[ecryptfs-utils] fix man pages
Michal Hlavinka
mhlavink at fedoraproject.org
Fri Mar 11 13:30:57 UTC 2011
commit ade735755b018ecfd18d168c2ffcc1b47570ca52
Author: Michal Hlavinka <mhlavink at redhat.com>
Date: Fri Mar 11 14:30:41 2011 +0100
fix man pages
ecryptfs-utils-86-manpage.patch | 39 +++++++++++++++++++++++++++++++++++++++
ecryptfs-utils.spec | 9 ++++++++-
2 files changed, 47 insertions(+), 1 deletions(-)
---
diff --git a/ecryptfs-utils-86-manpage.patch b/ecryptfs-utils-86-manpage.patch
new file mode 100644
index 0000000..e431c2f
--- /dev/null
+++ b/ecryptfs-utils-86-manpage.patch
@@ -0,0 +1,39 @@
+--- ecryptfs-utils-86/doc/manpage/ecryptfs.7.manfix 2011-01-06 17:48:39.000000000 +0000
++++ ecryptfs-utils-86/doc/manpage/ecryptfs.7 2011-01-10 15:06:17.000000000 +0000
+@@ -1,6 +1,6 @@
+ .TH ecryptfs 7 2009-03-24 ecryptfs-utils "eCryptfs"
+ .SH NAME
+-eCryptfs \- an enterprise-class cryptographic filesystem for linux
++eCryptfs \- an enterprise-class cryptographic filesystem for Linux
+
+ .SH SYNOPSIS
+ .BI "mount -t ecryptfs [SRC DIR] [DST DIR] -o [OPTIONS]"
+@@ -67,7 +67,7 @@
+ The actual password is password. Since the password is visible to utilities (like ps under Unix) this form should only be used where security is not important.
+ .TP
+ .B passphrase_passwd_file=(filename)
+-The password should be specified in a file with passwd=(passphrase). It is highly reccomended that the file be stored on a secure medium such as a personal usb key.
++The password should be specified in a file with passwd=(passphrase). It is highly recommended that the file be stored on a secure medium such as a personal USB key.
+ .TP
+ .B passphrase_passwd_fd=(file descriptor)
+ The password is specified through the specified file descriptor.
+@@ -79,7 +79,7 @@
+ The filename should be the filename of a file containing an RSA SSL key.
+ .TP
+ .B openssl_passwd_file=(filename)
+-The password should be specified in a file with openssl_passwd=(openssl-password). It is highly reccomended that the file be stored on a secure medium such as a personal usb key.
++The password should be specified in a file with openssl_passwd=(openssl-password). It is highly recommended that the file be stored on a secure medium such as a personal USB key.
+ .TP
+ .B openssl_passwd_fd=(file descriptor)
+ The password is specified through the specified file descriptor.
+--- ecryptfs-utils-86/doc/manpage/ecryptfs-rewrite-file.1.manfix 2011-01-11 11:59:53.000000000 +0000
++++ ecryptfs-utils-86/doc/manpage/ecryptfs-rewrite-file.1 2011-02-04 15:25:35.000000000 +0000
+@@ -14,7 +14,7 @@
+ ecryptfs-umount-private
+ sync
+
+-It is advised that this script is executed in runlevel 1 or 3, to avoid simultanteous writes and race conditions with targeted files.
++It is advised that this script is executed in runlevel 1 or 3, to avoid simultaneous writes and race conditions with targeted files.
+
+ \fBUSING THIS SCRIPT WHILE GNOME, KDE, OR OTHER APPLICATIONS ARE RUNNING MAY CAUSE DATA LOSS.\fP
+
diff --git a/ecryptfs-utils.spec b/ecryptfs-utils.spec
index 434b209..44b033d 100644
--- a/ecryptfs-utils.spec
+++ b/ecryptfs-utils.spec
@@ -5,7 +5,7 @@
Name: ecryptfs-utils
Version: 86
-Release: 2%{?dist}
+Release: 3%{?dist}
Summary: The eCryptfs mount helper and support libraries
Group: System Environment/Base
License: GPLv2+
@@ -33,6 +33,9 @@ Patch6: ecryptfs-utils-84-fgetc.patch
# fix selinux context for ~/Private cfg files
Patch7: ecryptfs-utils-86-selinux.patch
+# fix man pages
+Patch8: ecryptfs-utils-86-manpage.patch
+
# allow building with -Werror
Patch999: ecryptfs-utils-75-werror.patch
@@ -79,6 +82,7 @@ the interface supplied by the ecryptfs-utils library.
%patch5 -p1 -b .fixsigness
%patch6 -p1 -b .fgetc
%patch7 -p1 -b .selinux
+%patch8 -p1 -b .manfix
%patch999 -p1 -b .werror
%build
@@ -207,6 +211,9 @@ rm -rf $RPM_BUILD_ROOT
%{python_sitearch}/ecryptfs-utils/_libecryptfs.so
%changelog
+* Fri Mar 11 2011 Michal Hlavinka <mhlavink at redhat.com> - 86-3
+- fix man pages
+
* Wed Mar 02 2011 Michal Hlavinka <mhlavink at redhat.com> - 86-2
- fix selinux context
More information about the scm-commits
mailing list