lp://staging/~tyhicks/ecryptfs/lp1597154-packaging
- Get this branch:
- bzr branch lp://staging/~tyhicks/ecryptfs/lp1597154-packaging
Branch merges
- Martin Pitt (community): Approve
- Jason Gerard DeRose (community): Approve
- eCryptfs: Pending requested
-
Diff: 84 lines (+52/-0)3 files modifieddebian/changelog (+6/-0)
debian/ecryptfs-utils.postinst (+42/-0)
src/utils/ecryptfs-setup-swap (+4/-0)
Related bugs
Related blueprints
Branch information
Recent revisions
- 884. By Tyler Hicks
-
debian/
ecryptfs- utils.postinst: Fix any unencrypted GPT swap partitions
that have mistakenly remained marked as auto mount. This should only
modify the swap partitions on systems that ecryptfs-setup-swap has been
used on. (LP: #1447282, LP: #1597154) - 883. By Tyler Hicks
-
tests/kernel/
lp-872905. sh: Adjust the test to account for upstream kernel
changes that were preventing the test from cleaning up after itself. The kernel
had a change of behavior where mounts that are configured to use encrypted
filenames will not be able to successfully lookup lower files with plaintext
filenames. This change caused the lower filler file, which was being created
directly in the lower filesystem, to not be removed during the test cleanup and
all of the following tests to fail since the lower filesystem remained full.The upstream kernel commit mentioned above is:
88ae4ab ecryptfs_lookup(): try either only encrypted or plaintext name
- 882. By Tyler Hicks
-
src/utils/
ecryptfs- setup-swap: Prevent unencrypted swap partitions from
being automatically enabled by systemd. This bug affected GPT partitioned
NVMe/MMC drives and resulted in the swap partition being used without
encryption. It also resulted in a usability issue in that users were
erroneously prompted to enter a pass-phrase to unlock their swap partition
at boot. (LP: #1597154) - 881. By Tyler Hicks
-
[ Richard Laager ]
* src/utils/ecryptfs- setup-private: LP: #1574174
- Adjust the test for discovering already active mount point destinations
so that it doesn't accidentally match mount point sources.
- Fixes ecryptfs-setup-private issue when attempting to use ZFS and
eCryptfs together - 878. By Dustin Kirkland
-
* src/utils/
ecryptfs- setup-private: LP: #1328689
- fix a long standing bug, where setting up an encrypted private,
encrypted home, or migrating to an encrypted home did not work
correctly over ssh sessions
- the root cause of the bug is some complexity in the handling of
user keyrings and session keyrings
- the long term solution would be to correctly use session keyrings
- the short term solution is to continue linking user and session
keyrings - 875. By Dustin Kirkland
-
* Remove unnecessary dependencies in the Debian packaging (LP: #1548975)
- debian/control: Remove opencryptoki from ecryptfs-utils
- debian/rules: Remove openCryptoki related logic since it was not being
- debian/control: Remove libtspi-dev from libecryptfs-dev Depends since
- debian/control: Remove libpkcs11-helper1- dev from libecryptfs-dev
Depends since --disable-pkcs11- helper is passed to the configure script
- debian/control: Remove libgpg-error-dev and libgpgme11-dev from
- debian/control: Remove libgcrypt11-dev from Build-Depends and
- debian/control: Remove libkeyutils-dev and libpam0g-dev from
Branch metadata
- Branch format:
- Branch format 7
- Repository format:
- Bazaar repository format 2a (needs bzr 1.16 or later)
- Stacked on:
- lp://staging/ecryptfs