From a34b447ad1e6d4eea4adecddb9198f659d19aeeb Mon Sep 17 00:00:00 2001 From: Jakob Unterwurzacher Date: Fri, 2 Sep 2016 20:58:13 +0200 Subject: [PATCH] reverse: let the kernel enforce read-only mode ... and print a warning that reverse mode is experimental --- main.go | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/main.go b/main.go index 44736ba..528824c 100644 --- a/main.go +++ b/main.go @@ -408,6 +408,7 @@ func initFuseFrontend(key []byte, args argContainer, confFile *configfile.ConfFi var finalFs pathfs.FileSystem if args.reverse { finalFs = fusefrontend_reverse.NewFS(frontendArgs) + tlog.Info.Printf(tlog.ColorYellow + "REVERSE MODE IS EXPERIMENTAL" + tlog.ColorReset) } else { finalFs = fusefrontend.NewFS(frontendArgs) } @@ -437,7 +438,8 @@ func initFuseFrontend(key []byte, args argContainer, confFile *configfile.ConfFi mOpts.Name = "gocryptfs" // The kernel enforces read-only operation, we just have to pass "ro". - if args.ro { + // Reverse mounts are always read-only + if args.ro || args.reverse { mOpts.Options = append(mOpts.Options, "ro") } // Add additional mount options (if any) after the stock ones, so the user has