50
|
|
[ Martin Pitt ] * src/utils/ecryptfs-setup-swap: - Add setup-swap-check-links.patch: When commenting out existing swap, also consider device symlinks like /dev/mapper/ubuntu--vg-swap_1 or /dev/disks/by-uuid/ into account. Fixes broken cryptswap under LVM and manual setups. (LP: #1453738) * src/utils/ecryptfs-setup-swap, debian/ecryptfs-utils.postinst: - On upgrade, uncomment underlying unencrypted swap partitions that are referred to by a device link when crypttab and fstab have a "cryptswap*" device referring to them. * debian/control, debian/libecryptfs0.install, debian/libecryptfs0.links, debian/libecryptfs0.shlibs: - Rename libecryptfs0 to libecryptfs1 and adjust the packaging. It has actually shipped libecryptfs.so.1 since at least trusty. Add C/R/P: libecryptfs0 for smoother upgrades, this needs to be kept until after 16.04 LTS.
[ Tyler Hicks ] * src/utils/mount.ecryptfs_private.c: Implement proper option parsing to restore the -f option when unmounting and display a helpful usage message (LP: #1454388) * src/utils/mount.ecryptfs_private.c: Add an option, -d, to umount.ecryptfs_private to treat the situation where the encrypted private session counter is nonzero, after decrementing it, as a non-error situation. No error message is printed to stderr and the exit status is 0. * src/pam_ecryptfs/pam_ecryptfs.c: Use the new umount.ecryptfs_private '-d' option to silence the error message that was printed to stderr when the encrypted private session counter is nonzero after being decremented. (LP: #1454319) * src/utils/ecryptfs-umount-private: Return 1 if umount.ecryptfs_private encounters an error. The ecryptfs-umount-private script was previously returning 0 even when umount.ecryptfs_private exited upon error. * debian/control: Fix 'Please add dh-python package to Build-Depends' build warning
[ Dustin Kirkland ] * debian/libecryptfs1.install, debian/libecryptfs1.links, debian/libecryptfs1.shlibs: - fix ftbfs, add missing files * wily
|
Dustin Kirkland |
108-0ubuntu1 |
8 years ago
|
|
|
49
|
|
|
Martin Pitt |
107-0ubuntu3 |
8 years ago
|
|
|
48
|
|
|
Martin Pitt |
107-0ubuntu2 |
8 years ago
|
|
|
47
|
|
|
Martin Pitt |
107-0ubuntu1.1 |
9 years ago
|
|
|
46
|
|
|
Dustin Kirkland |
107-0ubuntu1 |
9 years ago
|
|
|
45
|
|
|
Dustin Kirkland |
106-0ubuntu1 |
9 years ago
|
|
|
44
|
|
[ Colin King ] * src/libecryptfs/ecryptfs-stat.c, tests/kernel/extend-file- random/test.c, tests/kernel/inode-race-stat/test.c, tests/kernel/trunc-file/test.c: - Fixed some 32 bit build warnings * src/libecryptfs/decision_graph.c, src/libecryptfs/key_management.c, src/libecryptfs/main.c, src/libecryptfs/module_mgr.c, src/utils/io.c, src/utils/mount.ecryptfs_private.c, tests/kernel/inotify/test.c, tests/kernel/trunc-file/test.c, tests/userspace/wrap-unwrap/test.c: - Fixed a pile of minor bugs (memory leaks, unclosed file descriptors, etc.) mostly in error paths * src/key_mod/ecryptfs_key_mod_passphrase.c, src/libecryptfs/main.c, src/pam_ecryptfs/pam_ecryptfs.c: - more Coverity fixes, memory leak, error checking, etc.
[ Nobuto MURATA ] * fix an empty update-notifier window (LP: #1107650) - changes made in Rev.758 was incomplete
[ Tyler Hicks ] * doc/manpage/ecryptfs.7: - adjust man page text to avoid confusion about whether the interactive mount helper takes a capital 'N' for the answer to y/n questions (LP: #1130460) * src/utils/ecryptfs_rewrap_passphrase.c: - Handle errors when interactively reading the new wrapping passphrase and the confirmation from stdin. Fixes a segfault (invalid memory read) in ecryptfs-rewrap-passphrase if there was an error while reading either of these passphrases. * configure.ac: - Set AM_CPPFLAGS to always include config.h as the first include file. Some .c files correctly included config.h before anything else. The majority of .c files got this wrong by including it after other header files, including it multiple times, or not including it at all. Including it in the AM_CPPFLAGS should solve these problems and keep future mistakes from happening in new source files. - Enable large file support (LFS) through the use of the AC_SYS_LARGEFILE autoconf macro. ecryptfs-utils has been well tested with LFS enabled because ecryptfs-utils is being built with '-D_LARGEFILE_SOURCE -D_FILE_OFFSET_BITS=64' in Debian-based distros. This is mainly needed for some of the in-tree regression tests but ecryptfs-utils, in general, should be built with LFS enabled. * debian/rules: - Don't append '-D_LARGEFILE_SOURCE -D_FILE_OFFSET_BITS=64' to the CFLAGS now that the upstream build enables LFS * tests/userspace/lfs.sh, tests/userspace/lfs/test.c: - Add a test to verify that LFS is enabled. This test is run under the make check target. * tests/kernel/enospc/test.c: - Fix test failures on 32 bit architectures due to large file sizes overflowing data types
[ Dustin Kirkland ] * src/utils/ecryptfs-setup-swap: LP: #1172014 - write crypttab entry using UUID * src/utils/ecryptfs-recover-private: LP: #1028532 - error out, if we fail to mount the private data correctly
[ Colin King and Dustin Kirkland ] * configure.ac, src/daemon/main.c, src/libecryptfs/cmd_ln_parser.c, src/libecryptfs/decision_graph.c, src/utils/mount.ecryptfs.c, tests/kernel/trunc-file/test.c: - remove some dead code, fix some minor issues raised by Coverity
|
Nobuto MURATA |
104-0ubuntu1 |
11 years ago
|
|
|
43
|
|
|
Dustin Kirkland |
73-0ubuntu1 |
15 years ago
|
|
|
42
|
|
|
Dustin Kirkland |
72-0ubuntu1 |
15 years ago
|
|
|
41
|
|
|
Dustin Kirkland |
71-0ubuntu2 |
15 years ago
|
|
|
40
|
|
|
Dustin Kirkland |
71-0ubuntu1 |
15 years ago
|
|
|
39
|
|
|
Dustin Kirkland |
70-0ubuntu1 |
15 years ago
|
|
|
38
|
|
|
Dustin Kirkland |
69-0ubuntu2 |
15 years ago
|
|
|
37
|
|
|
Dustin Kirkland |
69-0ubuntu1 |
15 years ago
|
|
|
36
|
|
|
Dustin Kirkland |
68-1ubuntu2 |
15 years ago
|
|
|
35
|
|
|
Dustin Kirkland |
68-1ubuntu1 |
15 years ago
|
|
|
34
|
|
|
Dustin Kirkland |
67-1ubuntu1 |
15 years ago
|
|
|
33
|
|
|
Dustin Kirkland |
66-2ubuntu3 |
15 years ago
|
|
|
32
|
|
|
Dustin Kirkland |
66-2ubuntu2 |
15 years ago
|
|
|
31
|
|
* Merge from debian unstable, (LP: #259631, #293433, #286265, #247421, #294888, #298421) * Remaining changes: - debian/ecryptfs-utils.postinst: handle pam-auth-update (Bug: #506172) - debian/rules: + keep the dpatch infrastructure around, as we'll likely need it again at some point soon + install the desktop, readme, and pam-auth-update files () - debian/ecryptfs-utils.install: install the desktop, readme shared files (Bug: #506172) - debian/control: + keep the dpatch build dep + depend on libpam-runtime (Bug: #506172) - debian/ecryptfs-utils.prerm: remove pam-auth-update configuration (Bug: #506172) - debian/ecryptfs-mount-private.txt: readme to install in unmounted private dir (Bug: #506172) - debian/ecryptfs-mount-private.desktop: desktop link to install in unmounted private dir (Bug: #506172) - debian/ecryptfs-utils.dirs: usr share install dirs (Bug: #506172) - debian/ecryptfs-utils.pam-auth-update: pam stack configuration (Bug: #506172)
|
Dustin Kirkland |
66-2ubuntu1 |
15 years ago
|
|
|