From 34d8a498c4899b1493f7bea16c22486d6725c9b1 Mon Sep 17 00:00:00 2001 From: Jakob Unterwurzacher Date: Mon, 30 Aug 2021 11:31:01 +0200 Subject: Unbreak hyperlinks broken by go mod v2 conversion Commit 69d88505fd7f4cb0d9e4f1918de296342fe05858 go mod: declare module version v2 translated all instances of "github.com/rfjakob/gocryptfs/" to "github.com/rfjakob/gocryptfs/v2/". Unfortunately, this included hyperlinks. Unbreak the hyperlinks like this: find . -name \*.go | xargs sed -i s%https://github.com/rfjakob/gocryptfs/v2/%https://github.com/rfjakob/gocryptfs/v2/% --- tests/cli/cli_test.go | 16 ++++++++-------- tests/defaults/acl_test.go | 4 ++-- tests/defaults/main_test.go | 2 +- tests/matrix/concurrency_test.go | 4 ++-- tests/matrix/dir_test.go | 2 +- tests/matrix/fallocate_test.go | 2 +- tests/matrix/matrix_test.go | 6 +++--- tests/reverse/correctness_test.go | 2 +- tests/reverse/exclude_test.go | 2 +- 9 files changed, 20 insertions(+), 20 deletions(-) (limited to 'tests') diff --git a/tests/cli/cli_test.go b/tests/cli/cli_test.go index 96a5b72..d63625b 100644 --- a/tests/cli/cli_test.go +++ b/tests/cli/cli_test.go @@ -60,9 +60,9 @@ func TestInitFilePerms(t *testing.T) { syscall.Stat(dir+"/gocryptfs.diriv", &st) perms = st.Mode & 0777 // From v1.7.1, these are created with 0440 permissions, see - // https://github.com/rfjakob/gocryptfs/v2/issues/387 . + // https://github.com/rfjakob/gocryptfs/issues/387 . // From v2.0, created with 0444 perms, see - // https://github.com/rfjakob/gocryptfs/v2/issues/539 . + // https://github.com/rfjakob/gocryptfs/issues/539 . if perms != 0444 { t.Errorf("Wrong permissions for gocryptfs.diriv: %#o", perms) } @@ -441,7 +441,7 @@ func TestPasswdPasswordIncorrect(t *testing.T) { // Check that we correctly background on mount and close stderr and stdout. // Something like // gocryptfs a b | cat -// must not hang ( https://github.com/rfjakob/gocryptfs/v2/issues/130 ). +// must not hang ( https://github.com/rfjakob/gocryptfs/issues/130 ). func TestMountBackground(t *testing.T) { dir := test_helpers.InitFS(t) mnt := dir + ".mnt" @@ -557,7 +557,7 @@ func TestExcludeForward(t *testing.T) { } // Check that the config file can be read from a named pipe. -// Make sure bug https://github.com/rfjakob/gocryptfs/v2/issues/258 does not come +// Make sure bug https://github.com/rfjakob/gocryptfs/issues/258 does not come // back. func TestConfigPipe(t *testing.T) { dir := test_helpers.InitFS(t) @@ -580,7 +580,7 @@ func TestConfigPipe(t *testing.T) { } // Ciphertext dir and mountpoint contains a comma -// https://github.com/rfjakob/gocryptfs/v2/issues/262 +// https://github.com/rfjakob/gocryptfs/issues/262 func TestComma(t *testing.T) { dir0 := test_helpers.InitFS(t) dir := dir0 + ",foo,bar" @@ -625,7 +625,7 @@ func TestIdle(t *testing.T) { } // Mount with idle timeout of 100ms read something every 10ms. The fs should -// NOT get unmounted. Regression test for https://github.com/rfjakob/gocryptfs/v2/issues/421 +// NOT get unmounted. Regression test for https://github.com/rfjakob/gocryptfs/issues/421 func TestNotIdle(t *testing.T) { dir := test_helpers.InitFS(t) mnt := dir + ".mnt" @@ -663,7 +663,7 @@ func TestNotIdle(t *testing.T) { // TestSymlinkedCipherdir checks that if CIPHERDIR itself is a symlink, it is // followed. -// https://github.com/rfjakob/gocryptfs/v2/issues/450 +// https://github.com/rfjakob/gocryptfs/issues/450 func TestSymlinkedCipherdir(t *testing.T) { dir := test_helpers.InitFS(t) dirSymlink := dir + ".symlink" @@ -909,7 +909,7 @@ func TestPassfileX2(t *testing.T) { } // TestInitNotEmpty checks that `gocryptfs -init` returns the right error code -// if CIPHERDIR is not empty. See https://github.com/rfjakob/gocryptfs/v2/pull/503 +// if CIPHERDIR is not empty. See https://github.com/rfjakob/gocryptfs/pull/503 func TestInitNotEmpty(t *testing.T) { dir := test_helpers.TmpDir + "/" + t.Name() if err := os.Mkdir(dir, 0700); err != nil { diff --git a/tests/defaults/acl_test.go b/tests/defaults/acl_test.go index 94d3c38..2ab5dc1 100644 --- a/tests/defaults/acl_test.go +++ b/tests/defaults/acl_test.go @@ -17,7 +17,7 @@ import ( "github.com/rfjakob/gocryptfs/v2/tests/test_helpers" ) -// https://github.com/rfjakob/gocryptfs/v2/issues/543 +// https://github.com/rfjakob/gocryptfs/issues/543 func TestCpA(t *testing.T) { fn1 := filepath.Join(test_helpers.TmpDir, t.Name()) fn2 := filepath.Join(test_helpers.DefaultPlainDir, t.Name()) @@ -77,7 +77,7 @@ func getfacl(fn string) (string, error) { return string(out), err } -// https://github.com/rfjakob/gocryptfs/v2/issues/543 +// https://github.com/rfjakob/gocryptfs/issues/543 func TestAcl543(t *testing.T) { fn1 := test_helpers.TmpDir + "/TestAcl543" fn2 := test_helpers.DefaultPlainDir + "/TestAcl543" diff --git a/tests/defaults/main_test.go b/tests/defaults/main_test.go index 0acab2d..0045981 100644 --- a/tests/defaults/main_test.go +++ b/tests/defaults/main_test.go @@ -239,7 +239,7 @@ func TestMvWarningSymlink(t *testing.T) { if err != nil { t.Log(string(out)) if runtime.GOOS == "darwin" { - t.Skip("mv on darwin chokes on broken symlinks, see https://github.com/rfjakob/gocryptfs/v2/issues/349") + t.Skip("mv on darwin chokes on broken symlinks, see https://github.com/rfjakob/gocryptfs/issues/349") } t.Fatal(err) } diff --git a/tests/matrix/concurrency_test.go b/tests/matrix/concurrency_test.go index fa713df..04b7c96 100644 --- a/tests/matrix/concurrency_test.go +++ b/tests/matrix/concurrency_test.go @@ -12,7 +12,7 @@ import ( "github.com/rfjakob/gocryptfs/v2/tests/test_helpers" ) -// https://github.com/rfjakob/gocryptfs/v2/issues/363 +// https://github.com/rfjakob/gocryptfs/issues/363 // // Note: this test calls log.Fatal() instead of t.Fatal() because apparently, // calling t.Fatal() from a goroutine hangs the test. @@ -73,7 +73,7 @@ func TestConcurrentReadWrite(t *testing.T) { wg.Wait() } -// https://github.com/rfjakob/gocryptfs/v2/issues/363 +// https://github.com/rfjakob/gocryptfs/issues/363 // // Note: this test calls log.Fatal() instead of t.Fatal() because apparently, // calling t.Fatal() from a goroutine hangs the test. diff --git a/tests/matrix/dir_test.go b/tests/matrix/dir_test.go index 52c97a7..13d6712 100644 --- a/tests/matrix/dir_test.go +++ b/tests/matrix/dir_test.go @@ -34,7 +34,7 @@ func TestDirOverwrite(t *testing.T) { } // Test that we can create and remove a directory regardless of the permission it has -// https://github.com/rfjakob/gocryptfs/v2/issues/354 +// https://github.com/rfjakob/gocryptfs/issues/354 func TestRmdirPerms(t *testing.T) { for _, perm := range []uint32{0000, 0100, 0200, 0300, 0400, 0500, 0600, 0700} { dir := fmt.Sprintf("TestRmdir%#o", perm) diff --git a/tests/matrix/fallocate_test.go b/tests/matrix/fallocate_test.go index 84eae7e..ade6415 100644 --- a/tests/matrix/fallocate_test.go +++ b/tests/matrix/fallocate_test.go @@ -149,7 +149,7 @@ func TestFallocate(t *testing.T) { } } // We used to allocate 18 bytes too much: - // https://github.com/rfjakob/gocryptfs/v2/issues/311 + // https://github.com/rfjakob/gocryptfs/issues/311 // // 8110 bytes of plaintext should get us exactly 8192 bytes of ciphertext. err = file.Truncate(0) diff --git a/tests/matrix/matrix_test.go b/tests/matrix/matrix_test.go index f34b5f2..abcb7e0 100644 --- a/tests/matrix/matrix_test.go +++ b/tests/matrix/matrix_test.go @@ -774,7 +774,7 @@ func TestMkfifo(t *testing.T) { } // TestMagicNames verifies that "magic" names are handled correctly -// https://github.com/rfjakob/gocryptfs/v2/issues/174 +// https://github.com/rfjakob/gocryptfs/issues/174 func TestMagicNames(t *testing.T) { names := []string{"warmup1", "warmup2", "gocryptfs.longname.QhUr5d9FHerwEs--muUs6_80cy6JRp89c1otLwp92Cs", "gocryptfs.diriv"} for _, n := range names { @@ -891,7 +891,7 @@ func TestStatfs(t *testing.T) { } // gocryptfs 2.0 reported the ciphertext size on symlink creation, causing -// confusion: https://github.com/rfjakob/gocryptfs/v2/issues/574 +// confusion: https://github.com/rfjakob/gocryptfs/issues/574 func TestSymlinkSize(t *testing.T) { p := filepath.Join(test_helpers.DefaultPlainDir, t.Name()) // SYMLINK reports the size to the kernel @@ -911,7 +911,7 @@ func TestSymlinkSize(t *testing.T) { // TestPwd check that /usr/bin/pwd works inside gocryptfs. // // This was broken in gocryptfs v2.0 with -sharedstorage: -// https://github.com/rfjakob/gocryptfs/v2/issues/584 +// https://github.com/rfjakob/gocryptfs/issues/584 func TestPwd(t *testing.T) { dir := test_helpers.DefaultPlainDir for i := 0; i < 3; i++ { diff --git a/tests/reverse/correctness_test.go b/tests/reverse/correctness_test.go index 3b25112..090a468 100644 --- a/tests/reverse/correctness_test.go +++ b/tests/reverse/correctness_test.go @@ -185,7 +185,7 @@ func TestEnoent(t *testing.T) { // If the symlink target gets too long due to base64 encoding, we should // return ENAMETOOLONG instead of having the kernel reject the data and // returning an I/O error to the user. -// https://github.com/rfjakob/gocryptfs/v2/issues/167 +// https://github.com/rfjakob/gocryptfs/issues/167 func TestTooLongSymlink(t *testing.T) { var err error var l int diff --git a/tests/reverse/exclude_test.go b/tests/reverse/exclude_test.go index e37050c..f24ff2c 100644 --- a/tests/reverse/exclude_test.go +++ b/tests/reverse/exclude_test.go @@ -128,7 +128,7 @@ func TestExcludeTestFs(t *testing.T) { } // Exclude everything using "/*", then selectively include only dir1 using "!/dir1" -// https://github.com/rfjakob/gocryptfs/v2/issues/588 +// https://github.com/rfjakob/gocryptfs/issues/588 func TestExcludeAllOnlyDir1(t *testing.T) { // --exclude-wildcard patterns, gitignore syntax patterns := []string{ -- cgit v1.2.3