<feed xmlns='http://www.w3.org/2005/Atom'>
<title>gocryptfs/internal/fusefrontend/names.go, branch xattr_user_buffer</title>
<subtitle>Mirror of gocryptfs source code on Github</subtitle>
<id>http://nuetzlich.net/cgit/gocryptfs/atom?h=xattr_user_buffer</id>
<link rel='self' href='http://nuetzlich.net/cgit/gocryptfs/atom?h=xattr_user_buffer'/>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/'/>
<updated>2019-01-02T20:52:52+00:00</updated>
<entry>
<title>fusefrontend: move openBackingDir into its own file</title>
<updated>2019-01-02T20:52:52+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2019-01-02T20:52:52+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=352f3147c5f1260cf729692d945c87e210cb1ad8'/>
<id>urn:sha1:352f3147c5f1260cf729692d945c87e210cb1ad8</id>
<content type='text'>
This function is in all fastpaths, will get a cache, and needs
its own file.
renamed:    internal/fusefrontend/names.go -&gt; internal/fusefrontend/openbackingdir.go
renamed:    internal/fusefrontend/names_test.go -&gt; internal/fusefrontend/openbackingdir_test.go
</content>
</entry>
<entry>
<title>fusefronted: make EncryptPath symlink-safe</title>
<updated>2019-01-02T20:45:40+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2019-01-02T20:45:40+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=2b12bba274ba75f76ac8c2af3790e4190b32396f'/>
<id>urn:sha1:2b12bba274ba75f76ac8c2af3790e4190b32396f</id>
<content type='text'>
Finally allows us to delete EncryptPathDirIV.
</content>
</entry>
<entry>
<title>fusefrontend: openBackingDir: fix fd leak in error path</title>
<updated>2019-01-01T23:14:12+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2019-01-01T23:14:12+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=5aa1755cbc55d17a5b4b71faa1e0bba34fe83d8b'/>
<id>urn:sha1:5aa1755cbc55d17a5b4b71faa1e0bba34fe83d8b</id>
<content type='text'>
Reported by @slackner at
https://github.com/rfjakob/gocryptfs/commit/932efbd4593fe6be6c86f0dafeaea32910b7c246#r31813373
thanks!
</content>
</entry>
<entry>
<title>fusefrontend: only compile getBackingPath() on Darwin</title>
<updated>2019-01-01T15:24:25+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2018-11-11T17:32:48+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=1d5500c3db3b4b1f5a5fbc49c7934d3665739a0a'/>
<id>urn:sha1:1d5500c3db3b4b1f5a5fbc49c7934d3665739a0a</id>
<content type='text'>
This function is NOT symlink-safe. Darwin needs it because it lacks
fgetxattr(2) and friends.
</content>
</entry>
<entry>
<title>fusefrontend: make GetXAttr() symlink-safe on Linux</title>
<updated>2019-01-01T15:24:25+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2018-11-11T16:43:48+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=2286372603f506cf719654a9901de0749c544b12'/>
<id>urn:sha1:2286372603f506cf719654a9901de0749c544b12</id>
<content type='text'>
Uses the /proc/self/fd trick, which does not work
on Darwin.
</content>
</entry>
<entry>
<title>fusefrontend: mark a few more functions as symlink-safe / unsafe</title>
<updated>2019-01-01T15:24:25+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2018-11-04T20:29:17+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=de3a2c189578f7636c39fde44fbe1da9c78b367e'/>
<id>urn:sha1:de3a2c189578f7636c39fde44fbe1da9c78b367e</id>
<content type='text'>
</content>
</entry>
<entry>
<title>fusefrontend: make openBackingDir() symlink-safe</title>
<updated>2019-01-01T15:24:09+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2018-10-14T18:11:49+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=932efbd4593fe6be6c86f0dafeaea32910b7c246'/>
<id>urn:sha1:932efbd4593fe6be6c86f0dafeaea32910b7c246</id>
<content type='text'>
openBackingDir() used encryptPath(), which is not symlink-safe
itself. Drop encryptPath() and implement our own directory walk.

Adds three seconds to untar and two seconds to rm:

$ ./benchmark.bash
Testing gocryptfs at /tmp/benchmark.bash.MzG: gocryptfs v1.6-36-g8fb3c2f-dirty; go-fuse v20170619-66-g6df8ddc; 2018-10-14 go1.11
WRITE: 262144000 bytes (262 MB, 250 MiB) copied, 1.25078 s, 210 MB/s
READ:  262144000 bytes (262 MB, 250 MiB) copied, 1.0318 s, 254 MB/s
UNTAR: 20.941
MD5:   11.568
LS:    1.638
RM:    5.337
</content>
</entry>
<entry>
<title>Add option for autounmount</title>
<updated>2018-10-11T18:16:45+00:00</updated>
<author>
<name>Jesse Dunietz</name>
</author>
<published>2018-10-06T19:49:33+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=87d3ed9187cb9caccaa8df0769d4cb722cc5bd00'/>
<id>urn:sha1:87d3ed9187cb9caccaa8df0769d4cb722cc5bd00</id>
<content type='text'>
Even though filesystem notifications aren't implemented for FUSE, I decided to
try my hand at implementing the autounmount feature (#128). I based it on the
EncFS autounmount code, which records filesystem accesses and checks every X
seconds whether it's idled long enough to unmount.

I've tested the feature locally, but I haven't added any tests for this flag.
I also haven't worked with Go before. So please let me know if there's
anything that should be done differently.

One particular concern: I worked from the assumption that the open files table
is unique per-filesystem. If that's not true, I'll need to add an open file
count and associated lock to the Filesystem type instead.

https://github.com/rfjakob/gocryptfs/pull/265
</content>
</entry>
<entry>
<title>fusefrontend: add named parameters to openBackingDir</title>
<updated>2018-09-23T10:17:59+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2018-09-22T18:25:47+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=bead82c9fb91cbae0290523b57eec421e5218177'/>
<id>urn:sha1:bead82c9fb91cbae0290523b57eec421e5218177</id>
<content type='text'>
Named parameters make using the function easier.
</content>
</entry>
<entry>
<title>fusefrontend: get rid of os.File* wrapping</title>
<updated>2018-09-23T10:17:26+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2018-09-22T18:10:34+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=c270b21efc1d9ecbe5c913c733204f826e263747'/>
<id>urn:sha1:c270b21efc1d9ecbe5c913c733204f826e263747</id>
<content type='text'>
Directly use int file descriptors for the dirfd
and get rid of one level of indirection.
</content>
</entry>
</feed>
