1
0
Fork 0
mirror of https://github.com/restic/restic.git synced 2025-01-21 06:48:35 +00:00
restic/internal/fs/meta_windows.go
2024-11-30 19:17:25 +01:00

83 lines
2.6 KiB
Go

package fs
import (
"os"
"syscall"
"github.com/restic/restic/internal/debug"
"github.com/restic/restic/internal/errors"
"github.com/restic/restic/internal/restic"
"golang.org/x/sys/windows"
)
func (p *pathMetadataHandle) Xattr(_ bool) ([]restic.ExtendedAttribute, error) {
return xattrFromPath(p.name)
}
func xattrFromPath(path string) ([]restic.ExtendedAttribute, error) {
allowExtended, err := checkAndStoreEASupport(path)
if err != nil || !allowExtended {
return nil, err
}
var fileHandle windows.Handle
if fileHandle, err = openHandleForEA(path, false); err != nil {
return nil, errors.Errorf("get EA failed while opening file handle for path %v, with: %v", path, err)
}
defer closeFileHandle(fileHandle, path)
//Get the windows Extended Attributes using the file handle
var extAtts []extendedAttribute
extAtts, err = fgetEA(fileHandle)
debug.Log("fillExtendedAttributes(%v) %v", path, extAtts)
if err != nil {
return nil, errors.Errorf("get EA failed for path %v, with: %v", path, err)
}
if len(extAtts) == 0 {
return nil, nil
}
extendedAttrs := make([]restic.ExtendedAttribute, 0, len(extAtts))
for _, attr := range extAtts {
extendedAttr := restic.ExtendedAttribute{
Name: attr.Name,
Value: attr.Value,
}
extendedAttrs = append(extendedAttrs, extendedAttr)
}
return extendedAttrs, nil
}
func (p *pathMetadataHandle) SecurityDescriptor() (*[]byte, error) {
return getSecurityDescriptor(p.name)
}
func (p *fdMetadataHandle) Xattr(_ bool) ([]restic.ExtendedAttribute, error) {
// FIXME
return xattrFromPath(p.name)
}
func (p *fdMetadataHandle) SecurityDescriptor() (*[]byte, error) {
// FIXME
return getSecurityDescriptor(p.name)
}
func openMetadataHandle(path string, flag int) (*os.File, error) {
path = fixpath(path)
// OpenFile from go does not request FILE_READ_EA so we need our own low-level implementation
// according to the windows docs, STANDARD_RIGHTS_READ + FILE_FLAG_BACKUP_SEMANTICS disable security checks on access
// if the process holds the SeBackupPrivilege
fileAccess := windows.FILE_READ_EA | windows.FILE_READ_ATTRIBUTES | windows.STANDARD_RIGHTS_READ
shareMode := windows.FILE_SHARE_READ | windows.FILE_SHARE_WRITE | windows.FILE_SHARE_DELETE
attrs := windows.FILE_ATTRIBUTE_NORMAL | windows.FILE_FLAG_BACKUP_SEMANTICS
if flag&O_NOFOLLOW != 0 {
attrs |= syscall.FILE_FLAG_OPEN_REPARSE_POINT
}
utf16Path := windows.StringToUTF16Ptr(path)
handle, err := windows.CreateFile(utf16Path, uint32(fileAccess), uint32(shareMode), nil, windows.OPEN_EXISTING, uint32(attrs), 0)
if err != nil {
return nil, err
}
return os.NewFile(uintptr(handle), path), nil
}