-
Notifications
You must be signed in to change notification settings - Fork 257
Comparing changes
Open a pull request
base repository: rfjakob/gocryptfs
base: v2.4.0
head repository: rfjakob/gocryptfs
compare: master
Commits on Jun 17, 2023
-
Configuration menu - View commit details
-
Copy full SHA for 0f11c77 - Browse repository at this point
Copy the full SHA 0f11c77View commit details
Commits on Sep 5, 2023
-
Configuration menu - View commit details
-
Copy full SHA for 8b1c4b0 - Browse repository at this point
Copy the full SHA 8b1c4b0View commit details
Commits on Sep 15, 2023
-
tests/fsck: add malleable_base64 test filesystem
This filesystem contains filenames with non-canonical base64 encodings of the same name "foo", leading to this mess: $ ls mnt/ foo foo foo foo
Configuration menu - View commit details
-
Copy full SHA for 30c0fbd - Browse repository at this point
Copy the full SHA 30c0fbdView commit details -
nametransform: reject non-canonical base64
The test added in the earlier commit passes with this change.
Configuration menu - View commit details
-
Copy full SHA for 7fff33a - Browse repository at this point
Copy the full SHA 7fff33aView commit details -
gocryptfs -speed: call testing.Init() to not panic
Looks like I should have been calling testing.Init() all along. From https://pkg.go.dev/testing#Init : > Init is only needed when calling functions such as > Benchmark without using "go test". Panic only affected without_openssl builds and looks like this: $ ./gocryptfs -speed gocryptfs v2.4.0-2-g8b1c4b0-dirty without_openssl; go-fuse v2.3.0; 2023-09-15 go1.21.1 linux/amd64 cpu: Intel(R) Core(TM) i5-6500 CPU @ 3.20GHz; with AES acceleration AES-GCM-256-OpenSSL panic: runtime error: invalid memory address or nil pointer dereference [signal SIGSEGV: segmentation violation code=0x1 addr=0x0 pc=0x5a5d20] goroutine 7 [running]: testing.(*common).decorate(0x40d625?, {0xc00001c150, 0x2a}, 0x830601?) testing/testing.go:772 +0xa0 [...] Fixes: #789 Relates-to: golang/go#62666
Configuration menu - View commit details
-
Copy full SHA for 3a65627 - Browse repository at this point
Copy the full SHA 3a65627View commit details
Commits on Sep 17, 2023
-
fsck: print "Checking filesystem..."
From #779 / @jroovy > When using `-fsck`, the command line output looks like this: > > ``` > $ gocryptfs -fsck ENCRYPTED_DIRECTORY > Password: > Decrypting master key > ``` > > However, the user might think it's stuck at decrypting the master > key. Adding extra text showing that fsck is working would be nice, > something like: > > ``` > $ gocryptfs -fsck ENCRYPTED_DIRECTORY > Password: > Decrypting master key > Checking filesystem... > ``` Fixes #779
Configuration menu - View commit details
-
Copy full SHA for 4ef110f - Browse repository at this point
Copy the full SHA 4ef110fView commit details
Commits on Oct 29, 2023
-
.github: drop unsupported Go versions
According to https://go.dev/doc/devel/release#policy each major Go release is supported until there are two newer major releases. For example, Go 1.5 was supported until the Go 1.7 release, and Go 1.6 was supported until the Go 1.8 release. Older releases are not receiving security updates. Upcoming dependency updates to golang exp packages use newer features like unsafe.Slice and therefore do not build correctly against Go < 1.19.x. Drop the older versions and add the newer versions to the ci. Signed-off-by: Christian Stewart <christian@aperture.us>
Configuration menu - View commit details
-
Copy full SHA for 770707e - Browse repository at this point
Copy the full SHA 770707eView commit details -
Update /x/crypto, /x/sys/, /x/term, jacobsa-crypto
Updated jacobsa-crypto which also pulls in the latest versions of the golang.org/x/ packages. Signed-off-by: Christian Stewart <christian@aperture.us>
Configuration menu - View commit details
-
Copy full SHA for 08b6ed1 - Browse repository at this point
Copy the full SHA 08b6ed1View commit details -
Signed-off-by: Christian Stewart <christian@aperture.us>
Configuration menu - View commit details
-
Copy full SHA for aa49343 - Browse repository at this point
Copy the full SHA aa49343View commit details -
Signed-off-by: Christian Stewart <christian@aperture.us>
Configuration menu - View commit details
-
Copy full SHA for 5da40e7 - Browse repository at this point
Copy the full SHA 5da40e7View commit details -
github ci: add back go 1.18 & go 1.19
Seems to build fine and has a big userbase due to Debian and Ubuntu.
Configuration menu - View commit details
-
Copy full SHA for 94c5828 - Browse repository at this point
Copy the full SHA 94c5828View commit details
Commits on Nov 12, 2023
-
Removed repeated "conflicts"
Configuration menu - View commit details
-
Copy full SHA for 1766df8 - Browse repository at this point
Copy the full SHA 1766df8View commit details
Commits on Dec 11, 2023
-
Configuration menu - View commit details
-
Copy full SHA for 15118e6 - Browse repository at this point
Copy the full SHA 15118e6View commit details -
tests: TestMountPasswordIncorrect: better error on wrong exit code
Report that exit code is wrong when the exit code is wrong.
Configuration menu - View commit details
-
Copy full SHA for 6fbe61d - Browse repository at this point
Copy the full SHA 6fbe61dView commit details
Commits on Jan 23, 2024
-
Configuration menu - View commit details
-
Copy full SHA for 9958b63 - Browse repository at this point
Copy the full SHA 9958b63View commit details
Commits on Mar 9, 2024
-
Configuration menu - View commit details
-
Copy full SHA for 1d7dd0a - Browse repository at this point
Copy the full SHA 1d7dd0aView commit details
Commits on Mar 12, 2024
-
Configuration menu - View commit details
-
Copy full SHA for 0dfa7f8 - Browse repository at this point
Copy the full SHA 0dfa7f8View commit details
Commits on Mar 13, 2024
-
Configuration menu - View commit details
-
Copy full SHA for 8ced867 - Browse repository at this point
Copy the full SHA 8ced867View commit details
Commits on Apr 18, 2024
-
MANPAGE: emphasize that -reverse implies -aessiv, so you must specify…
… it with -masterkey Fixes: #841
Configuration menu - View commit details
-
Copy full SHA for 7883d38 - Browse repository at this point
Copy the full SHA 7883d38View commit details -
Enables older CPUs (2008-2013) to take advantage of certain hardware accelerators. Closes #828
Configuration menu - View commit details
-
Copy full SHA for f5007b2 - Browse repository at this point
Copy the full SHA f5007b2View commit details
Commits on Apr 19, 2024
-
Configuration menu - View commit details
-
Copy full SHA for 4b6b955 - Browse repository at this point
Copy the full SHA 4b6b955View commit details -
Configuration menu - View commit details
-
Copy full SHA for 1b3fb29 - Browse repository at this point
Copy the full SHA 1b3fb29View commit details
Commits on May 1, 2024
-
tetss: reverse: add TestHardlinkedLongname
Regression test for #802 . Fails at the moment.
Configuration menu - View commit details
-
Copy full SHA for 210c5c5 - Browse repository at this point
Copy the full SHA 210c5c5View commit details -
reverse: use unique generation number for all nodes
We used to present gocryptfs.longname.*.name files for hardlinked files as hardlinked to the kernel (same Node ID) which is wrong. Fix this by using a unique generation number for all nodes, which also fixes possible issues with inode reuse. Basically what 1bc1db6 did for forward mode with -sharedstorage. Fixes #802
Configuration menu - View commit details
-
Copy full SHA for ed0a12b - Browse repository at this point
Copy the full SHA ed0a12bView commit details
Commits on May 5, 2024
-
inomap: incorporate spillBit into the spillNext start value
This avoids the manual "| spillBit" logic.
Configuration menu - View commit details
-
Copy full SHA for c85c092 - Browse repository at this point
Copy the full SHA c85c092View commit details -
This will be used in reverse mode. Switch to atomic increment to avoid a "nextSpillInoUnlocked" helper.
Configuration menu - View commit details
-
Copy full SHA for 5a2d461 - Browse repository at this point
Copy the full SHA 5a2d461View commit details -
Configuration menu - View commit details
-
Copy full SHA for bbfbf37 - Browse repository at this point
Copy the full SHA bbfbf37View commit details -
reverse: use incrementing inode number for gocryptfs.longname.*.name …
Configuration menu - View commit details
-
Copy full SHA for a385079 - Browse repository at this point
Copy the full SHA a385079View commit details
Commits on May 12, 2024
-
Fix error in the examples for `-fido2-assert-option`
Configuration menu - View commit details
-
Copy full SHA for f797960 - Browse repository at this point
Copy the full SHA f797960View commit details -
Remove accidentially-committed generation_num package
This package is a failed experiment and should not have been committed. Fixes: 9958b63
Configuration menu - View commit details
-
Copy full SHA for 67d52b3 - Browse repository at this point
Copy the full SHA 67d52b3View commit details
Commits on May 17, 2024
-
Configuration menu - View commit details
-
Copy full SHA for 72ec4b0 - Browse repository at this point
Copy the full SHA 72ec4b0View commit details -
syscallcompat: Openat: always set O_CLOEXEC
Let's not leak fds to logger. Before: $ lsof -p $(pgrep logger) COMMAND PID USER FD TYPE DEVICE SIZE/OFF NODE NAME logger 146410 jakob cwd DIR 253,0 4096 2 / logger 146410 jakob rtd DIR 253,0 4096 2 / logger 146410 jakob txt REG 253,0 41560 6293858 /usr/bin/logger logger 146410 jakob mem REG 253,0 229754784 6292695 /usr/lib/locale/locale-archive logger 146410 jakob mem REG 253,0 186480 6292031 /usr/lib64/libgcc_s-14-20240508.so.1 logger 146410 jakob mem REG 253,0 787128 6294119 /usr/lib64/libzstd.so.1.5.6 logger 146410 jakob mem REG 253,0 211424 6294587 /usr/lib64/liblzma.so.5.4.6 logger 146410 jakob mem REG 253,0 131128 6302636 /usr/lib64/liblz4.so.1.9.4 logger 146410 jakob mem REG 253,0 49184 6302330 /usr/lib64/libcap.so.2.69 logger 146410 jakob mem REG 253,0 2476880 6295299 /usr/lib64/libc.so.6 logger 146410 jakob mem REG 253,0 987256 6292058 /usr/lib64/libsystemd.so.0.38.0 logger 146410 jakob mem REG 253,0 906256 6295295 /usr/lib64/ld-linux-x86-64.so.2 logger 146410 jakob 0r FIFO 0,14 0t0 607727 pipe logger 146410 jakob 1w CHR 1,3 0t0 4 /dev/null logger 146410 jakob 2w CHR 1,3 0t0 4 /dev/null logger 146410 jakob 3u unix 0x0000000046d9c96b 0t0 607729 type=DGRAM (CONNECTED) logger 146410 jakob 10u DIR 0,33 80 7758 /tmp/tmp.lbUiEw9P6W/a After: $ lsof -p $(pgrep logger) COMMAND PID USER FD TYPE DEVICE SIZE/OFF NODE NAME logger 147982 jakob cwd DIR 253,0 4096 2 / logger 147982 jakob rtd DIR 253,0 4096 2 / logger 147982 jakob txt REG 253,0 41560 6293858 /usr/bin/logger logger 147982 jakob mem REG 253,0 229754784 6292695 /usr/lib/locale/locale-archive logger 147982 jakob mem REG 253,0 186480 6292031 /usr/lib64/libgcc_s-14-20240508.so.1 logger 147982 jakob mem REG 253,0 787128 6294119 /usr/lib64/libzstd.so.1.5.6 logger 147982 jakob mem REG 253,0 211424 6294587 /usr/lib64/liblzma.so.5.4.6 logger 147982 jakob mem REG 253,0 131128 6302636 /usr/lib64/liblz4.so.1.9.4 logger 147982 jakob mem REG 253,0 49184 6302330 /usr/lib64/libcap.so.2.69 logger 147982 jakob mem REG 253,0 2476880 6295299 /usr/lib64/libc.so.6 logger 147982 jakob mem REG 253,0 987256 6292058 /usr/lib64/libsystemd.so.0.38.0 logger 147982 jakob mem REG 253,0 906256 6295295 /usr/lib64/ld-linux-x86-64.so.2 logger 147982 jakob 0r FIFO 0,14 0t0 609636 pipe logger 147982 jakob 1w CHR 1,3 0t0 4 /dev/null logger 147982 jakob 2w CHR 1,3 0t0 4 /dev/null logger 147982 jakob 3u unix 0x00000000bc46d033 0t0 610344 type=DGRAM (CONNECTED) Fixes #846
Configuration menu - View commit details
-
Copy full SHA for da87308 - Browse repository at this point
Copy the full SHA da87308View commit details
Commits on Jun 6, 2024
-
stupidgcm: detect AES-GCM acceleration like crypto/tls
Instead of just looking for AES, also look for PCLMULQDQ, like crypto/tls does. Fixes: #822
Configuration menu - View commit details
-
Copy full SHA for f06f27e - Browse repository at this point
Copy the full SHA f06f27eView commit details
Commits on Jul 27, 2024
-
Configuration menu - View commit details
-
Copy full SHA for 533c9eb - Browse repository at this point
Copy the full SHA 533c9ebView commit details
Commits on Aug 23, 2024
-
readpassword: show where stdin is connected
Should make debugging situations like #852 Empty stdin in mkinitcpio hook easier. Examples: $ echo -n "" | ./gocryptfs -init a Choose a password for protecting your files. Reading Password from stdin (connected to "pipe:[749878]") Got empty Password from stdin $ ./gocryptfs -init a < /dev/null Choose a password for protecting your files. Reading Password from stdin (connected to "/dev/null") Got empty Password from stdin $ ./gocryptfs -init a < /dev/zero Choose a password for protecting your files. Reading Password from stdin (connected to "/dev/zero") fatal: maximum password length of 2048 bytes exceeded $ ./gocryptfs -init a < /dev/full Choose a password for protecting your files. Reading Password from stdin (connected to "/dev/full") fatal: maximum password length of 2048 bytes exceeded $ jakob@brikett:~/go/src/github.com/rfjakob/gocryptfs$ ./gocryptfs -init a < /dev/urandom Choose a password for protecting your files. Reading Password from stdin (connected to "/dev/urandom") Your master key is: 4e45a317-595d8a2d-46493a30-97de86ef- 540c7364-f0acc297-dd6f2592-7d9a5c97 If the gocryptfs.conf file becomes corrupted or you ever forget your password, there is only one hope for recovery: The master key. Print it to a piece of paper and store it in a drawer. This message is only printed once. The gocryptfs filesystem has been created successfully. You can now mount it using: gocryptfs a MOUNTPOINT
Configuration menu - View commit details
-
Copy full SHA for b78e6a1 - Browse repository at this point
Copy the full SHA b78e6a1View commit details -
Configuration menu - View commit details
-
Copy full SHA for 1db3808 - Browse repository at this point
Copy the full SHA 1db3808View commit details -
Configuration menu - View commit details
-
Copy full SHA for f665be1 - Browse repository at this point
Copy the full SHA f665be1View commit details
Commits on Sep 2, 2024
-
Configuration menu - View commit details
-
Copy full SHA for 40abf96 - Browse repository at this point
Copy the full SHA 40abf96View commit details
Commits on Sep 3, 2024
-
ctlsock: delete colliding orphaned socket file
Detect and delete an orphaned socket file that collides with the ctlsock we want to create. Fixes #776
Configuration menu - View commit details
-
Copy full SHA for 2c01b1a - Browse repository at this point
Copy the full SHA 2c01b1aView commit details
Commits on Sep 19, 2024
-
dl-linux-tarball.bash: drop wget's "--no-progress" flag
Looks like wget does not support it anymore $ wget --version GNU Wget2 2.1.0 - multithreaded metalink/file/website downloader $ ./benchmark.bash Testing gocryptfs at /tmp/benchmark.bash.bmt: gocryptfs v2.4.0-38-g40abf96-dirty; go-fuse v2.5.0; 2024-09-03 go1.21.4 linux/amd64 /tmp/benchmark.bash.bmt.mnt is a mountpoint Downloading linux-3.0.tar.gz Unknown option 'show-progress'
Configuration menu - View commit details
-
Copy full SHA for 2ccea57 - Browse repository at this point
Copy the full SHA 2ccea57View commit details
Commits on Oct 30, 2024
-
manpage: Fix reference to manual section
The `--reverse` section of the manual has a reference to an `INIT FLAGS` section, but no such section exists. Change the reference to refer to the `INIT OPTIONS` section, which does exist.
Configuration menu - View commit details
-
Copy full SHA for 94bd6a3 - Browse repository at this point
Copy the full SHA 94bd6a3View commit details
Commits on Nov 11, 2024
-
Configuration menu - View commit details
-
Copy full SHA for 12c0f3a - Browse repository at this point
Copy the full SHA 12c0f3aView commit details -
Report inode number for the root node
Now that hanwen/go-fuse#399 has landed we can report an inode number for the root node. Fixes #580
Configuration menu - View commit details
-
Copy full SHA for 8689105 - Browse repository at this point
Copy the full SHA 8689105View commit details
Commits on Dec 4, 2024
-
passfile: drop byte counter from trailing garbage warning
We don't know the exact value as we only read 2kiB. Relates-to: #882
Configuration menu - View commit details
-
Copy full SHA for 11f338f - Browse repository at this point
Copy the full SHA 11f338fView commit details -
Configuration menu - View commit details
-
Copy full SHA for 634a450 - Browse repository at this point
Copy the full SHA 634a450View commit details -
gocryptfs -passwd: ignore -extpass and -passfile for new password
Configuration menu - View commit details
-
Copy full SHA for d5bd98e - Browse repository at this point
Copy the full SHA d5bd98eView commit details -
gocryptfs -passwd: fix the tests I just broke
Turns out at least the tests depended on the old behavoir. Fixes d5bd98e
Configuration menu - View commit details
-
Copy full SHA for 82dac42 - Browse repository at this point
Copy the full SHA 82dac42View commit details -
tests: ignore pidfd in fd leak test
This is not a real leak: fd leak in test process? before, after: [0r=/dev/null 3r=/proc/940141/fd 5rw=anon_inode:[eventfd] (filtered: pipe:[2454797], pipe:[2454797], anon_inode:[eventpoll])] [0r=/dev/null 3r=/proc/940141/fd 5rw=anon_inode:[eventfd] 12rw=anon_inode:[pidfd] (filtered: pipe:[2454797], pipe:[2454797], anon_inode:[eventpoll], pipe:[2460158])] Ignore pidfd.
Configuration menu - View commit details
-
Copy full SHA for 9529f5d - Browse repository at this point
Copy the full SHA 9529f5dView commit details
Commits on Dec 5, 2024
-
Configuration menu - View commit details
-
Copy full SHA for 0192dca - Browse repository at this point
Copy the full SHA 0192dcaView commit details
Commits on Dec 30, 2024
-
Configuration menu - View commit details
-
Copy full SHA for 1464f9d - Browse repository at this point
Copy the full SHA 1464f9dView commit details
There are no files selected for viewing