diff options
| author | Jakob Unterwurzacher | 2016-09-02 20:58:13 +0200 | 
|---|---|---|
| committer | Jakob Unterwurzacher | 2016-09-25 16:43:17 +0200 | 
| commit | a34b447ad1e6d4eea4adecddb9198f659d19aeeb (patch) | |
| tree | acedf3bce70e857a34252b90826be0085b401185 | |
| parent | 777eb8e62f19895e9b2d3d8364a6ae1c40ff3ebc (diff) | |
reverse: let the kernel enforce read-only mode
... and print a warning that reverse mode is experimental
| -rw-r--r-- | main.go | 4 | 
1 files changed, 3 insertions, 1 deletions
| @@ -408,6 +408,7 @@ func initFuseFrontend(key []byte, args argContainer, confFile *configfile.ConfFi  	var finalFs pathfs.FileSystem  	if args.reverse {  		finalFs = fusefrontend_reverse.NewFS(frontendArgs) +		tlog.Info.Printf(tlog.ColorYellow + "REVERSE MODE IS EXPERIMENTAL" + tlog.ColorReset)  	} else {  		finalFs = fusefrontend.NewFS(frontendArgs)  	} @@ -437,7 +438,8 @@ func initFuseFrontend(key []byte, args argContainer, confFile *configfile.ConfFi  	mOpts.Name = "gocryptfs"  	// The kernel enforces read-only operation, we just have to pass "ro". -	if args.ro { +	// Reverse mounts are always read-only +	if args.ro || args.reverse {  		mOpts.Options = append(mOpts.Options, "ro")  	}  	// Add additional mount options (if any) after the stock ones, so the user has | 
