diff options
author | Jakob Unterwurzacher | 2020-09-09 11:17:19 +0200 |
---|---|---|
committer | Jakob Unterwurzacher | 2020-09-09 11:17:19 +0200 |
commit | ac687d53593d8215b881db92fe2d1bbbd2d2d774 (patch) | |
tree | 91254ea710f042118ec4f21d5e9a77982a0037f1 /internal/fusefrontend/node_xattr_darwin.go | |
parent | 8b1df08b8af38aa50084abe492d0aee395492ede (diff) |
v2api: add Darwin xattr support
Diffstat (limited to 'internal/fusefrontend/node_xattr_darwin.go')
-rw-r--r-- | internal/fusefrontend/node_xattr_darwin.go | 106 |
1 files changed, 106 insertions, 0 deletions
diff --git a/internal/fusefrontend/node_xattr_darwin.go b/internal/fusefrontend/node_xattr_darwin.go index e69de29..82c0dff 100644 --- a/internal/fusefrontend/node_xattr_darwin.go +++ b/internal/fusefrontend/node_xattr_darwin.go @@ -0,0 +1,106 @@ +package fusefrontend + +import ( + "syscall" + + "golang.org/x/sys/unix" + + "github.com/hanwen/go-fuse/v2/fs" + + "github.com/rfjakob/gocryptfs/internal/syscallcompat" +) + +// On Darwin we have to unset XATTR_NOSECURITY 0x0008 +func filterXattrSetFlags(flags int) int { + // See https://opensource.apple.com/source/xnu/xnu-1504.15.3/bsd/sys/xattr.h.auto.html + const XATTR_NOSECURITY = 0x0008 + + return flags &^ XATTR_NOSECURITY +} + +func (n *Node) getXAttr(cAttr string) (out []byte, errno syscall.Errno) { + dirfd, cName, errno := n.prepareAtSyscall("") + if errno != 0 { + return + } + defer syscall.Close(dirfd) + + // O_NONBLOCK to not block on FIFOs. + fd, err := syscallcompat.Openat(dirfd, cName, syscall.O_RDONLY|syscall.O_NONBLOCK, 0) + if err != nil { + return nil, fs.ToErrno(err) + } + defer syscall.Close(fd) + + cData, err := syscallcompat.Fgetxattr(fd, cAttr) + if err != nil { + return nil, fs.ToErrno(err) + } + + return cData, 0 +} + +func (n *Node) setXAttr(cAttr string, cData []byte, flags uint32) (errno syscall.Errno) { + dirfd, cName, errno := n.prepareAtSyscall("") + if errno != 0 { + return + } + defer syscall.Close(dirfd) + + // O_NONBLOCK to not block on FIFOs. + fd, err := syscallcompat.Openat(dirfd, cName, syscall.O_WRONLY|syscall.O_NONBLOCK, 0) + // Directories cannot be opened read-write. Retry. + if err == syscall.EISDIR { + fd, err = syscallcompat.Openat(dirfd, cName, syscall.O_RDONLY|syscall.O_DIRECTORY|syscall.O_NONBLOCK, 0) + } + if err != nil { + fs.ToErrno(err) + } + defer syscall.Close(fd) + + err = unix.Fsetxattr(fd, cAttr, cData, int(flags)) + return fs.ToErrno(err) +} + +func (n *Node) removeXAttr(cAttr string) (errno syscall.Errno) { + dirfd, cName, errno := n.prepareAtSyscall("") + if errno != 0 { + return + } + defer syscall.Close(dirfd) + + // O_NONBLOCK to not block on FIFOs. + fd, err := syscallcompat.Openat(dirfd, cName, syscall.O_WRONLY|syscall.O_NONBLOCK, 0) + // Directories cannot be opened read-write. Retry. + if err == syscall.EISDIR { + fd, err = syscallcompat.Openat(dirfd, cName, syscall.O_RDONLY|syscall.O_DIRECTORY|syscall.O_NONBLOCK, 0) + } + if err != nil { + return fs.ToErrno(err) + } + defer syscall.Close(fd) + + err = unix.Fremovexattr(fd, cAttr) + return fs.ToErrno(err) +} + +func (n *Node) listXAttr() (out []string, errno syscall.Errno) { + dirfd, cName, errno := n.prepareAtSyscall("") + if errno != 0 { + return + } + defer syscall.Close(dirfd) + + // O_NONBLOCK to not block on FIFOs. + fd, err := syscallcompat.Openat(dirfd, cName, syscall.O_RDONLY|syscall.O_NONBLOCK, 0) + if err != nil { + return nil, fs.ToErrno(err) + } + defer syscall.Close(fd) + + cNames, err := syscallcompat.Flistxattr(fd) + if err != nil { + return nil, fs.ToErrno(err) + } + return cNames, 0 +} |