<feed xmlns='http://www.w3.org/2005/Atom'>
<title>gocryptfs/Documentation, branch v1.0</title>
<subtitle>Mirror of gocryptfs source code on Github</subtitle>
<id>http://nuetzlich.net/cgit/gocryptfs/atom?h=v1.0</id>
<link rel='self' href='http://nuetzlich.net/cgit/gocryptfs/atom?h=v1.0'/>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/'/>
<updated>2016-07-03T20:15:59+00:00</updated>
<entry>
<title>XFSTESTS.md: add output from latest fuse-xfstests</title>
<updated>2016-07-03T20:15:59+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2016-07-03T20:15:59+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=77e7abdf8c1f9e2da3be4edfd0edb0d6ce9cdc67'/>
<id>urn:sha1:77e7abdf8c1f9e2da3be4edfd0edb0d6ce9cdc67</id>
<content type='text'>
fuse-xfstests is regularily rebased to xfstests master.
</content>
</entry>
<entry>
<title>MANPAGE: note that "-plaintextnames" disables symlink encryption</title>
<updated>2016-06-26T21:08:25+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2016-06-26T21:07:59+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=a8a0d2d92c2ea98040e144c1a0d1fee4dd4b9d1d'/>
<id>urn:sha1:a8a0d2d92c2ea98040e144c1a0d1fee4dd4b9d1d</id>
<content type='text'>
This is no change in behavoir, just a clarification in the man page.
</content>
</entry>
<entry>
<title>main: add "-o" option to enable "suid" and "dev"</title>
<updated>2016-06-26T21:03:18+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2016-06-26T21:03:18+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=15b88756add78a065fd81120d9447ca1de80dbfe'/>
<id>urn:sha1:15b88756add78a065fd81120d9447ca1de80dbfe</id>
<content type='text'>
Device files and suid binaries are often not needed when running
gocryptfs as root. As they are potentially dangerous, let the
user enable them explicitely via the new "-o" option instead of
always enabling them when running as root.
</content>
</entry>
<entry>
<title>Drop deprecated "-gcmiv128" option</title>
<updated>2016-06-23T20:10:19+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2016-06-23T20:10:19+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=b558901e66a5245d067f63f45c5ecada0fffad3f'/>
<id>urn:sha1:b558901e66a5245d067f63f45c5ecada0fffad3f</id>
<content type='text'>
The GCMIV128 feature flag is already mandatory, dropping the command
line option is the final step.

Completes https://github.com/rfjakob/gocryptfs/issues/29 .
</content>
</entry>
<entry>
<title>Drop deprecated "-emenames" option</title>
<updated>2016-06-23T19:56:50+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2016-06-23T19:56:50+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=3d59a72ba952602ca046df532fe2a3e8e16f1046'/>
<id>urn:sha1:3d59a72ba952602ca046df532fe2a3e8e16f1046</id>
<content type='text'>
The EMENames feature flag is already mandatory, dropping the command
line option is the final step.
</content>
</entry>
<entry>
<title>Drop deprecated "-diriv" option</title>
<updated>2016-06-23T19:38:59+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2016-06-23T19:29:00+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=b17f0465c7c38cab2f1f4ad0fc25d64d5cd175e7'/>
<id>urn:sha1:b17f0465c7c38cab2f1f4ad0fc25d64d5cd175e7</id>
<content type='text'>
The DirIV feature flag is already mandatory, dropping the command
line option is the final step.
</content>
</entry>
<entry>
<title>main: drop "on-disk format" from -version output, add Go version</title>
<updated>2016-06-19T17:33:15+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2016-06-19T17:33:15+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=1dcafb99ff91e5389263d6c59b7179fd5abef0a5'/>
<id>urn:sha1:1dcafb99ff91e5389263d6c59b7179fd5abef0a5</id>
<content type='text'>
As v0.4 introduced ext4-style feature flags, the on-disk format version
is unlinkely to change. Drop it from the version output to reduce
clutter. Use "gocryptfs -version -debug" to see it.

Add the Go version string because only Go 1.6 and newer have an optimized
AES-GCM implementation. This will help users to understand the performance
of their build.
</content>
</entry>
<entry>
<title>Add "-ro" (read-only) flag</title>
<updated>2016-06-16T19:29:22+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2016-06-16T19:29:22+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=82d87ff8eda1a8e43cda4a5f500fc579477ee606'/>
<id>urn:sha1:82d87ff8eda1a8e43cda4a5f500fc579477ee606</id>
<content type='text'>
From the man page:

  **-ro**
  :      Mount the filesystem read-only

Also add a test.
</content>
</entry>
<entry>
<title>Add performance numbers for v0.11</title>
<updated>2016-06-07T22:32:40+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2016-06-07T21:35:48+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=f030123ab5ac7761b2a19e2609c0401f1c614fbc'/>
<id>urn:sha1:f030123ab5ac7761b2a19e2609c0401f1c614fbc</id>
<content type='text'>
</content>
</entry>
<entry>
<title>Add "-allow_other" command-line option</title>
<updated>2016-05-18T17:30:05+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2016-05-16T21:59:26+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=e7f78135b3092bbd2479beac5b7da077cb5d1497'/>
<id>urn:sha1:e7f78135b3092bbd2479beac5b7da077cb5d1497</id>
<content type='text'>
As requested in https://github.com/rfjakob/gocryptfs/issues/26 ,
this adds the option to allow other users to access the filesystem.
</content>
</entry>
</feed>
