ecryptfs-utils-96 has been released, with upstream tarballs (and signatures) available on Launchpad at:
And now in the Ubuntu precise development release.
Special thanks to first time contributors Colin King and Eddie Garcia!
[ Dustin Kirkland ]
* CONTRIBUTING:
- added a new file to describe how to contribute to ecryptfs
* === added directory img/old, img/old/ecryptfs_14.png,
img/old/ecryptfs_192.png, img/old/ecryptfs_64.png:
- saving the old logos/branding for posterity
* debian/copyright, img/COPYING:
- added CC-by-SA 3.0 license
- use the text version
* img/ecryptfs_14.png, img/ecryptfs_192.png, img/ecryptfs_64.png:
- added scaled copies of images used for Launchpad.net branding
* src/utils/ecryptfs-recover-private: LP: #847505
- add an option to allow user to enter the mount passphrase,
in case they've recorded that, but forgotten their login
passphrase
* src/libecryptfs/sysfs.c: LP: #802197
- default sysfs to /sys, if not found in /etc/mtab
- it seems that reading /etc/mtab for this is outdated
- ensure that ecryptfs works even if there is no sysfs entry
in /etc/mtab
* src/key_mod/ecryptfs_key_mod_tspi.c: LP: #462225
- fix TPM and string_to_uuid 64bits issue
- thanks to Janos for the patch
[ Tyler Hicks ]
* CONTRIBUTING:
- clarified how to contribute to the ecryptfs kernel module
* tests/lib/etl_funcs.sh:
- created eCryptfs test library of bash functions for use in test
cases and test harnesses
* test/etl_add_passphrase_key_to_keyring.c:
- created a C helper program to allow bash scripts to interface to
the libecryptfs function that adds passphrase-based keys to the
kernel keyring
* tests/kernel/tests.rc, tests/userspace/tests.rc:
- created a test case category files for test harnesses to source
when running testcases of a certain category (destructive, safe,
etc.)
* tests/run_tests.sh:
- created a test harness to run eCryptfs test cases
* tests/kernel/miscdev-bad-count.sh,
tests/kernel/miscdev-bad-count/test.c:
- created test case for miscdev issue reported to mailing list
* tests/kernel/lp-885744.sh:
- created test case for pathconf bug
* tests/kernel/lp-926292.sh:
- created test case for checking stale inode attrs after setxattr
* tests/new.sh:
- created new test case template to copy from
* tests/userspace/verify-passphrase-sig.sh,
tests/userspace/verify-passphrase-sig/test.c:
- created test case, for make check, to test the creation of
passphrase-based fekeks and signatures
* configure.ac, Makefile.am, tests/Makefile.am, tests/lib/Makefile.am,
tests/kernel/Makefile.am, tests/userspace/Makefile.am:
- updated and created autoconf/automake files to build the new tests
directory
- added make check target
[ Eddie Garcia ]
* img/*: LP: #907131
- contributing a new set of logos and branding under the CC-by-SA3.0
license
[ Colin King ]
* tests/kernel/extend-file-random.sh,
tests/kernel/extend-file-random/test.c:
- Test to randomly extend file size, read/write + unlink
* tests/kernel/trunc-file.sh, tests/kernel/trunc-file/test.c:
- Test to exercise file truncation
* tests/kernel/directory-concurrent.sh,
tests/kernel/directory-concurrent/test.c:
- test for directory creation/deletion races with multiple processes
* tests/kernel/file-concurrent.sh,
tests/kernel/file-concurrent/test.c:
- test for file creation/truncation/unlink races with multiple
processes
* tests/kernel/inotify.sh, tests/kernel/inotify/test.c:
- test for proper inotify support
* tests/kernel/mmap-dir.sh, tests/kernel/mmap-dir/test.c:
- test that directory files cannot be mmap'ed
* tests/kernel/read-dir.sh, tests/kernel/read-dir/test.c:
- test that read() on directory files returns the right error
* tests/kernel/setattr-flush-dirty.sh:
- test that the modified timestamp isn't clobbered in writeback
* tests/kernel/inode-race-stat.sh, tests/kernel/inode-race-stat/test.c:
- test for inode initialization race condition
-- Dustin Kirkland
:-Dustin
No comments:
Post a Comment
Please do not use blog comments for support requests! Blog comments do not scale well to this effect.
Instead, please use Launchpad for Bugs and StackExchange for Questions.
* bugs.launchpad.net
* stackexchange.com
Thanks,
:-Dustin