A few more spelling fixes.
Found with the 'codespell' utility.
This commit is contained in:
parent
c1bd262600
commit
ab169443fd
@ -163,7 +163,7 @@ Changelog
|
||||
v1.7-beta1, 2019-01-03
|
||||
* **Fix possible symlink race attacks in forward mode** when using allow_other + plaintextnames
|
||||
* If you use *both* `-allow_other` *and* `-plaintextnames`, you should upgrade.
|
||||
Malicous users could trick gocryptfs into modifying files outside of `CIPHERDIR`,
|
||||
Malicious users could trick gocryptfs into modifying files outside of `CIPHERDIR`,
|
||||
or reading files inside `CIPHERDIR` that they should not have access to.
|
||||
* If you do not use `-plaintextnames` (disabled per default), these attacks do
|
||||
not work as symlinks are encrypted.
|
||||
|
@ -269,7 +269,7 @@ func (fs *FS) Create(path string, flags uint32, mode uint32, context *fuse.Conte
|
||||
return NewFile(f, fs)
|
||||
}
|
||||
|
||||
// Chmod - FUSE call. Change permissons on "path".
|
||||
// Chmod - FUSE call. Change permissions on "path".
|
||||
//
|
||||
// Symlink-safe through use of Fchmodat().
|
||||
func (fs *FS) Chmod(path string, mode uint32, context *fuse.Context) (code fuse.Status) {
|
||||
|
@ -101,7 +101,7 @@ func ReadLongNameAt(dirfd int, cName string) (string, error) {
|
||||
return string(buf[0:n]), nil
|
||||
}
|
||||
|
||||
// DeleteLongName deletes "hashName.name" in the directory openend at "dirfd".
|
||||
// DeleteLongName deletes "hashName.name" in the directory opened at "dirfd".
|
||||
//
|
||||
// This function is symlink-safe through the use of Unlinkat().
|
||||
func DeleteLongNameAt(dirfd int, hashName string) error {
|
||||
|
Loading…
Reference in New Issue
Block a user