cloud-initramfs-tools 0.27ubuntu1.5 source package in Ubuntu

Changelog

cloud-initramfs-tools (0.27ubuntu1.5) xenial; urgency=medium

  * sync with upstream at 0.40ubuntu1
    - whitespace changes.
    - rooturl: adjust squashfs url matching to not require '.'.
      Previously it would match <url>*.squashfs or <url>*.squash
      Now it will match <url>*squashfs or <url>*squash.  (LP: #1728048)
    - updateroot/*, debian/control: new package 'cloud-initramfs-updateroot'
    - debian/README.source: update upstream information for move to git.
    - overlayroot: change from storing password in
      /run/initramfs/overlayroot.passwd rather than randomly generated
      /run/initramfs/overlayroot.XXXXXX
    - overlayroot: avoid confusing systemd (LP: #1723183)
       + Mark / as 'noauto' in the newly written /etc/fstab
       + Comment out the read-only line for /.

 -- Scott Moser <email address hidden>  Fri, 15 Dec 2017 15:57:35 -0500

Upload details

Uploaded by:
Scott Moser
Uploaded to:
Xenial
Original maintainer:
Scott Moser
Architectures:
all
Section:
admin
Urgency:
Medium Urgency

See full publishing history Publishing

Series Pocket Published Component Section

Builds

Xenial: [FULLYBUILT] amd64

Downloads

File Size SHA-256 Checksum
cloud-initramfs-tools_0.27ubuntu1.5.tar.xz 39.6 KiB debda70c13d3b22535e44d2447b9f55fb83030240b7a0b7d8b5f418738b254c5
cloud-initramfs-tools_0.27ubuntu1.5.dsc 2.0 KiB 41bfc958b5cee5e04059ab8ac365ea170d22b4be5d1e54afe678331a65d727ae

Available diffs

View changes file

Binary packages built by this source

cloud-initramfs-copymods: copy initramfs modules into root filesystem for later use

 When booting with an external-to-root kernel and initramfs, you need
 to ensure that /lib/modules contains any necessary modules not already
 loaded.
 .
 This package arranges for the modules in the initramfs to be placed
 into /lib/modules after the switchroot is done.

cloud-initramfs-dyn-netconf: write a network interface file in /run for BOOTIF

 This package provides an initramfs module that will write a simple
 network interfaces formated file to /run/network/interfaces with
 entries for any devices that were configured during initramfs.

cloud-initramfs-growroot: automatically resize the root partition on first boot

 This package adds functionality to an initramfs built by initramfs-tools.
 When installed, the initramfs will repartition a disk to make the
 root volume consume all space that follows it.
 .
 You most likely do not want this package unless you know what you are
 doing. It is primarily interesting in a virtualized environment when
 a disk can provisioned with a size larger than its original size.
 In this case, with this package installed, you can automatically use
 the new space without requiring a reboot to re-read the partition table.

cloud-initramfs-rescuevol: boot off a rescue volume rather than root filesystem

 This package adds functionality to an initramfs built by initramfs-tools.
 When installed the initramfs will check to see if any partitions
 with a label of 'RESCUE_VOL' are attached. If such a volume is attached,
 it will boot off that volume rather than the root volume.
 .
 This is useful in a cloud environment, when the user is able to attach
 and detach volumes to a running system, but has no other mechanism
 for interupting of fixing a failed boot. It is analogous to inserting
 a rescue CD into a system to recover from failure.

cloud-initramfs-rooturl: use a tarball or squashfs image in a url as the root filesystem

 Allows user to pass in root=http://example.com/your.tar.gz
 Root filesystem will be tmpfs from that url.

cloud-initramfs-updateroot: extract a tarball over root filesystem before pivot

 Allows kernel command line updateroot=http://your.tar.gz
 And then tarball will be pulled and extracted over the root.

overlayroot: use an overlayfs on top of a read-only root filesystem

 This package adds functionality to an initramfs built by initramfs-tools.
 When installed and configured, the initramfs will mount an overlayfs
 filesystem on top of a read-only root volume.
 .
 The changes can be written to a in-memory temporary filesystem, a
 filesystem on an existing block device, or a dmcrypt encrypted block
 device.