diff options
author | Jakob Unterwurzacher | 2021-08-30 11:31:01 +0200 |
---|---|---|
committer | Jakob Unterwurzacher | 2021-08-30 11:31:01 +0200 |
commit | 34d8a498c4899b1493f7bea16c22486d6725c9b1 (patch) | |
tree | 47677bc9a93e02fc5d8ae9b787e5e14b023be701 /internal/nametransform | |
parent | 17fe50ef742869e50b18d90846436215f798b548 (diff) |
Unbreak hyperlinks broken by go mod v2 conversion
Commit
69d88505fd7f4cb0d9e4f1918de296342fe05858 go mod: declare module version v2
translated all instances of "github.com/rfjakob/gocryptfs/" to
"github.com/rfjakob/gocryptfs/v2/".
Unfortunately, this included hyperlinks.
Unbreak the hyperlinks like this:
find . -name \*.go | xargs sed -i s%https://github.com/rfjakob/gocryptfs/v2/%https://github.com/rfjakob/gocryptfs/v2/%
Diffstat (limited to 'internal/nametransform')
-rw-r--r-- | internal/nametransform/diriv.go | 2 | ||||
-rw-r--r-- | internal/nametransform/perms.go | 4 |
2 files changed, 3 insertions, 3 deletions
diff --git a/internal/nametransform/diriv.go b/internal/nametransform/diriv.go index dc6b21d..7929c40 100644 --- a/internal/nametransform/diriv.go +++ b/internal/nametransform/diriv.go @@ -68,7 +68,7 @@ func WriteDirIVAt(dirfd int) error { iv := cryptocore.RandBytes(DirIVLen) // 0400 permissions: gocryptfs.diriv should never be modified after creation. // Don't use "ioutil.WriteFile", it causes trouble on NFS: - // https://github.com/rfjakob/gocryptfs/v2/commit/7d38f80a78644c8ec4900cc990bfb894387112ed + // https://github.com/rfjakob/gocryptfs/commit/7d38f80a78644c8ec4900cc990bfb894387112ed fd, err := syscallcompat.Openat(dirfd, DirIVFilename, os.O_WRONLY|os.O_CREATE|os.O_EXCL, dirivPerms) if err != nil { tlog.Warn.Printf("WriteDirIV: Openat: %v", err) diff --git a/internal/nametransform/perms.go b/internal/nametransform/perms.go index 6b88afd..cfcd062 100644 --- a/internal/nametransform/perms.go +++ b/internal/nametransform/perms.go @@ -6,14 +6,14 @@ const ( // never chmod'ed or chown'ed. // // Group-readable so the FS can be mounted by several users in the same group - // (see https://github.com/rfjakob/gocryptfs/v2/issues/387 ). + // (see https://github.com/rfjakob/gocryptfs/issues/387 ). // // Note that gocryptfs.conf is still created with 0400 permissions so the // owner must explicitly chmod it to permit access. // // World-readable so an encrypted directory can be copied by the non-root // owner when gocryptfs is running as root - // ( https://github.com/rfjakob/gocryptfs/v2/issues/539 ). + // ( https://github.com/rfjakob/gocryptfs/issues/539 ). dirivPerms = 0444 // Permissions for gocryptfs.longname.[sha256].name files. |