<feed xmlns='http://www.w3.org/2005/Atom'>
<title>gocryptfs/internal/syscallcompat/open_nofollow_test.go, branch xattr_user_buffer</title>
<subtitle>Mirror of gocryptfs source code on Github</subtitle>
<id>http://nuetzlich.net/cgit/gocryptfs/atom?h=xattr_user_buffer</id>
<link rel='self' href='http://nuetzlich.net/cgit/gocryptfs/atom?h=xattr_user_buffer'/>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/'/>
<updated>2021-08-18T13:48:01+00:00</updated>
<entry>
<title>Fix issues found by ineffassign</title>
<updated>2021-08-18T13:48:01+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2021-08-18T13:47:17+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=64793fedf4ac8eebe05c57af75877944c60f03a4'/>
<id>urn:sha1:64793fedf4ac8eebe05c57af75877944c60f03a4</id>
<content type='text'>
gocryptfs$ ineffassign ./...

/home/jakob/go/src/github.com/rfjakob/gocryptfs/internal/configfile/config_file.go:243:2: ineffectual assignment to scryptHash
/home/jakob/go/src/github.com/rfjakob/gocryptfs/internal/configfile/config_file.go:272:2: ineffectual assignment to scryptHash
/home/jakob/go/src/github.com/rfjakob/gocryptfs/internal/fusefrontend/file.go:285:3: ineffectual assignment to fileID
/home/jakob/go/src/github.com/rfjakob/gocryptfs/internal/fusefrontend/node.go:367:3: ineffectual assignment to err
/home/jakob/go/src/github.com/rfjakob/gocryptfs/internal/fusefrontend/node_open_create.go:68:2: ineffectual assignment to fd
/home/jakob/go/src/github.com/rfjakob/gocryptfs/mount.go:308:2: ineffectual assignment to masterkey
/home/jakob/go/src/github.com/rfjakob/gocryptfs/gocryptfs-xray/xray_main.go:156:13: ineffectual assignment to err
/home/jakob/go/src/github.com/rfjakob/gocryptfs/internal/fusefrontend/prepare_syscall_test.go:65:16: ineffectual assignment to errno
/home/jakob/go/src/github.com/rfjakob/gocryptfs/internal/syscallcompat/open_nofollow_test.go:34:2: ineffectual assignment to fd
/home/jakob/go/src/github.com/rfjakob/gocryptfs/tests/defaults/acl_test.go:111:6: ineffectual assignment to err
/home/jakob/go/src/github.com/rfjakob/gocryptfs/tests/defaults/acl_test.go:181:2: ineffectual assignment to sz
/home/jakob/go/src/github.com/rfjakob/gocryptfs/tests/defaults/acl_test.go:198:2: ineffectual assignment to sz
/home/jakob/go/src/github.com/rfjakob/gocryptfs/tests/defaults/main_test.go:365:8: ineffectual assignment to err
/home/jakob/go/src/github.com/rfjakob/gocryptfs/tests/xattr/xattr_fd_test.go:30:6: ineffectual assignment to err
/home/jakob/go/src/github.com/rfjakob/gocryptfs/tests/xattr/xattr_fd_test.go:66:6: ineffectual assignment to err
</content>
</entry>
<entry>
<title>syscallcompat: untangle OpenNofollow and rename to OpenDirNofollow</title>
<updated>2018-09-08T15:41:17+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2018-09-08T15:41:17+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=9ec9d0c49cfbdc9ceba10d7534b77e527c0a3cdc'/>
<id>urn:sha1:9ec9d0c49cfbdc9ceba10d7534b77e527c0a3cdc</id>
<content type='text'>
The function used to do two things:

1) Walk the directory tree in a manner safe from symlink attacks
2) Open the final component in the mode requested by the caller

This change drops (2), which was only used once, and lets the caller
handle it. This simplifies the function and makes it fit for reuse in
forward mode in openBackingPath(), and for using O_PATH on Linux.
</content>
</entry>
<entry>
<title>syscallcompat: OpenNofollow: use O_DIRECTORY flag</title>
<updated>2017-12-05T22:31:07+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2017-12-05T22:31:07+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=03bf604fc08abc9bb2d75bde21c96c9df4894a3b'/>
<id>urn:sha1:03bf604fc08abc9bb2d75bde21c96c9df4894a3b</id>
<content type='text'>
...when opening intermedia directories to give us an
extra layer of safety.

From the FreeBSD man page:

     This flag can be used to prevent applications with elevated
     privileges from opening files which are even unsafe to open with O_RDONLY,
     such as device nodes.
</content>
</entry>
<entry>
<title>syscallcompat: OpenNofollow: fix relPath="" case</title>
<updated>2017-12-05T22:08:55+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2017-12-05T22:08:55+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=e604ce6deaf0ba4407c54293a338673ed06f833a'/>
<id>urn:sha1:e604ce6deaf0ba4407c54293a338673ed06f833a</id>
<content type='text'>
Sometimes want to open baseDir itself. This case
was broken, fix it.
</content>
</entry>
<entry>
<title>syscallcompat: add OpenNofollow helper</title>
<updated>2017-12-02T19:35:44+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2017-12-02T19:35:44+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=91e042e2bafbec3271d8c79005f7dc8229a16a10'/>
<id>urn:sha1:91e042e2bafbec3271d8c79005f7dc8229a16a10</id>
<content type='text'>
OpenNofollow = symlink-race-safe Open

Prepares fixing https://github.com/rfjakob/gocryptfs/issues/165
</content>
</entry>
</feed>
