diff options
Diffstat (limited to 'internal')
69 files changed, 164 insertions, 164 deletions
diff --git a/internal/configfile/config_file.go b/internal/configfile/config_file.go index 025e1c3..d457db6 100644 --- a/internal/configfile/config_file.go +++ b/internal/configfile/config_file.go @@ -12,10 +12,10 @@ import ( "os" - "github.com/rfjakob/gocryptfs/internal/contentenc" - "github.com/rfjakob/gocryptfs/internal/cryptocore" - "github.com/rfjakob/gocryptfs/internal/exitcodes" - "github.com/rfjakob/gocryptfs/internal/tlog" + "github.com/rfjakob/gocryptfs/v2/internal/contentenc" + "github.com/rfjakob/gocryptfs/v2/internal/cryptocore" + "github.com/rfjakob/gocryptfs/v2/internal/exitcodes" + "github.com/rfjakob/gocryptfs/v2/internal/tlog" ) const ( @@ -223,10 +223,10 @@ func Load(filename string) (*ConfFile, error) { The filesystem was created by gocryptfs v0.6 or earlier. This version of gocryptfs can no longer mount the filesystem. Please download gocryptfs v0.11 and upgrade your filesystem, - see https://github.com/rfjakob/gocryptfs/wiki/Upgrading for instructions. + see https://github.com/rfjakob/gocryptfs/v2/wiki/Upgrading for instructions. If you have trouble upgrading, join the discussion at - https://github.com/rfjakob/gocryptfs/issues/29 . + https://github.com/rfjakob/gocryptfs/v2/issues/29 . `+tlog.ColorReset) @@ -312,7 +312,7 @@ func (cf *ConfFile) WriteFile() error { err = fd.Sync() if err != nil { // This can happen on network drives: FRITZ.NAS mounted on MacOS returns - // "operation not supported": https://github.com/rfjakob/gocryptfs/issues/390 + // "operation not supported": https://github.com/rfjakob/gocryptfs/v2/issues/390 tlog.Warn.Printf("Warning: fsync failed: %v", err) // Try sync instead syscall.Sync() diff --git a/internal/configfile/config_test.go b/internal/configfile/config_test.go index c03be90..6986888 100644 --- a/internal/configfile/config_test.go +++ b/internal/configfile/config_test.go @@ -5,7 +5,7 @@ import ( "testing" "time" - "github.com/rfjakob/gocryptfs/internal/tlog" + "github.com/rfjakob/gocryptfs/v2/internal/tlog" ) var testPw = []byte("test") diff --git a/internal/configfile/scrypt.go b/internal/configfile/scrypt.go index 54fe0c6..7ac822e 100644 --- a/internal/configfile/scrypt.go +++ b/internal/configfile/scrypt.go @@ -7,9 +7,9 @@ import ( "golang.org/x/crypto/scrypt" - "github.com/rfjakob/gocryptfs/internal/cryptocore" - "github.com/rfjakob/gocryptfs/internal/exitcodes" - "github.com/rfjakob/gocryptfs/internal/tlog" + "github.com/rfjakob/gocryptfs/v2/internal/cryptocore" + "github.com/rfjakob/gocryptfs/v2/internal/exitcodes" + "github.com/rfjakob/gocryptfs/v2/internal/tlog" ) const ( diff --git a/internal/configfile/scrypt_test.go b/internal/configfile/scrypt_test.go index 8f7a5c8..30f37a1 100644 --- a/internal/configfile/scrypt_test.go +++ b/internal/configfile/scrypt_test.go @@ -17,7 +17,7 @@ BenchmarkScrypt14-2 20 92561590 ns/op ... 92ms BenchmarkScrypt15-2 10 183971593 ns/op BenchmarkScrypt16-2 3 368506365 ns/op BenchmarkScrypt17-2 2 755502608 ns/op ... 755ms -ok github.com/rfjakob/gocryptfs/cryptfs 18.772s +ok github.com/rfjakob/gocryptfs/v2/cryptfs 18.772s */ func benchmarkScryptN(n int, b *testing.B) { diff --git a/internal/contentenc/content.go b/internal/contentenc/content.go index e023492..01cabb8 100644 --- a/internal/contentenc/content.go +++ b/internal/contentenc/content.go @@ -12,9 +12,9 @@ import ( "github.com/hanwen/go-fuse/v2/fuse" - "github.com/rfjakob/gocryptfs/internal/cryptocore" - "github.com/rfjakob/gocryptfs/internal/stupidgcm" - "github.com/rfjakob/gocryptfs/internal/tlog" + "github.com/rfjakob/gocryptfs/v2/internal/cryptocore" + "github.com/rfjakob/gocryptfs/v2/internal/stupidgcm" + "github.com/rfjakob/gocryptfs/v2/internal/tlog" ) // NonceMode determines how nonces are created. @@ -179,7 +179,7 @@ func (be *ContentEnc) DecryptBlock(ciphertext []byte, blockNo uint64, fileID []b nonce := ciphertext[:be.cryptoCore.IVLen] if bytes.Equal(nonce, be.allZeroNonce) { // Bug in tmpfs? - // https://github.com/rfjakob/gocryptfs/issues/56 + // https://github.com/rfjakob/gocryptfs/v2/issues/56 // http://www.spinics.net/lists/kernel/msg2370127.html return nil, errors.New("all-zero nonce") } diff --git a/internal/contentenc/content_test.go b/internal/contentenc/content_test.go index 998e9b8..9cc8753 100644 --- a/internal/contentenc/content_test.go +++ b/internal/contentenc/content_test.go @@ -3,7 +3,7 @@ package contentenc import ( "testing" - "github.com/rfjakob/gocryptfs/internal/cryptocore" + "github.com/rfjakob/gocryptfs/v2/internal/cryptocore" ) type testRange struct { diff --git a/internal/contentenc/file_header.go b/internal/contentenc/file_header.go index 6ce2e3b..8c9c054 100644 --- a/internal/contentenc/file_header.go +++ b/internal/contentenc/file_header.go @@ -11,7 +11,7 @@ import ( "fmt" "log" - "github.com/rfjakob/gocryptfs/internal/cryptocore" + "github.com/rfjakob/gocryptfs/v2/internal/cryptocore" ) const ( diff --git a/internal/contentenc/offsets.go b/internal/contentenc/offsets.go index 3a0abf3..d3b9d7a 100644 --- a/internal/contentenc/offsets.go +++ b/internal/contentenc/offsets.go @@ -3,7 +3,7 @@ package contentenc import ( "log" - "github.com/rfjakob/gocryptfs/internal/tlog" + "github.com/rfjakob/gocryptfs/v2/internal/tlog" ) // Contentenc methods that translate offsets between ciphertext and plaintext diff --git a/internal/contentenc/offsets_test.go b/internal/contentenc/offsets_test.go index c3b8fcd..768393c 100644 --- a/internal/contentenc/offsets_test.go +++ b/internal/contentenc/offsets_test.go @@ -4,7 +4,7 @@ import ( "fmt" "testing" - "github.com/rfjakob/gocryptfs/internal/cryptocore" + "github.com/rfjakob/gocryptfs/v2/internal/cryptocore" ) // TestSizeToSize tests CipherSizeToPlainSize and PlainSizeToCipherSize diff --git a/internal/cryptocore/cryptocore.go b/internal/cryptocore/cryptocore.go index 5729952..5da88db 100644 --- a/internal/cryptocore/cryptocore.go +++ b/internal/cryptocore/cryptocore.go @@ -12,9 +12,9 @@ import ( "github.com/rfjakob/eme" - "github.com/rfjakob/gocryptfs/internal/siv_aead" - "github.com/rfjakob/gocryptfs/internal/stupidgcm" - "github.com/rfjakob/gocryptfs/internal/tlog" + "github.com/rfjakob/gocryptfs/v2/internal/siv_aead" + "github.com/rfjakob/gocryptfs/v2/internal/stupidgcm" + "github.com/rfjakob/gocryptfs/v2/internal/tlog" ) const ( diff --git a/internal/cryptocore/cryptocore_test.go b/internal/cryptocore/cryptocore_test.go index e595ef6..319a900 100644 --- a/internal/cryptocore/cryptocore_test.go +++ b/internal/cryptocore/cryptocore_test.go @@ -3,7 +3,7 @@ package cryptocore import ( "testing" - "github.com/rfjakob/gocryptfs/internal/stupidgcm" + "github.com/rfjakob/gocryptfs/v2/internal/stupidgcm" ) // "New" should accept at least these param combinations diff --git a/internal/ctlsocksrv/ctlsock_serve.go b/internal/ctlsocksrv/ctlsock_serve.go index b63759e..85f5b65 100644 --- a/internal/ctlsocksrv/ctlsock_serve.go +++ b/internal/ctlsocksrv/ctlsock_serve.go @@ -11,8 +11,8 @@ import ( "os" "syscall" - "github.com/rfjakob/gocryptfs/ctlsock" - "github.com/rfjakob/gocryptfs/internal/tlog" + "github.com/rfjakob/gocryptfs/v2/ctlsock" + "github.com/rfjakob/gocryptfs/v2/internal/tlog" ) // Interface should be implemented by fusefrontend[_reverse] diff --git a/internal/ensurefds012/ensurefds012.go b/internal/ensurefds012/ensurefds012.go index 4e772c6..09b3fc2 100644 --- a/internal/ensurefds012/ensurefds012.go +++ b/internal/ensurefds012/ensurefds012.go @@ -5,7 +5,7 @@ // // Use like this: // -// import _ "github.com/rfjakob/gocryptfs/internal/ensurefds012" +// import _ "github.com/rfjakob/gocryptfs/v2/internal/ensurefds012" // // The import line MUST be in the alphabitcally first source code file of // package main! @@ -25,14 +25,14 @@ // l-wx------. 1 jakob jakob 64 Jan 5 15:54 3 -> /dev/null // lrwx------. 1 jakob jakob 64 Jan 5 15:54 4 -> 'anon_inode:[eventpoll]' // -// See https://github.com/rfjakob/gocryptfs/issues/320 for details. +// See https://github.com/rfjakob/gocryptfs/v2/issues/320 for details. package ensurefds012 import ( "os" "syscall" - "github.com/rfjakob/gocryptfs/internal/exitcodes" + "github.com/rfjakob/gocryptfs/v2/internal/exitcodes" ) func init() { diff --git a/internal/fido2/fido2.go b/internal/fido2/fido2.go index 663d65c..fa6015e 100644 --- a/internal/fido2/fido2.go +++ b/internal/fido2/fido2.go @@ -9,9 +9,9 @@ import ( "os/exec" "strings" - "github.com/rfjakob/gocryptfs/internal/cryptocore" - "github.com/rfjakob/gocryptfs/internal/exitcodes" - "github.com/rfjakob/gocryptfs/internal/tlog" + "github.com/rfjakob/gocryptfs/v2/internal/cryptocore" + "github.com/rfjakob/gocryptfs/v2/internal/exitcodes" + "github.com/rfjakob/gocryptfs/v2/internal/tlog" ) type fidoCommand int diff --git a/internal/fusefrontend/args.go b/internal/fusefrontend/args.go index e20987b..677ffd6 100644 --- a/internal/fusefrontend/args.go +++ b/internal/fusefrontend/args.go @@ -42,7 +42,7 @@ type Args struct { // Suid is true if the filesystem has been mounted with the "-suid" flag. // If it is false, we can ignore the GETXATTR "security.capability" calls, // which are a performance problem for writes. See - // https://github.com/rfjakob/gocryptfs/issues/515 for details. + // https://github.com/rfjakob/gocryptfs/v2/issues/515 for details. Suid bool // Enable the FUSE kernel_cache option KernelCache bool diff --git a/internal/fusefrontend/ctlsock_interface.go b/internal/fusefrontend/ctlsock_interface.go index 87f0dc3..2afe4e0 100644 --- a/internal/fusefrontend/ctlsock_interface.go +++ b/internal/fusefrontend/ctlsock_interface.go @@ -6,10 +6,10 @@ import ( "strings" "syscall" - "github.com/rfjakob/gocryptfs/internal/ctlsocksrv" - "github.com/rfjakob/gocryptfs/internal/nametransform" - "github.com/rfjakob/gocryptfs/internal/syscallcompat" - "github.com/rfjakob/gocryptfs/internal/tlog" + "github.com/rfjakob/gocryptfs/v2/internal/ctlsocksrv" + "github.com/rfjakob/gocryptfs/v2/internal/nametransform" + "github.com/rfjakob/gocryptfs/v2/internal/syscallcompat" + "github.com/rfjakob/gocryptfs/v2/internal/tlog" ) var _ ctlsocksrv.Interface = &RootNode{} // Verify that interface is implemented. diff --git a/internal/fusefrontend/dircache.go b/internal/fusefrontend/dircache.go index 8c285fa..83a1e66 100644 --- a/internal/fusefrontend/dircache.go +++ b/internal/fusefrontend/dircache.go @@ -7,7 +7,7 @@ import ( "syscall" "time" - "github.com/rfjakob/gocryptfs/internal/tlog" + "github.com/rfjakob/gocryptfs/v2/internal/tlog" ) const ( diff --git a/internal/fusefrontend/file.go b/internal/fusefrontend/file.go index ef043ae..9481abf 100644 --- a/internal/fusefrontend/file.go +++ b/internal/fusefrontend/file.go @@ -17,13 +17,13 @@ import ( "github.com/hanwen/go-fuse/v2/fs" "github.com/hanwen/go-fuse/v2/fuse" - "github.com/rfjakob/gocryptfs/internal/contentenc" - "github.com/rfjakob/gocryptfs/internal/inomap" - "github.com/rfjakob/gocryptfs/internal/openfiletable" - "github.com/rfjakob/gocryptfs/internal/serialize_reads" - "github.com/rfjakob/gocryptfs/internal/stupidgcm" - "github.com/rfjakob/gocryptfs/internal/syscallcompat" - "github.com/rfjakob/gocryptfs/internal/tlog" + "github.com/rfjakob/gocryptfs/v2/internal/contentenc" + "github.com/rfjakob/gocryptfs/v2/internal/inomap" + "github.com/rfjakob/gocryptfs/v2/internal/openfiletable" + "github.com/rfjakob/gocryptfs/v2/internal/serialize_reads" + "github.com/rfjakob/gocryptfs/v2/internal/stupidgcm" + "github.com/rfjakob/gocryptfs/v2/internal/syscallcompat" + "github.com/rfjakob/gocryptfs/v2/internal/tlog" ) // File implements the go-fuse v2 API (github.com/hanwen/go-fuse/v2/fs) diff --git a/internal/fusefrontend/file_allocate_truncate.go b/internal/fusefrontend/file_allocate_truncate.go index f4e6099..fddcfe8 100644 --- a/internal/fusefrontend/file_allocate_truncate.go +++ b/internal/fusefrontend/file_allocate_truncate.go @@ -11,8 +11,8 @@ import ( "github.com/hanwen/go-fuse/v2/fs" - "github.com/rfjakob/gocryptfs/internal/syscallcompat" - "github.com/rfjakob/gocryptfs/internal/tlog" + "github.com/rfjakob/gocryptfs/v2/internal/syscallcompat" + "github.com/rfjakob/gocryptfs/v2/internal/tlog" ) // FALLOC_DEFAULT is a "normal" fallocate operation diff --git a/internal/fusefrontend/file_holes.go b/internal/fusefrontend/file_holes.go index cb44803..f35fa70 100644 --- a/internal/fusefrontend/file_holes.go +++ b/internal/fusefrontend/file_holes.go @@ -9,7 +9,7 @@ import ( "github.com/hanwen/go-fuse/v2/fs" - "github.com/rfjakob/gocryptfs/internal/tlog" + "github.com/rfjakob/gocryptfs/v2/internal/tlog" ) // Will a write to plaintext offset "targetOff" create a file hole in the diff --git a/internal/fusefrontend/file_setattr.go b/internal/fusefrontend/file_setattr.go index 0d6dc48..fe4bc47 100644 --- a/internal/fusefrontend/file_setattr.go +++ b/internal/fusefrontend/file_setattr.go @@ -7,8 +7,8 @@ import ( "github.com/hanwen/go-fuse/v2/fs" "github.com/hanwen/go-fuse/v2/fuse" - "github.com/rfjakob/gocryptfs/internal/syscallcompat" - "github.com/rfjakob/gocryptfs/internal/tlog" + "github.com/rfjakob/gocryptfs/v2/internal/syscallcompat" + "github.com/rfjakob/gocryptfs/v2/internal/tlog" ) func (f *File) Setattr(ctx context.Context, in *fuse.SetAttrIn, out *fuse.AttrOut) (errno syscall.Errno) { diff --git a/internal/fusefrontend/node.go b/internal/fusefrontend/node.go index 0f63fdf..99d337f 100644 --- a/internal/fusefrontend/node.go +++ b/internal/fusefrontend/node.go @@ -9,9 +9,9 @@ import ( "github.com/hanwen/go-fuse/v2/fs" "github.com/hanwen/go-fuse/v2/fuse" - "github.com/rfjakob/gocryptfs/internal/nametransform" - "github.com/rfjakob/gocryptfs/internal/syscallcompat" - "github.com/rfjakob/gocryptfs/internal/tlog" + "github.com/rfjakob/gocryptfs/v2/internal/nametransform" + "github.com/rfjakob/gocryptfs/v2/internal/syscallcompat" + "github.com/rfjakob/gocryptfs/v2/internal/tlog" ) // Node is a file or directory in the filesystem tree diff --git a/internal/fusefrontend/node_dir_ops.go b/internal/fusefrontend/node_dir_ops.go index c4ab861..97e4caa 100644 --- a/internal/fusefrontend/node_dir_ops.go +++ b/internal/fusefrontend/node_dir_ops.go @@ -12,11 +12,11 @@ import ( "github.com/hanwen/go-fuse/v2/fs" "github.com/hanwen/go-fuse/v2/fuse" - "github.com/rfjakob/gocryptfs/internal/configfile" - "github.com/rfjakob/gocryptfs/internal/cryptocore" - "github.com/rfjakob/gocryptfs/internal/nametransform" - "github.com/rfjakob/gocryptfs/internal/syscallcompat" - "github.com/rfjakob/gocryptfs/internal/tlog" + "github.com/rfjakob/gocryptfs/v2/internal/configfile" + "github.com/rfjakob/gocryptfs/v2/internal/cryptocore" + "github.com/rfjakob/gocryptfs/v2/internal/nametransform" + "github.com/rfjakob/gocryptfs/v2/internal/syscallcompat" + "github.com/rfjakob/gocryptfs/v2/internal/tlog" ) const dsStoreName = ".DS_Store" diff --git a/internal/fusefrontend/node_helpers.go b/internal/fusefrontend/node_helpers.go index 8d1749d..46046f1 100644 --- a/internal/fusefrontend/node_helpers.go +++ b/internal/fusefrontend/node_helpers.go @@ -9,8 +9,8 @@ import ( "github.com/hanwen/go-fuse/v2/fuse" - "github.com/rfjakob/gocryptfs/internal/syscallcompat" - "github.com/rfjakob/gocryptfs/internal/tlog" + "github.com/rfjakob/gocryptfs/v2/internal/syscallcompat" + "github.com/rfjakob/gocryptfs/v2/internal/tlog" ) // toFuseCtx tries to extract a fuse.Context from a generic context.Context. diff --git a/internal/fusefrontend/node_open_create.go b/internal/fusefrontend/node_open_create.go index 6385bc1..eb45fb4 100644 --- a/internal/fusefrontend/node_open_create.go +++ b/internal/fusefrontend/node_open_create.go @@ -7,9 +7,9 @@ import ( "github.com/hanwen/go-fuse/v2/fs" "github.com/hanwen/go-fuse/v2/fuse" - "github.com/rfjakob/gocryptfs/internal/nametransform" - "github.com/rfjakob/gocryptfs/internal/syscallcompat" - "github.com/rfjakob/gocryptfs/internal/tlog" + "github.com/rfjakob/gocryptfs/v2/internal/nametransform" + "github.com/rfjakob/gocryptfs/v2/internal/syscallcompat" + "github.com/rfjakob/gocryptfs/v2/internal/tlog" ) // Open - FUSE call. Open already-existing file. diff --git a/internal/fusefrontend/node_prepare_syscall.go b/internal/fusefrontend/node_prepare_syscall.go index 8a0e75c..2a4d6ab 100644 --- a/internal/fusefrontend/node_prepare_syscall.go +++ b/internal/fusefrontend/node_prepare_syscall.go @@ -4,11 +4,11 @@ import ( "sync/atomic" "syscall" - "github.com/rfjakob/gocryptfs/internal/tlog" + "github.com/rfjakob/gocryptfs/v2/internal/tlog" "github.com/hanwen/go-fuse/v2/fs" - "github.com/rfjakob/gocryptfs/internal/syscallcompat" + "github.com/rfjakob/gocryptfs/v2/internal/syscallcompat" ) // prepareAtSyscall returns a (dirfd, cName) pair that can be used diff --git a/internal/fusefrontend/node_xattr.go b/internal/fusefrontend/node_xattr.go index ceb10f1..d5d8c5b 100644 --- a/internal/fusefrontend/node_xattr.go +++ b/internal/fusefrontend/node_xattr.go @@ -9,7 +9,7 @@ import ( "github.com/hanwen/go-fuse/v2/fuse" - "github.com/rfjakob/gocryptfs/internal/tlog" + "github.com/rfjakob/gocryptfs/v2/internal/tlog" ) // -1 as uint32 @@ -24,7 +24,7 @@ var xattrNameIV = []byte("xattr_name_iv_xx") var xattrStorePrefix = "user.gocryptfs." // We get one read of this xattr for each write - -// see https://github.com/rfjakob/gocryptfs/issues/515 for details. +// see https://github.com/rfjakob/gocryptfs/v2/issues/515 for details. var xattrCapability = "security.capability" // isAcl returns true if the attribute name is for storing ACLs @@ -41,7 +41,7 @@ func (n *Node) Getxattr(ctx context.Context, attr string, dest []byte) (uint32, rn := n.rootNode() // If we are not mounted with -suid, reading the capability xattr does not // make a lot of sense, so reject the request and gain a massive speedup. - // See https://github.com/rfjakob/gocryptfs/issues/515 . + // See https://github.com/rfjakob/gocryptfs/v2/issues/515 . if !rn.args.Suid && attr == xattrCapability { // Returning EOPNOTSUPP is what we did till // ca9e912a28b901387e1dbb85f6c531119f2d5ef2 "fusefrontend: drop xattr user namespace restriction" diff --git a/internal/fusefrontend/node_xattr_darwin.go b/internal/fusefrontend/node_xattr_darwin.go index 31ba653..8c8a153 100644 --- a/internal/fusefrontend/node_xattr_darwin.go +++ b/internal/fusefrontend/node_xattr_darwin.go @@ -8,7 +8,7 @@ import ( "github.com/hanwen/go-fuse/v2/fs" "github.com/hanwen/go-fuse/v2/fuse" - "github.com/rfjakob/gocryptfs/internal/syscallcompat" + "github.com/rfjakob/gocryptfs/v2/internal/syscallcompat" ) // On Darwin we have to unset XATTR_NOSECURITY 0x0008 diff --git a/internal/fusefrontend/node_xattr_linux.go b/internal/fusefrontend/node_xattr_linux.go index 212d4e1..4a356a5 100644 --- a/internal/fusefrontend/node_xattr_linux.go +++ b/internal/fusefrontend/node_xattr_linux.go @@ -9,7 +9,7 @@ import ( "github.com/hanwen/go-fuse/v2/fs" "github.com/hanwen/go-fuse/v2/fuse" - "github.com/rfjakob/gocryptfs/internal/syscallcompat" + "github.com/rfjakob/gocryptfs/v2/internal/syscallcompat" ) func filterXattrSetFlags(flags int) int { diff --git a/internal/fusefrontend/prepare_syscall_test.go b/internal/fusefrontend/prepare_syscall_test.go index 693f62a..acddaf3 100644 --- a/internal/fusefrontend/prepare_syscall_test.go +++ b/internal/fusefrontend/prepare_syscall_test.go @@ -9,8 +9,8 @@ import ( "github.com/hanwen/go-fuse/v2/fuse" - "github.com/rfjakob/gocryptfs/internal/syscallcompat" - "github.com/rfjakob/gocryptfs/tests/test_helpers" + "github.com/rfjakob/gocryptfs/v2/internal/syscallcompat" + "github.com/rfjakob/gocryptfs/v2/tests/test_helpers" ) func TestPrepareAtSyscall(t *testing.T) { diff --git a/internal/fusefrontend/root_node.go b/internal/fusefrontend/root_node.go index a2de953..34b084b 100644 --- a/internal/fusefrontend/root_node.go +++ b/internal/fusefrontend/root_node.go @@ -7,13 +7,13 @@ import ( "syscall" "time" - "github.com/rfjakob/gocryptfs/internal/configfile" - "github.com/rfjakob/gocryptfs/internal/contentenc" - "github.com/rfjakob/gocryptfs/internal/inomap" - "github.com/rfjakob/gocryptfs/internal/nametransform" - "github.com/rfjakob/gocryptfs/internal/serialize_reads" - "github.com/rfjakob/gocryptfs/internal/syscallcompat" - "github.com/rfjakob/gocryptfs/internal/tlog" + "github.com/rfjakob/gocryptfs/v2/internal/configfile" + "github.com/rfjakob/gocryptfs/v2/internal/contentenc" + "github.com/rfjakob/gocryptfs/v2/internal/inomap" + "github.com/rfjakob/gocryptfs/v2/internal/nametransform" + "github.com/rfjakob/gocryptfs/v2/internal/serialize_reads" + "github.com/rfjakob/gocryptfs/v2/internal/syscallcompat" + "github.com/rfjakob/gocryptfs/v2/internal/tlog" ) // RootNode is the root of the filesystem tree of Nodes. diff --git a/internal/fusefrontend/xattr_unit_test.go b/internal/fusefrontend/xattr_unit_test.go index 397e3ef..7449d24 100644 --- a/internal/fusefrontend/xattr_unit_test.go +++ b/internal/fusefrontend/xattr_unit_test.go @@ -9,9 +9,9 @@ import ( "github.com/hanwen/go-fuse/v2/fs" - "github.com/rfjakob/gocryptfs/internal/contentenc" - "github.com/rfjakob/gocryptfs/internal/cryptocore" - "github.com/rfjakob/gocryptfs/internal/nametransform" + "github.com/rfjakob/gocryptfs/v2/internal/contentenc" + "github.com/rfjakob/gocryptfs/v2/internal/cryptocore" + "github.com/rfjakob/gocryptfs/v2/internal/nametransform" ) func newTestFS(args Args) *RootNode { diff --git a/internal/fusefrontend_reverse/ctlsock_interface.go b/internal/fusefrontend_reverse/ctlsock_interface.go index 1cfdf3e..9266cbf 100644 --- a/internal/fusefrontend_reverse/ctlsock_interface.go +++ b/internal/fusefrontend_reverse/ctlsock_interface.go @@ -6,7 +6,7 @@ import ( "golang.org/x/sys/unix" - "github.com/rfjakob/gocryptfs/internal/ctlsocksrv" + "github.com/rfjakob/gocryptfs/v2/internal/ctlsocksrv" ) // Verify that the interface is implemented. diff --git a/internal/fusefrontend_reverse/excluder.go b/internal/fusefrontend_reverse/excluder.go index d5b3319..0faadfa 100644 --- a/internal/fusefrontend_reverse/excluder.go +++ b/internal/fusefrontend_reverse/excluder.go @@ -6,9 +6,9 @@ import ( "os" "strings" - "github.com/rfjakob/gocryptfs/internal/exitcodes" - "github.com/rfjakob/gocryptfs/internal/fusefrontend" - "github.com/rfjakob/gocryptfs/internal/tlog" + "github.com/rfjakob/gocryptfs/v2/internal/exitcodes" + "github.com/rfjakob/gocryptfs/v2/internal/fusefrontend" + "github.com/rfjakob/gocryptfs/v2/internal/tlog" "github.com/sabhiram/go-gitignore" ) diff --git a/internal/fusefrontend_reverse/excluder_test.go b/internal/fusefrontend_reverse/excluder_test.go index e44c0e0..bb041ce 100644 --- a/internal/fusefrontend_reverse/excluder_test.go +++ b/internal/fusefrontend_reverse/excluder_test.go @@ -6,7 +6,7 @@ import ( "reflect" "testing" - "github.com/rfjakob/gocryptfs/internal/fusefrontend" + "github.com/rfjakob/gocryptfs/v2/internal/fusefrontend" ) func TestShouldPrefixExcludeValuesWithSlash(t *testing.T) { diff --git a/internal/fusefrontend_reverse/file.go b/internal/fusefrontend_reverse/file.go index 294872f..bc917ac 100644 --- a/internal/fusefrontend_reverse/file.go +++ b/internal/fusefrontend_reverse/file.go @@ -9,7 +9,7 @@ import ( "github.com/hanwen/go-fuse/v2/fs" "github.com/hanwen/go-fuse/v2/fuse" - "github.com/rfjakob/gocryptfs/internal/contentenc" + "github.com/rfjakob/gocryptfs/v2/internal/contentenc" ) type File struct { diff --git a/internal/fusefrontend_reverse/file_helpers.go b/internal/fusefrontend_reverse/file_helpers.go index f024e69..4ded5d6 100644 --- a/internal/fusefrontend_reverse/file_helpers.go +++ b/internal/fusefrontend_reverse/file_helpers.go @@ -5,9 +5,9 @@ import ( "io" "sync" - "github.com/rfjakob/gocryptfs/internal/contentenc" - "github.com/rfjakob/gocryptfs/internal/pathiv" - "github.com/rfjakob/gocryptfs/internal/tlog" + "github.com/rfjakob/gocryptfs/v2/internal/contentenc" + "github.com/rfjakob/gocryptfs/v2/internal/pathiv" + "github.com/rfjakob/gocryptfs/v2/internal/tlog" ) var inodeTable sync.Map diff --git a/internal/fusefrontend_reverse/node.go b/internal/fusefrontend_reverse/node.go index 1b2fd67..170410f 100644 --- a/internal/fusefrontend_reverse/node.go +++ b/internal/fusefrontend_reverse/node.go @@ -12,10 +12,10 @@ import ( "github.com/hanwen/go-fuse/v2/fs" "github.com/hanwen/go-fuse/v2/fuse" - "github.com/rfjakob/gocryptfs/internal/contentenc" - "github.com/rfjakob/gocryptfs/internal/pathiv" - "github.com/rfjakob/gocryptfs/internal/syscallcompat" - "github.com/rfjakob/gocryptfs/internal/tlog" + "github.com/rfjakob/gocryptfs/v2/internal/contentenc" + "github.com/rfjakob/gocryptfs/v2/internal/pathiv" + "github.com/rfjakob/gocryptfs/v2/internal/syscallcompat" + "github.com/rfjakob/gocryptfs/v2/internal/tlog" ) // Node is a file or directory in the filesystem tree diff --git a/internal/fusefrontend_reverse/node_dir_ops.go b/internal/fusefrontend_reverse/node_dir_ops.go index 2592ebc..05e2f49 100644 --- a/internal/fusefrontend_reverse/node_dir_ops.go +++ b/internal/fusefrontend_reverse/node_dir_ops.go @@ -10,11 +10,11 @@ import ( "github.com/hanwen/go-fuse/v2/fs" "github.com/hanwen/go-fuse/v2/fuse" - "github.com/rfjakob/gocryptfs/internal/configfile" - "github.com/rfjakob/gocryptfs/internal/cryptocore" - "github.com/rfjakob/gocryptfs/internal/nametransform" - "github.com/rfjakob/gocryptfs/internal/syscallcompat" - "github.com/rfjakob/gocryptfs/internal/tlog" + "github.com/rfjakob/gocryptfs/v2/internal/configfile" + "github.com/rfjakob/gocryptfs/v2/internal/cryptocore" + "github.com/rfjakob/gocryptfs/v2/internal/nametransform" + "github.com/rfjakob/gocryptfs/v2/internal/syscallcompat" + "github.com/rfjakob/gocryptfs/v2/internal/tlog" ) // Readdir - FUSE call. diff --git a/internal/fusefrontend_reverse/node_helpers.go b/internal/fusefrontend_reverse/node_helpers.go index b7dc086..96c3c2d 100644 --- a/internal/fusefrontend_reverse/node_helpers.go +++ b/internal/fusefrontend_reverse/node_helpers.go @@ -11,9 +11,9 @@ import ( "github.com/hanwen/go-fuse/v2/fs" "github.com/hanwen/go-fuse/v2/fuse" - "github.com/rfjakob/gocryptfs/internal/configfile" - "github.com/rfjakob/gocryptfs/internal/pathiv" - "github.com/rfjakob/gocryptfs/internal/syscallcompat" + "github.com/rfjakob/gocryptfs/v2/internal/configfile" + "github.com/rfjakob/gocryptfs/v2/internal/pathiv" + "github.com/rfjakob/gocryptfs/v2/internal/syscallcompat" ) const ( diff --git a/internal/fusefrontend_reverse/root_node.go b/internal/fusefrontend_reverse/root_node.go index 5ce7f81..d4c1e37 100644 --- a/internal/fusefrontend_reverse/root_node.go +++ b/internal/fusefrontend_reverse/root_node.go @@ -6,18 +6,18 @@ import ( "strings" "syscall" - "github.com/rfjakob/gocryptfs/internal/tlog" + "github.com/rfjakob/gocryptfs/v2/internal/tlog" "golang.org/x/sys/unix" "github.com/hanwen/go-fuse/v2/fs" "github.com/hanwen/go-fuse/v2/fuse" - "github.com/rfjakob/gocryptfs/internal/contentenc" - "github.com/rfjakob/gocryptfs/internal/fusefrontend" - "github.com/rfjakob/gocryptfs/internal/inomap" - "github.com/rfjakob/gocryptfs/internal/nametransform" - "github.com/rfjakob/gocryptfs/internal/syscallcompat" + "github.com/rfjakob/gocryptfs/v2/internal/contentenc" + "github.com/rfjakob/gocryptfs/v2/internal/fusefrontend" + "github.com/rfjakob/gocryptfs/v2/internal/inomap" + "github.com/rfjakob/gocryptfs/v2/internal/nametransform" + "github.com/rfjakob/gocryptfs/v2/internal/syscallcompat" "github.com/sabhiram/go-gitignore" ) diff --git a/internal/fusefrontend_reverse/rpath.go b/internal/fusefrontend_reverse/rpath.go index 7ebedd7..9625dc2 100644 --- a/internal/fusefrontend_reverse/rpath.go +++ b/internal/fusefrontend_reverse/rpath.go @@ -7,10 +7,10 @@ import ( "strings" "syscall" - "github.com/rfjakob/gocryptfs/internal/nametransform" - "github.com/rfjakob/gocryptfs/internal/pathiv" - "github.com/rfjakob/gocryptfs/internal/syscallcompat" - "github.com/rfjakob/gocryptfs/internal/tlog" + "github.com/rfjakob/gocryptfs/v2/internal/nametransform" + "github.com/rfjakob/gocryptfs/v2/internal/pathiv" + "github.com/rfjakob/gocryptfs/v2/internal/syscallcompat" + "github.com/rfjakob/gocryptfs/v2/internal/tlog" ) // rDecryptName decrypts the ciphertext name "cName", given the dirIV of the diff --git a/internal/fusefrontend_reverse/virtualnode.go b/internal/fusefrontend_reverse/virtualnode.go index 328f021..688f536 100644 --- a/internal/fusefrontend_reverse/virtualnode.go +++ b/internal/fusefrontend_reverse/virtualnode.go @@ -8,9 +8,9 @@ import ( "github.com/hanwen/go-fuse/v2/fs" "github.com/hanwen/go-fuse/v2/fuse" - "github.com/rfjakob/gocryptfs/internal/configfile" - "github.com/rfjakob/gocryptfs/internal/inomap" - "github.com/rfjakob/gocryptfs/internal/nametransform" + "github.com/rfjakob/gocryptfs/v2/internal/configfile" + "github.com/rfjakob/gocryptfs/v2/internal/inomap" + "github.com/rfjakob/gocryptfs/v2/internal/nametransform" ) const ( diff --git a/internal/inomap/inomap.go b/internal/inomap/inomap.go index 630ba18..97f9b61 100644 --- a/internal/inomap/inomap.go +++ b/internal/inomap/inomap.go @@ -19,7 +19,7 @@ import ( "sync" "syscall" - "github.com/rfjakob/gocryptfs/internal/tlog" + "github.com/rfjakob/gocryptfs/v2/internal/tlog" ) const ( diff --git a/internal/nametransform/badname.go b/internal/nametransform/badname.go index 44b7d36..eed0061 100644 --- a/internal/nametransform/badname.go +++ b/internal/nametransform/badname.go @@ -8,7 +8,7 @@ import ( "golang.org/x/sys/unix" - "github.com/rfjakob/gocryptfs/internal/syscallcompat" + "github.com/rfjakob/gocryptfs/v2/internal/syscallcompat" ) const ( diff --git a/internal/nametransform/diriv.go b/internal/nametransform/diriv.go index 3a80baa..dc6b21d 100644 --- a/internal/nametransform/diriv.go +++ b/internal/nametransform/diriv.go @@ -7,9 +7,9 @@ import ( "os" "syscall" - "github.com/rfjakob/gocryptfs/internal/cryptocore" - "github.com/rfjakob/gocryptfs/internal/syscallcompat" - "github.com/rfjakob/gocryptfs/internal/tlog" + "github.com/rfjakob/gocryptfs/v2/internal/cryptocore" + "github.com/rfjakob/gocryptfs/v2/internal/syscallcompat" + "github.com/rfjakob/gocryptfs/v2/internal/tlog" ) const ( @@ -68,7 +68,7 @@ func WriteDirIVAt(dirfd int) error { iv := cryptocore.RandBytes(DirIVLen) // 0400 permissions: gocryptfs.diriv should never be modified after creation. // Don't use "ioutil.WriteFile", it causes trouble on NFS: - // https://github.com/rfjakob/gocryptfs/commit/7d38f80a78644c8ec4900cc990bfb894387112ed + // https://github.com/rfjakob/gocryptfs/v2/commit/7d38f80a78644c8ec4900cc990bfb894387112ed fd, err := syscallcompat.Openat(dirfd, DirIVFilename, os.O_WRONLY|os.O_CREATE|os.O_EXCL, dirivPerms) if err != nil { tlog.Warn.Printf("WriteDirIV: Openat: %v", err) diff --git a/internal/nametransform/longnames.go b/internal/nametransform/longnames.go index bf8060b..1c2857a 100644 --- a/internal/nametransform/longnames.go +++ b/internal/nametransform/longnames.go @@ -9,8 +9,8 @@ import ( "strings" "syscall" - "github.com/rfjakob/gocryptfs/internal/syscallcompat" - "github.com/rfjakob/gocryptfs/internal/tlog" + "github.com/rfjakob/gocryptfs/v2/internal/syscallcompat" + "github.com/rfjakob/gocryptfs/v2/internal/tlog" ) const ( diff --git a/internal/nametransform/names.go b/internal/nametransform/names.go index 412ccc0..d766d2f 100644 --- a/internal/nametransform/names.go +++ b/internal/nametransform/names.go @@ -9,7 +9,7 @@ import ( "github.com/rfjakob/eme" - "github.com/rfjakob/gocryptfs/internal/tlog" + "github.com/rfjakob/gocryptfs/v2/internal/tlog" ) const ( diff --git a/internal/nametransform/perms.go b/internal/nametransform/perms.go index cfcd062..6b88afd 100644 --- a/internal/nametransform/perms.go +++ b/internal/nametransform/perms.go @@ -6,14 +6,14 @@ const ( // never chmod'ed or chown'ed. // // Group-readable so the FS can be mounted by several users in the same group - // (see https://github.com/rfjakob/gocryptfs/issues/387 ). + // (see https://github.com/rfjakob/gocryptfs/v2/issues/387 ). // // Note that gocryptfs.conf is still created with 0400 permissions so the // owner must explicitly chmod it to permit access. // // World-readable so an encrypted directory can be copied by the non-root // owner when gocryptfs is running as root - // ( https://github.com/rfjakob/gocryptfs/issues/539 ). + // ( https://github.com/rfjakob/gocryptfs/v2/issues/539 ). dirivPerms = 0444 // Permissions for gocryptfs.longname.[sha256].name files. diff --git a/internal/openfiletable/open_file_table.go b/internal/openfiletable/open_file_table.go index dfd9637..ce8df76 100644 --- a/internal/openfiletable/open_file_table.go +++ b/internal/openfiletable/open_file_table.go @@ -8,7 +8,7 @@ import ( "sync" "sync/atomic" - "github.com/rfjakob/gocryptfs/internal/inomap" + "github.com/rfjakob/gocryptfs/v2/internal/inomap" ) // wlock - serializes write accesses to each file (identified by inode number) diff --git a/internal/pathiv/pathiv.go b/internal/pathiv/pathiv.go index 08042e9..48f8426 100644 --- a/internal/pathiv/pathiv.go +++ b/internal/pathiv/pathiv.go @@ -4,7 +4,7 @@ import ( "crypto/sha256" "encoding/binary" - "github.com/rfjakob/gocryptfs/internal/nametransform" + "github.com/rfjakob/gocryptfs/v2/internal/nametransform" ) // Purpose identifies for which purpose the IV will be used. This is mixed into the diff --git a/internal/readpassword/extpass_test.go b/internal/readpassword/extpass_test.go index ea05893..5c23ab3 100644 --- a/internal/readpassword/extpass_test.go +++ b/internal/readpassword/extpass_test.go @@ -5,7 +5,7 @@ import ( "os/exec" "testing" - "github.com/rfjakob/gocryptfs/internal/tlog" + "github.com/rfjakob/gocryptfs/v2/internal/tlog" ) func TestMain(m *testing.M) { diff --git a/internal/readpassword/passfile.go b/internal/readpassword/passfile.go index df6cd4d..29fde6c 100644 --- a/internal/readpassword/passfile.go +++ b/internal/readpassword/passfile.go @@ -4,8 +4,8 @@ import ( "bytes" "os" - "github.com/rfjakob/gocryptfs/internal/exitcodes" - "github.com/rfjakob/gocryptfs/internal/tlog" + "github.com/rfjakob/gocryptfs/v2/internal/exitcodes" + "github.com/rfjakob/gocryptfs/v2/internal/tlog" ) // readPassFileConcatenate reads the first line from each file name and diff --git a/internal/readpassword/read.go b/internal/readpassword/read.go index e116f0b..c0dce43 100644 --- a/internal/readpassword/read.go +++ b/internal/readpassword/read.go @@ -11,8 +11,8 @@ import ( "golang.org/x/crypto/ssh/terminal" - "github.com/rfjakob/gocryptfs/internal/exitcodes" - "github.com/rfjakob/gocryptfs/internal/tlog" + "github.com/rfjakob/gocryptfs/v2/internal/exitcodes" + "github.com/rfjakob/gocryptfs/v2/internal/tlog" ) const ( diff --git a/internal/serialize_reads/sr.go b/internal/serialize_reads/sr.go index 96cec4f..88115f9 100644 --- a/internal/serialize_reads/sr.go +++ b/internal/serialize_reads/sr.go @@ -5,7 +5,7 @@ import ( "sync" "time" - "github.com/rfjakob/gocryptfs/internal/tlog" + "github.com/rfjakob/gocryptfs/v2/internal/tlog" ) // serializerState is used by the Wait and Done functions diff --git a/internal/speed/speed.go b/internal/speed/speed.go index e097c55..4844845 100644 --- a/internal/speed/speed.go +++ b/internal/speed/speed.go @@ -14,8 +14,8 @@ import ( "golang.org/x/crypto/chacha20poly1305" - "github.com/rfjakob/gocryptfs/internal/siv_aead" - "github.com/rfjakob/gocryptfs/internal/stupidgcm" + "github.com/rfjakob/gocryptfs/v2/internal/siv_aead" + "github.com/rfjakob/gocryptfs/v2/internal/stupidgcm" ) // 128-bit file ID + 64 bit block number = 192 bits = 24 bytes diff --git a/internal/speed/speed_test.go b/internal/speed/speed_test.go index 1e9d859..f3ec66c 100644 --- a/internal/speed/speed_test.go +++ b/internal/speed/speed_test.go @@ -9,7 +9,7 @@ BenchmarkStupidGCM-2 100000 22552 ns/op 181.62 MB/s BenchmarkGoGCM-2 20000 81871 ns/op 50.03 MB/s BenchmarkAESSIV-2 10000 104623 ns/op 39.15 MB/s PASS -ok github.com/rfjakob/gocryptfs/internal/speed 6.022s +ok github.com/rfjakob/gocryptfs/v2/internal/speed 6.022s */ import ( diff --git a/internal/stupidgcm/prefer.go b/internal/stupidgcm/prefer.go index bacd56a..94c1b6c 100644 --- a/internal/stupidgcm/prefer.go +++ b/internal/stupidgcm/prefer.go @@ -14,7 +14,7 @@ import ( // 2) Is ARM64 && has AES instructions && Go is v1.11 or higher // (commit https://github.com/golang/go/commit/4f1f503373cda7160392be94e3849b0c9b9ebbda) // -// See https://github.com/rfjakob/gocryptfs/wiki/CPU-Benchmarks +// See https://github.com/rfjakob/gocryptfs/v2/wiki/CPU-Benchmarks // for benchmarks. func PreferOpenSSL() bool { if BuiltWithoutOpenssl { @@ -26,7 +26,7 @@ func PreferOpenSSL() bool { return false } // On the Apple M1, Go stdlib is faster than OpenSSL, despite cpu.ARM64.HasAES - // reading false: https://github.com/rfjakob/gocryptfs/issues/556#issuecomment-848079309 + // reading false: https://github.com/rfjakob/gocryptfs/v2/issues/556#issuecomment-848079309 if runtime.GOOS == "darwin" && runtime.GOARCH == "arm64" { return false } diff --git a/internal/stupidgcm/without_openssl.go b/internal/stupidgcm/without_openssl.go index deac342..4a14e73 100644 --- a/internal/stupidgcm/without_openssl.go +++ b/internal/stupidgcm/without_openssl.go @@ -6,7 +6,7 @@ import ( "fmt" "os" - "github.com/rfjakob/gocryptfs/internal/exitcodes" + "github.com/rfjakob/gocryptfs/v2/internal/exitcodes" ) type StupidGCM struct{} diff --git a/internal/syscallcompat/eintr.go b/internal/syscallcompat/eintr.go index cdde806..2e2bb18 100644 --- a/internal/syscallcompat/eintr.go +++ b/internal/syscallcompat/eintr.go @@ -12,7 +12,7 @@ import ( // https://github.com/golang/go/blob/d2a80f3fb5b44450e0b304ac5a718f99c053d82a/src/os/file_posix.go#L243 // // This is needed because CIFS throws lots of EINTR errors: -// https://github.com/rfjakob/gocryptfs/issues/483 +// https://github.com/rfjakob/gocryptfs/v2/issues/483 // // Don't use retryEINTR() with syscall.Close()! // See https://code.google.com/p/chromium/issues/detail?id=269623 . diff --git a/internal/syscallcompat/getdents_linux.go b/internal/syscallcompat/getdents_linux.go index 852b3cd..2ad7cde 100644 --- a/internal/syscallcompat/getdents_linux.go +++ b/internal/syscallcompat/getdents_linux.go @@ -16,14 +16,14 @@ import ( "github.com/hanwen/go-fuse/v2/fuse" - "github.com/rfjakob/gocryptfs/internal/tlog" + "github.com/rfjakob/gocryptfs/v2/internal/tlog" ) const sizeofDirent = int(unsafe.Sizeof(unix.Dirent{})) // maxReclen sanity check: Reclen should never be larger than this. // Due to padding between entries, it is 280 even on 32-bit architectures. -// See https://github.com/rfjakob/gocryptfs/issues/197 for details. +// See https://github.com/rfjakob/gocryptfs/v2/issues/197 for details. const maxReclen = 280 // getdents wraps unix.Getdents and converts the result to []fuse.DirEntry. @@ -43,7 +43,7 @@ func getdents(fd int) (entries []fuse.DirEntry, entriesSpecial []fuse.DirEntry, continue } else if err != nil { if smartBuf.Len() > 0 { - tlog.Warn.Printf("warning: unix.Getdents returned errno %d in the middle of data ( https://github.com/rfjakob/gocryptfs/issues/483 )", err.(syscall.Errno)) + tlog.Warn.Printf("warning: unix.Getdents returned errno %d in the middle of data ( https://github.com/rfjakob/gocryptfs/v2/issues/483 )", err.(syscall.Errno)) return nil, nil, syscall.EIO } return nil, nil, err @@ -145,7 +145,7 @@ func dtUnknownWarn(dirfd int) { if err == nil && buf.Type == XFS_SUPER_MAGIC { // Old XFS filesystems always return DT_UNKNOWN. Downgrade the message // to "info" level if we are on XFS. - // https://github.com/rfjakob/gocryptfs/issues/267 + // https://github.com/rfjakob/gocryptfs/v2/issues/267 tlog.Info.Printf("Getdents: convertDType: received DT_UNKNOWN, fstype=xfs, falling back to stat") } else { tlog.Warn.Printf("Getdents: convertDType: received DT_UNKNOWN, fstype=%#x, falling back to stat", diff --git a/internal/syscallcompat/getdents_test.go b/internal/syscallcompat/getdents_test.go index a6f41ca..6c746bc 100644 --- a/internal/syscallcompat/getdents_test.go +++ b/internal/syscallcompat/getdents_test.go @@ -27,7 +27,7 @@ func TestGetdents(t *testing.T) { // skipOnGccGo skips the emulateGetdents test when we are // running linux and were compiled with gccgo. The test is known to fail -// (https://github.com/rfjakob/gocryptfs/issues/201), but getdents emulation +// (https://github.com/rfjakob/gocryptfs/v2/issues/201), but getdents emulation // is not used on linux, so let's skip the test and ignore the failure. func skipOnGccGo(t *testing.T) { if !emulate || runtime.GOOS != "linux" { diff --git a/internal/syscallcompat/open_nofollow.go b/internal/syscallcompat/open_nofollow.go index f8e50e3..da28938 100644 --- a/internal/syscallcompat/open_nofollow.go +++ b/internal/syscallcompat/open_nofollow.go @@ -5,7 +5,7 @@ import ( "strings" "syscall" - "github.com/rfjakob/gocryptfs/internal/tlog" + "github.com/rfjakob/gocryptfs/v2/internal/tlog" ) // OpenDirNofollow opens the dir at "relPath" in a way that is secure against diff --git a/internal/syscallcompat/quirks.go b/internal/syscallcompat/quirks.go index 60d584d..cfcf3ff 100644 --- a/internal/syscallcompat/quirks.go +++ b/internal/syscallcompat/quirks.go @@ -1,17 +1,17 @@ package syscallcompat import ( - "github.com/rfjakob/gocryptfs/internal/tlog" + "github.com/rfjakob/gocryptfs/v2/internal/tlog" ) const ( // QuirkBrokenFalloc means the falloc is broken. - // Preallocation on Btrfs is broken ( https://github.com/rfjakob/gocryptfs/issues/395 ) - // and slow ( https://github.com/rfjakob/gocryptfs/issues/63 ). + // Preallocation on Btrfs is broken ( https://github.com/rfjakob/gocryptfs/v2/issues/395 ) + // and slow ( https://github.com/rfjakob/gocryptfs/v2/issues/63 ). QuirkBrokenFalloc = uint64(1 << iota) // QuirkDuplicateIno1 means that we have duplicate inode numbers. // On MacOS ExFAT, all empty files share inode number 1: - // https://github.com/rfjakob/gocryptfs/issues/585 + // https://github.com/rfjakob/gocryptfs/v2/issues/585 QuirkDuplicateIno1 ) diff --git a/internal/syscallcompat/quirks_darwin.go b/internal/syscallcompat/quirks_darwin.go index f4e7e71..aca3d99 100644 --- a/internal/syscallcompat/quirks_darwin.go +++ b/internal/syscallcompat/quirks_darwin.go @@ -3,12 +3,12 @@ package syscallcompat import ( "golang.org/x/sys/unix" - "github.com/rfjakob/gocryptfs/internal/tlog" + "github.com/rfjakob/gocryptfs/v2/internal/tlog" ) func DetectQuirks(cipherdir string) (q uint64) { const ( - // From https://github.com/rfjakob/gocryptfs/issues/585#issuecomment-887370065 + // From https://github.com/rfjakob/gocryptfs/v2/issues/585#issuecomment-887370065 FstypenameExfat = "exfat" ) @@ -31,9 +31,9 @@ func DetectQuirks(cipherdir string) (q uint64) { tlog.Debug.Printf("DetectQuirks: Fstypename=%q\n", fstypename) // On MacOS ExFAT, all empty files share inode number 1: - // https://github.com/rfjakob/gocryptfs/issues/585 + // https://github.com/rfjakob/gocryptfs/v2/issues/585 if fstypename == FstypenameExfat { - logQuirk("ExFAT detected, disabling hard links. See https://github.com/rfjakob/gocryptfs/issues/585 for why.") + logQuirk("ExFAT detected, disabling hard links. See https://github.com/rfjakob/gocryptfs/v2/issues/585 for why.") q |= QuirkDuplicateIno1 } diff --git a/internal/syscallcompat/quirks_linux.go b/internal/syscallcompat/quirks_linux.go index 262e48f..418f010 100644 --- a/internal/syscallcompat/quirks_linux.go +++ b/internal/syscallcompat/quirks_linux.go @@ -3,7 +3,7 @@ package syscallcompat import ( "golang.org/x/sys/unix" - "github.com/rfjakob/gocryptfs/internal/tlog" + "github.com/rfjakob/gocryptfs/v2/internal/tlog" ) // DetectQuirks decides if there are known quirks on the backing filesystem @@ -18,12 +18,12 @@ func DetectQuirks(cipherdir string) (q uint64) { return 0 } - // Preallocation on Btrfs is broken ( https://github.com/rfjakob/gocryptfs/issues/395 ) - // and slow ( https://github.com/rfjakob/gocryptfs/issues/63 ). + // Preallocation on Btrfs is broken ( https://github.com/rfjakob/gocryptfs/v2/issues/395 ) + // and slow ( https://github.com/rfjakob/gocryptfs/v2/issues/63 ). // // Cast to uint32 avoids compile error on arm: "constant 2435016766 overflows int32" if uint32(st.Type) == unix.BTRFS_SUPER_MAGIC { - logQuirk("Btrfs detected, forcing -noprealloc. See https://github.com/rfjakob/gocryptfs/issues/395 for why.") + logQuirk("Btrfs detected, forcing -noprealloc. See https://github.com/rfjakob/gocryptfs/v2/issues/395 for why.") q |= QuirkBrokenFalloc } diff --git a/internal/syscallcompat/sys_common.go b/internal/syscallcompat/sys_common.go index fc020bd..50b8180 100644 --- a/internal/syscallcompat/sys_common.go +++ b/internal/syscallcompat/sys_common.go @@ -6,7 +6,7 @@ import ( "golang.org/x/sys/unix" - "github.com/rfjakob/gocryptfs/internal/tlog" + "github.com/rfjakob/gocryptfs/v2/internal/tlog" ) // PATH_MAX is the maximum allowed path length on Linux. diff --git a/internal/syscallcompat/sys_darwin.go b/internal/syscallcompat/sys_darwin.go index 075563f..e35f213 100644 --- a/internal/syscallcompat/sys_darwin.go +++ b/internal/syscallcompat/sys_darwin.go @@ -59,7 +59,7 @@ func setattrlist(path *byte, list unsafe.Pointer, buf unsafe.Pointer, size uintp // Sorry, fallocate is not available on OSX at all and // fcntl F_PREALLOCATE is not accessible from Go. -// See https://github.com/rfjakob/gocryptfs/issues/18 if you want to help. +// See https://github.com/rfjakob/gocryptfs/v2/issues/18 if you want to help. func EnospcPrealloc(fd int, off int64, len int64) error { return nil } diff --git a/internal/syscallcompat/sys_linux.go b/internal/syscallcompat/sys_linux.go index a1d7d40..b7f1dad 100644 --- a/internal/syscallcompat/sys_linux.go +++ b/internal/syscallcompat/sys_linux.go @@ -15,7 +15,7 @@ import ( "github.com/hanwen/go-fuse/v2/fuse" - "github.com/rfjakob/gocryptfs/internal/tlog" + "github.com/rfjakob/gocryptfs/v2/internal/tlog" ) const ( @@ -48,7 +48,7 @@ func EnospcPrealloc(fd int, off int64, len int64) (err error) { } if err == syscall.EOPNOTSUPP { // ZFS and ext3 do not support fallocate. Warn but continue anyway. - // https://github.com/rfjakob/gocryptfs/issues/22 + // https://github.com/rfjakob/gocryptfs/v2/issues/22 preallocWarn.Do(func() { tlog.Warn.Printf("Warning: The underlying filesystem " + "does not support fallocate(2). gocryptfs will continue working " + |