+nfs-utils (1:1.0.12-2) unstable; urgency=medium
+
+ * Drop 11-root-on-krb5-mounts.patch, as it causes problems with backward
+ compatibility. (Closes: #407264, but also probably reopens it at the same
+ time...).
+ * Add an explicit versioned dependency on libblkid1, since the version in
+ sarge lacks the blkid_probe_all_new symbol and the shlibs does not add
+ the versioned dependency by itself. (Closes: #413057)
+
+ -- Steinar H. Gunderson <sesse@debian.org> Fri, 2 Mar 2007 19:54:06 +0100
+
nfs-utils (1:1.0.12-1) unstable; urgency=high
* New upstream release.
Package: nfs-kernel-server
Priority: optional
Architecture: any
-Depends: nfs-common (>= 1:1.0.8-1), ucf, lsb-base (>= 1.3-9ubuntu3), ${shlibs:Depends}
+Depends: nfs-common (>= 1:1.0.8-1), ucf, lsb-base (>= 1.3-9ubuntu3), ${shlibs:Depends}, libblkid1 (>= 1.39+1.40-WIP-2006.11.14+dfsg-1)
Provides: knfs, nfs-server
Conflicts: knfs, nfs-server
Replaces: knfs, nfs-server
+++ /dev/null
-Index: nfs-utils-1.0.11~git-20070212/utils/gssd/krb5_util.c
-===================================================================
---- nfs-utils-1.0.11~git-20070212.orig/utils/gssd/krb5_util.c
-+++ nfs-utils-1.0.11~git-20070212/utils/gssd/krb5_util.c
-@@ -120,6 +120,9 @@
- #include "gss_oids.h"
- #include "krb5_util.h"
-
-+#define GSSD_MACHINE_CRED_NAME "root"
-+#define GSSD_MACHINE_CRED_NAME_LEN 4
-+
- /* Global list of principals/cache file names for machine credentials */
- struct gssd_k5_kt_princ *gssd_k5_kt_princ_list = NULL;
-
-@@ -490,13 +493,13 @@ gssd_process_krb5_keytab(krb5_context co
- printerr(2, "Processing keytab entry for principal '%s'\n",
- pname);
- #ifdef HAVE_KRB5
-- if ( (kte.principal->data[0].length == GSSD_SERVICE_NAME_LEN) &&
-- (strncmp(kte.principal->data[0].data, GSSD_SERVICE_NAME,
-- GSSD_SERVICE_NAME_LEN) == 0) &&
-+ if ( (kte.principal->data[0].length == GSSD_MACHINE_CRED_NAME_LEN) &&
-+ (strncmp(kte.principal->data[0].data, GSSD_MACHINE_CRED_NAME,
-+ GSSD_MACHINE_CRED_NAME_LEN) == 0) &&
- #else
-- if ( (strlen(kte.principal->name.name_string.val[0]) == GSSD_SERVICE_NAME_LEN) &&
-- (strncmp(kte.principal->name.name_string.val[0], GSSD_SERVICE_NAME,
-- GSSD_SERVICE_NAME_LEN) == 0) &&
-+ if ( (strlen(kte.principal->name.name_string.val[0]) == GSSD_MACHINE_CRED_NAME_LEN) &&
-+ (strncmp(kte.principal->name.name_string.val[0], GSSD_MACHINE_CRED_NAME,
-+ GSSD_MACHINE_CRED_NAME_LEN) == 0) &&
-
- #endif
- (!gssd_have_realm_ple((void *)&kte.principal->realm)) ) {
-@@ -708,7 +711,7 @@ gssd_refresh_krb5_machine_creds(void)
- printerr(0, "Do you have a valid keytab entry for "
- "%s/<your.host>@<YOUR.REALM> in "
- "keytab file %s ?\n",
-- GSSD_SERVICE_NAME, keytabfile);
-+ GSSD_MACHINE_CRED_NAME, keytabfile);
- printerr(0, "Continuing without (machine) credentials "
- "- nfs4 mounts with Kerberos will fail\n");
- }