Comments (10)
Indeed it is a bit asymmetric. The reason is that I wanted to keep the most common action (mounting) as simple as possible and not require any argument.
EncFS handles the other actions in a seperate command ( http://linux.die.net/man/1/encfsctl ), but having two binaries instead of one seem undesireable as well.
from gocryptfs.
I'm not sure I understand the two binaries comment - to be clear I'm proposing all the commands stay within a single binary.
If you're interested, I could take a whack at a PR for this to try it out?
from gocryptfs.
from gocryptfs.
from gocryptfs.
Fair enough! I think, if you were adamant about keeping the mount example the same, it could default to mounting if the parameter doesn't match any sub-commands.
I'll be honest, this is the first I've heard of fallocate so I don't think I'd be super confident taking that on. But I am open to becoming a general contributor once I've played with it a bit more. Gocryptfs looks like an ideal candidate for sharing encrypted files through conventional cloud providers with colleagues, though I've yet to see what the user-visible behaviour is in the case of conflicts (my guess is nothing good).
from gocryptfs.
Regarding conflicts: Dropbox appends something like "conflicted copy 1" to the file name and keeps both versions if there is a conflict. This will work just fine with gocryptfs when file name encryption is disabled. Use the -plaintextnames
flag to disable file name encryption.
from gocryptfs.
I will close the ticket for as I don't think subcommands have enough merit to be implemented.
You are welcome to contribute on other open issues!
from gocryptfs.
I'm trying out gocryptfs for the first time, and, as a newcomer, the command-line flag documentation is a bit confusing. Also, I had to search the web for how to unmount, but that probably shouldn't be necessary.
One solution would be to improve the usage string. You could categorize and/or group related flags together. This should, for example, remove the need to add (with -init)
at the end of some flags.
Another solution is to use subcommands as mentioned above. Personally, I find this approach better.
Subcommands are self-documenting to an extent because they present the primary actions as mutually exclusive alternatives and separate those from optional flags. Looking at the current set of flags, it requires some reading to realize that -init
is a special case. I also have to think a bit about whether -init
works with -ro
, for example.
Subcommands also make it intuitive to get documentation on a subcommand and to determine which optional flags work with a subcommand. By typing (for example) gocryptfs <command> -h/--help
, I can immediately learn more about <command>
. And having this extra documentation not in the main usage string allows you to keep the latter brief.
To alleviate the concern about making the “mount” command easiest, you could use a subcommand “alias:” securefs
uses m
for mount
.
Better usage documentation could, of course, improve things for newcomers like myself. But I think subcommands go an extra level by highlighting the discrete operations of gocryptfs in an intuitive way.
from gocryptfs.
I too came here searching for how to unmount a gocrypfs folder. It feels "wrong" to have to use a different program (fusermount
) to reverse an operation taken the gocryptfs
program.
from gocryptfs.
This is the standard for all FUSE filesystems.
from gocryptfs.
Related Issues (20)
- avoid shelling out to logger binary HOT 4
- [Question] Is using the same config for multiple filesystems a bad idea? HOT 1
- Listing plain text names with encrypted names HOT 5
- question regarding GOCRYPTFS_BAD_NAME behavior in case of file content corruption HOT 1
- hard restart has broken my disc HOT 3
- Install gocryptfs through conda
- REPRODUCIBLE: gocryptfs reverse generating files that gocryptfs can't decrypt? HOT 9
- Decrypt to folder HOT 1
- Logger keeps from umounting: target is busy. HOT 3
- recreated gocryptfs.conf using masterkey have different EncryptedKey and Salt HOT 1
- [Question] Encrypted backups without reverse mode possible? HOT 4
- How may root check whether a Gocryptfs mount point exists (when in use)? HOT 1
- MacOS: Can't delete diacritically named files (NFC unicode form) HOT 1
- Empty stdin in mkinitcpio hook HOT 12
- Avoid duplicate kernel options
- BUG: Unable to build on ARM HOT 2
- Feature request: exclude files in read-only forward mode
- 2 directories seems to always break gocryptfs HOT 1
- passing options to FUSE HOT 2
- poor write performance over cifs HOT 13
Recommend Projects
-
React
A declarative, efficient, and flexible JavaScript library for building user interfaces.
-
Vue.js
🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.
-
Typescript
TypeScript is a superset of JavaScript that compiles to clean JavaScript output.
-
TensorFlow
An Open Source Machine Learning Framework for Everyone
-
Django
The Web framework for perfectionists with deadlines.
-
Laravel
A PHP framework for web artisans
-
D3
Bring data to life with SVG, Canvas and HTML. 📊📈🎉
-
Recommend Topics
-
javascript
JavaScript (JS) is a lightweight interpreted programming language with first-class functions.
-
web
Some thing interesting about web. New door for the world.
-
server
A server is a program made to process requests and deliver data to clients.
-
Machine learning
Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.
-
Visualization
Some thing interesting about visualization, use data art
-
Game
Some thing interesting about game, make everyone happy.
Recommend Org
-
Facebook
We are working to build community through open source technology. NB: members must have two-factor auth.
-
Microsoft
Open source projects and samples from Microsoft.
-
Google
Google ❤️ Open Source for everyone.
-
Alibaba
Alibaba Open Source for everyone
-
D3
Data-Driven Documents codes.
-
Tencent
China tencent open source team.
from gocryptfs.