summaryrefslogtreecommitdiff
path: root/internal/nametransform
diff options
context:
space:
mode:
Diffstat (limited to 'internal/nametransform')
-rw-r--r--internal/nametransform/badname.go2
-rw-r--r--internal/nametransform/diriv.go8
-rw-r--r--internal/nametransform/longnames.go4
-rw-r--r--internal/nametransform/names.go2
-rw-r--r--internal/nametransform/perms.go4
5 files changed, 10 insertions, 10 deletions
diff --git a/internal/nametransform/badname.go b/internal/nametransform/badname.go
index 44b7d36..eed0061 100644
--- a/internal/nametransform/badname.go
+++ b/internal/nametransform/badname.go
@@ -8,7 +8,7 @@ import (
"golang.org/x/sys/unix"
- "github.com/rfjakob/gocryptfs/internal/syscallcompat"
+ "github.com/rfjakob/gocryptfs/v2/internal/syscallcompat"
)
const (
diff --git a/internal/nametransform/diriv.go b/internal/nametransform/diriv.go
index 3a80baa..dc6b21d 100644
--- a/internal/nametransform/diriv.go
+++ b/internal/nametransform/diriv.go
@@ -7,9 +7,9 @@ import (
"os"
"syscall"
- "github.com/rfjakob/gocryptfs/internal/cryptocore"
- "github.com/rfjakob/gocryptfs/internal/syscallcompat"
- "github.com/rfjakob/gocryptfs/internal/tlog"
+ "github.com/rfjakob/gocryptfs/v2/internal/cryptocore"
+ "github.com/rfjakob/gocryptfs/v2/internal/syscallcompat"
+ "github.com/rfjakob/gocryptfs/v2/internal/tlog"
)
const (
@@ -68,7 +68,7 @@ func WriteDirIVAt(dirfd int) error {
iv := cryptocore.RandBytes(DirIVLen)
// 0400 permissions: gocryptfs.diriv should never be modified after creation.
// Don't use "ioutil.WriteFile", it causes trouble on NFS:
- // https://github.com/rfjakob/gocryptfs/commit/7d38f80a78644c8ec4900cc990bfb894387112ed
+ // https://github.com/rfjakob/gocryptfs/v2/commit/7d38f80a78644c8ec4900cc990bfb894387112ed
fd, err := syscallcompat.Openat(dirfd, DirIVFilename, os.O_WRONLY|os.O_CREATE|os.O_EXCL, dirivPerms)
if err != nil {
tlog.Warn.Printf("WriteDirIV: Openat: %v", err)
diff --git a/internal/nametransform/longnames.go b/internal/nametransform/longnames.go
index bf8060b..1c2857a 100644
--- a/internal/nametransform/longnames.go
+++ b/internal/nametransform/longnames.go
@@ -9,8 +9,8 @@ import (
"strings"
"syscall"
- "github.com/rfjakob/gocryptfs/internal/syscallcompat"
- "github.com/rfjakob/gocryptfs/internal/tlog"
+ "github.com/rfjakob/gocryptfs/v2/internal/syscallcompat"
+ "github.com/rfjakob/gocryptfs/v2/internal/tlog"
)
const (
diff --git a/internal/nametransform/names.go b/internal/nametransform/names.go
index 412ccc0..d766d2f 100644
--- a/internal/nametransform/names.go
+++ b/internal/nametransform/names.go
@@ -9,7 +9,7 @@ import (
"github.com/rfjakob/eme"
- "github.com/rfjakob/gocryptfs/internal/tlog"
+ "github.com/rfjakob/gocryptfs/v2/internal/tlog"
)
const (
diff --git a/internal/nametransform/perms.go b/internal/nametransform/perms.go
index cfcd062..6b88afd 100644
--- a/internal/nametransform/perms.go
+++ b/internal/nametransform/perms.go
@@ -6,14 +6,14 @@ const (
// never chmod'ed or chown'ed.
//
// Group-readable so the FS can be mounted by several users in the same group
- // (see https://github.com/rfjakob/gocryptfs/issues/387 ).
+ // (see https://github.com/rfjakob/gocryptfs/v2/issues/387 ).
//
// Note that gocryptfs.conf is still created with 0400 permissions so the
// owner must explicitly chmod it to permit access.
//
// World-readable so an encrypted directory can be copied by the non-root
// owner when gocryptfs is running as root
- // ( https://github.com/rfjakob/gocryptfs/issues/539 ).
+ // ( https://github.com/rfjakob/gocryptfs/v2/issues/539 ).
dirivPerms = 0444
// Permissions for gocryptfs.longname.[sha256].name files.