<feed xmlns='http://www.w3.org/2005/Atom'>
<title>gocryptfs/internal/syscallcompat, branch v2.0</title>
<subtitle>Mirror of gocryptfs source code on Github</subtitle>
<id>http://nuetzlich.net/cgit/gocryptfs/atom?h=v2.0</id>
<link rel='self' href='http://nuetzlich.net/cgit/gocryptfs/atom?h=v2.0'/>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/'/>
<updated>2021-06-02T17:10:36+00:00</updated>
<entry>
<title>fusefrontend: run acl Setxattr in user context</title>
<updated>2021-06-02T17:10:36+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2021-06-02T17:10:36+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=a38e5988bae3319a2c1c6745064f5785a0971d05'/>
<id>urn:sha1:a38e5988bae3319a2c1c6745064f5785a0971d05</id>
<content type='text'>
The result of setting an acl depends on who runs the
operation!

Fixes fuse-xfstests generic/375
(see https://github.com/rfjakob/fuse-xfstests/wiki/results_2021-05-19)
</content>
</entry>
<entry>
<title>syscallcompat: add GetdentsSpecial()</title>
<updated>2021-05-26T11:17:56+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2021-05-23T10:00:09+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=1b3c3b1347ef711ec38bb4c5cb14661035faf2ce'/>
<id>urn:sha1:1b3c3b1347ef711ec38bb4c5cb14661035faf2ce</id>
<content type='text'>
GetdentsSpecial calls then Getdents syscall,
with normal entries and "." / ".." split into two slices.
</content>
</entry>
<entry>
<title>syscallcompat: also refactor MkdiratUser on GOOS=darwin</title>
<updated>2021-05-22T20:01:46+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2021-05-22T20:01:46+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=09870bfac51995a0a8875137ed9e6d60688240f1'/>
<id>urn:sha1:09870bfac51995a0a8875137ed9e6d60688240f1</id>
<content type='text'>
Breakage was:

+GOOS=darwin
+GOARCH=amd64
+go build -tags without_openssl
internal/fusefrontend/node_dir_ops.go:45:34: cannot use context (type *fuse.Context) as type *fuse.Caller in argument to syscallcompat.MkdiratUser
internal/fusefrontend/node_dir_ops.go:83:35: cannot use context (type *fuse.Context) as type *fuse.Caller in argument to syscallcompat.MkdiratUser
</content>
</entry>
<entry>
<title>syscallcompat: refactor MkdiratUser to take fuse.Context</title>
<updated>2021-05-22T19:44:19+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2021-05-22T19:44:19+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=e1853e10116e97d7dcce895d6603dae1379a37b7'/>
<id>urn:sha1:e1853e10116e97d7dcce895d6603dae1379a37b7</id>
<content type='text'>
Let's have MkdiratUser take fuse.Context like everybody
else.
</content>
</entry>
<entry>
<title>syscallcompat: deduplicate OpenatUser/MknodatUser/SymlinkatUser/MkdiratUser</title>
<updated>2021-05-22T19:39:29+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2021-05-22T19:37:41+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=cb4f9f9e2934400fa0abf9bd6c65455783b2768e'/>
<id>urn:sha1:cb4f9f9e2934400fa0abf9bd6c65455783b2768e</id>
<content type='text'>
Turns out the whole euid switching logic can be shared when
wrapping the syscall in a closure.
</content>
</entry>
<entry>
<title>syscallcompat: getdents: link to #483</title>
<updated>2021-03-14T13:43:11+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2021-03-14T13:43:11+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=f6036c429a35dff83bd01b3e867262cf7e8468ef'/>
<id>urn:sha1:f6036c429a35dff83bd01b3e867262cf7e8468ef</id>
<content type='text'>
Give a user receiving the Getdents warning some background info.
</content>
</entry>
<entry>
<title>syscallcompat: MknodatUser: work around changed syscall.Setgroups semantics</title>
<updated>2021-02-06T10:38:25+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2021-02-06T10:13:22+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=80a651a19474c78b1b2716cbf8c85ffd78698823'/>
<id>urn:sha1:80a651a19474c78b1b2716cbf8c85ffd78698823</id>
<content type='text'>
Since go1.16beta1 (commit d1b1145cace8b968307f9311ff611e4bb810710c ,
https://go-review.googlesource.com/c/go/+/210639 )
syscall.{Setgroups,Setregid,Setreuid} affects all threads, which
is exactly what we not want.

We now use unix.{Setgroups,Setregid,Setreuid} instead.

Workarounds https://github.com/golang/go/issues/1435 .
</content>
</entry>
<entry>
<title>Drop two more generated files</title>
<updated>2020-10-19T17:27:47+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2020-10-19T17:27:47+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=832e58cad4567aa60ce8d390802262c82c5bfba3'/>
<id>urn:sha1:832e58cad4567aa60ce8d390802262c82c5bfba3</id>
<content type='text'>
These were committed by mistake.
</content>
</entry>
<entry>
<title>Drop generated files</title>
<updated>2020-10-19T17:25:47+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2020-10-19T17:25:47+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=165bf6c849c4f750157edce9bdc9702c4c7b684d'/>
<id>urn:sha1:165bf6c849c4f750157edce9bdc9702c4c7b684d</id>
<content type='text'>
These were committed by mistake.
</content>
</entry>
<entry>
<title>fusefronted: reject GETXATTR "security.capability"</title>
<updated>2020-10-18T19:07:30+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2020-10-18T19:05:44+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=6697ffd6e213828ff4cd873cd1d104877096a230'/>
<id>urn:sha1:6697ffd6e213828ff4cd873cd1d104877096a230</id>
<content type='text'>
Unless we are mounted with -suid, we can reject
these requests, and gain back some lost speed.

Closes https://github.com/rfjakob/gocryptfs/issues/515
</content>
</entry>
</feed>
