summaryrefslogtreecommitdiff
path: root/sys-fs
diff options
context:
space:
mode:
authorDoug Goldstein <cardoe@gentoo.org>2009-04-19 18:41:08 +0000
committerDoug Goldstein <cardoe@gentoo.org>2009-04-19 18:41:08 +0000
commitf25a9ee53aff53a63901c4e51abf891ef1569695 (patch)
treeae45da2c998465b34bd8921ff9f00dacbf847fc5 /sys-fs
parentPunt for bug 266775 (diff)
downloadhistorical-f25a9ee53aff53a63901c4e51abf891ef1569695.tar.gz
historical-f25a9ee53aff53a63901c4e51abf891ef1569695.tar.bz2
historical-f25a9ee53aff53a63901c4e51abf891ef1569695.zip
clean up old versions. clean up depends
Package-Manager: portage-2.1.6.11/cvs/Linux x86_64
Diffstat (limited to 'sys-fs')
-rw-r--r--sys-fs/cryptsetup/ChangeLog8
-rw-r--r--sys-fs/cryptsetup/Manifest20
-rw-r--r--sys-fs/cryptsetup/cryptsetup-1.0.5-r1.ebuild3
-rw-r--r--sys-fs/cryptsetup/cryptsetup-1.0.5.ebuild98
-rw-r--r--sys-fs/cryptsetup/cryptsetup-1.0.6-r1.ebuild102
-rw-r--r--sys-fs/cryptsetup/cryptsetup-1.0.6-r2.ebuild3
-rw-r--r--sys-fs/cryptsetup/cryptsetup-1.0.6.ebuild95
-rw-r--r--sys-fs/cryptsetup/files/1.0.6-dm-crypt-start.sh299
8 files changed, 24 insertions, 604 deletions
diff --git a/sys-fs/cryptsetup/ChangeLog b/sys-fs/cryptsetup/ChangeLog
index 04712da06160..38dea5e69dcb 100644
--- a/sys-fs/cryptsetup/ChangeLog
+++ b/sys-fs/cryptsetup/ChangeLog
@@ -1,6 +1,12 @@
# ChangeLog for sys-fs/cryptsetup
# Copyright 1999-2009 Gentoo Foundation; Distributed under the GPL v2
-# $Header: /var/cvsroot/gentoo-x86/sys-fs/cryptsetup/ChangeLog,v 1.63 2009/04/10 16:51:56 caleb Exp $
+# $Header: /var/cvsroot/gentoo-x86/sys-fs/cryptsetup/ChangeLog,v 1.64 2009/04/19 18:41:07 cardoe Exp $
+
+ 19 Apr 2009; Doug Goldstein <cardoe@gentoo.org>
+ -files/1.0.6-dm-crypt-start.sh, -cryptsetup-1.0.5.ebuild,
+ cryptsetup-1.0.5-r1.ebuild, -cryptsetup-1.0.6.ebuild,
+ -cryptsetup-1.0.6-r1.ebuild, cryptsetup-1.0.6-r2.ebuild:
+ clean up old versions. clean up depends
10 Apr 2009; Caleb Tennis <caleb@gentoo.org> cryptsetup-0.1-r3.ebuild,
cryptsetup-1.0.5.ebuild, cryptsetup-1.0.5-r1.ebuild,
diff --git a/sys-fs/cryptsetup/Manifest b/sys-fs/cryptsetup/Manifest
index 17a03c454c0a..b3f509fbce38 100644
--- a/sys-fs/cryptsetup/Manifest
+++ b/sys-fs/cryptsetup/Manifest
@@ -1,8 +1,10 @@
+-----BEGIN PGP SIGNED MESSAGE-----
+Hash: SHA1
+
AUX 1.0.5-dm-crypt-start.sh 8298 RMD160 858f607fe1a2036430f972dbbc643c178baf96f7 SHA1 00c7380894d30842c01ef18ed3e14114cf1da36b SHA256 8c9f4a502dfb20e1a6c656a9563da539dbe8d1aeeb3517bc34bf14a7d301f201
AUX 1.0.5-dm-crypt-stop.sh 1022 RMD160 c74d4fffec325378bb008b28c4225b67577c1d1b SHA1 d7b18d4d4845540baecdde373942cc8966c3d5e3 SHA256 42015047c708aa73eae615559ff76c9c8948a5d01fba68f64c5432e30ec799a4
AUX 1.0.5-dmcrypt.confd 3029 RMD160 c84d92a58923ce88a60ab1e8fcc88910b0689df6 SHA1 b006d7f31773842e7247b2df0fe1735aac87ec59 SHA256 b5ea27a1034dda22b287422097e30e99a0673bd6a3148e38b1c2310bdcc28280
AUX 1.0.5-dmcrypt.rc 660 RMD160 f1af3b07db2eaf938fd21b8ef4b23068f2fac78a SHA1 c297587c68d84611a8fec444d3a98443105efee7 SHA256 11518d0d26572b07f43e7ad69f638e93546656b9f14b647d9825ab8b4619906d
-AUX 1.0.6-dm-crypt-start.sh 8347 RMD160 9bac18ce843ba52e2b2acf354d9c9bd3f7aba6f9 SHA1 6c90da6e4a8ea1e431a18008817341baf1b591fd SHA256 b92b512565c41f9c7c281815735c7234b4f6c445ba2e435be36d6d9e1e14267e
AUX 1.0.6-dmcrypt.confd 3141 RMD160 64d4d4d7df03d301632851bee5969d11a61d57b1 SHA1 e44c783fd42076c7976cdb9bbf2c5280382ffa31 SHA256 9a962e482ead52e7636c0b99145a420f817c73efb6d506cb8322e555e5515325
AUX 1.0.6-r2-dm-crypt-start.sh 8086 RMD160 fd7efee56a67b66f80e39a154365959f9068930e SHA1 d11d188022cc6909c914efb22449d2a8a39a0899 SHA256 e338c017d0b645eb2e1d6d88d0d01610f8bf1ddf3901203be5047845eb13d782
AUX cryptfs.confd 1337 RMD160 f98acce860d95d69e8e95d9bab32ba5bb5bef421 SHA1 5e7b239e549b6def07af968d02b300ec36d8aac1 SHA256 8c8e815297eb20140ae7d4d555d3bfdd373ad368adf179841516430da370505c
@@ -14,10 +16,14 @@ DIST cryptsetup-0.1.tar.bz2 249013 RMD160 0657a5750e32e059e3a2ad10b3de0027d61644
DIST cryptsetup-1.0.5.tar.bz2 322394 RMD160 99d9b0090b297b1bc2c72c064f091c8b2f322f70 SHA1 3e275fa67e761f6ed229ecfe831dd8a7da4be4b4 SHA256 4bab529afa00cafde3bc5df2769578c88438f80c5152d4257cd0e86986f95bc4
DIST cryptsetup-1.0.6.tar.bz2 405713 RMD160 7ec056cf80fd25a782d3f6cc345858cf4ea988ec SHA1 dd45ad6a29c2e9af83c2c1525b02d7af88ab7212 SHA256 df7fda80cfa01f063caf39140287a47d018dfe056fc71a3ba605e690ff0183fd
EBUILD cryptsetup-0.1-r3.ebuild 1882 RMD160 cba167af414ab6349b172c5c8d6449ba7228458a SHA1 f9a70a151fdd2cb7e3591514f583c066e4899c0b SHA256 ffee91a66e88d879e3f6bfee3ab97e97b6735315e0d9c81d8b2ec005dcf8d473
-EBUILD cryptsetup-1.0.5-r1.ebuild 2904 RMD160 c258d8524878e09cfb7f378380d2609282eb6e3b SHA1 817a5a8462ba2fde68b0a20255e29d7a043c3a47 SHA256 15f9d7ea62a627fccec2b8fdda155904923f18f7e7dc83f864b44c9d7a13aaba
-EBUILD cryptsetup-1.0.5.ebuild 2668 RMD160 c3ba025527a8af2f197a234d81222e51394561ef SHA1 0a4235aa2058ff9cfdb1ba149803290cb486a8e4 SHA256 08362343bf08e06f4ce5e480e94522974a9c65a4cc15dee7b3e6befe3da68f9e
-EBUILD cryptsetup-1.0.6-r1.ebuild 3009 RMD160 44167d72bf991fa28edfe06d56ba2c67d3609b93 SHA1 b0bc73699d64587d87d8f03411ad1d991c12ed5e SHA256 3e52f8592d7052a973e1d272e53c73c40a8be3e9c87d261a1d69d33f3486bfc9
-EBUILD cryptsetup-1.0.6-r2.ebuild 3049 RMD160 16df1d1cead21ff00bae153bf62b9bbeac528412 SHA1 85be28b0d8503ea4ebb2d7f9e631f023f480de84 SHA256 c88a34b8d0bf39fa98a9398e5b30d8e2ef45427a4cb40bede461235efa88c851
-EBUILD cryptsetup-1.0.6.ebuild 2868 RMD160 22f4698188e55194f3f5855fa90715267d71b3c4 SHA1 193ecb86971795371e1cb23cc9db83a88d5e5412 SHA256 980e9910567940b98797a4dae041a4fbed1eab679d528ee2a77e1802d226f053
-MISC ChangeLog 8925 RMD160 451782410fac468612e5c9a57cb89a7d90c52113 SHA1 b6af2ae68da455397da4859508e0a0550c5c4785 SHA256 a6c6b98160c705e89260b63a545e57e3b96ff8855760bc790c3f864829519fa4
+EBUILD cryptsetup-1.0.5-r1.ebuild 2967 RMD160 e3d53062c60387d7ed59c864a842de457f031d3f SHA1 4a603cb45fe4cf249cc6a75413d3e14481098b6e SHA256 4f305ccb9c8432becb2e4a42859305aa642d3df8c8ed04b78c5dca4f839bead7
+EBUILD cryptsetup-1.0.6-r2.ebuild 3112 RMD160 f833a6f36e18935eab111a8d87429fa14e36f79f SHA1 a9b2cfea40a03760eb984b8f4689c878b1523789 SHA256 413d9a58c739b55c7916959278f9378d7d612bfb8429e7c666ea1f5b5f320956
+MISC ChangeLog 9194 RMD160 792829471a069f6d49d3be9ddd3219e43837c7b3 SHA1 ab31d2cc707d420bf4f6d0528b405d9a69e81393 SHA256 628ad511d9d95655083b4f255d7346d08e08d23f262f56344834f84fae40b17d
MISC metadata.xml 239 RMD160 81512c49e64b6e70c7b746ba09d3e6fce4c7bc89 SHA1 c4085a72e46fe6bcea5bdff780007791eae6db4b SHA256 aebd5282fb892100f348eba1ed27edd27e7296356897c6f5314674f8abb4b51a
+-----BEGIN PGP SIGNATURE-----
+Version: GnuPG v2.0.11 (GNU/Linux)
+
+iEUEARECAAYFAknrcJcACgkQoeSe8B0zEfzoFwCY+qiveyYKeG3h0Fy6EoO2G1Fh
+sgCeLg+Kt/SnFFbuiTMJsJKCzEe5Du4=
+=0FLk
+-----END PGP SIGNATURE-----
diff --git a/sys-fs/cryptsetup/cryptsetup-1.0.5-r1.ebuild b/sys-fs/cryptsetup/cryptsetup-1.0.5-r1.ebuild
index fa69fb5033e6..c280904bdb92 100644
--- a/sys-fs/cryptsetup/cryptsetup-1.0.5-r1.ebuild
+++ b/sys-fs/cryptsetup/cryptsetup-1.0.5-r1.ebuild
@@ -1,6 +1,6 @@
# Copyright 1999-2009 Gentoo Foundation
# Distributed under the terms of the GNU General Public License v2
-# $Header: /var/cvsroot/gentoo-x86/sys-fs/cryptsetup/cryptsetup-1.0.5-r1.ebuild,v 1.15 2009/04/10 16:51:56 caleb Exp $
+# $Header: /var/cvsroot/gentoo-x86/sys-fs/cryptsetup/cryptsetup-1.0.5-r1.ebuild,v 1.16 2009/04/19 18:41:07 cardoe Exp $
inherit linux-info eutils flag-o-matic multilib
@@ -21,6 +21,7 @@ DEPEND="|| (
>=dev-libs/libgpg-error-1.0-r1
>=dev-libs/popt-1.7
sys-fs/udev
+ || ( >=sys-libs/e2fsprogs-libs-1.41 <sys-fs/e2fsprogs-1.41 )
selinux? ( sys-libs/libselinux )
!>=sys-fs/udev-126
!sys-fs/cryptsetup-luks"
diff --git a/sys-fs/cryptsetup/cryptsetup-1.0.5.ebuild b/sys-fs/cryptsetup/cryptsetup-1.0.5.ebuild
deleted file mode 100644
index 3f8ce830c4d6..000000000000
--- a/sys-fs/cryptsetup/cryptsetup-1.0.5.ebuild
+++ /dev/null
@@ -1,98 +0,0 @@
-# Copyright 1999-2009 Gentoo Foundation
-# Distributed under the terms of the GNU General Public License v2
-# $Header: /var/cvsroot/gentoo-x86/sys-fs/cryptsetup/cryptsetup-1.0.5.ebuild,v 1.7 2009/04/10 16:51:56 caleb Exp $
-
-inherit linux-info eutils flag-o-matic multilib
-
-DESCRIPTION="Tool to setup encrypted devices with dm-crypt"
-HOMEPAGE="http://luks.endorphin.org/"
-SRC_URI="http://luks.endorphin.org/source/${P}.tar.bz2"
-
-LICENSE="GPL-2"
-SLOT="0"
-KEYWORDS="~alpha ~amd64 ~arm ~hppa ~ia64 ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86"
-IUSE="dynamic nls selinux"
-
-DEPEND="|| (
- >=sys-fs/lvm2-2.02.45
- >=sys-fs/device-mapper-1.00.07-r1
- )
- >=dev-libs/libgcrypt-1.1.42
- >=dev-libs/libgpg-error-1.0-r1
- >=dev-libs/popt-1.7
- sys-fs/udev
- selinux? ( sys-libs/libselinux )
- !>=sys-fs/udev-126
- !sys-fs/cryptsetup-luks"
-
-dm-crypt_check() {
- local CONFIG_CHECK="~DM_CRYPT"
- local WARNING_DM_CRYPT="CONFIG_DM_CRYPT:\tis not set (required for cryptsetup)\n"
- check_extra_config
-}
-
-crypto_check() {
- local CONFIG_CHECK="~CRYPTO"
- local WARNING_CRYPTO="CONFIG_CRYPTO:\tis not set (required for cryptsetup)\n"
- check_extra_config
-}
-
-cbc_check() {
- local CONFIG_CHECK="~CRYPTO_CBC"
- local WARNING_CRYPTO_CBC="CONFIG_CRYPTO_CBC:\tis not set (required for kernel 2.6.19)\n"
- check_extra_config
-}
-
-src_unpack() {
- unpack ${A}
- cd "${S}"
-}
-
-pkg_setup() {
- dm-crypt_check
- crypto_check
- cbc_check
-}
-
-src_compile() {
- if use dynamic ; then
- ewarn "If you need cryptsetup for an initrd or initramfs then you"
- ewarn "should NOT use the dynamic USE flag"
- epause 5
- fi
-
- econf \
- --sbindir=/sbin \
- $(use_enable !dynamic static) \
- --libdir=/usr/$(get_libdir) \
- $(use_enable nls) \
- $(use_enable selinux) \
- || die
-
- emake || die
-}
-
-src_install() {
- emake DESTDIR="${D}" install || die "install failed"
- rmdir "${D}"/usr/$(get_libdir)/cryptsetup
- insinto /lib/rcscripts/addons
- #dosym /sbin/cryptsetup /bin/cryptsetup
- newins "${FILESDIR}"/1.0.5-dm-crypt-start.sh dm-crypt-start.sh || die
- newins "${FILESDIR}"/1.0.5-dm-crypt-stop.sh dm-crypt-stop.sh || die
- newconfd "${FILESDIR}"/1.0.5-dmcrypt.confd dmcrypt || die
- newinitd "${FILESDIR}"/1.0.5-dmcrypt.rc dmcrypt || die
-}
-
-pkg_postinst() {
- ewarn "This ebuild introduces a new set of scripts and configuration"
- ewarn "then the last version. If you are currently using /etc/conf.d/cryptfs"
- ewarn "then you *MUST* copy your old file to:"
- ewarn "/etc/conf.d/dmcrypt"
- ewarn "Or your encrypted partitions will *NOT* work."
- einfo
- einfo "Please see the example for configuring a LUKS mountpoint"
- einfo "in /etc/conf.d/dmcrypt"
- einfo
- einfo "If you are using baselayout-2 then please do:"
- einfo "rc-update add dmcrypt boot"
-}
diff --git a/sys-fs/cryptsetup/cryptsetup-1.0.6-r1.ebuild b/sys-fs/cryptsetup/cryptsetup-1.0.6-r1.ebuild
deleted file mode 100644
index b25c18bc50d3..000000000000
--- a/sys-fs/cryptsetup/cryptsetup-1.0.6-r1.ebuild
+++ /dev/null
@@ -1,102 +0,0 @@
-# Copyright 1999-2009 Gentoo Foundation
-# Distributed under the terms of the GNU General Public License v2
-# $Header: /var/cvsroot/gentoo-x86/sys-fs/cryptsetup/cryptsetup-1.0.6-r1.ebuild,v 1.5 2009/04/10 16:51:56 caleb Exp $
-
-inherit linux-info eutils flag-o-matic multilib
-
-DESCRIPTION="Tool to setup encrypted devices with dm-crypt"
-HOMEPAGE="http://luks.endorphin.org/"
-SRC_URI="http://luks.endorphin.org/source/${P}.tar.bz2"
-
-LICENSE="GPL-2"
-SLOT="0"
-KEYWORDS="~alpha ~amd64 ~arm ~hppa ~ia64 ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86"
-IUSE="dynamic nls selinux"
-
-DEPEND="|| (
- >=sys-fs/lvm2-2.02.45
- >=sys-fs/device-mapper-1.00.07-r1
- )
- >=dev-libs/libgcrypt-1.1.42
- >=dev-libs/libgpg-error-1.0-r1
- >=dev-libs/popt-1.7
- >=sys-fs/udev-124
- selinux? ( sys-libs/libselinux )
- !sys-fs/cryptsetup-luks"
-
-dm-crypt_check() {
- local CONFIG_CHECK="~DM_CRYPT"
- local WARNING_DM_CRYPT="CONFIG_DM_CRYPT:\tis not set (required for cryptsetup)\n"
- check_extra_config
-}
-
-crypto_check() {
- local CONFIG_CHECK="~CRYPTO"
- local WARNING_CRYPTO="CONFIG_CRYPTO:\tis not set (required for cryptsetup)\n"
- check_extra_config
-}
-
-cbc_check() {
- local CONFIG_CHECK="~CRYPTO_CBC"
- local WARNING_CRYPTO_CBC="CONFIG_CRYPTO_CBC:\tis not set (required for kernel 2.6.19)\n"
- check_extra_config
-}
-
-pkg_setup() {
- dm-crypt_check
- crypto_check
- cbc_check
-
- if use dynamic ; then
- ewarn "If you need cryptsetup for an initrd or initramfs then you"
- ewarn "should NOT use the dynamic USE flag"
- epause 5
- fi
-}
-
-src_unpack() {
- unpack ${A}
- cd "${S}"
-
- # fix for bug #236481, use udevadm instead of udevsettle
- epatch "${FILESDIR}"/${PN}-1.0.6-udevsettle.patch
-}
-
-src_compile() {
- econf \
- --sbindir=/sbin \
- $(use_enable !dynamic static) \
- --libdir=/usr/$(get_libdir) \
- $(use_enable nls) \
- $(use_enable selinux) \
- || die
- emake || die
-}
-
-src_install() {
- emake DESTDIR="${D}" install || die "install failed"
- rmdir "${D}"/usr/$(get_libdir)/cryptsetup
- insinto /lib/rcscripts/addons
- newins "${FILESDIR}"/1.0.6-dm-crypt-start.sh dm-crypt-start.sh || die
- newins "${FILESDIR}"/1.0.5-dm-crypt-stop.sh dm-crypt-stop.sh || die
- newconfd "${FILESDIR}"/1.0.5-dmcrypt.confd dmcrypt || die
- newinitd "${FILESDIR}"/1.0.5-dmcrypt.rc dmcrypt || die
-}
-
-pkg_postinst() {
- ewarn "This ebuild introduces a new set of scripts and configuration"
- ewarn "than the last version. If you are currently using /etc/conf.d/cryptfs"
- ewarn "then you *MUST* copy your old file to:"
- ewarn "/etc/conf.d/dmcrypt"
- ewarn "Or your encrypted partitions will *NOT* work."
- elog "Please see the example for configuring a LUKS mountpoint"
- elog "in /etc/conf.d/dmcrypt"
- elog
- elog "If you are using baselayout-2 then please do:"
- elog "rc-update add dmcrypt boot"
- elog "This version introduces a command line arguement 'key_timeout'."
- elog "If you want the search for the removable key device to timeout"
- elog "after 10 seconds add the following to your bootloader config:"
- elog "key_timeout=10"
- elog "A timeout of 0 will mean it will wait indefinitely."
-}
diff --git a/sys-fs/cryptsetup/cryptsetup-1.0.6-r2.ebuild b/sys-fs/cryptsetup/cryptsetup-1.0.6-r2.ebuild
index 8ab4f345acd2..8180653f6382 100644
--- a/sys-fs/cryptsetup/cryptsetup-1.0.6-r2.ebuild
+++ b/sys-fs/cryptsetup/cryptsetup-1.0.6-r2.ebuild
@@ -1,6 +1,6 @@
# Copyright 1999-2009 Gentoo Foundation
# Distributed under the terms of the GNU General Public License v2
-# $Header: /var/cvsroot/gentoo-x86/sys-fs/cryptsetup/cryptsetup-1.0.6-r2.ebuild,v 1.4 2009/04/10 16:51:56 caleb Exp $
+# $Header: /var/cvsroot/gentoo-x86/sys-fs/cryptsetup/cryptsetup-1.0.6-r2.ebuild,v 1.5 2009/04/19 18:41:07 cardoe Exp $
inherit linux-info eutils flag-o-matic multilib
@@ -21,6 +21,7 @@ DEPEND="|| (
>=dev-libs/libgpg-error-1.0-r1
>=dev-libs/popt-1.7
>=sys-fs/udev-124
+ || ( >=sys-libs/e2fsprogs-libs-1.41 <sys-fs/e2fsprogs-1.41 )
selinux? ( sys-libs/libselinux )
!sys-fs/cryptsetup-luks"
diff --git a/sys-fs/cryptsetup/cryptsetup-1.0.6.ebuild b/sys-fs/cryptsetup/cryptsetup-1.0.6.ebuild
deleted file mode 100644
index c1a7140d2a7b..000000000000
--- a/sys-fs/cryptsetup/cryptsetup-1.0.6.ebuild
+++ /dev/null
@@ -1,95 +0,0 @@
-# Copyright 1999-2009 Gentoo Foundation
-# Distributed under the terms of the GNU General Public License v2
-# $Header: /var/cvsroot/gentoo-x86/sys-fs/cryptsetup/cryptsetup-1.0.6.ebuild,v 1.4 2009/04/10 16:51:56 caleb Exp $
-
-inherit linux-info eutils flag-o-matic multilib
-
-DESCRIPTION="Tool to setup encrypted devices with dm-crypt"
-HOMEPAGE="http://luks.endorphin.org/"
-SRC_URI="http://luks.endorphin.org/source/${P}.tar.bz2"
-
-LICENSE="GPL-2"
-SLOT="0"
-KEYWORDS="~alpha ~amd64 ~arm ~hppa ~ia64 ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86"
-IUSE="dynamic nls selinux"
-
-DEPEND="|| (
- >=sys-fs/lvm2-2.02.45
- >=sys-fs/device-mapper-1.00.07-r1
- )
- >=dev-libs/libgcrypt-1.1.42
- >=dev-libs/libgpg-error-1.0-r1
- >=dev-libs/popt-1.7
- sys-fs/udev
- selinux? ( sys-libs/libselinux )
- !>=sys-fs/udev-126
- !sys-fs/cryptsetup-luks"
-
-dm-crypt_check() {
- local CONFIG_CHECK="~DM_CRYPT"
- local WARNING_DM_CRYPT="CONFIG_DM_CRYPT:\tis not set (required for cryptsetup)\n"
- check_extra_config
-}
-
-crypto_check() {
- local CONFIG_CHECK="~CRYPTO"
- local WARNING_CRYPTO="CONFIG_CRYPTO:\tis not set (required for cryptsetup)\n"
- check_extra_config
-}
-
-cbc_check() {
- local CONFIG_CHECK="~CRYPTO_CBC"
- local WARNING_CRYPTO_CBC="CONFIG_CRYPTO_CBC:\tis not set (required for kernel 2.6.19)\n"
- check_extra_config
-}
-
-pkg_setup() {
- dm-crypt_check
- crypto_check
- cbc_check
-
- if use dynamic ; then
- ewarn "If you need cryptsetup for an initrd or initramfs then you"
- ewarn "should NOT use the dynamic USE flag"
- epause 5
- fi
-}
-
-src_compile() {
- econf \
- --sbindir=/sbin \
- $(use_enable !dynamic static) \
- --libdir=/usr/$(get_libdir) \
- $(use_enable nls) \
- $(use_enable selinux) \
- || die
- emake || die
-}
-
-src_install() {
- emake DESTDIR="${D}" install || die "install failed"
- rmdir "${D}"/usr/$(get_libdir)/cryptsetup
- insinto /lib/rcscripts/addons
- newins "${FILESDIR}"/1.0.6-dm-crypt-start.sh dm-crypt-start.sh || die
- newins "${FILESDIR}"/1.0.5-dm-crypt-stop.sh dm-crypt-stop.sh || die
- newconfd "${FILESDIR}"/1.0.5-dmcrypt.confd dmcrypt || die
- newinitd "${FILESDIR}"/1.0.5-dmcrypt.rc dmcrypt || die
-}
-
-pkg_postinst() {
- ewarn "This ebuild introduces a new set of scripts and configuration"
- ewarn "than the last version. If you are currently using /etc/conf.d/cryptfs"
- ewarn "then you *MUST* copy your old file to:"
- ewarn "/etc/conf.d/dmcrypt"
- ewarn "Or your encrypted partitions will *NOT* work."
- elog "Please see the example for configuring a LUKS mountpoint"
- elog "in /etc/conf.d/dmcrypt"
- elog
- elog "If you are using baselayout-2 then please do:"
- elog "rc-update add dmcrypt boot"
- elog "This version introduces a command line arguement 'key_timeout'."
- elog "If you want the search for the removable key device to timeout"
- elog "after 10 seconds add the following to your bootloader config:"
- elog "key_timeout=10"
- elog "A timeout of 0 will mean it will wait indefinitely."
-}
diff --git a/sys-fs/cryptsetup/files/1.0.6-dm-crypt-start.sh b/sys-fs/cryptsetup/files/1.0.6-dm-crypt-start.sh
deleted file mode 100644
index aca0700452c8..000000000000
--- a/sys-fs/cryptsetup/files/1.0.6-dm-crypt-start.sh
+++ /dev/null
@@ -1,299 +0,0 @@
-# /lib/rcscripts/addons/dm-crypt-start.sh
-
-# For backwards compatability with baselayout < 1.13.0
-dm_crypt_execute_checkfs() {
- dm_crypt_execute_dmcrypt
-}
-
-dm_crypt_execute_volumes() {
- dm_crypt_execute_dmcrypt
-}
-
-# Setup mappings for an individual target/swap
-# Note: This relies on variables localized in the main body below.
-dm_crypt_execute_dmcrypt() {
- local dev ret mode foo
- # some colors
- local red='\x1b[31;01m' green='\x1b[32;01m' off='\x1b[0;0m'
-
- if [ -n "$target" ]; then
- # let user set options, otherwise leave empty
- : ${options:=' '}
- elif [ -n "$swap" ]; then
- einfo "Checking swap is not LUKS"
- cryptsetup isLuks ${source} 2>/dev/null >/dev/console </dev/console
- foo="$?"
- if [ "${foo}" -eq 0 ]; then
- ewarn "The swap you have defined is a LUKS partition. Aborting crypt-swap setup."
- return
- fi
- target=${swap}
- # swap contents do not need to be preserved between boots, luks not required.
- # suspend2 users should have initramfs's init handling their swap partition either way.
- : ${options:='-c aes -h sha1 -d /dev/urandom'}
- : ${pre_mount:='mkswap ${dev}'}
- else
- return
- fi
- if [ -z "$source" ] && [ ! -e "$source" ]; then
- ewarn "source \"${source}\" for ${target} missing, skipping..."
- return
- fi
-
- if [[ -n ${loop_file} ]] ; then
- dev="/dev/mapper/${target}"
- ebegin " Setting up loop device ${source}"
- /sbin/losetup ${source} ${loop_file}
- fi
-
- # cryptsetup:
- # luksOpen <device> <name> # <device> is $source
- # create <name> <device> # <name> is $target
- local arg1="create" arg2="$target" arg3="$source" luks=0
-
- cryptsetup isLuks ${source} 2>/dev/null && { arg1="luksOpen"; arg2="$source"; arg3="$target"; luks=1; }
-
- if /sbin/cryptsetup status ${target} | egrep -q '\<active:' ; then
- einfo "dm-crypt mapping ${target} is already configured"
- return
- fi
- splash svc_input_begin ${SVCNAME} >/dev/null 2>&1
-
- # Handle keys
- if [ -n "$key" ]; then
- read_abort() {
- local ans
- local prompt=" ${green}*${off} $1? (${red}yes${off}/${green}No${off}) "
- shift
- echo -n -e "${prompt}" >/dev/console
- if ! read -n 1 $* ans </dev/console ; then
- local back=${prompt//?/\\b}
- echo -n -e "${back}" >/dev/console
- else
- echo >/dev/console
- fi
- case $ans in
- [yY]|[yY][eE][sS]) return 0;;
- *) return 1;;
- esac
- }
-
- # Notes: sed not used to avoid case where /usr partition is encrypted.
- mode=${key/*:/} && ( [ "$mode" == "$key" ] || [ -z "$mode" ] ) && mode=reg
- key=${key/:*/}
- case "$mode" in
- gpg|reg)
- # handle key on removable device
- if [ -n "$remdev" ]; then
- # temp directory to mount removable device
- local mntrem=/mnt/remdev.$$
- if [ ! -d "${mntrem}" ] ; then
- if ! mkdir -p "${mntrem}" ; then
- ewarn "${source} will not be decrypted ..."
- einfo "Reason: Unable to create temporary mount point '${mntrem}'"
- return
- fi
- fi
- i=0
- einfo "Please insert removable device for ${target}"
- while :; do
- foo=""
- if mount -n -o ro "${remdev}" "${mntrem}" 2>/dev/null >/dev/null ; then
- # keyfile exists?
- if [ ! -e "${mntrem}${key}" ]; then
- umount -n "${mntrem}"
- rmdir "${mntrem}"
- einfo "Cannot find ${key} on removable media."
- read_abort "Abort" ${read_timeout} && return
- else
- key="${mntrem}${key}"
- break
- fi
- else
- [ -e "${remdev}" ] \
- && foo="mount failed" \
- || foo="mount source not found"
- fi
- ((++i))
- read_abort "Stop waiting after $i attempts (${foo})" -t 1 && return
- done
- else # keyfile ! on removable device
- if [ ! -e "$key" ]; then
- ewarn "${source} will not be decrypted ..."
- einfo "Reason: keyfile ${key} does not exist."
- return
- fi
- fi
- ;;
- *)
- ewarn "${source} will not be decrypted ..."
- einfo "Reason: mode ${mode} is invalid."
- return
- ;;
- esac
- else
- mode=none
- fi
- ebegin "dm-crypt map ${target}"
- einfo "cryptsetup will be called with : ${options} ${arg1} ${arg2} ${arg3}"
- if [ "$mode" == "gpg" ]; then
- : ${gpg_options:='-q -d'}
- # gpg available ?
- if type -p gpg >/dev/null ; then
- for (( i = 0 ; i < 3 ; i++ ))
- do
- # paranoid, don't store key in a variable, pipe it so it stays very little in ram unprotected.
- # save stdin stdout stderr "values"
- exec 3>&0 4>&1 6>&2 # ABS says fd 5 is reserved
- exec &>/dev/console </dev/console
- gpg ${gpg_options} ${key} 2>/dev/null | cryptsetup ${options} ${arg1} ${arg2} ${arg3}
- ret="$?"
- # restore values and close file descriptors
- exec 0>&3 1>&4 2>&6
- exec 3>&- 4>&- 6>&-
- [ "$ret" -eq 0 ] && break
- done
- eend "${ret}" "failure running cryptsetup"
- else
- ewarn "${source} will not be decrypted ..."
- einfo "Reason: cannot find gpg application."
- einfo "You have to install app-crypt/gnupg first."
- einfo "If you have /usr on its own partition, try copying gpg to /bin ."
- fi
- else
- if [ "$mode" == "reg" ]; then
- cryptsetup ${options} -d ${key} ${arg1} ${arg2} ${arg3} >/dev/console </dev/console
- ret="$?"
- eend "${ret}" "failure running cryptsetup"
- else
- cryptsetup ${options} ${arg1} ${arg2} ${arg3} >/dev/console </dev/console
- ret="$?"
- eend "${ret}" "failure running cryptsetup"
- fi
- fi
- if [ -d "$mntrem" ]; then
- umount -n ${mntrem} 2>/dev/null >/dev/null
- rmdir ${mntrem} 2>/dev/null >/dev/null
- fi
- splash svc_input_end ${SVCNAME} >/dev/null 2>&1
-
- if [[ ${ret} != 0 ]] ; then
- cryptfs_status=1
- else
- if [[ -n ${pre_mount} ]] ; then
- dev="/dev/mapper/${target}"
- ebegin " Running pre_mount commands for ${target}"
- eval "${pre_mount}" > /dev/null
- ewend $? || cryptfs_status=1
- fi
- fi
-}
-
-# Run any post_mount commands for an individual mount
-#
-# Note: This relies on variables localized in the main body below.
-dm_crypt_execute_localmount() {
- local mount_point
-
- [ -z "$target" ] && [ -z "$post_mount" ] && return
-
- if ! /sbin/cryptsetup status ${target} | egrep -q '\<active:' ; then
- ewarn "Skipping unmapped target ${target}"
- cryptfs_status=1
- return
- fi
-
- mount_point=$(grep "/dev/mapper/${target}" /proc/mounts | cut -d' ' -f2)
- if [[ -z ${mount_point} ]] ; then
- ewarn "Failed to find mount point for ${target}, skipping"
- cryptfs_status=1
- fi
-
- if [[ -n ${post_mount} ]] ; then
- ebegin "Running post_mount commands for target ${target}"
- eval "${post_mount}" >/dev/null
- eend $? || cryptfs_status=1
- fi
-}
-
-# Determine string lengths
-strlen() {
- if [ -z "$1" ]
- then
- echo "usage: strlen <variable_name>"
- die
- fi
- eval echo "\${#${1}}"
-}
-
-# Lookup optional bootparams
-parse_opt() {
- case "$1" in
- *\=*)
- local key_name="`echo "$1" | cut -f1 -d=`"
- local key_len=`strlen key_name`
- local value_start=$((key_len+2))
- echo "$1" | cut -c ${value_start}-
- ;;
- esac
-}
-
-local cryptfs_status=0
-local gpg_options key loop_file target targetline options pre_mount post_mount source swap remdev
-
-CMDLINE="`cat /proc/cmdline`"
-for x in ${CMDLINE}
-do
- case "${x}" in
- key_timeout\=*)
- KEY_TIMEOUT=`parse_opt "${x}"`
- if [ ${KEY_TIMEOUT} -gt 0 ]; then
- read_timeout="-t ${KEY_TIMEOUT}"
- fi
- ;;
- esac
-done
-
-if [[ -f /etc/conf.d/dmcrypt ]] && [[ -x /sbin/cryptsetup ]] ; then
- ebegin "Setting up dm-crypt mappings"
-
- # Fix for baselayout-1.12.10 (bug 174256)
- [ -z ${SVCNAME} ] && SVCNAME="${myservice}"
-
- while read targetline ; do
- # skip comments and blank lines
- [[ ${targetline}\# == \#* ]] && continue
-
- # check for the start of a new target/swap
- case ${targetline} in
- target=*|swap=*)
- # If we have a target queued up, then execute it
- dm_crypt_execute_${SVCNAME}
-
- # Prepare for the next target/swap by resetting variables
- unset gpg_options key loop_file target options pre_mount post_mount source swap remdev
- ;;
-
- gpg_options=*|remdev=*|key=*|loop_file=*|options=*|pre_mount=*|post_mount=*|source=*)
- if [[ -z ${target} && -z ${swap} ]] ; then
- ewarn "Ignoring setting outside target/swap section: ${targetline}"
- continue
- fi
- ;;
-
- *)
- ewarn "Skipping invalid line in /etc/conf.d/dmcrypt: ${targetline}"
- ;;
- esac
-
- # Queue this setting for the next call to dm_crypt_execute_${SVCNAME}
- eval "${targetline}"
- done < /etc/conf.d/dmcrypt
-
- # If we have a target queued up, then execute it
- dm_crypt_execute_${SVCNAME}
-
- ewend ${cryptfs_status} "Failed to setup dm-crypt devices"
-fi
-
-# vim:ts=4