reverse: let the kernel enforce read-only mode

... and print a warning that reverse mode is experimental
This commit is contained in:
Jakob Unterwurzacher 2016-09-02 20:58:13 +02:00
parent 777eb8e62f
commit a34b447ad1

View File

@ -408,6 +408,7 @@ func initFuseFrontend(key []byte, args argContainer, confFile *configfile.ConfFi
var finalFs pathfs.FileSystem var finalFs pathfs.FileSystem
if args.reverse { if args.reverse {
finalFs = fusefrontend_reverse.NewFS(frontendArgs) finalFs = fusefrontend_reverse.NewFS(frontendArgs)
tlog.Info.Printf(tlog.ColorYellow + "REVERSE MODE IS EXPERIMENTAL" + tlog.ColorReset)
} else { } else {
finalFs = fusefrontend.NewFS(frontendArgs) finalFs = fusefrontend.NewFS(frontendArgs)
} }
@ -437,7 +438,8 @@ func initFuseFrontend(key []byte, args argContainer, confFile *configfile.ConfFi
mOpts.Name = "gocryptfs" mOpts.Name = "gocryptfs"
// The kernel enforces read-only operation, we just have to pass "ro". // The kernel enforces read-only operation, we just have to pass "ro".
if args.ro { // Reverse mounts are always read-only
if args.ro || args.reverse {
mOpts.Options = append(mOpts.Options, "ro") mOpts.Options = append(mOpts.Options, "ro")
} }
// Add additional mount options (if any) after the stock ones, so the user has // Add additional mount options (if any) after the stock ones, so the user has