vcswatch reports that
this package seems to have a new changelog entry (version
1.2.1, distribution
UNRELEASED) and new commits
in its VCS. You should consider whether it's time to make
an upload.
Here are the relevant commit messages:
commit aa916c1eabdc1579fc31e7ff12254df478cc9a14
Author: Helmut Grohne <helmut@subdivi.de>
Date: Thu Nov 9 07:30:26 2023 +0100
provide a basic /dev tree even in unprivileged namespaces
Most piuparts environments will provide a working /dev tree. For
instance, a pbuilder base.tgz contains them. As does a schroot tree.
Likewise, docker will set up devices. Even debootstrap will create them.
However when running piuparts in an unprivileged namespace, debootstrap
cannot create them (and can be made to work by exporting container=lxc).
Similarly, when passing a device-less base.tgz for an unprivileged
namespace they are missing. While piuparts previously created /dev/null,
this is bound to fail with -EPERM. In that case, individual device nodes
need to be bind mounted. Since such bind mounting is not preferred for
the other variants, we try creating missing devices first.
commit 929b4a4a54d9407dcb9bc757a12580718a7c4ed1
Merge: 9e1fc883 d78f6457
Author: Nicolas Dandrimont <nicolas@dandrimont.eu>
Date: Wed Nov 8 22:14:19 2023 +0100
Merge branch 'helmutg/feature-bindmount-file' into develop
commit 9e1fc883607d36e87acacd5e809a2a656d0038a1
Merge: 4c861838 b7f4db99
Author: Nicolas Dandrimont <nicolas@dandrimont.eu>
Date: Wed Nov 8 22:12:22 2023 +0100
Merge branch 'helmutg/feature-recursive-bindmounts' into develop
commit 4c86183880f8caa490b005e11df397e67cc61f90
Merge: bd46522f cdd25f5e
Author: Nicolas Dandrimont <nicolas@dandrimont.eu>
Date: Wed Nov 8 22:12:09 2023 +0100
Merge branch 'helmutg/improve-mount_proc' into develop
commit bd46522f3347a757dc45ca434e45ceeb48c7cd75
Merge: 6d601ebe eb94e796
Author: Nicolas Dandrimont <nicolas@dandrimont.eu>
Date: Wed Nov 8 22:11:54 2023 +0100
Merge branch 'helmutg/feature-tar-compression' into develop
commit cdd25f5e8cfccedb0d8550451c0bb9bae31e5540
Author: Nicolas Dandrimont <olasd@debian.org>
Date: Wed Nov 8 13:35:20 2023 +0000
Explain why we bind mount ptmx when it exists
commit d78f6457f5ddfc96c962e469284cb7fc69acfc9d
Author: Helmut Grohne <helmut@subdivi.de>
Date: Wed Nov 8 14:01:24 2023 +0100
refactor the opts parameter to mount into a list
Reported-by: Nicolas Dandrimont <nicolas@dandrimont.eu>
commit eb94e796a798576fa58bd1b1c6185a0abb8eb0d4
Author: Helmut Grohne <helmut@subdivi.de>
Date: Wed Nov 8 08:52:35 2023 +0100
allow using tarballs compressed with non-gzip
The extension of the filename given to --basetgz with or without --save
will be checked for known compression formats by tar. Therefore gzip
tarballs must now have a suffix of .gz or .tgz.
commit 13d93cee834f0a76f225f607af0fb0c216258b80
Author: Helmut Grohne <helmut@subdivi.de>
Date: Wed Nov 8 09:07:14 2023 +0100
allow using --bindmount with things that are not directories
While typically think of directories when it comes to mounting, one can
also mount regular files or devices. Doing so only works when the mount
target is not a directory though and piuparts kindly creates such
directories. So when the mount options reveal that we're doing a bind
mount and the source is not a directory, we create an empty file
instead.
commit b7f4db997d5f96b4be397f6ea6761cae23633405
Author: Helmut Grohne <helmut@subdivi.de>
Date: Wed Nov 8 09:00:43 2023 +0100
make --bindmount recursive
When performing a bind mount, Linux will not do so recursively by
default. So if a subdirectory of the provided bind mount is a mount
point itself, this mount point will not be propagated and the underlying
hierarchy will be exposed inside piuparts. This may be intentional, but
likely is not.
Since a bind mount may be used to access a hierarchy that was hidden by
another mount, bind mounts are denied in unprivileged namespaces. On the
other hand, recursive bind mounts just work there.
commit 4d436fc3d235f5517585b065fa4d46657176c0ce
Author: Helmut Grohne <helmut@subdivi.de>
Date: Wed Nov 8 08:55:34 2023 +0100
improve compatibility of mount_proc with unprivileged namespaces
When run in an unprivileged namespace, both the mknod and the mount
operation may be denied and piuparts may fail here. Looking deeper, this
branch happens when /dev/ptmx is not already a symlink and what is bind
mounted can be expressed as a symlink, so opt for implementing this
device as a symlink when it is missing entirely. If nothing else, one
less mount invocation is a minor speedup.
commit 6d601ebe7298eaf9829a19f84d820f5bfae5d63e
Author: Nicolas Dandrimont <nicolas@dandrimont.eu>
Date: Sun Oct 29 12:49:57 2023 +0100
Start 1.2.1 development
Gbp-Dch: ignore