partman-auto-crypto 33 is marked for autoremoval from testing on 2022-06-30
It (build-)depends on packages with these RC bugs:
1011146: nvidia-graphics-drivers-tesla-470: CVE-2022-28181, CVE-2022-28183,
CVE-2022-28184, CVE-2022-28185, CVE-2022-28191, CVE-2022-28192
https://bugs.debian.org
Your message dated Wed, 23 Oct 2019 23:00:44 +0200
with message-id <20191023230044.d7040c13d9d2fecff4f3a...@mailbox.org>
and subject line Closing loop-AES related bugs
has caused the Debian Bug report #392221,
regarding partman-auto-crypto: Please add support for loop-aes auto install
to be
Your message dated Sat, 19 Oct 2019 22:05:03 +
with message-id
and subject line Bug#927571: fixed in partman-auto-crypto 31
has caused the Debian Bug report #927571,
regarding Updating the partman-auto-crypto Uploaders list
to be marked as done.
This means that you claim that the problem has
Source: partman-auto-crypto
Version: 30
Severity: minor
User: m...@qa.debian.org
Usertags: mia-teammaint
Christian Perrier has retired, so can't work on
the partman-auto-crypto package anymore (at least with this address).
We are tracking their status in the MIA team and would like to ask you
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Fri, 23 Feb 2018 15:30:44 +0100
Source: partman-auto-crypto
Binary: partman-auto-crypto
Architecture: source
Version: 28
Distribution: unstable
Urgency: medium
Maintainer: Debian Install System Team <debian-boot@lists.debian.
Your message dated Mon, 30 Jan 2017 23:49:56 +
with message-id <e1cylhs-000egi...@fasolo.debian.org>
and subject line Bug#476388: fixed in partman-auto-crypto 25
has caused the Debian Bug report #476388,
regarding partman-auto-crypto: Allow preseeding of the skip_erase flag
to be
Philipp Kern (2017-01-29):
> Please find attached a patch that's the minimum necessary to preseed
> away the disk erase choice. While you could argue that it could be a
> full-blown prompt, it is still possible to cancel the erase during
> interactive installations as instructed
rtition-crypto
index 279af3f..3ee8342 100755
--- a/autopartition-crypto
+++ b/autopartition-crypto
@@ -32,6 +32,9 @@ for dev in $DEVICES/*; do
echo dm-crypt > $id/crypto_type
crypto_prepare_method "$dev/$id" dm-crypt || exit 1
+ if [ "$(debconf-get partman-auto-crypto/erase_disks)" = &
Package: partman-auto-crypto
Version: 23
Severity: normal
Tags: d-i
Dear Maintainer,
the installation of testing (currently stretch) on a machine, with disk
encryption... FAILS.
Details:
During the part called
* Partition disks
I choose
* Guided - use entire disk and set up encrypted
Hi,
nice nicesw...@gmail.com (2015-08-14):
Package: partman-auto-crypto
Version: 23
Severity: normal
Tags: d-i
Dear Maintainer,
the installation of testing (currently stretch) on a machine, with
disk encryption... FAILS.
Details:
During the part called
* Partition disks
Package: partman-auto-crypto
Severity: normal
Tags: d-i
Hello,
it seems that the daily installer build doesn't contain the menu item Guided
- use entire disk and set up encrypted LVM anymore, whereas in the wheezy 7.2
installer it is still present. This looks like a regression to me. (I can't
FYI: The status of the partman-auto-crypto source package
in Debian's testing distribution has changed.
Previous version: 15
Current version: 16
--
This email is automatically generated once a day. As the installation of
new packages into testing happens multiple times a day you
FYI: The status of the partman-auto-crypto source package
in Debian's testing distribution has changed.
Previous version: 14
Current version: 15
--
This email is automatically generated once a day. As the installation of
new packages into testing happens multiple times a day you
FYI: The status of the partman-auto-crypto source package
in Debian's testing distribution has changed.
Previous version: 12
Current version: 14
--
This email is automatically generated once a day. As the installation of
new packages into testing happens multiple times a day you
I would second the suggestion for support of implementing loop-aes, as
this must otherwise be done through other means, thereby increasing the
cost (time, labor) of deploying Debian to secure situations.
FYI: The status of the partman-auto-crypto source package
in Debian's testing distribution has changed.
Previous version: 11
Current version: 12
--
This email is automatically generated once a day. As the installation of
new packages into testing happens multiple times a day you
FYI: The status of the partman-auto-crypto source package
in Debian's testing distribution has changed.
Previous version: 8
Current version: 11
--
This email is automatically generated; the Debian Release Team
[EMAIL PROTECTED] is responsible.
See http://release.debian.org/testing-watch
FYI: The status of the partman-auto-crypto source package
in Debian's testing distribution has changed.
Previous version: 7
Current version: 8
--
This email is automatically generated; [EMAIL PROTECTED] is responsible.
See http://people.debian.org/~henning/trille/ for more information
On Wed, Apr 16, 2008 at 01:22:11PM +0200, Jérémy Bobbio wrote:
This wishlist is extracted for T. Nan's request [1] posted on the
debian-boot mailling-list.
partman-auto-crypto should define a debconf question (for preseeding
only) that would make it define the skip_erase flag
On Thu, Apr 17, 2008 at 02:25:31PM +0100, Colin Watson wrote:
On Wed, Apr 16, 2008 at 01:22:11PM +0200, Jérémy Bobbio wrote:
This wishlist is extracted for T. Nan's request [1] posted on the
debian-boot mailling-list.
partman-auto-crypto should define a debconf question (for preseeding
Package: partman-auto-crypto
Version: 7
Severity: wishlist
This wishlist is extracted for T. Nan's request [1] posted on the
debian-boot mailling-list.
partman-auto-crypto should define a debconf question (for preseeding
only) that would make it define the skip_erase flag for the encrypted
FYI: The status of the partman-auto-crypto source package
in Debian's testing distribution has changed.
Previous version: 6
Current version: 7
--
This email is automatically generated; [EMAIL PROTECTED] is responsible.
See http://people.debian.org/~henning/trille/ for more information
FYI: The status of the partman-auto-crypto source package
in Debian's testing distribution has changed.
Previous version: 5
Current version: 6
--
This email is automatically generated; [EMAIL PROTECTED] is responsible.
See http://people.debian.org/~henning/trille/ for more information
There are disparities between your recently accepted upload and the
override file for the following file(s):
partman-auto-crypto_6_all.udeb: package says priority is optional, override
says standard.
Either the package or the override file is incorrect. If you think
the override is correct and
administrator
(administrator, Debian Bugs database)
---BeginMessage---
Package: partman-auto-crypto
Severity: wishlist
Hi,
when using d-i RC1, and doing guided partitioning (LVM with crypto),
there does not seem to be a possibility to prevent the erase data
operation from happening.
This is bad
administrator
(administrator, Debian Bugs database)
---BeginMessage---
Package: partman-auto-crypto
Severity: wishlist
Hi,
when using d-i RC1, and doing guided partitioning (LVM with crypto),
there does not seem to be a possibility to prevent the erase data
operation from happening.
This is bad
FYI: The status of the partman-auto-crypto source package
in Debian's testing distribution has changed.
Previous version: 4
Current version: 5
--
This email is automatically generated; [EMAIL PROTECTED] is responsible.
See http://people.debian.org/~henning/trille/ for more information
Package: partman-auto-crypto
Severity: wishlist
Hi,
when using d-i RC1, and doing guided partitioning (LVM with crypto),
there does not seem to be a possibility to prevent the erase data
operation from happening.
This is bad when installing to a vmware, since the virtual disk file
is going
FYI: The status of the partman-auto-crypto source package
in Debian's testing distribution has changed.
Previous version: 2
Current version: 3
--
This email is automatically generated; [EMAIL PROTECTED] is responsible.
See http://people.debian.org/~henning/trille/ for more information
FYI: The status of the partman-auto-crypto source package
in Debian's testing distribution has changed.
Previous version: (not in testing)
Current version: 2
--
This email is automatically generated; [EMAIL PROTECTED] is responsible.
See http://people.debian.org/~henning/trille/ for more
Processing commands for [EMAIL PROTECTED]:
retitle 392221 partman-auto-crypto: Please add support for loop-aes auto
install
Bug#392221: Support alternative setups
Changed Bug title.
thanks
Stopping processing here.
Please contact me if you need assistance.
Debian bug tracking system
On Sun, Oct 08, 2006 at 12:27:00AM +0200, Frans Pop wrote:
Package: partman-auto-crypto
Version: 2
(1)
In autopartition-crypto there is a somewhat dangerous double use of
$dev; it would possibly be better to use separate variables. be better
to use separate variables.
Ok
I also wonder what
Hi all,
On Tue, Oct 10, 2006 at 01:51:34AM +0200, David Härdeman wrote:
The loop is there because it needs to look not for the $dev device but
the virtual device-mapper device which has been created ontop of the
device pointed to by $dev after the crypto_setup step. It should be a
bit
Package: partman-auto-crypto
Severity: wishlist
Hi,
Please consider this the lowest severity bug report from me, it is just
a suggestion.
Could support be added for just crypto setup without LVM, using
loop-aes. Perhaps waiting until after #381895 is fixed, so that the root
partition can
On Tue, Oct 10, 2006 at 08:56:31PM +0100, James Westby wrote:
Could support be added for just crypto setup without LVM, using
loop-aes. Perhaps waiting until after #381895 is fixed, so that the root
partition can be encrypted as well.
It would be nice to have the support to have crypto without
administrator
(administrator, Debian Bugs database)
---BeginMessage---
Package: partman-auto-crypto
Severity: critical
Justification: causes serious data loss
Hi!
I have tried to use partman-auto-crypto by selecting
Automatically set up encrypted LVM in the partman menu.
I initially thought
Processing commands for [EMAIL PROTECTED]:
reassign 391071 partman-auto
Bug#391071: partman-auto-crypto: No confirmation before hard-drive wiping
Bug reassigned from package `partman-auto-crypto' to `partman-auto'.
tags 391071 + pending
Bug#391071: partman-auto-crypto: No confirmation before
-. /lib/partman/auto-shared.sh
. /lib/partman/auto-lvm_tools.sh
dev=$1
Index: partman-auto-crypto/debian/changelog
===
--- partman-auto-crypto/debian/changelog (revision 41357)
+++ partman-auto-crypto/debian/changelog (working copy
Package: partman-auto-crypto
Version: 2
(1)
In autopartition-crypto there is a somewhat dangerous double use of
$dev; it would possibly be better to use separate variables. be better
to use separate variables.
I also wonder what that loop actually does. Why is it needed to loop over
$DEVICES
I personally would prefer to consistently delay disk selection to a second
level in _all_ cases and explain what the next step will be in the
description; something like:
/me feels like some strings are about to be broken soon:-|
signature.asc
Description: Digital signature
On Thu, October 5, 2006 2:07, Frans Pop said:
I personally would prefer to consistently delay disk selection to a second
level in _all_ cases and explain what the next step will be in the
description; something like:
example
...
Automatic - use the largest continuous free space
Automatic
On Thursday 05 October 2006 09:48, David Härdeman wrote:
Strange, it sounds familiar...oh yes...it's what I've been suggesting
all along [1]. So I think its safe to say that we fully agree.
:-)
I can whip up a patch or two once I have confirmation that this is the
final decision on this
David Härdeman wrote:
Strange, it sounds familiar...oh yes...it's what I've been suggesting all
along [1]. So I think its safe to say that we fully agree.
I'm not going to say anything more on this issue, except that I still
think that Kamion and my argument has merit, and if it's ignored now,
Package: partman-auto-crypto
Severity: critical
Justification: causes serious data loss
Hi!
I have tried to use partman-auto-crypto by selecting
Automatically set up encrypted LVM in the partman menu.
I initially thought that it was going to use the free space which was
available on the hard
On Wednesday 04 October 2006 19:19, Jérémy Bobbio wrote:
I have tried to use partman-auto-crypto by selecting
Automatically set up encrypted LVM in the partman menu.
I initially thought that it was going to use the free space which was
available on the hard-drive.
David:
Where has the Erase
On Wed, Oct 04, 2006 at 08:23:29PM +0200, Frans Pop wrote:
On Wednesday 04 October 2006 19:19, Jérémy Bobbio wrote:
I have tried to use partman-auto-crypto by selecting
Automatically set up encrypted LVM in the partman menu.
I initially thought that it was going to use the free space which
On Wednesday 04 October 2006 22:06, David Härdeman wrote:
Where has the Erase entire disk and ... part of this menu entry (and
the one for auto-lvm disappeared to? IIRC that was in the original
discussion.
It is currently only used on the first menu for the regular
partitioning method. I
On Wed, Oct 04, 2006 at 11:05:51PM +0200, Frans Pop wrote:
On Wednesday 04 October 2006 22:06, David Härdeman wrote:
Where has the Erase entire disk and ... part of this menu entry (and
the one for auto-lvm disappeared to? IIRC that was in the original
discussion.
How about changing them to:
On Thursday 05 October 2006 00:03, David Härdeman wrote:
What's against bringing it back in the method dialog?
Nothing, it's a matter of taste (meaning it's up to you to decide) :)
The user would probably be left wondering which disk the last option
refers to...not knowing that the disk
On Fri, September 15, 2006 4:45, Frans Pop said:
I'd suggest just uploading at standard prio. We can always keep the udeb
in unstable if any serious issues are found.
Good :)
Talking about priorities, have the priorities of other crypto udebs been
adjusted already for the only load when
On Tuesday 05 September 2006 01:22, Max Vozeler wrote:
What I think needs to be solved before a first upload:
1. Priority. The package currently has standard priority,
which gets it loaded by default installs. I'm not sure given
the closeness to rc1 and would prefer input about this
On Tue, September 5, 2006 9:35, David Härdeman said:
On Tue, September 5, 2006 1:22, Max Vozeler said:
2. Dependencies. I think they need to be tightened a bit
Done
3. Yet a bit more code could perhaps be dropped, I think :-)
Done
4. debian/copyright still mentions substantial
On Tue, September 5, 2006 1:22, Max Vozeler said:
What I think needs to be solved before a first upload:
...
2. Dependencies. I think they need to be tightened a bit
Will do
3. Yet a bit more code could perhaps be dropped, I think :-)
I'll take a look at it
4. debian/copyright still
Hi all,
I've had another detailed look at partman-auto-crypto tonight.
(/people/alphix-guest/partman-auto-crypto) Quick summary: The
package seems solid from my tests and review of the code; I
think it's ready to move to trunk/ and have a first upload after
two points are solved.
Thanks
(administrator, Debian Bugs database)
---BeginMessage---
Package: partman-auto
Severity: minor
Tags: patch
The attached patch adds support for partman-auto-crypto preseeding. It
should be committed once partman-auto-crypto is moved to the d-i trunk.
Regards,
David
Index: debian/changelog
David Härdeman [EMAIL PROTECTED] writes:
Perhaps rewording the first menu and having the warning that the disks
will be erased in the second menu would make things clearer? We could
also stress which methods are automated and which are not a bit
more. Something like this:
example
Manually
.
Ok, will commit today
2) Concerns over an overcrowded partman-auto menu
FJP suggested in the RFC thread on partman-auto-crypto that the
partman-auto main menu might need to change to accomodate the large
number of options. The following example was given:
[...]
However, I think that we should
.
As for lvm, I don't see any new bugs against partman-lvm, what issues
are you referring to?
The issues are mainly in partman-auto-lvm which partman-auto-crypto is
based on (and thus also affected by).
Another alternative is to not change the partman-auto main menu at all.
The menu might get
?
Support in graphical installer would be nice to have before the release.
What needs to be done?
As for lvm, I don't see any new bugs against partman-lvm, what issues
are you referring to?
The issues are mainly in partman-auto-lvm which partman-auto-crypto is
based on (and thus also affected
referring to?
The issues are mainly in partman-auto-lvm which partman-auto-crypto is
based on (and thus also affected by).
I assume you're referring to the should automatically delete existing
LVM issue?
Yes, and #368633 and #381244.
No, with p-a-c we have disk - crypto - lvm (in order
Hi all,
I'd like to start working on getting partman-auto-crypto into d-i again.
As far as I know there are two outstanding issues:
1) Swap on LVM in partman-auto-lvm
I sent an RFC on this more than a month ago. Not much discussion
resulted, I got a few positive comments and no negative
David Härdeman wrote:
1) Swap on LVM in partman-auto-lvm
I sent an RFC on this more than a month ago. Not much discussion
resulted, I got a few positive comments and no negative comments. Is
this ok to commit?
Not commenting on this just because I don't know anything about it, not
because
On Sat, Aug 19, 2006 at 04:29:26PM -0400, Joey Hess wrote:
2) Concerns over an overcrowded partman-auto menu
...
However, I think that we should split it into two screens:
example
Manually edit partition table
Erase disk and create new partitions
Erase disk(s); use LVM for new partitions
thread on partman-auto-crypto that the
partman-auto main menu might need to change to accomodate the large
number of options. The following example was given:
[...]
However, I think that we should split it into two screens:
I have been thinking about this a bit too and I agree this is probably
.
Ok, I've prepared partman-auto-crypto to support preseeding. I've filed
a bug against partman-auto for the necessary changes that can be
committed once p-a-c moves to trunk.
Regards,
David
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL
Package: partman-auto
Severity: minor
Tags: patch
The attached patch adds support for partman-auto-crypto preseeding. It
should be committed once partman-auto-crypto is moved to the d-i trunk.
Regards,
David
Index: debian/changelog
changed the default in partman-crypto to
be dm-crypt, perhaps we shouldn't even offer the choice between the two
in partman-auto-crypto...
None of these items seem to be a reason to postpone the use
of partman-auto-crypto, and code sharing is hard to implement
before both packages are in the source
On Wednesday 21 June 2006 21:42, David Härdeman wrote:
It's now at a point where it seems reasonable to move it into the
regular tree (/d-i/packages/partman/partman-auto-crypto).
I've not had time to review this yet, but yesterday I added support in
partman-auto-lvm for preseeding the disk
On Mon, Jun 26, 2006 at 07:54:01PM +0200, Frans Pop wrote:
On Wednesday 21 June 2006 21:42, David Härdeman wrote:
It's now at a point where it seems reasonable to move it into the
regular tree (/d-i/packages/partman/partman-auto-crypto).
I've not had time to review this yet, but yesterday I
Hey David,
On Wed, Jun 21, 2006 at 09:42:17PM +0200, David Härdeman wrote:
I've been working on partman-auto-crypto in the d-i SVN repo
at /people/alphix-guest/partman-auto-crypto.
Thanks for working on this.. :-)
Last night I completed two test installs using the SVN
version (r38313
So, I'd be happy to have some review, questions and comments on the code :)
Template: partman-auto-crypto/text/use_device
Type: text
# TRANSLATORS: This is a menu entry. Keep in under 55 columns/characters
# The string replacing ${DEVICE} may be very long, so make your translation
# as short
On Thu, June 22, 2006 9:14, Christian Perrier said:
For instance, for French translation, I would probably put:
Effacer et utiliser avec chiffrement tout le disque ${DEVICE}
...which means that most part of ${DEVICE} will be truncated.
Yes I know, I already see the same problem with the
On Thursday 22 June 2006 09:14, Christian Perrier wrote:
That entry could be a problem. We actually already have this problem
with partman-auto${DEVICE} can contain a very long string...and
does actually not fit completely on the screen.
Maybe we should make this menu indented, similar to
Hi all,
I've been working on partman-auto-crypto in the d-i SVN repo at
/people/alphix-guest/partman-auto-crypto.
It's now at a point where it seems reasonable to move it into the
regular tree (/d-i/packages/partman/partman-auto-crypto).
partman-auto-lvm currently sets up a boot partition
74 matches
Mail list logo