Closed mhogomchungu closed 6 months ago
I can fix this, but then if securefs fails to mount for other reasons (lockfile already exists), you still need to query the log file to find out. The inherent problem is that to go into background, securefs
needs to fork, but that makes some state inconsistent, so my current change is to fork as soon as possible.
I'm guessing that you are concerned about the change for interfacing with SiriKaili? I think it is easier not to ask securefs
to go to background in that case.
SiriKali requires running in the foreground for Windows only and running in the background for other systems. Not going to change this behavior.
I have made changes and SiriKali now uses the log file with versions 1.0.0 or greater of securefs.
The log file does not seem to be geared towards users of securefs.
Parsing log output like below text as a way of knowing a volume was successfully unlocked seems a bit fragile.
[Info] [0x7f6d9f22b6c0] [2024-04-24 04:51:15.723905426 UTC] [auto securefs::FuseHighLevelOpsBase::build_ops(const securefs::FuseHighLevelOpsBase *, bool)::(anonymous class)::operator()(fuse_conn_info *) const:354] Fuse operations initialized
Output when unlocking with version 0.14.2 with a wrong password.
Output when unlocking with version 1.0.0 using a wrong password
Well, you cant "remount" because securefs is not running in the background because the attempt to unlock failed.
I think the previous behavior is the correct one, securefs should go into background after a successful unlocking.