<feed xmlns='http://www.w3.org/2005/Atom'>
<title>gocryptfs/contrib, branch v2.1</title>
<subtitle>Mirror of gocryptfs source code on Github</subtitle>
<id>http://nuetzlich.net/cgit/gocryptfs/atom?h=v2.1</id>
<link rel='self' href='http://nuetzlich.net/cgit/gocryptfs/atom?h=v2.1'/>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/'/>
<updated>2021-06-26T17:13:24+00:00</updated>
<entry>
<title>tests, maxlen.bash: speed up TestMaxlen using QUICK=1</title>
<updated>2021-06-26T17:13:24+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2021-06-26T17:12:52+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=ad3eeaedc5a9042682f236f43dd939b2e620d07c'/>
<id>urn:sha1:ad3eeaedc5a9042682f236f43dd939b2e620d07c</id>
<content type='text'>
From &gt;6 to &lt;1 second.
</content>
</entry>
<entry>
<title>maxlen.bash: suppress progress output if not on a terminal</title>
<updated>2021-06-26T14:08:29+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2021-06-25T12:00:20+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=389aba6a6b91f4bbf846caeb57ffdf177fd2cfdc'/>
<id>urn:sha1:389aba6a6b91f4bbf846caeb57ffdf177fd2cfdc</id>
<content type='text'>
</content>
</entry>
<entry>
<title>contrib/maxlen.bash: also test dir and path length</title>
<updated>2021-06-20T16:09:21+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2021-06-17T17:19:13+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=9ac77d42d1c2f56018eb5bcb4e2265d78d572e8c'/>
<id>urn:sha1:9ac77d42d1c2f56018eb5bcb4e2265d78d572e8c</id>
<content type='text'>
Move the script from tests to contrib as it may now
be useful to somebody else.

https://github.com/rfjakob/gocryptfs/issues/552
</content>
</entry>
<entry>
<title>Add contrib/atomicrename</title>
<updated>2021-06-04T20:17:13+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2021-06-04T20:16:41+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=3a1f009c1ad281f37a7643b32a63057dd9c2a16e'/>
<id>urn:sha1:3a1f009c1ad281f37a7643b32a63057dd9c2a16e</id>
<content type='text'>
$ ./contrib/atomicrename/atomicrename -h
atomicrename creates 100 "src" files in the current directory, renames
them in random order over a single "dst" file while reading the "dst"
file concurrently in a loop.

Progress and errors are reported as they occour in addition to a summary
printed at the end. cifs and fuse filesystems are known to fail, local
filesystems and nfs seem ok.

See https://github.com/hanwen/go-fuse/issues/398 for background info.
</content>
</entry>
<entry>
<title>findholes: add --create, --verify</title>
<updated>2021-05-29T14:00:40+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2021-05-29T14:00:40+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=c1d7e38761d35149f19524fa19d3afaaca73f302'/>
<id>urn:sha1:c1d7e38761d35149f19524fa19d3afaaca73f302</id>
<content type='text'>
Also, change the logic for the segment walk to not
rely on the total size. cp does not use the total
size either, and we miss bugs by cheating!
</content>
</entry>
<entry>
<title>Add contrib/findholes</title>
<updated>2021-05-26T11:17:56+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2021-05-24T12:26:20+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=8bccd3b4bf18d6505723b1c5ae30de4bbaad126e'/>
<id>urn:sha1:8bccd3b4bf18d6505723b1c5ae30de4bbaad126e</id>
<content type='text'>
Utility and libs to find hole/data segments using lseek.
</content>
</entry>
<entry>
<title>contrib: cleanup-tmp-mounts: also clean ext4-ramdisk</title>
<updated>2020-10-15T15:49:17+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2020-10-15T15:49:17+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=a2f48eb838a5c3c565c8ca81047fefd33435e458'/>
<id>urn:sha1:a2f48eb838a5c3c565c8ca81047fefd33435e458</id>
<content type='text'>
</content>
</entry>
<entry>
<title>contrib/mount-ext4-ramdisk.sh: clean up in error case</title>
<updated>2020-09-18T11:21:07+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2020-09-18T11:21:07+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=95caa66e0b7e55e71aeed2a0a3160e68fd5fe595'/>
<id>urn:sha1:95caa66e0b7e55e71aeed2a0a3160e68fd5fe595</id>
<content type='text'>
Also fix all shellcheck warnings.
</content>
</entry>
<entry>
<title>Add contrib/mount-ext4-ramdisk.sh</title>
<updated>2020-09-14T17:01:33+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2020-09-14T17:01:33+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=55fcacfc27aeb5217b637fa60f4f562aa7daf633'/>
<id>urn:sha1:55fcacfc27aeb5217b637fa60f4f562aa7daf633</id>
<content type='text'>
</content>
</entry>
<entry>
<title>getdents_c: continue on EINTR from open</title>
<updated>2020-07-29T18:35:59+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2020-07-29T18:35:59+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=8afbbc86d170c49bbbdd801f43cd77774bcde13e'/>
<id>urn:sha1:8afbbc86d170c49bbbdd801f43cd77774bcde13e</id>
<content type='text'>
Getting EINTR here is acceptable.
</content>
</entry>
</feed>
