<feed xmlns='http://www.w3.org/2005/Atom'>
<title>gocryptfs/tests/reverse, branch v1.7.1</title>
<subtitle>Mirror of gocryptfs source code on Github</subtitle>
<id>http://nuetzlich.net/cgit/gocryptfs/atom?h=v1.7.1</id>
<link rel='self' href='http://nuetzlich.net/cgit/gocryptfs/atom?h=v1.7.1'/>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/'/>
<updated>2019-03-26T19:56:37+00:00</updated>
<entry>
<title>reverse mode: support wildcard exclude (--exclude-wildcard)</title>
<updated>2019-03-26T19:56:37+00:00</updated>
<author>
<name>Eduardo M KALINOWSKI</name>
</author>
<published>2019-02-16T20:55:54+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=3bc100aeb3f0763f78c8b3a70165b9f8aaa52db5'/>
<id>urn:sha1:3bc100aeb3f0763f78c8b3a70165b9f8aaa52db5</id>
<content type='text'>
This adds support for gitignore-like wildcards and exclude patters in
reverse mode. It (somewhat) fixes #273: no regexp support, but the
syntax should be powerful enough to satisfy most needs.

Also, since adding a lot of --exclude options can be tedious, it adds
the --exclude-from option to read patterns from a file (or files).
</content>
</entry>
<entry>
<title>Revert "syscallcompat: drop Faccessat AT_SYMLINK_NOFOLLOW helper"</title>
<updated>2019-01-20T12:10:59+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2019-01-20T12:10:59+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=3d6b2685fb926b40b4eb528a8cbdc3871444d492'/>
<id>urn:sha1:3d6b2685fb926b40b4eb528a8cbdc3871444d492</id>
<content type='text'>
Breaks mounting on MacOS: unix.Faccessat on Darwin does NOT (yet)
support AT_SYMLINK_NOFOLLOW. See d44fe89ba4f3252c5bd00c4f7730197732f2a26a .

This reverts commit 0805a63df1b5f915b228727f6074c2506922d0ad.
</content>
</entry>
<entry>
<title>syscallcompat: drop Faccessat AT_SYMLINK_NOFOLLOW helper</title>
<updated>2019-01-20T11:59:59+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2019-01-20T11:59:59+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=0805a63df1b5f915b228727f6074c2506922d0ad'/>
<id>urn:sha1:0805a63df1b5f915b228727f6074c2506922d0ad</id>
<content type='text'>
unix.Faccessat has added support for AT_SYMLINK_NOFOLLOW in July 2018,
https://github.com/golang/sys/commit/bd9dbc187b6e1dacfdd2722a87e83093c2d7bd6e#diff-341484dbbe3180cd7a31ef2ad2d679b6
which means we no longer need our own helper.

Closes https://github.com/rfjakob/gocryptfs/issues/347
</content>
</entry>
<entry>
<title>tests: reverse: verify that longname .name files are exluded as well</title>
<updated>2019-01-04T16:57:57+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2019-01-04T16:57:57+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=58f62ada465c4ecbdb9a62a08968bebe37f02b7d'/>
<id>urn:sha1:58f62ada465c4ecbdb9a62a08968bebe37f02b7d</id>
<content type='text'>
Currently fails, will be fixed in the next commit.

https://github.com/rfjakob/gocryptfs/issues/286
</content>
</entry>
<entry>
<title>tests: add fd leak retry logic to UnmountErr, really return error</title>
<updated>2019-01-02T00:09:09+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2019-01-02T00:09:09+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=772afa93f98aa77959995e42564b898057c59b87'/>
<id>urn:sha1:772afa93f98aa77959995e42564b898057c59b87</id>
<content type='text'>
Give the gocryptfs process one extra millisecond to close
files. Allows us to drop several other sleeps.

UnmountErr now really returns an error when it detects an fd leak
instead of just printing a message.
</content>
</entry>
<entry>
<title>tests: reverse: add ctlsocket cleanup delay</title>
<updated>2019-01-01T23:09:17+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2019-01-01T21:54:41+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=035b3367b7a447adc5e4c1ed96706f911c08c9f8'/>
<id>urn:sha1:035b3367b7a447adc5e4c1ed96706f911c08c9f8</id>
<content type='text'>
</content>
</entry>
<entry>
<title>Assorted spelling fixes.</title>
<updated>2018-12-27T14:19:55+00:00</updated>
<author>
<name>Sebastian Lackner</name>
</author>
<published>2018-12-27T11:03:00+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=874eaf9734cc10940e08f7b043652449e1e220b5'/>
<id>urn:sha1:874eaf9734cc10940e08f7b043652449e1e220b5</id>
<content type='text'>
Mostly detected with the 'codespell' utility, but also includes some
manual grammar fixes.
</content>
</entry>
<entry>
<title>tests: catch "name too long" symlink failure on XFS</title>
<updated>2018-10-10T20:40:55+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2018-10-10T20:38:22+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=4f2feb1be7530d4fca7061b89d61f3ffc5761a0b'/>
<id>urn:sha1:4f2feb1be7530d4fca7061b89d61f3ffc5761a0b</id>
<content type='text'>
Retry with length 1000 if length 4000 fails, which
should work on all filesystems.

Failure was:

  --- FAIL: TestTooLongSymlink (0.00s)
      correctness_test.go:198: symlink xxx[...]xxxx /tmp/xfs.mnt/gocryptfs-test-parent/549823072/365091391/TooLongSymlink: file name too long

https://github.com/rfjakob/gocryptfs/issues/267
</content>
</entry>
<entry>
<title>fusefrontend: use OpenDirNofollow in openBackingDir</title>
<updated>2018-09-08T17:27:33+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2018-09-08T17:27:33+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=e8d8ae54d3b852d1d35b6db81d4a0beb57fbdce1'/>
<id>urn:sha1:e8d8ae54d3b852d1d35b6db81d4a0beb57fbdce1</id>
<content type='text'>
Rename openBackingPath to openBackingDir and use OpenDirNofollow
to be safe against symlink races. Note that openBackingDir is
not used in several important code paths like Create().

But it is used in Unlink, and the performance impact in the RM benchmark
to be acceptable:

Before

	$ ./benchmark.bash
	Testing gocryptfs at /tmp/benchmark.bash.bYO: gocryptfs v1.6-12-g930c37e-dirty; go-fuse v20170619-49-gb11e293; 2018-09-08 go1.10.3
	WRITE: 262144000 bytes (262 MB, 250 MiB) copied, 1.07979 s, 243 MB/s
	READ:  262144000 bytes (262 MB, 250 MiB) copied, 0.882413 s, 297 MB/s
	UNTAR: 16.703
	MD5:   7.606
	LS:    1.349
	RM:    3.237

After

	$ ./benchmark.bash
	Testing gocryptfs at /tmp/benchmark.bash.jK3: gocryptfs v1.6-13-g84d6faf-dirty; go-fuse v20170619-49-gb11e293; 2018-09-08 go1.10.3
	WRITE: 262144000 bytes (262 MB, 250 MiB) copied, 1.06261 s, 247 MB/s
	READ:  262144000 bytes (262 MB, 250 MiB) copied, 0.947228 s, 277 MB/s
	UNTAR: 17.197
	MD5:   7.540
	LS:    1.364
	RM:    3.410
</content>
</entry>
<entry>
<title>tests: restore Go 1.7 compatibility</title>
<updated>2018-09-08T16:19:53+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2018-09-08T16:19:53+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=84d6fafeca8f1d7b1b631a56fc3dc47016c4ba31'/>
<id>urn:sha1:84d6fafeca8f1d7b1b631a56fc3dc47016c4ba31</id>
<content type='text'>
Go 1.7 does not have t.Name() yet.
</content>
</entry>
</feed>
