Discussion:
[tomoyo-users-en 406] ccs-patch refreshed
(too old to reply)
Tetsuo Handa
2011-09-03 10:57:34 UTC
Permalink
Raw Message
I updated ccs-patch 1.6.9p1 / 1.7.3p1 / 1.8.2p3 tarballs.
ccs-patch 1.8.2p3 includes patch for Linux 3.1-rc4 and small fixes (mainly from
feedbacks/cleanups from TOMOYO 2.4).



Since disk space reserved only for compiling binary packages is becoming too
large to ignore, I'd like to remove patches used by nobody. Please tell me if
you want to continue using TOMOYO for below already-EOL-reached products.

Fedora 11
Fedora 12
Fedora 13
Debian Etch
OpenSUSE 11.0
OpenSUSE 11.1
OpenSUSE 11.2
Ubuntu 6.06
Ubuntu 8.10
Ubuntu 9.04
Ubuntu 9.10
VineLinux 4.2

Regarding above already-EOL-reached products, I will remove patches from
tarball and stop providing binary packages if I receive no response by the end
of October 2011. If I receive a response, I'll continue providing. Similarly,
regarding patches for vanilla 2.4.30 - 2.4.36 and 2.6.11 - 2.6.26 kernels,
I will remove patches from tarball if I receive no response.



Regarding AKARI, I fixed a bug that akari.ko cannot be loaded on kernels built
with both CONFIG_SMP=n and CONSIG_DEBUG_SPINLOCK=n.
Tetsuo Handa
2011-10-25 12:52:02 UTC
Permalink
Raw Message
Linux 3.1 (which includes TOMOYO 2.4) was released.

Patches for Linux 3.2 (which will be TOMOYO 2.5) was merged into Linus's
tree. Please be sure to install tomoyo-tools-2.5 when using TOMOYO 2.5.

Final call for removing old packages/patches:
If you need below binary packages or patches, please reply soon.
Post by Tetsuo Handa
Since disk space reserved only for compiling binary packages is becoming too
large to ignore, I'd like to remove patches used by nobody. Please tell me if
you want to continue using TOMOYO for below already-EOL-reached products.
Fedora 11
Fedora 12
Fedora 13
Debian Etch
OpenSUSE 11.0
OpenSUSE 11.1
OpenSUSE 11.2
Ubuntu 6.06
Ubuntu 8.10
Ubuntu 9.04
Ubuntu 9.10
VineLinux 4.2
Regarding above already-EOL-reached products, I will remove patches from
tarball and stop providing binary packages if I receive no response by the end
of October 2011. If I receive a response, I'll continue providing. Similarly,
regarding patches for vanilla 2.4.30 - 2.4.36 and 2.6.11 - 2.6.26 kernels,
I will remove patches from tarball if I receive no response.
Tetsuo Handa
2013-07-06 11:33:12 UTC
Permalink
Raw Message
Hello.

Regarding below already-EOL-reached products, I will remove patches from
tarball and stop providing binary packages. If you still need patches for these
products, please let me know so that I can keep them in SVN's tomoyo/branches/
directory.

Fedora 14
Fedora 15
Fedora 16
Debian Lenny
OpenSUSE 11.3
OpenSUSE 11.4
OpenSUSE 12.1
Ubuntu 8.04
Ubuntu 10.10
Ubuntu 11.04
Ubuntu 11.10
VineLinux 5
Asianux 2



Also, my GPG key which is used for signing tarballs and binary packages will
expire shortly. As it seems that nowadays 4096 bits key is recommended, I'll
create a new key rather than updating expire date.

pub 1024D/4B975A98 2008-07-29 [expires: 2013-07-29]
uid Tetsuo Handa <penguin-kernel at I-love.SAKURA.ne.jp>
Tetsuo Handa
2013-07-07 13:05:05 UTC
Permalink
Raw Message
Hello.

I created a new key

pub 4096R/0C64F52A 2013-07-07 [expires: 2018-07-07]
Key fingerprint = 43C8 3369 623D 7AD3 A96C 2FC7 425F 128D 0C64 F52A
uid Tetsuo Handa <penguin-kernel at I-love.SAKURA.ne.jp>

and added it to http://I-love.SAKURA.ne.jp/kumaneko-key . From now on, I'll
use the new key for signing tarballs and binary packages.

To check that the new key works, you can use below tarballs.

ccs-patch-1.8.3-20130707.tar.gz MD5:2222f4c99f564b664f455e466f973ee0
ccs-patch-1.8.3-20130707.tar.gz.asc MD5:13c41ef42cc9afa285cc596e94937b67
caitsith-patch-0.1-20130707.tar.gz MD5:77775a4fda7abb73c1a0950c29198372
caitsith-patch-0.1-20130707.tar.gz.asc MD5:24b5159c225ff7d7b6b6afd5b3009b0d
Tetsuo Handa
2013-07-14 12:55:25 UTC
Permalink
Raw Message
Hello.
Post by Tetsuo Handa
I created a new key
pub 4096R/0C64F52A 2013-07-07 [expires: 2018-07-07]
Key fingerprint = 43C8 3369 623D 7AD3 A96C 2FC7 425F 128D 0C64 F52A
uid Tetsuo Handa <penguin-kernel at I-love.SAKURA.ne.jp>
and added it to http://I-love.SAKURA.ne.jp/kumaneko-key . From now on, I'll
use the new key for signing tarballs and binary packages.
Unfortunately, it turned out that older version of RPM cannot handle
"4096bit RSA and RSA key" (pitfall described at
http://technosorcery.net/blog/2010/10/10/pitfalls-with-rpm-and-gpg/ ).

Therefore, I had to create 1024bit DSA key for signing binary packages
(because I found this pitfall after purging my old 1024bit DSA key).

pub 1024D/FD797347 2013-07-14 [expires: 2018-07-07]
Key fingerprint = D932 B37B C4DE C5C2 D88F C8E2 B37F 39F6 FD79 7347
uid Tetsuo Handa (for older versions of RPM which cannot handle 4096bit RSA key) <penguin-kernel at I-love.SAKURA.ne.jp>

http://I-love.SAKURA.ne.jp/kumaneko-key was updated to include the new key,
but "rpm --import" seems to import only first PGP PUBLIC KEY BLOCK. Ouch!

Well, I need to consider updating documentation on how to import my gpg keys.
Any good ideas?
Tetsuo Handa
2013-08-04 14:00:38 UTC
Permalink
Raw Message
Hello.

Since I received no responses, today I removed binary packages repository for
EOL'd versions listed below.

Fedora 14
Fedora 15
Fedora 16
Debian Lenny
OpenSUSE 11.3
OpenSUSE 11.4
OpenSUSE 12.1
Ubuntu 8.04
Ubuntu 10.10
Ubuntu 11.04
Ubuntu 11.10
VineLinux 5
Asianux 2
Post by Tetsuo Handa
http://I-love.SAKURA.ne.jp/kumaneko-key was updated to include the new key,
but "rpm --import" seems to import only first PGP PUBLIC KEY BLOCK. Ouch!
Well, I need to consider updating documentation on how to import my gpg keys.
Any good ideas?
After all, I put three keys into http://I-love.SAKURA.ne.jp/kumaneko-key
in the order that "rpm --import" will import key for signing RPM files and
"apt-key add" and "gpg --import" will import all keys. Also, I uploaded
TOMOYO 1.8's binary packages signed with new keys. If you found any problems,
please let me know.

By the way, TOMOYO project at SourceForge.jp seems to have reached 50,000
cumulative downloads on 2013-07-22. Thank you for trying and utilizing TOMOYO!
Loading...