./filesystems/fuse, Filesystem in Userspace

[ CVSweb ] [ Homepage ] [ RSS ] [ Required by ] [ Add to tracker ]

Branch: CURRENT, Version: 2.9.9nb1, Package name: fuse-2.9.9nb1, Maintainer: pkgsrc-users

With FUSE it is possible to implement a fully functional file system in a
userspace program. Features include:

* Simple library API
* Simple installation (no need to patch or recompile the kernel)
* Secure implementation
* Userspace - kernel interface is very efficient
* Usable by non privileged users
* Runs on Linux kernels 2.4.X and 2.6.X
* Has proven very stable over time

MESSAGE.Linux [+/-]

Required to build:

Master sites:

Filesize: 207.048 KB

Version history: (Expand)

CVS history: (Expand)

   2023-09-09 12:23:00 by Paolo Vincenzo Olivo | Files touched by this commit (1)
Log message:
filesystems/fuse: needs gettext.
   2023-09-08 08:01:04 by Paolo Vincenzo Olivo | Files touched by this commit (4)
Log message:
filesystems/fuse: fix compile warning and bump revision.
   2023-09-07 22:56:05 by Paolo Vincenzo Olivo | Files touched by this commit (5)
Log message:
filesystems/fuse: bring Linux build in par with current version.
   2023-09-07 21:38:15 by Paolo Vincenzo Olivo | Files touched by this commit (12) | Package updated
Log message:
filesystems/fuse: update to fuse-2.9.9.

This is the last and most recent maintainance release for the 2.x

# Changes (since version 2.9.3)

FUSE 2.9.9 (2019-01-04)

* Added OpenAFS to whitelist (so users can now mount FUSE filesystems
  on mountpoints within OpenAFS filesystems).
* Added a test of `seekdir` to test_syscalls.
* Fixed `readdir` bug when non-zero offsets are given to filler and the
  filesystem client, after reading a whole directory, re-reads it from a
  non-zero offset e. g. by calling `seekdir` followed by `readdir`.

FUSE 2.9.8 (2018-07-24)

* SECURITY UPDATE: In previous versions of libfuse it was possible to
  for unprivileged users to specify the `allow_other` option even when
  this was forbidden in `/etc/fuse.conf`.  The vulnerability is
  present only on systems where SELinux is active (including in
  permissive mode).
* libfuse no longer segfaults when fuse_interrupted() is called outside
  the event loop.
* The fusermount binary has been hardened in several ways to reduce
  potential attack surface. Most importantly, mountpoints and mount
  options must now match a hard-coded whitelist. It is expected that
  this whitelist covers all regular use-cases.
* Fixed rename deadlock on FreeBSD.

FUSE 2.9.7 (2016-06-20)

* Added SELinux support.
* Fixed race-condition when session is terminated right after starting
  a FUSE file system.

FUSE 2.9.6 (2016-04-23)

* Tarball now includes documentation.
* Shared-object version has now been bumped correctly.

FUSE 2.9.5 (2016-01-14)

* New maintainer: Nikolaus Rath <Nikolaus@rath.org>. Many thanks to
  Miklos Szeredi <miklos@szeredi.hu> for bringing FUSE to where it is

* fix warning in mount.c:receive_fd().  Reported by Albert Berger

* fix possible memory leak.  Reported by Jose R. Guzman

FUSE 2.9.4 (2015-05-22)

* fix exec environment for mount and umount.  Found by Tavis Ormandy

* fix fuse_remove_signal_handlers() to properly restore the default
  signal handler.  Reported by: Chris Johnson

* highlevel API: fix directory file handle passed to ioctl() method.
  Reported by Eric Biggers

* libfuse: document deadlock avoidance for fuse_notify_inval_entry()
  and fuse_notify_delete()

* fusermount, libfuse: send value as unsigned in "user_id=" and
  "group_id=" options.  Uids/gids larger than 2147483647 would result
  in EINVAL when mounting the filesystem.  This also needs a fix in
  the kernel.

* Initilaize stat buffer passed to ->getattr() and ->fgetattr() to
  zero in all cases.  Reported by Daniel Iwan

* libfuse: Add missing includes.  This allows compiling fuse with
  musl.  Patch by Daniel Thau
   2021-10-26 12:25:31 by Nia Alarie | Files touched by this commit (47)
Log message:
filesystems: Replace RMD160 checksums with BLAKE2s checksums

All checksums have been double-checked against existing RMD160 and
SHA512 hashes
   2021-10-07 15:51:05 by Nia Alarie | Files touched by this commit (47)
Log message:
filesystems: Remove SHA1 hashes for distfiles
   2020-01-27 21:42:55 by Leonardo Taccari | Files touched by this commit (1)
Log message:
fuse: Update HOMEPAGE

There is no https homepage and the http one just redirect to
   2020-01-19 00:36:14 by Roland Illig | Files touched by this commit (3046)
Log message:
all: migrate several HOMEPAGEs to https

pkglint --only "https instead of http" -r -F

With manual adjustments afterwards since pkglint 19.4.4 fixed a few
indentations in unrelated lines.

This mainly affects projects hosted at SourceForce, as well as
freedesktop.org, CTAN and GNU.