mirror of
https://github.com/restic/restic.git
synced 2025-03-30 00:00:14 +01:00
97 lines
2.8 KiB
Go
97 lines
2.8 KiB
Go
package fs
|
|
|
|
import (
|
|
"os"
|
|
"syscall"
|
|
|
|
"github.com/restic/restic/internal/debug"
|
|
"github.com/restic/restic/internal/errors"
|
|
"github.com/restic/restic/internal/restic"
|
|
"golang.org/x/sys/windows"
|
|
)
|
|
|
|
func (p *pathMetadataHandle) Xattr(_ bool) ([]restic.ExtendedAttribute, error) {
|
|
f, err := openMetadataHandle(p.name, p.flag)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
defer func() {
|
|
cerr := f.Close()
|
|
if err == nil {
|
|
err = cerr
|
|
}
|
|
}()
|
|
|
|
return xattrFromHandle(p.name, windows.Handle(f.Fd()))
|
|
}
|
|
|
|
func xattrFromHandle(path string, handle windows.Handle) ([]restic.ExtendedAttribute, error) {
|
|
if supp, err := handleSupportsExtendedAttributes(handle); err != nil || !supp {
|
|
return nil, err
|
|
}
|
|
|
|
//Get the windows Extended Attributes using the file handle
|
|
var extAtts []extendedAttribute
|
|
extAtts, err := fgetEA(handle)
|
|
debug.Log("fillExtendedAttributes(%v) %v", path, extAtts)
|
|
if err != nil {
|
|
return nil, errors.Errorf("get EA failed for path %v, with: %v", path, err)
|
|
}
|
|
if len(extAtts) == 0 {
|
|
return nil, nil
|
|
}
|
|
|
|
extendedAttrs := make([]restic.ExtendedAttribute, 0, len(extAtts))
|
|
for _, attr := range extAtts {
|
|
extendedAttr := restic.ExtendedAttribute{
|
|
Name: attr.Name,
|
|
Value: attr.Value,
|
|
}
|
|
|
|
extendedAttrs = append(extendedAttrs, extendedAttr)
|
|
}
|
|
return extendedAttrs, nil
|
|
}
|
|
|
|
func (p *pathMetadataHandle) SecurityDescriptor() (buf *[]byte, err error) {
|
|
f, err := openMetadataHandle(p.name, p.flag)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
defer func() {
|
|
cerr := f.Close()
|
|
if err == nil {
|
|
err = cerr
|
|
}
|
|
}()
|
|
|
|
return getSecurityDescriptor(windows.Handle(f.Fd()))
|
|
}
|
|
|
|
func (p *fdMetadataHandle) Xattr(_ bool) ([]restic.ExtendedAttribute, error) {
|
|
return xattrFromHandle(p.name, windows.Handle(p.f.Fd()))
|
|
}
|
|
|
|
func (p *fdMetadataHandle) SecurityDescriptor() (*[]byte, error) {
|
|
return getSecurityDescriptor(windows.Handle(p.f.Fd()))
|
|
}
|
|
|
|
func openMetadataHandle(path string, flag int) (*os.File, error) {
|
|
path = fixpath(path)
|
|
// OpenFile from go does not request FILE_READ_EA so we need our own low-level implementation
|
|
// according to the windows docs, STANDARD_RIGHTS_READ + FILE_FLAG_BACKUP_SEMANTICS disable security checks on access
|
|
// if the process holds the SeBackupPrivilege
|
|
fileAccess := windows.FILE_READ_EA | windows.FILE_READ_ATTRIBUTES | windows.STANDARD_RIGHTS_READ
|
|
shareMode := windows.FILE_SHARE_READ | windows.FILE_SHARE_WRITE | windows.FILE_SHARE_DELETE
|
|
attrs := windows.FILE_ATTRIBUTE_NORMAL | windows.FILE_FLAG_BACKUP_SEMANTICS
|
|
if flag&O_NOFOLLOW != 0 {
|
|
attrs |= syscall.FILE_FLAG_OPEN_REPARSE_POINT
|
|
}
|
|
|
|
utf16Path := windows.StringToUTF16Ptr(path)
|
|
handle, err := windows.CreateFile(utf16Path, uint32(fileAccess), uint32(shareMode), nil, windows.OPEN_EXISTING, uint32(attrs), 0)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return os.NewFile(uintptr(handle), path), nil
|
|
}
|