libgocryptfs/internal/fusefrontend
Jakob Unterwurzacher 932efbd459 fusefrontend: make openBackingDir() symlink-safe
openBackingDir() used encryptPath(), which is not symlink-safe
itself. Drop encryptPath() and implement our own directory walk.

Adds three seconds to untar and two seconds to rm:

$ ./benchmark.bash
Testing gocryptfs at /tmp/benchmark.bash.MzG: gocryptfs v1.6-36-g8fb3c2f-dirty; go-fuse v20170619-66-g6df8ddc; 2018-10-14 go1.11
WRITE: 262144000 bytes (262 MB, 250 MiB) copied, 1.25078 s, 210 MB/s
READ:  262144000 bytes (262 MB, 250 MiB) copied, 1.0318 s, 254 MB/s
UNTAR: 20.941
MD5:   11.568
LS:    1.638
RM:    5.337
2019-01-01 16:24:09 +01:00
..
args.go reverse mode: add --exclude option 2018-08-11 23:26:49 +02:00
ctlsock_interface.go fusefrontend: make DecryptPath() symlink-safe 2019-01-01 16:24:09 +01:00
file_allocate_truncate.go fusefrontend: truncateGrowFile: pass zeroPad error to caller 2018-08-15 17:25:22 +02:00
file_holes.go fusefrontend: doWrite: delete file header if first write fails 2018-07-15 15:12:55 +02:00
file.go fusefrontend: Fix debug message in doWrite() method. 2019-01-01 16:12:42 +01:00
fs_dir.go fusefrontend: mark symlink-safe FUSE calls 2019-01-01 16:24:09 +01:00
fs.go fusefrontend: mark symlink-safe FUSE calls 2019-01-01 16:24:09 +01:00
names_test.go fusefrontend: make openBackingDir() symlink-safe 2019-01-01 16:24:09 +01:00
names.go fusefrontend: make openBackingDir() symlink-safe 2019-01-01 16:24:09 +01:00
xattr_darwin.go xattr: added passing of a "flags" parameter 2018-05-07 21:45:40 +02:00
xattr_linux_unit_test.go Improved xattr handling on non-linux systems (#227) 2018-04-17 20:33:04 +02:00
xattr_linux.go xattr: added passing of a "flags" parameter 2018-05-07 21:45:40 +02:00
xattr_unit_test.go fusefrontend: make openBackingDir() symlink-safe 2019-01-01 16:24:09 +01:00
xattr.go fusefrontend: mark symlink-safe FUSE calls 2019-01-01 16:24:09 +01:00