syscallcompat: Drop Symlinkat emulation on macOS.
This commit is contained in:
parent
92110628ee
commit
7b0d56fe98
@ -30,26 +30,6 @@ func emulateMknodat(dirfd int, path string, mode uint32, dev int) error {
|
|||||||
return syscall.Mknod(path, mode, dev)
|
return syscall.Mknod(path, mode, dev)
|
||||||
}
|
}
|
||||||
|
|
||||||
// emulateSymlinkat emulates the syscall for platforms that don't have it
|
|
||||||
// in the kernel (darwin).
|
|
||||||
func emulateSymlinkat(oldpath string, newdirfd int, newpath string) (err error) {
|
|
||||||
if !filepath.IsAbs(newpath) {
|
|
||||||
chdirMutex.Lock()
|
|
||||||
defer chdirMutex.Unlock()
|
|
||||||
cwd, err := syscall.Open(".", syscall.O_RDONLY, 0)
|
|
||||||
if err != nil {
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
defer syscall.Close(cwd)
|
|
||||||
err = syscall.Fchdir(newdirfd)
|
|
||||||
if err != nil {
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
defer syscall.Fchdir(cwd)
|
|
||||||
}
|
|
||||||
return syscall.Symlink(oldpath, newpath)
|
|
||||||
}
|
|
||||||
|
|
||||||
// emulateMkdirat emulates the syscall for platforms that don't have it
|
// emulateMkdirat emulates the syscall for platforms that don't have it
|
||||||
// in the kernel (darwin).
|
// in the kernel (darwin).
|
||||||
func emulateMkdirat(dirfd int, path string, mode uint32) (err error) {
|
func emulateMkdirat(dirfd int, path string, mode uint32) (err error) {
|
||||||
|
@ -2,8 +2,6 @@ package syscallcompat
|
|||||||
|
|
||||||
import (
|
import (
|
||||||
"os"
|
"os"
|
||||||
"runtime"
|
|
||||||
"syscall"
|
|
||||||
"testing"
|
"testing"
|
||||||
|
|
||||||
"golang.org/x/sys/unix"
|
"golang.org/x/sys/unix"
|
||||||
@ -29,45 +27,6 @@ func TestEmulateMknodat(t *testing.T) {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
// symlinkCheckMode looks if the mode bits in "st" say that this is a symlink.
|
|
||||||
// Calls t.Fatal() if not.
|
|
||||||
func symlinkCheckMode(t *testing.T, st syscall.Stat_t) {
|
|
||||||
if runtime.GOOS == "darwin" {
|
|
||||||
// On MacOS, symlinks don't carry their own permissions, so
|
|
||||||
// only check the file type.
|
|
||||||
if st.Mode&syscall.S_IFMT != syscall.S_IFLNK {
|
|
||||||
t.Fatalf("This is not a symlink: mode = 0%o", st.Mode)
|
|
||||||
}
|
|
||||||
return
|
|
||||||
}
|
|
||||||
if st.Mode != 0120777 {
|
|
||||||
t.Fatalf("Wrong mode, have 0%o, want 0120777", st.Mode)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
func TestEmulateSymlinkat(t *testing.T) {
|
|
||||||
err := emulateSymlinkat("/foo/bar/baz", tmpDirFd, "symlink1")
|
|
||||||
if err != nil {
|
|
||||||
t.Fatal(err)
|
|
||||||
}
|
|
||||||
var st syscall.Stat_t
|
|
||||||
err = syscall.Lstat(tmpDir+"/symlink1", &st)
|
|
||||||
if err != nil {
|
|
||||||
t.Fatal(err)
|
|
||||||
}
|
|
||||||
symlinkCheckMode(t, st)
|
|
||||||
// Test with absolute path
|
|
||||||
err = emulateSymlinkat("/foo/bar/baz", -1, tmpDir+"/symlink2")
|
|
||||||
if err != nil {
|
|
||||||
t.Fatal(err)
|
|
||||||
}
|
|
||||||
err = syscall.Lstat(tmpDir+"/symlink2", &st)
|
|
||||||
if err != nil {
|
|
||||||
t.Fatal(err)
|
|
||||||
}
|
|
||||||
symlinkCheckMode(t, st)
|
|
||||||
}
|
|
||||||
|
|
||||||
func TestEmulateMkdirat(t *testing.T) {
|
func TestEmulateMkdirat(t *testing.T) {
|
||||||
err := emulateMkdirat(tmpDirFd, "mkdirat", 0700)
|
err := emulateMkdirat(tmpDirFd, "mkdirat", 0700)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
|
@ -87,6 +87,11 @@ func Linkat(olddirfd int, oldpath string, newdirfd int, newpath string, flags in
|
|||||||
return unix.Linkat(olddirfd, oldpath, newdirfd, newpath, flags)
|
return unix.Linkat(olddirfd, oldpath, newdirfd, newpath, flags)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// Symlinkat syscall.
|
||||||
|
func Symlinkat(oldpath string, newdirfd int, newpath string) (err error) {
|
||||||
|
return unix.Symlinkat(oldpath, newdirfd, newpath)
|
||||||
|
}
|
||||||
|
|
||||||
const XATTR_SIZE_MAX = 65536
|
const XATTR_SIZE_MAX = 65536
|
||||||
|
|
||||||
// Make the buffer 1kB bigger so we can detect overflows
|
// Make the buffer 1kB bigger so we can detect overflows
|
||||||
|
@ -3,6 +3,7 @@ package syscallcompat
|
|||||||
import (
|
import (
|
||||||
"bytes"
|
"bytes"
|
||||||
"os"
|
"os"
|
||||||
|
"runtime"
|
||||||
"syscall"
|
"syscall"
|
||||||
"testing"
|
"testing"
|
||||||
|
|
||||||
@ -207,3 +208,42 @@ func TestFchmodat(t *testing.T) {
|
|||||||
t.Errorf("chmod on symlink affected symlink target: New mode=%#0o", st.Mode)
|
t.Errorf("chmod on symlink affected symlink target: New mode=%#0o", st.Mode)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// symlinkCheckMode looks if the mode bits in "st" say that this is a symlink.
|
||||||
|
// Calls t.Fatal() if not.
|
||||||
|
func symlinkCheckMode(t *testing.T, st syscall.Stat_t) {
|
||||||
|
if runtime.GOOS == "darwin" {
|
||||||
|
// On MacOS, symlinks don't carry their own permissions, so
|
||||||
|
// only check the file type.
|
||||||
|
if st.Mode&syscall.S_IFMT != syscall.S_IFLNK {
|
||||||
|
t.Fatalf("This is not a symlink: mode = 0%o", st.Mode)
|
||||||
|
}
|
||||||
|
return
|
||||||
|
}
|
||||||
|
if st.Mode != 0120777 {
|
||||||
|
t.Fatalf("Wrong mode, have 0%o, want 0120777", st.Mode)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestSymlinkat(t *testing.T) {
|
||||||
|
err := Symlinkat("/foo/bar/baz", tmpDirFd, "symlink1")
|
||||||
|
if err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
var st syscall.Stat_t
|
||||||
|
err = syscall.Lstat(tmpDir+"/symlink1", &st)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
symlinkCheckMode(t, st)
|
||||||
|
// Test with absolute path
|
||||||
|
err = Symlinkat("/foo/bar/baz", -1, tmpDir+"/symlink2")
|
||||||
|
if err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
err = syscall.Lstat(tmpDir+"/symlink2", &st)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
symlinkCheckMode(t, st)
|
||||||
|
}
|
||||||
|
@ -102,10 +102,6 @@ func Fchmodat(dirfd int, path string, mode uint32, flags int) (err error) {
|
|||||||
return unix.Fchmodat(dirfd, path, mode, flags)
|
return unix.Fchmodat(dirfd, path, mode, flags)
|
||||||
}
|
}
|
||||||
|
|
||||||
func Symlinkat(oldpath string, newdirfd int, newpath string) (err error) {
|
|
||||||
return emulateSymlinkat(oldpath, newdirfd, newpath)
|
|
||||||
}
|
|
||||||
|
|
||||||
func SymlinkatUser(oldpath string, newdirfd int, newpath string, context *fuse.Context) (err error) {
|
func SymlinkatUser(oldpath string, newdirfd int, newpath string, context *fuse.Context) (err error) {
|
||||||
if context != nil {
|
if context != nil {
|
||||||
runtime.LockOSThread()
|
runtime.LockOSThread()
|
||||||
|
@ -154,11 +154,6 @@ func Fchmodat(dirfd int, path string, mode uint32, flags int) (err error) {
|
|||||||
return syscall.Chmod(procPath, mode)
|
return syscall.Chmod(procPath, mode)
|
||||||
}
|
}
|
||||||
|
|
||||||
// Symlinkat syscall.
|
|
||||||
func Symlinkat(oldpath string, newdirfd int, newpath string) (err error) {
|
|
||||||
return unix.Symlinkat(oldpath, newdirfd, newpath)
|
|
||||||
}
|
|
||||||
|
|
||||||
// SymlinkatUser runs the Symlinkat syscall in the context of a different user.
|
// SymlinkatUser runs the Symlinkat syscall in the context of a different user.
|
||||||
func SymlinkatUser(oldpath string, newdirfd int, newpath string, context *fuse.Context) (err error) {
|
func SymlinkatUser(oldpath string, newdirfd int, newpath string, context *fuse.Context) (err error) {
|
||||||
if context != nil {
|
if context != nil {
|
||||||
|
Loading…
x
Reference in New Issue
Block a user