From 34d8a498c4899b1493f7bea16c22486d6725c9b1 Mon Sep 17 00:00:00 2001 From: Jakob Unterwurzacher Date: Mon, 30 Aug 2021 11:31:01 +0200 Subject: Unbreak hyperlinks broken by go mod v2 conversion Commit 69d88505fd7f4cb0d9e4f1918de296342fe05858 go mod: declare module version v2 translated all instances of "github.com/rfjakob/gocryptfs/" to "github.com/rfjakob/gocryptfs/v2/". Unfortunately, this included hyperlinks. Unbreak the hyperlinks like this: find . -name \*.go | xargs sed -i s%https://github.com/rfjakob/gocryptfs/v2/%https://github.com/rfjakob/gocryptfs/v2/% --- internal/syscallcompat/eintr.go | 2 +- internal/syscallcompat/getdents_linux.go | 6 +++--- internal/syscallcompat/getdents_test.go | 2 +- internal/syscallcompat/quirks.go | 6 +++--- internal/syscallcompat/quirks_darwin.go | 6 +++--- internal/syscallcompat/quirks_linux.go | 6 +++--- internal/syscallcompat/sys_darwin.go | 2 +- internal/syscallcompat/sys_linux.go | 2 +- 8 files changed, 16 insertions(+), 16 deletions(-) (limited to 'internal/syscallcompat') diff --git a/internal/syscallcompat/eintr.go b/internal/syscallcompat/eintr.go index 2e2bb18..cdde806 100644 --- a/internal/syscallcompat/eintr.go +++ b/internal/syscallcompat/eintr.go @@ -12,7 +12,7 @@ import ( // https://github.com/golang/go/blob/d2a80f3fb5b44450e0b304ac5a718f99c053d82a/src/os/file_posix.go#L243 // // This is needed because CIFS throws lots of EINTR errors: -// https://github.com/rfjakob/gocryptfs/v2/issues/483 +// https://github.com/rfjakob/gocryptfs/issues/483 // // Don't use retryEINTR() with syscall.Close()! // See https://code.google.com/p/chromium/issues/detail?id=269623 . diff --git a/internal/syscallcompat/getdents_linux.go b/internal/syscallcompat/getdents_linux.go index 2ad7cde..cedb463 100644 --- a/internal/syscallcompat/getdents_linux.go +++ b/internal/syscallcompat/getdents_linux.go @@ -23,7 +23,7 @@ const sizeofDirent = int(unsafe.Sizeof(unix.Dirent{})) // maxReclen sanity check: Reclen should never be larger than this. // Due to padding between entries, it is 280 even on 32-bit architectures. -// See https://github.com/rfjakob/gocryptfs/v2/issues/197 for details. +// See https://github.com/rfjakob/gocryptfs/issues/197 for details. const maxReclen = 280 // getdents wraps unix.Getdents and converts the result to []fuse.DirEntry. @@ -43,7 +43,7 @@ func getdents(fd int) (entries []fuse.DirEntry, entriesSpecial []fuse.DirEntry, continue } else if err != nil { if smartBuf.Len() > 0 { - tlog.Warn.Printf("warning: unix.Getdents returned errno %d in the middle of data ( https://github.com/rfjakob/gocryptfs/v2/issues/483 )", err.(syscall.Errno)) + tlog.Warn.Printf("warning: unix.Getdents returned errno %d in the middle of data ( https://github.com/rfjakob/gocryptfs/issues/483 )", err.(syscall.Errno)) return nil, nil, syscall.EIO } return nil, nil, err @@ -145,7 +145,7 @@ func dtUnknownWarn(dirfd int) { if err == nil && buf.Type == XFS_SUPER_MAGIC { // Old XFS filesystems always return DT_UNKNOWN. Downgrade the message // to "info" level if we are on XFS. - // https://github.com/rfjakob/gocryptfs/v2/issues/267 + // https://github.com/rfjakob/gocryptfs/issues/267 tlog.Info.Printf("Getdents: convertDType: received DT_UNKNOWN, fstype=xfs, falling back to stat") } else { tlog.Warn.Printf("Getdents: convertDType: received DT_UNKNOWN, fstype=%#x, falling back to stat", diff --git a/internal/syscallcompat/getdents_test.go b/internal/syscallcompat/getdents_test.go index 6c746bc..a6f41ca 100644 --- a/internal/syscallcompat/getdents_test.go +++ b/internal/syscallcompat/getdents_test.go @@ -27,7 +27,7 @@ func TestGetdents(t *testing.T) { // skipOnGccGo skips the emulateGetdents test when we are // running linux and were compiled with gccgo. The test is known to fail -// (https://github.com/rfjakob/gocryptfs/v2/issues/201), but getdents emulation +// (https://github.com/rfjakob/gocryptfs/issues/201), but getdents emulation // is not used on linux, so let's skip the test and ignore the failure. func skipOnGccGo(t *testing.T) { if !emulate || runtime.GOOS != "linux" { diff --git a/internal/syscallcompat/quirks.go b/internal/syscallcompat/quirks.go index cfcf3ff..110c00d 100644 --- a/internal/syscallcompat/quirks.go +++ b/internal/syscallcompat/quirks.go @@ -6,12 +6,12 @@ import ( const ( // QuirkBrokenFalloc means the falloc is broken. - // Preallocation on Btrfs is broken ( https://github.com/rfjakob/gocryptfs/v2/issues/395 ) - // and slow ( https://github.com/rfjakob/gocryptfs/v2/issues/63 ). + // Preallocation on Btrfs is broken ( https://github.com/rfjakob/gocryptfs/issues/395 ) + // and slow ( https://github.com/rfjakob/gocryptfs/issues/63 ). QuirkBrokenFalloc = uint64(1 << iota) // QuirkDuplicateIno1 means that we have duplicate inode numbers. // On MacOS ExFAT, all empty files share inode number 1: - // https://github.com/rfjakob/gocryptfs/v2/issues/585 + // https://github.com/rfjakob/gocryptfs/issues/585 QuirkDuplicateIno1 ) diff --git a/internal/syscallcompat/quirks_darwin.go b/internal/syscallcompat/quirks_darwin.go index aca3d99..4adeea1 100644 --- a/internal/syscallcompat/quirks_darwin.go +++ b/internal/syscallcompat/quirks_darwin.go @@ -8,7 +8,7 @@ import ( func DetectQuirks(cipherdir string) (q uint64) { const ( - // From https://github.com/rfjakob/gocryptfs/v2/issues/585#issuecomment-887370065 + // From https://github.com/rfjakob/gocryptfs/issues/585#issuecomment-887370065 FstypenameExfat = "exfat" ) @@ -31,9 +31,9 @@ func DetectQuirks(cipherdir string) (q uint64) { tlog.Debug.Printf("DetectQuirks: Fstypename=%q\n", fstypename) // On MacOS ExFAT, all empty files share inode number 1: - // https://github.com/rfjakob/gocryptfs/v2/issues/585 + // https://github.com/rfjakob/gocryptfs/issues/585 if fstypename == FstypenameExfat { - logQuirk("ExFAT detected, disabling hard links. See https://github.com/rfjakob/gocryptfs/v2/issues/585 for why.") + logQuirk("ExFAT detected, disabling hard links. See https://github.com/rfjakob/gocryptfs/issues/585 for why.") q |= QuirkDuplicateIno1 } diff --git a/internal/syscallcompat/quirks_linux.go b/internal/syscallcompat/quirks_linux.go index 418f010..bcdcf07 100644 --- a/internal/syscallcompat/quirks_linux.go +++ b/internal/syscallcompat/quirks_linux.go @@ -18,12 +18,12 @@ func DetectQuirks(cipherdir string) (q uint64) { return 0 } - // Preallocation on Btrfs is broken ( https://github.com/rfjakob/gocryptfs/v2/issues/395 ) - // and slow ( https://github.com/rfjakob/gocryptfs/v2/issues/63 ). + // Preallocation on Btrfs is broken ( https://github.com/rfjakob/gocryptfs/issues/395 ) + // and slow ( https://github.com/rfjakob/gocryptfs/issues/63 ). // // Cast to uint32 avoids compile error on arm: "constant 2435016766 overflows int32" if uint32(st.Type) == unix.BTRFS_SUPER_MAGIC { - logQuirk("Btrfs detected, forcing -noprealloc. See https://github.com/rfjakob/gocryptfs/v2/issues/395 for why.") + logQuirk("Btrfs detected, forcing -noprealloc. See https://github.com/rfjakob/gocryptfs/issues/395 for why.") q |= QuirkBrokenFalloc } diff --git a/internal/syscallcompat/sys_darwin.go b/internal/syscallcompat/sys_darwin.go index e35f213..075563f 100644 --- a/internal/syscallcompat/sys_darwin.go +++ b/internal/syscallcompat/sys_darwin.go @@ -59,7 +59,7 @@ func setattrlist(path *byte, list unsafe.Pointer, buf unsafe.Pointer, size uintp // Sorry, fallocate is not available on OSX at all and // fcntl F_PREALLOCATE is not accessible from Go. -// See https://github.com/rfjakob/gocryptfs/v2/issues/18 if you want to help. +// See https://github.com/rfjakob/gocryptfs/issues/18 if you want to help. func EnospcPrealloc(fd int, off int64, len int64) error { return nil } diff --git a/internal/syscallcompat/sys_linux.go b/internal/syscallcompat/sys_linux.go index b7f1dad..961d1c9 100644 --- a/internal/syscallcompat/sys_linux.go +++ b/internal/syscallcompat/sys_linux.go @@ -48,7 +48,7 @@ func EnospcPrealloc(fd int, off int64, len int64) (err error) { } if err == syscall.EOPNOTSUPP { // ZFS and ext3 do not support fallocate. Warn but continue anyway. - // https://github.com/rfjakob/gocryptfs/v2/issues/22 + // https://github.com/rfjakob/gocryptfs/issues/22 preallocWarn.Do(func() { tlog.Warn.Printf("Warning: The underlying filesystem " + "does not support fallocate(2). gocryptfs will continue working " + -- cgit v1.2.3