Hello community,

here is the log from the commit of package sshfs for openSUSE:Factory checked 
in at 2020-11-12 22:37:30
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/sshfs (Old)
 and      /work/SRC/openSUSE:Factory/.sshfs.new.24930 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "sshfs"

Thu Nov 12 22:37:30 2020 rev:35 rq:847104 version:3.7.1

Changes:
--------
--- /work/SRC/openSUSE:Factory/sshfs/sshfs.changes      2020-01-03 
17:39:53.987385460 +0100
+++ /work/SRC/openSUSE:Factory/.sshfs.new.24930/sshfs.changes   2020-11-12 
22:37:49.674043844 +0100
@@ -1,0 +2,6 @@
+Mon Nov  9 10:39:19 UTC 2020 - Ismail Dönmez <idon...@suse.com>
+
+- Update to version 3.7.1
+  * Minor bugfixes
+
+-------------------------------------------------------------------

Old:
----
  sshfs-3.7.0.tar.xz
  sshfs-3.7.0.tar.xz.asc

New:
----
  sshfs-3.7.1.tar.xz
  sshfs-3.7.1.tar.xz.asc

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ sshfs.spec ++++++
--- /var/tmp/diff_new_pack.Spk4TU/_old  2020-11-12 22:37:50.518044725 +0100
+++ /var/tmp/diff_new_pack.Spk4TU/_new  2020-11-12 22:37:50.522044729 +0100
@@ -17,7 +17,7 @@
 
 
 Name:           sshfs
-Version:        3.7.0
+Version:        3.7.1
 Release:        0
 Summary:        Filesystem client based on SSH file transfer protocol
 License:        GPL-2.0-or-later

++++++ sshfs-3.7.0.tar.xz -> sshfs-3.7.1.tar.xz ++++++
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/sshfs-3.7.0/AUTHORS new/sshfs-3.7.1/AUTHORS
--- old/sshfs-3.7.0/AUTHORS     2020-01-03 12:04:02.000000000 +0100
+++ new/sshfs-3.7.1/AUTHORS     2020-11-09 10:52:00.000000000 +0100
@@ -13,18 +13,21 @@
 Contributors (autogenerated list)
 ---------------------------------
 
+
 Alan Jenkins <alan.christopher.jenk...@gmail.com>
 Alexander Neumann <alexan...@bumpern.de>
 Anatol Pomozov <anatol.pomo...@gmail.com>
 Benjamin Fleischer <flei...@gmail.com>
 Berserker <berserker.tr...@yandex.com>
 Bill Zissimopoulos <billz...@navimatics.com>
+bjoe2k4 <bjoe...@users.noreply.github.com>
 Brandon Carter <b-car...@users.noreply.github.com>
 Chris Wolfe <cwo...@chromium.org>
 Clayton G. Hobbs <c...@lakeserv.net>
 Daniel Lublin <dan...@lublin.se>
 Dominique Martinet <asmad...@codewreck.org>
 DrDaveD <2129743+drda...@users.noreply.github.com>
+Fabrice Fontaine <fontaine.fabr...@gmail.com>
 gala <gala...@users.noreply.github.com>
 Galen Getsov <4815620+gget...@users.noreply.github.com>
 George Vlahavas <vlaha...@gmail.com>
@@ -35,6 +38,8 @@
 Josh Triplett <j...@joshtriplett.org>
 Julio Merino <j...@google.com>
 Julio Merino <j...@meroh.net>
+Junichi Uekawa <danc...@gmail.com>
+Junichi Uekawa <dan...@netfort.gr.jp>
 kalvdans <git...@kalvdans.no-ip.org>
 Michael Forney <mfor...@mforney.org>
 Mike Kelly <m...@pair.com>
@@ -51,6 +56,7 @@
 Rian Hunter <rianhun...@users.noreply.github.com>
 Samuel Murray <samuel.mur...@outlook.com>
 S. D. Cloudt <s.d.clo...@student.tue.nl>
+Simon Arlott <70171+no...@users.noreply.github.com>
 smheidrich <smheidr...@weltenfunktion.de>
 sunwire <50745572+sunw...@users.noreply.github.com>
 Tim Harder <radher...@gmail.com>
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/sshfs-3.7.0/ChangeLog.rst 
new/sshfs-3.7.1/ChangeLog.rst
--- old/sshfs-3.7.0/ChangeLog.rst       2020-01-03 12:04:02.000000000 +0100
+++ new/sshfs-3.7.1/ChangeLog.rst       2020-11-09 10:52:00.000000000 +0100
@@ -1,3 +1,9 @@
+Release 3.7.1 (2020-11-09)
+--------------------------
+
+* Minor bugfixes.
+
+
 Release 3.7.0 (2020-01-03)
 --------------------------
 
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/sshfs-3.7.0/README.rst new/sshfs-3.7.1/README.rst
--- old/sshfs-3.7.0/README.rst  2020-01-03 12:04:02.000000000 +0100
+++ new/sshfs-3.7.1/README.rst  2020-11-09 10:52:00.000000000 +0100
@@ -98,11 +98,3 @@
 
 Please report any bugs on the GitHub issue tracker at
 https://github.com/libfuse/libfuse/issues.
-
-
-Professional Support
---------------------
-
-Professional support is offered via `Rath Consulting`_.
-
-.. _`Rath Consulting`: http://www.rath-consulting.biz
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/sshfs-3.7.0/meson.build new/sshfs-3.7.1/meson.build
--- old/sshfs-3.7.0/meson.build 2020-01-03 12:04:02.000000000 +0100
+++ new/sshfs-3.7.1/meson.build 2020-11-09 10:52:00.000000000 +0100
@@ -1,4 +1,4 @@
-project('sshfs', 'c', version: '3.7.0',
+project('sshfs', 'c', version: '3.7.1',
         meson_version: '>= 0.40',
         default_options: [ 'buildtype=debugoptimized' ])
 
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/sshfs-3.7.0/sshfs.c new/sshfs-3.7.1/sshfs.c
--- old/sshfs-3.7.0/sshfs.c     2020-01-03 12:04:02.000000000 +0100
+++ new/sshfs-3.7.1/sshfs.c     2020-11-09 10:52:00.000000000 +0100
@@ -341,7 +341,7 @@
        int foreground;
        int reconnect;
        int delay_connect;
-       int slave;
+       int passive;
        char *host;
        char *base_path;
        GHashTable *reqtab;
@@ -351,7 +351,7 @@
        int max_conns;
        struct conn *conns;
        int ptyfd;
-       int ptyslavefd;
+       int ptypassivefd;
        int connvers;
        int server_version;
        unsigned remote_uid;
@@ -497,7 +497,8 @@
        SSHFS_OPT("no_check_root",     no_check_root, 1),
        SSHFS_OPT("password_stdin",    password_stdin, 1),
        SSHFS_OPT("delay_connect",     delay_connect, 1),
-       SSHFS_OPT("slave",             slave, 1),
+       SSHFS_OPT("slave",             passive, 1),
+       SSHFS_OPT("passive",           passive, 1),
        SSHFS_OPT("disable_hardlink",  disable_hardlink, 1),
        SSHFS_OPT("dir_cache=yes", dir_cache, 1),
        SSHFS_OPT("dir_cache=no",  dir_cache, 0),
@@ -1068,6 +1069,7 @@
                             const char *path)
 {
        struct conntab_entry *ce;
+       int i;
 
        if (sshfs.max_conns == 1)
                return &sshfs.conns[0];
@@ -1089,7 +1091,7 @@
 
        int best_index = 0;
        uint64_t best_score = ~0ULL; /* smaller is better */
-       for (int i = 0; i < sshfs.max_conns; i++) {
+       for (i = 0; i < sshfs.max_conns; i++) {
                uint64_t score = ((uint64_t) sshfs.conns[i].req_count << 43) +
                                 ((uint64_t) sshfs.conns[i].dir_count << 22) +
                                 ((uint64_t) sshfs.conns[i].file_count << 1) +
@@ -1146,8 +1148,8 @@
                if (sshfs.ptyfd == -1)
                        return -1;
 
-               sshfs.ptyslavefd = open(ptyname, O_RDWR | O_NOCTTY);
-               if (sshfs.ptyslavefd == -1)
+               sshfs.ptypassivefd = open(ptyname, O_RDWR | O_NOCTTY);
+               if (sshfs.ptypassivefd == -1)
                        return -1;
        }
 
@@ -1189,6 +1191,12 @@
                        _exit(0);
                }
                chdir("/");
+               /*
+                * Avoid processes hanging trying to stat() OLDPWD if it is in
+                * the mount point. This can be removed if sshfs opens the
+                * mount point after establishing the ssh connection.
+                */
+               unsetenv("OLDPWD");
 
                if (sshfs.password_stdin) {
                        int sfd;
@@ -1200,7 +1208,7 @@
                                _exit(1);
                        }
                        close(sfd);
-                       close(sshfs.ptyslavefd);
+                       close(sshfs.ptypassivefd);
                        close(sshfs.ptyfd);
                }
 
@@ -1224,7 +1232,7 @@
        return 0;
 }
 
-static int connect_slave(struct conn *conn)
+static int connect_passive(struct conn *conn)
 {
        conn->rfd = STDIN_FILENO;
        conn->wfd = STDOUT_FILENO;
@@ -1531,9 +1539,9 @@
                close(sshfs.ptyfd);
                sshfs.ptyfd = -1;
        }
-       if (sshfs.ptyslavefd != -1) {
-               close(sshfs.ptyslavefd);
-               sshfs.ptyslavefd = -1;
+       if (sshfs.ptypassivefd != -1) {
+               close(sshfs.ptypassivefd);
+               sshfs.ptypassivefd = -1;
        }
 }
 
@@ -1824,8 +1832,8 @@
 {
        int err;
 
-       if (sshfs.slave)
-               err = connect_slave(conn);
+       if (sshfs.passive)
+               err = connect_passive(conn);
        else if (sshfs.directport)
                err = connect_to(conn, sshfs.host, sshfs.directport);
        else
@@ -3629,7 +3637,7 @@
 "    -o ssh_protocol=N      ssh protocol to use (default: 2)\n"
 "    -o sftp_server=SERV    path to sftp server or subsystem (default: sftp)\n"
 "    -o directport=PORT     directly connect to PORT bypassing ssh\n"
-"    -o slave               communicate over stdin and stdout bypassing 
network\n"
+"    -o passive             communicate over stdin and stdout bypassing 
network\n"
 "    -o disable_hardlink    link(2) will return with errno set to ENOSYS\n"
 "    -o transform_symlinks  transform absolute symlinks to relative\n"
 "    -o follow_symlinks     follow symlinks on the server\n"
@@ -4182,9 +4190,9 @@
        sshfs.show_version = 0;
        sshfs.singlethread = 0;
        sshfs.foreground = 0;
-       sshfs.ptyslavefd = -1;
+       sshfs.ptypassivefd = -1;
        sshfs.delay_connect = 0;
-       sshfs.slave = 0;
+       sshfs.passive = 0;
        sshfs.detect_uid = 0;
        if (strcmp(IDMAP_DEFAULT, "none") == 0) {
                sshfs.idmap = IDMAP_NONE;
@@ -4250,12 +4258,12 @@
        DEBUG("SSHFS version %s\n", PACKAGE_VERSION);
 
        /* Force sshfs to the foreground when using stdin+stdout */
-       if (sshfs.slave)
+       if (sshfs.passive)
                sshfs.foreground = 1;
 
 
-       if (sshfs.slave && sshfs.password_stdin) {
-               fprintf(stderr, "the password_stdin and slave options cannot 
both be specified\n");
+       if (sshfs.passive && sshfs.password_stdin) {
+               fprintf(stderr, "the password_stdin and passive options cannot 
both be specified\n");
                exit(1);
        }
 
@@ -4287,8 +4295,8 @@
                        exit(1);
                }
 
-               if (sshfs.slave) {
-                       fprintf(stderr, "slave option cannot be specified with 
parallel connections\n");
+               if (sshfs.passive) {
+                       fprintf(stderr, "passive option cannot be specified 
with parallel connections\n");
                        exit(1);
                }
        } else if (sshfs.max_conns <= 0) {
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/sshfs-3.7.0/sshfs.rst new/sshfs-3.7.1/sshfs.rst
--- old/sshfs-3.7.0/sshfs.rst   2020-01-03 12:04:02.000000000 +0100
+++ new/sshfs-3.7.1/sshfs.rst   2020-11-09 10:52:00.000000000 +0100
@@ -37,7 +37,7 @@
 permission checking can be enabled with ``-o default_permissions``.
 
 By default, only the mounting user will be able to access the filesystem. 
Access for other
-users can be enabled by passing ``-o allow_others``. In this case you most 
likely also
+users can be enabled by passing ``-o allow_other``. In this case you most 
likely also
 want to use ``-o default_permissions``.
 
 It is recommended to run SSHFS as regular user (not as root).  For this to 
work the
@@ -156,8 +156,11 @@
 -o directport=PORT
    directly connect to PORT bypassing ssh
 
--o slave
-   communicate over stdin and stdout bypassing network
+-o passive
+   communicate over stdin and stdout bypassing network. Useful for
+   mounting local filesystem on the remote side.  An example using
+   dpipe command would be ``dpipe /usr/lib/openssh/sftp-server = ssh
+   RemoteHostname sshfs :/directory/to/be/shared ~/mnt/src -o passive``
 
 -o disable_hardlink
    With this option set, attempts to call `link(2)` will fail with
@@ -223,8 +226,8 @@
    to use. Each connection is established with a separate SSH process.
    The primary purpose of this feature is to improve the responsiveness of the
    file system during large file transfers. When using more than once
-   connection, the *password_stdin* and *slave* options can not be
-   used, and the *buflimit* workaround is not supported/
+   connection, the *password_stdin* and *passive* options can not be
+   used, and the *buflimit* workaround is not supported.
 
 In addition, SSHFS accepts several options common to all FUSE file
 systems. These are described in the `mount.fuse` manpage (look
_______________________________________________
openSUSE Commits mailing list -- commit@lists.opensuse.org
To unsubscribe, email commit-le...@lists.opensuse.org
List Netiquette: https://en.opensuse.org/openSUSE:Mailing_list_netiquette
List Archives: 
https://lists.opensuse.org/archives/list/commit@lists.opensuse.org

Reply via email to