<feed xmlns='http://www.w3.org/2005/Atom'>
<title>gocryptfs/internal/nametransform, branch v1.8.0</title>
<subtitle>Mirror of gocryptfs source code on Github</subtitle>
<id>http://nuetzlich.net/cgit/gocryptfs/atom?h=v1.8.0</id>
<link rel='self' href='http://nuetzlich.net/cgit/gocryptfs/atom?h=v1.8.0'/>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/'/>
<updated>2020-04-18T14:14:48+00:00</updated>
<entry>
<title>nametransform: update comment &amp; simplify tests</title>
<updated>2020-04-18T14:14:48+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2020-04-18T14:14:48+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=f6b1c680b3f7c7d5cd842cca3117f5ee2f0f2fad'/>
<id>urn:sha1:f6b1c680b3f7c7d5cd842cca3117f5ee2f0f2fad</id>
<content type='text'>
The comment still mentioned CBC, which has been removed
a long time ago.

The test definition can be rewritten using slice literals,
saving sume stuttering.
</content>
</entry>
<entry>
<title>Show undecryptable filenames if they match supplied glob</title>
<updated>2020-02-28T21:17:59+00:00</updated>
<author>
<name>orcas</name>
</author>
<published>2019-09-14T16:32:54+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=9ec042f2f62bc95154d6c8b3215a2e7853f8f5c6'/>
<id>urn:sha1:9ec042f2f62bc95154d6c8b3215a2e7853f8f5c6</id>
<content type='text'>
Resolves https://github.com/rfjakob/gocryptfs/issues/393
</content>
</entry>
<entry>
<title>forward mode: create gocryptfs.diriv files with 0440 permissions</title>
<updated>2019-03-30T19:06:40+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2019-03-30T19:06:40+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=ec17445b996e7a2dc3b753963ea329881430e27b'/>
<id>urn:sha1:ec17445b996e7a2dc3b753963ea329881430e27b</id>
<content type='text'>
Makes it easier to share an encrypted folder via a network drive.

https://github.com/rfjakob/gocryptfs/issues/387
</content>
</entry>
<entry>
<title>reverse mode: support wildcard exclude (--exclude-wildcard)</title>
<updated>2019-03-26T19:56:37+00:00</updated>
<author>
<name>Eduardo M KALINOWSKI</name>
</author>
<published>2019-02-16T20:55:54+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=3bc100aeb3f0763f78c8b3a70165b9f8aaa52db5'/>
<id>urn:sha1:3bc100aeb3f0763f78c8b3a70165b9f8aaa52db5</id>
<content type='text'>
This adds support for gitignore-like wildcards and exclude patters in
reverse mode. It (somewhat) fixes #273: no regexp support, but the
syntax should be powerful enough to satisfy most needs.

Also, since adding a lot of --exclude options can be tedious, it adds
the --exclude-from option to read patterns from a file (or files).
</content>
</entry>
<entry>
<title>nametransform: reject names longer than 255 chars</title>
<updated>2019-02-17T16:05:05+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2019-02-17T16:05:05+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=19cb6d046aac92f44722c17ba9a371b08ca0be6a'/>
<id>urn:sha1:19cb6d046aac92f44722c17ba9a371b08ca0be6a</id>
<content type='text'>
Looks like we allowed creating longer names by accident.
Fix that, and add a test that verifies it.
</content>
</entry>
<entry>
<title>nametransform: Create *.name files with 0400 permission.</title>
<updated>2019-01-09T19:42:18+00:00</updated>
<author>
<name>Sebastian Lackner</name>
</author>
<published>2019-01-09T01:49:24+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=aae45b4d77082c8bd54575eaf7b48794d8d53e9e'/>
<id>urn:sha1:aae45b4d77082c8bd54575eaf7b48794d8d53e9e</id>
<content type='text'>
Similar to gocryptfs.iv files they are never modified.
</content>
</entry>
<entry>
<title>nametransform: ReadDirIVAt: return raw syscall error</title>
<updated>2019-01-04T22:21:27+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2019-01-04T22:21:27+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=8074f12bebbaafd2c498183a914f021d32d34578'/>
<id>urn:sha1:8074f12bebbaafd2c498183a914f021d32d34578</id>
<content type='text'>
Otherwise this can happen, as triggered by xfstests generic/011:

  go-fuse: can't convert error type: openat failed: too many open files

The app then gets a misleading "Function not implemented" error.
</content>
</entry>
<entry>
<title>A few more spelling fixes.</title>
<updated>2019-01-04T00:23:44+00:00</updated>
<author>
<name>Sebastian Lackner</name>
</author>
<published>2019-01-03T20:08:49+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=ab169443fde9c6697b5b9dc010691cbc61cd5206'/>
<id>urn:sha1:ab169443fde9c6697b5b9dc010691cbc61cd5206</id>
<content type='text'>
Found with the 'codespell' utility.
</content>
</entry>
<entry>
<title>nametransform: Add implicit syscall.O_RDONLY flag.</title>
<updated>2019-01-03T17:24:05+00:00</updated>
<author>
<name>Sebastian Lackner</name>
</author>
<published>2019-01-03T16:51:23+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=61241b05889bda6e70446eab571f138d5d6f6c20'/>
<id>urn:sha1:61241b05889bda6e70446eab571f138d5d6f6c20</id>
<content type='text'>
</content>
</entry>
<entry>
<title>fusefrontend: add dirCache</title>
<updated>2019-01-03T14:31:13+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2019-01-02T21:32:21+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=4f66d66755da63c78b09201c6c72353009251cf2'/>
<id>urn:sha1:4f66d66755da63c78b09201c6c72353009251cf2</id>
<content type='text'>
</content>
</entry>
</feed>
