File: copy_windows.go

package info (click to toggle)
golang-github-tonistiigi-fsutil 0.0~git20240925.a340068-2
  • links: PTS, VCS
  • area: main
  • in suites: forky, sid
  • size: 644 kB
  • sloc: sh: 21; makefile: 5
file content (124 lines) | stat: -rw-r--r-- 3,101 bytes parent folder | download | duplicates (7)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
package fs

import (
	"io"
	"os"

	"github.com/Microsoft/go-winio"
	"github.com/pkg/errors"
	"golang.org/x/sys/windows"
)

const (
	seTakeOwnershipPrivilege = "SeTakeOwnershipPrivilege"
)

func getUIDGID(fi os.FileInfo) (uid, gid int) {
	return 0, 0
}

func getFileSecurityInfo(name string) (*windows.SID, *windows.ACL, error) {
	secInfo, err := windows.GetNamedSecurityInfo(
		name, windows.SE_FILE_OBJECT,
		windows.OWNER_SECURITY_INFORMATION|windows.DACL_SECURITY_INFORMATION)

	if err != nil {
		return nil, nil, errors.Wrap(err, "fetching security info")
	}
	sid, _, err := secInfo.Owner()
	if err != nil {
		return nil, nil, errors.Wrap(err, "fetching owner SID")
	}
	dacl, _, err := secInfo.DACL()
	if err != nil {
		return nil, nil, errors.Wrap(err, "fetching dacl")
	}
	return sid, dacl, nil
}

func (c *copier) copyFileInfo(fi os.FileInfo, src, name string) error {
	if err := os.Chmod(name, fi.Mode()); err != nil {
		return errors.Wrapf(err, "failed to chmod %s", name)
	}

	sid, dacl, err := getFileSecurityInfo(src)
	if err != nil {
		return errors.Wrap(err, "getting file info")
	}

	if c.chown != nil {
		// Use the defined chowner.
		usr := &User{SID: sid.String()}
		if err := Chown(name, usr, c.chown); err != nil {
			return errors.Wrapf(err, "failed to chown %s", name)
		}
		return nil
	} else {
		// Copy file ownership and ACL from the source file.
		// We need SeRestorePrivilege and SeTakeOwnershipPrivilege in order
		// to restore security info on a file, especially if we're trying to
		// apply security info which includes SIDs not necessarily present on
		// the host.
		privileges := []string{winio.SeRestorePrivilege, seTakeOwnershipPrivilege}
		if err := winio.EnableProcessPrivileges(privileges); err != nil {
			return err
		}
		defer winio.DisableProcessPrivileges(privileges)

		if err := windows.SetNamedSecurityInfo(
			name, windows.SE_FILE_OBJECT,
			windows.OWNER_SECURITY_INFORMATION|windows.DACL_SECURITY_INFORMATION,
			sid, nil, dacl, nil); err != nil {

			return err
		}
	}

	if err := c.copyFileTimestamp(fi, name); err != nil {
		return err
	}
	return nil
}

func (c *copier) copyFileTimestamp(fi os.FileInfo, name string) error {
	if c.utime != nil {
		return Utimes(name, c.utime)
	}

	if fi.Mode()&os.ModeSymlink == 0 {
		if err := os.Chtimes(name, fi.ModTime(), fi.ModTime()); err != nil {
			return errors.Wrap(err, "changing mtime")
		}
	}
	return nil
}

func copyFile(source, target string) error {
	src, err := os.Open(source)
	if err != nil {
		return errors.Wrapf(err, "failed to open source %s", source)
	}
	defer src.Close()
	tgt, err := os.Create(target)
	if err != nil {
		return errors.Wrapf(err, "failed to open target %s", target)
	}
	defer tgt.Close()

	return copyFileContent(tgt, src)
}

func copyFileContent(dst, src *os.File) error {
	buf := bufferPool.Get().(*[]byte)
	_, err := io.CopyBuffer(dst, src, *buf)
	bufferPool.Put(buf)
	return err
}

func copyXAttrs(dst, src string, xeh XAttrErrorHandler) error {
	return nil
}

func copyDevice(dst string, fi os.FileInfo) error {
	return errors.New("device copy not supported")
}