diff options
author | Jakob Unterwurzacher | 2020-07-11 19:43:07 +0200 |
---|---|---|
committer | Jakob Unterwurzacher | 2020-07-11 19:43:07 +0200 |
commit | 250dbc64362265beace368b62f5a6656908a2e84 (patch) | |
tree | 2eed3ec591ee4597f0173afd9d97e555c470b51f /internal/fusefrontend/node.go | |
parent | c35b575d5f5aa29c4f39e9f0df15385d9f379caf (diff) |
v2api: implement Symlink
Diffstat (limited to 'internal/fusefrontend/node.go')
-rw-r--r-- | internal/fusefrontend/node.go | 49 |
1 files changed, 49 insertions, 0 deletions
diff --git a/internal/fusefrontend/node.go b/internal/fusefrontend/node.go index 2f5f3ec..aa9bd51 100644 --- a/internal/fusefrontend/node.go +++ b/internal/fusefrontend/node.go @@ -400,3 +400,52 @@ func (n *Node) Link(ctx context.Context, target fs.InodeEmbedder, name string, o inode = n.newChild(ctx, st, out) return inode, 0 } + +// Symlink - FUSE call. Create a symlink. +// +// Symlink-safe through use of Symlinkat. +func (n *Node) Symlink(ctx context.Context, target, name string, out *fuse.EntryOut) (inode *fs.Inode, errno syscall.Errno) { + dirfd, cName, errno := n.prepareAtSyscall(name) + if errno != 0 { + return + } + defer syscall.Close(dirfd) + + // Make sure context is nil if we don't want to preserve the owner + rn := n.rootNode() + if !rn.args.PreserveOwner { + ctx = nil + } + + cTarget := target + if !rn.args.PlaintextNames { + // Symlinks are encrypted like file contents (GCM) and base64-encoded + cTarget = rn.encryptSymlinkTarget(target) + } + // Create ".name" file to store long file name (except in PlaintextNames mode) + var err error + ctx2 := toFuseCtx(ctx) + if !rn.args.PlaintextNames && nametransform.IsLongContent(cName) { + err = rn.nameTransform.WriteLongNameAt(dirfd, cName, name) + if err != nil { + errno = fs.ToErrno(err) + return + } + // Create "gocryptfs.longfile." symlink + err = syscallcompat.SymlinkatUser(cTarget, dirfd, cName, ctx2) + if err != nil { + nametransform.DeleteLongNameAt(dirfd, cName) + } + } else { + // Create symlink + err = syscallcompat.SymlinkatUser(cTarget, dirfd, cName, ctx2) + } + + st, err := syscallcompat.Fstatat2(dirfd, cName, unix.AT_SYMLINK_NOFOLLOW) + if err != nil { + errno = fs.ToErrno(err) + return + } + inode = n.newChild(ctx, st, out) + return inode, 0 +} |