<feed xmlns='http://www.w3.org/2005/Atom'>
<title>gocryptfs/internal, branch v1.7-rc2</title>
<subtitle>Mirror of gocryptfs source code on Github</subtitle>
<id>http://nuetzlich.net/cgit/gocryptfs/atom?h=v1.7-rc2</id>
<link rel='self' href='http://nuetzlich.net/cgit/gocryptfs/atom?h=v1.7-rc2'/>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/'/>
<updated>2019-02-04T21:08:03+00:00</updated>
<entry>
<title>Disable Trezor support</title>
<updated>2019-02-04T21:08:03+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2019-02-04T20:57:24+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=16fac26c57ba303bf60266d24c17f5243e5ea376'/>
<id>urn:sha1:16fac26c57ba303bf60266d24c17f5243e5ea376</id>
<content type='text'>
Trezor support has been broken since Sept 2018
( https://github.com/rfjakob/gocryptfs/issues/261 ).

Disable trezor.go by renaming to trezor.go.broken.
This keeps "dep" from having to pull in A LOT OF dependencies:

Before:

  $ du -sh vendor/
  49M	vendor/

After:

  $ du -sh vendor/
  16M	vendor/
</content>
</entry>
<entry>
<title>fusefronted: comment why Access() does not check context.Uid</title>
<updated>2019-01-20T13:37:36+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2019-01-20T12:34:46+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=b08cbce5c1244f901e58812402d82a1816ecf436'/>
<id>urn:sha1:b08cbce5c1244f901e58812402d82a1816ecf436</id>
<content type='text'>
https://github.com/rfjakob/gocryptfs/issues/347
</content>
</entry>
<entry>
<title>fusefrontend: ensure directories without W or X perms can be deleted</title>
<updated>2019-01-20T13:29:28+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2019-01-20T13:29:28+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=962c52364415496b64a42b49fe5f90d593dc09f7'/>
<id>urn:sha1:962c52364415496b64a42b49fe5f90d593dc09f7</id>
<content type='text'>
This fixed the "Permission denied" bug, but still has the problem that
the directory may be replaced behind our back. Mitigated by the fact
that we skip the workaround when running as root with -allow_other.

https://github.com/rfjakob/gocryptfs/issues/354
</content>
</entry>
<entry>
<title>Revert "syscallcompat: drop Faccessat AT_SYMLINK_NOFOLLOW helper"</title>
<updated>2019-01-20T12:10:59+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2019-01-20T12:10:59+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=3d6b2685fb926b40b4eb528a8cbdc3871444d492'/>
<id>urn:sha1:3d6b2685fb926b40b4eb528a8cbdc3871444d492</id>
<content type='text'>
Breaks mounting on MacOS: unix.Faccessat on Darwin does NOT (yet)
support AT_SYMLINK_NOFOLLOW. See d44fe89ba4f3252c5bd00c4f7730197732f2a26a .

This reverts commit 0805a63df1b5f915b228727f6074c2506922d0ad.
</content>
</entry>
<entry>
<title>syscallcompat: drop Faccessat AT_SYMLINK_NOFOLLOW helper</title>
<updated>2019-01-20T11:59:59+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2019-01-20T11:59:59+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=0805a63df1b5f915b228727f6074c2506922d0ad'/>
<id>urn:sha1:0805a63df1b5f915b228727f6074c2506922d0ad</id>
<content type='text'>
unix.Faccessat has added support for AT_SYMLINK_NOFOLLOW in July 2018,
https://github.com/golang/sys/commit/bd9dbc187b6e1dacfdd2722a87e83093c2d7bd6e#diff-341484dbbe3180cd7a31ef2ad2d679b6
which means we no longer need our own helper.

Closes https://github.com/rfjakob/gocryptfs/issues/347
</content>
</entry>
<entry>
<title>ctlsock: fix buffer truncation of JSON unmarshal error</title>
<updated>2019-01-20T11:13:49+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2019-01-20T11:13:49+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=8c09df03aa5eeb581befb7bb77a0af44b39dfd37'/>
<id>urn:sha1:8c09df03aa5eeb581befb7bb77a0af44b39dfd37</id>
<content type='text'>
In the error case, buf was not restored to the original
capacity. Instead of truncating "buf" and restoring (or forgetting to restore)
later, introduce the "data" slice.

Fixes https://github.com/rfjakob/gocryptfs/issues/356
</content>
</entry>
<entry>
<title>fusefrontend: Always use intFd() method instead of int(f.fd.Fd()).</title>
<updated>2019-01-16T19:55:20+00:00</updated>
<author>
<name>Sebastian Lackner</name>
</author>
<published>2019-01-16T14:32:16+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=452b8b00f426c9e745fcdeb3677147d492406f6f'/>
<id>urn:sha1:452b8b00f426c9e745fcdeb3677147d492406f6f</id>
<content type='text'>
</content>
</entry>
<entry>
<title>fusefrontend: Rework the Utimens handling on macOS.</title>
<updated>2019-01-16T19:55:20+00:00</updated>
<author>
<name>Sebastian Lackner</name>
</author>
<published>2019-01-16T14:38:32+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=682e642cfa556c2d72c4050bfb8e38febdec49b3'/>
<id>urn:sha1:682e642cfa556c2d72c4050bfb8e38febdec49b3</id>
<content type='text'>
For Linux, everything effectively stays the same. For both path-based and
fd-based Utimens() calls, we use unix.UtimesNanoAt(). To avoid introducing
a separate syscall wrapper for futimens() (as done in go-fuse, for example),
we instead use the /proc/self/fd - trick.

On macOS, this changes quite a lot:

* Path-based Utimens() calls were previously completely broken, since
  unix.UtimensNanoAt() ignores the passed file descriptor. Note that this
  cannot be fixed easily since there IS no appropriate syscall available on
  macOS prior to High Sierra (10.13). We emulate this case by using
  Fchdir() + setattrlist().

* Fd-based Utimens() calls were previously translated to f.GetAttr() (to
  fill any empty parameters) and syscall.Futimes(), which does not does
  support nanosecond precision. Both issues can be fixed by switching to
  fsetattrlist().

Fixes https://github.com/rfjakob/gocryptfs/issues/350
</content>
</entry>
<entry>
<title>fusefrontend: Print 'too many open files' warning for both short and long names.</title>
<updated>2019-01-15T21:07:37+00:00</updated>
<author>
<name>Sebastian Lackner</name>
</author>
<published>2019-01-15T10:35:20+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=8f331456511a14d8d936bd4bdc60c4bf587b4d3a'/>
<id>urn:sha1:8f331456511a14d8d936bd4bdc60c4bf587b4d3a</id>
<content type='text'>
While we're at it, also replace os.* constants with syscall.* constants.
</content>
</entry>
<entry>
<title>fusefrontend_reverse: Delete leftover debug statement.</title>
<updated>2019-01-15T21:07:37+00:00</updated>
<author>
<name>Sebastian Lackner</name>
</author>
<published>2019-01-15T10:31:35+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=d8bb223dd3f3449b4a2d4962292bfa18e2f8b3b6'/>
<id>urn:sha1:d8bb223dd3f3449b4a2d4962292bfa18e2f8b3b6</id>
<content type='text'>
</content>
</entry>
</feed>
