* src/libecryptfs/key_management.c:
  - Fix a regression when reading version 1 wrapped passphrase files. A
    return code indicating success was always returned even when an error
    was encountered. The impact is low since the error situation is still
    caught when validating either the wrapping password's signature or the
    wrapped passphrase's signature. Thanks to László Böszörményi for
    catching this mistake.
  - Reject empty passphrases passed into ecryptfs_wrap_passphrase()
* src/libecryptfs/main.c:
  - Reject empty wrapping passphrases passed into generate_passphrase_sig()

45. By Dustin Kirkland  on 2015-03-11

[ Dustin Kirkland and Martin Pitt ]
* debian/ecryptfs-utils.postinst: LP: #953875
  - detect and clean up after nonexisting cryptswap devices

[ Tyler Hicks ]
* tests/userspace/Makefile.am: Fix the 'make check' failure present in the
  ecryptfs-utils-105 release tarball. The failure was due to the automake
  file not specifying that some data files should be distributed as part
  of the v1-to-v2-wrapped-passphrase test, causing the test to fail due to
  the missing files.

[ Dustin Kirkland ]
* scripts/release.sh:
  - ensure that we try a binary build as part of the release process
  - make sure we're in the original working directory when we release
  - remove the -x option, too noisy
* vivid
* vivid
* vivid

44. By Nobuto Murata on 2013-02-21

[ Colin King ]
* src/libecryptfs/ecryptfs-stat.c, tests/kernel/extend-file-
  random/test.c, tests/kernel/inode-race-stat/test.c,
  tests/kernel/trunc-file/test.c:
  - Fixed some 32 bit build warnings
* src/libecryptfs/decision_graph.c, src/libecryptfs/key_management.c,
  src/libecryptfs/main.c, src/libecryptfs/module_mgr.c, src/utils/io.c,
  src/utils/mount.ecryptfs_private.c, tests/kernel/inotify/test.c,
  tests/kernel/trunc-file/test.c, tests/userspace/wrap-unwrap/test.c:
  - Fixed a pile of minor bugs (memory leaks, unclosed file descriptors,
    etc.) mostly in error paths
* src/key_mod/ecryptfs_key_mod_passphrase.c, src/libecryptfs/main.c,
  src/pam_ecryptfs/pam_ecryptfs.c:
  - more Coverity fixes, memory leak, error checking, etc.

[ Nobuto MURATA ]
* fix an empty update-notifier window (LP: #1107650)
  - changes made in Rev.758 was incomplete

[ Tyler Hicks ]
* doc/manpage/ecryptfs.7:
  - adjust man page text to avoid confusion about whether the interactive
    mount helper takes a capital 'N' for the answer to y/n questions
    (LP: #1130460)
* src/utils/ecryptfs_rewrap_passphrase.c:
  - Handle errors when interactively reading the new wrapping passphrase
    and the confirmation from stdin. Fixes a segfault (invalid memory read)
    in ecryptfs-rewrap-passphrase if there was an error while reading either
    of these passphrases.
* configure.ac:
  - Set AM_CPPFLAGS to always include config.h as the first include file.
    Some .c files correctly included config.h before anything else. The
    majority of .c files got this wrong by including it after other header
    files, including it multiple times, or not including it at all.
    Including it in the AM_CPPFLAGS should solve these problems and keep
    future mistakes from happening in new source files.
  - Enable large file support (LFS) through the use of the AC_SYS_LARGEFILE
    autoconf macro. ecryptfs-utils has been well tested with LFS enabled
    because ecryptfs-utils is being built with
    '-D_LARGEFILE_SOURCE -D_FILE_OFFSET_BITS=64' in Debian-based distros.
    This is mainly needed for some of the in-tree regression tests but
    ecryptfs-utils, in general, should be built with LFS enabled.
* debian/rules:
  - Don't append '-D_LARGEFILE_SOURCE -D_FILE_OFFSET_BITS=64' to the CFLAGS
    now that the upstream build enables LFS
* tests/userspace/lfs.sh, tests/userspace/lfs/test.c:
  - Add a test to verify that LFS is enabled. This test is run under the
    make check target.
* tests/kernel/enospc/test.c:
  - Fix test failures on 32 bit architectures due to large file sizes
    overflowing data types

[ Dustin Kirkland ]
* src/utils/ecryptfs-setup-swap: LP: #1172014
  - write crypttab entry using UUID
* src/utils/ecryptfs-recover-private: LP: #1028532
  - error out, if we fail to mount the private data correctly

[ Colin King and Dustin Kirkland ]
* configure.ac, src/daemon/main.c, src/libecryptfs/cmd_ln_parser.c,
  src/libecryptfs/decision_graph.c, src/utils/mount.ecryptfs.c,
  tests/kernel/trunc-file/test.c:
  - remove some dead code, fix some minor issues raised by Coverity

43. By Dustin Kirkland  on 2009-03-20

[ Dustin Kirkland ]
Userspace fixes for LP: #345544, CVE-2009-0787
* src/utils/ecryptfs-rewrite-file: new script, to rewrite a file,
  forcing it to be re-encrypted when written to disk
* doc/manpage/ecryptfs-rewrite-file.1: documentation added

Unrelated fixes in this release
* src/utils/ecryptfs-mount-private, src/utils/ecryptfs-setup-private,
  src/utils/ecryptfs-setup-swap: use head/line for prompting and reading
  input

[ Michal Hlavinka ]
* ecryptfs-setup-private: don't fail with syntax error when kernel
  module not loaded
* *.desktop: make desktop files standards compliant
* umount.ecryptfs: don't sigsegv when arguments are missing

42. By Dustin Kirkland  on 2009-03-18

[ Dustin Kirkland ]
* src/utils/ecryptfs-[u]mount-private: print message about cd $PWD,
  LP: #332331
* doc/manpage/*: manpage updates
* debian/ecryptfs-utils.prerm: prevent removal of ecryptfs-utils
  package, if in use, LP: #331085
* src/utils/ecryptfs-setup-private:
  - allow for LDAP-based logins, LP: #317307
  - add --noautomount, --noautoumount options, LP: #301759

[ Tyler Hicks ]
* src/libecryptfs/cipher_list.c: ignore unknown ciphers, LP: #335632
* doc/manpage/ecryptfs.7: add key sig mount options info, LP: #329491
* src/utils/mount.ecryptfs.c: scrub unknown option

[ James Dupin ]
* doc/manpage/fr/*: initial cut at french manpages

[ Michal Hlavinka ]
* src/libecryptfs/module_mgr.c: fix mount parameter handling on
  interactive mounting, LP: #331948

41. By Dustin Kirkland  on 2009-02-23

debian/ecryptfs-utils.prerm: perform some cursory checks, to ensure that
there are no obvious, current users of ecryptfs before allowing package
removal, LP: #331085

Branch metadata

Branch format:
Branch format 7
Repository format:
Bazaar repository format 2a (needs bzr 1.16 or later)
Stacked on:
lp:ubuntu/trusty/ecryptfs-utils
This branch contains Public information 
Everyone can see this information.

Subscribers