2010-04-13 17:30:11 -06:00
|
|
|
// Copyright 2009 The Go Authors. All rights reserved.
|
|
|
|
// Use of this source code is governed by a BSD-style
|
|
|
|
// license that can be found in the LICENSE file.
|
|
|
|
|
|
|
|
package os
|
|
|
|
|
|
|
|
import (
|
2011-11-01 19:49:08 -06:00
|
|
|
"io"
|
2010-04-13 17:30:11 -06:00
|
|
|
"runtime"
|
2011-07-01 08:18:07 -06:00
|
|
|
"sync"
|
2010-04-13 17:30:11 -06:00
|
|
|
"syscall"
|
2011-11-15 10:48:22 -07:00
|
|
|
"unicode/utf16"
|
2012-09-11 20:04:45 -06:00
|
|
|
"unicode/utf8"
|
2013-01-06 18:48:32 -07:00
|
|
|
"unsafe"
|
2010-04-13 17:30:11 -06:00
|
|
|
)
|
|
|
|
|
2011-07-01 08:18:07 -06:00
|
|
|
// File represents an open file descriptor.
|
|
|
|
type File struct {
|
allow copy of struct containing unexported fields
An experiment: allow structs to be copied even if they
contain unexported fields. This gives packages the
ability to return opaque values in their APIs, like reflect
does for reflect.Value but without the kludgy hacks reflect
resorts to.
In general, we trust programmers not to do silly things
like *x = *y on a package's struct pointers, just as we trust
programmers not to do unicode.Letter = unicode.Digit,
but packages that want a harder guarantee can introduce
an extra level of indirection, like in the changes to os.File
in this CL or by using an interface type.
All in one CL so that it can be rolled back more easily if
we decide this is a bad idea.
Originally discussed in March 2011.
https://groups.google.com/group/golang-dev/t/3f5d30938c7c45ef
R=golang-dev, adg, dvyukov, r, bradfitz, jan.mercl, gri
CC=golang-dev
https://golang.org/cl/5372095
2011-11-15 10:20:59 -07:00
|
|
|
*file
|
|
|
|
}
|
|
|
|
|
|
|
|
// file is the real representation of *File.
|
|
|
|
// The extra level of indirection ensures that no clients of os
|
|
|
|
// can overwrite this data, which could cause the finalizer
|
|
|
|
// to close the wrong file descriptor.
|
|
|
|
type file struct {
|
2011-07-01 08:18:07 -06:00
|
|
|
fd syscall.Handle
|
|
|
|
name string
|
|
|
|
dirinfo *dirInfo // nil unless directory being read
|
|
|
|
l sync.Mutex // used to implement windows pread/pwrite
|
2012-09-11 20:04:45 -06:00
|
|
|
|
|
|
|
// only for console io
|
|
|
|
isConsole bool
|
|
|
|
lastbits []byte // first few bytes of the last incomplete rune in last write
|
2013-02-25 20:18:48 -07:00
|
|
|
readbuf []rune // input console buffer
|
2011-07-01 08:18:07 -06:00
|
|
|
}
|
|
|
|
|
|
|
|
// Fd returns the Windows handle referencing the open file.
|
2012-02-09 20:16:15 -07:00
|
|
|
func (file *File) Fd() uintptr {
|
2011-07-01 08:18:07 -06:00
|
|
|
if file == nil {
|
2012-02-09 20:16:15 -07:00
|
|
|
return uintptr(syscall.InvalidHandle)
|
2011-07-01 08:18:07 -06:00
|
|
|
}
|
2012-02-09 20:16:15 -07:00
|
|
|
return uintptr(file.fd)
|
2011-07-01 08:18:07 -06:00
|
|
|
}
|
|
|
|
|
2013-01-06 18:48:32 -07:00
|
|
|
// newFile returns a new File with the given file handle and name.
|
|
|
|
// Unlike NewFile, it does not check that h is syscall.InvalidHandle.
|
|
|
|
func newFile(h syscall.Handle, name string) *File {
|
2012-02-09 20:16:15 -07:00
|
|
|
f := &File{&file{fd: h, name: name}}
|
2012-09-11 20:04:45 -06:00
|
|
|
var m uint32
|
|
|
|
if syscall.GetConsoleMode(f.fd, &m) == nil {
|
|
|
|
f.isConsole = true
|
|
|
|
}
|
allow copy of struct containing unexported fields
An experiment: allow structs to be copied even if they
contain unexported fields. This gives packages the
ability to return opaque values in their APIs, like reflect
does for reflect.Value but without the kludgy hacks reflect
resorts to.
In general, we trust programmers not to do silly things
like *x = *y on a package's struct pointers, just as we trust
programmers not to do unicode.Letter = unicode.Digit,
but packages that want a harder guarantee can introduce
an extra level of indirection, like in the changes to os.File
in this CL or by using an interface type.
All in one CL so that it can be rolled back more easily if
we decide this is a bad idea.
Originally discussed in March 2011.
https://groups.google.com/group/golang-dev/t/3f5d30938c7c45ef
R=golang-dev, adg, dvyukov, r, bradfitz, jan.mercl, gri
CC=golang-dev
https://golang.org/cl/5372095
2011-11-15 10:20:59 -07:00
|
|
|
runtime.SetFinalizer(f.file, (*file).close)
|
2011-07-01 08:18:07 -06:00
|
|
|
return f
|
|
|
|
}
|
|
|
|
|
2013-01-06 18:48:32 -07:00
|
|
|
// NewFile returns a new File with the given file descriptor and name.
|
|
|
|
func NewFile(fd uintptr, name string) *File {
|
|
|
|
h := syscall.Handle(fd)
|
|
|
|
if h == syscall.InvalidHandle {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
return newFile(h, name)
|
|
|
|
}
|
|
|
|
|
2010-04-13 17:30:11 -06:00
|
|
|
// Auxiliary information if the File describes a directory
|
|
|
|
type dirInfo struct {
|
2012-06-08 11:54:48 -06:00
|
|
|
data syscall.Win32finddata
|
2011-09-05 17:59:08 -06:00
|
|
|
needdata bool
|
2012-02-26 18:29:33 -07:00
|
|
|
path string
|
2013-01-06 18:48:32 -07:00
|
|
|
isempty bool // set if FindFirstFile returns ERROR_FILE_NOT_FOUND
|
2010-04-13 17:30:11 -06:00
|
|
|
}
|
|
|
|
|
2012-07-27 06:21:33 -06:00
|
|
|
func epipecheck(file *File, e error) {
|
|
|
|
}
|
|
|
|
|
2010-08-03 14:03:50 -06:00
|
|
|
const DevNull = "NUL"
|
|
|
|
|
2012-01-10 21:26:11 -07:00
|
|
|
func (f *file) isdir() bool { return f != nil && f.dirinfo != nil }
|
2010-04-13 17:30:11 -06:00
|
|
|
|
2012-01-19 16:45:18 -07:00
|
|
|
func openFile(name string, flag int, perm FileMode) (file *File, err error) {
|
|
|
|
r, e := syscall.Open(name, flag|syscall.O_CLOEXEC, syscallMode(perm))
|
2011-11-13 20:44:52 -07:00
|
|
|
if e != nil {
|
2013-01-06 18:48:32 -07:00
|
|
|
return nil, e
|
2010-04-13 17:30:11 -06:00
|
|
|
}
|
2012-02-10 14:47:19 -07:00
|
|
|
return NewFile(uintptr(r), name), nil
|
2010-04-13 17:30:11 -06:00
|
|
|
}
|
|
|
|
|
2011-11-01 19:49:08 -06:00
|
|
|
func openDir(name string) (file *File, err error) {
|
syscall: return EINVAL when string arguments have NUL characters
Since NUL usually terminates strings in underlying syscalls, allowing
it when converting string arguments is a security risk, especially
when dealing with filenames. For example, a program might reason that
filename like "/root/..\x00/" is a subdirectory or "/root/" and allow
access to it, while underlying syscall will treat "\x00" as an end of
that string and the actual filename will be "/root/..", which might
be unexpected. Returning EINVAL when string arguments have NUL in
them makes sure this attack vector is unusable.
R=golang-dev, r, bradfitz, fullung, rsc, minux.ma
CC=golang-dev
https://golang.org/cl/6458050
2012-08-05 15:24:32 -06:00
|
|
|
maskp, e := syscall.UTF16PtrFromString(name + `\*`)
|
|
|
|
if e != nil {
|
2013-01-06 18:48:32 -07:00
|
|
|
return nil, e
|
syscall: return EINVAL when string arguments have NUL characters
Since NUL usually terminates strings in underlying syscalls, allowing
it when converting string arguments is a security risk, especially
when dealing with filenames. For example, a program might reason that
filename like "/root/..\x00/" is a subdirectory or "/root/" and allow
access to it, while underlying syscall will treat "\x00" as an end of
that string and the actual filename will be "/root/..", which might
be unexpected. Returning EINVAL when string arguments have NUL in
them makes sure this attack vector is unusable.
R=golang-dev, r, bradfitz, fullung, rsc, minux.ma
CC=golang-dev
https://golang.org/cl/6458050
2012-08-05 15:24:32 -06:00
|
|
|
}
|
2010-04-13 17:30:11 -06:00
|
|
|
d := new(dirInfo)
|
syscall: return EINVAL when string arguments have NUL characters
Since NUL usually terminates strings in underlying syscalls, allowing
it when converting string arguments is a security risk, especially
when dealing with filenames. For example, a program might reason that
filename like "/root/..\x00/" is a subdirectory or "/root/" and allow
access to it, while underlying syscall will treat "\x00" as an end of
that string and the actual filename will be "/root/..", which might
be unexpected. Returning EINVAL when string arguments have NUL in
them makes sure this attack vector is unusable.
R=golang-dev, r, bradfitz, fullung, rsc, minux.ma
CC=golang-dev
https://golang.org/cl/6458050
2012-08-05 15:24:32 -06:00
|
|
|
r, e := syscall.FindFirstFile(maskp, &d.data)
|
2011-11-13 20:44:52 -07:00
|
|
|
if e != nil {
|
2013-01-06 18:48:32 -07:00
|
|
|
// FindFirstFile returns ERROR_FILE_NOT_FOUND when
|
|
|
|
// no matching files can be found. Then, if directory
|
|
|
|
// exists, we should proceed.
|
|
|
|
if e != syscall.ERROR_FILE_NOT_FOUND {
|
|
|
|
return nil, e
|
|
|
|
}
|
|
|
|
var fa syscall.Win32FileAttributeData
|
|
|
|
namep, e := syscall.UTF16PtrFromString(name)
|
|
|
|
if e != nil {
|
|
|
|
return nil, e
|
|
|
|
}
|
|
|
|
e = syscall.GetFileAttributesEx(namep, syscall.GetFileExInfoStandard, (*byte)(unsafe.Pointer(&fa)))
|
|
|
|
if e != nil {
|
|
|
|
return nil, e
|
|
|
|
}
|
|
|
|
if fa.FileAttributes&syscall.FILE_ATTRIBUTE_DIRECTORY == 0 {
|
|
|
|
return nil, e
|
|
|
|
}
|
|
|
|
d.isempty = true
|
2010-04-13 17:30:11 -06:00
|
|
|
}
|
2012-02-26 18:29:33 -07:00
|
|
|
d.path = name
|
|
|
|
if !isAbs(d.path) {
|
|
|
|
cwd, _ := Getwd()
|
|
|
|
d.path = cwd + `\` + d.path
|
|
|
|
}
|
2013-01-06 18:48:32 -07:00
|
|
|
f := newFile(r, name)
|
2010-04-13 17:30:11 -06:00
|
|
|
f.dirinfo = d
|
|
|
|
return f, nil
|
|
|
|
}
|
|
|
|
|
2011-04-05 00:42:14 -06:00
|
|
|
// OpenFile is the generalized open call; most users will use Open
|
|
|
|
// or Create instead. It opens the named file with specified flag
|
|
|
|
// (O_RDONLY etc.) and perm, (0666 etc.) if applicable. If successful,
|
|
|
|
// methods on the returned File can be used for I/O.
|
2012-02-08 22:55:36 -07:00
|
|
|
// If there is an error, it will be of type *PathError.
|
2012-01-19 16:45:18 -07:00
|
|
|
func OpenFile(name string, flag int, perm FileMode) (file *File, err error) {
|
2011-11-25 17:01:49 -07:00
|
|
|
if name == "" {
|
|
|
|
return nil, &PathError{"open", name, syscall.ENOENT}
|
|
|
|
}
|
2010-04-13 17:30:11 -06:00
|
|
|
// TODO(brainman): not sure about my logic of assuming it is dir first, then fall back to file
|
|
|
|
r, e := openDir(name)
|
|
|
|
if e == nil {
|
2010-10-04 00:31:49 -06:00
|
|
|
if flag&O_WRONLY != 0 || flag&O_RDWR != 0 {
|
|
|
|
r.Close()
|
2012-02-16 16:04:29 -07:00
|
|
|
return nil, &PathError{"open", name, syscall.EISDIR}
|
2010-10-04 00:31:49 -06:00
|
|
|
}
|
2010-04-13 17:30:11 -06:00
|
|
|
return r, nil
|
|
|
|
}
|
2010-04-13 23:30:41 -06:00
|
|
|
r, e = openFile(name, flag, perm)
|
2010-04-13 17:30:11 -06:00
|
|
|
if e == nil {
|
|
|
|
return r, nil
|
|
|
|
}
|
2013-01-06 18:48:32 -07:00
|
|
|
return nil, &PathError{"open", name, e}
|
2010-04-13 17:30:11 -06:00
|
|
|
}
|
|
|
|
|
|
|
|
// Close closes the File, rendering it unusable for I/O.
|
2011-11-01 19:49:08 -06:00
|
|
|
// It returns an error, if any.
|
|
|
|
func (file *File) Close() error {
|
allow copy of struct containing unexported fields
An experiment: allow structs to be copied even if they
contain unexported fields. This gives packages the
ability to return opaque values in their APIs, like reflect
does for reflect.Value but without the kludgy hacks reflect
resorts to.
In general, we trust programmers not to do silly things
like *x = *y on a package's struct pointers, just as we trust
programmers not to do unicode.Letter = unicode.Digit,
but packages that want a harder guarantee can introduce
an extra level of indirection, like in the changes to os.File
in this CL or by using an interface type.
All in one CL so that it can be rolled back more easily if
we decide this is a bad idea.
Originally discussed in March 2011.
https://groups.google.com/group/golang-dev/t/3f5d30938c7c45ef
R=golang-dev, adg, dvyukov, r, bradfitz, jan.mercl, gri
CC=golang-dev
https://golang.org/cl/5372095
2011-11-15 10:20:59 -07:00
|
|
|
return file.file.close()
|
|
|
|
}
|
|
|
|
|
|
|
|
func (file *file) close() error {
|
2013-01-06 18:48:32 -07:00
|
|
|
if file == nil {
|
|
|
|
return syscall.EINVAL
|
|
|
|
}
|
|
|
|
if file.isdir() && file.dirinfo.isempty {
|
|
|
|
// "special" empty directories
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
if file.fd == syscall.InvalidHandle {
|
2012-02-16 16:04:29 -07:00
|
|
|
return syscall.EINVAL
|
2010-04-13 17:30:11 -06:00
|
|
|
}
|
2011-11-13 20:44:52 -07:00
|
|
|
var e error
|
2010-04-13 17:30:11 -06:00
|
|
|
if file.isdir() {
|
2011-07-01 08:18:07 -06:00
|
|
|
e = syscall.FindClose(syscall.Handle(file.fd))
|
2010-04-13 17:30:11 -06:00
|
|
|
} else {
|
2011-07-01 08:18:07 -06:00
|
|
|
e = syscall.CloseHandle(syscall.Handle(file.fd))
|
2010-04-13 17:30:11 -06:00
|
|
|
}
|
2011-11-01 19:49:08 -06:00
|
|
|
var err error
|
2011-11-13 20:44:52 -07:00
|
|
|
if e != nil {
|
|
|
|
err = &PathError{"close", file.name, e}
|
2010-04-13 17:30:11 -06:00
|
|
|
}
|
2011-07-01 08:18:07 -06:00
|
|
|
file.fd = syscall.InvalidHandle // so it can't be closed again
|
2010-04-13 17:30:11 -06:00
|
|
|
|
|
|
|
// no need for a finalizer anymore
|
|
|
|
runtime.SetFinalizer(file, nil)
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2012-01-16 22:51:54 -07:00
|
|
|
func (file *File) readdir(n int) (fi []FileInfo, err error) {
|
2013-01-06 18:48:32 -07:00
|
|
|
if file == nil {
|
2012-02-16 16:04:29 -07:00
|
|
|
return nil, syscall.EINVAL
|
2010-09-23 20:06:59 -06:00
|
|
|
}
|
|
|
|
if !file.isdir() {
|
2012-02-16 16:04:29 -07:00
|
|
|
return nil, &PathError{"Readdir", file.name, syscall.ENOTDIR}
|
2010-09-23 20:06:59 -06:00
|
|
|
}
|
2013-01-06 18:48:32 -07:00
|
|
|
if !file.dirinfo.isempty && file.fd == syscall.InvalidHandle {
|
|
|
|
return nil, syscall.EINVAL
|
|
|
|
}
|
2011-05-28 19:59:35 -06:00
|
|
|
wantAll := n <= 0
|
2011-05-16 10:26:16 -06:00
|
|
|
size := n
|
2011-05-28 19:59:35 -06:00
|
|
|
if wantAll {
|
|
|
|
n = -1
|
2010-04-13 17:30:11 -06:00
|
|
|
size = 100
|
|
|
|
}
|
|
|
|
fi = make([]FileInfo, 0, size) // Empty with room to grow.
|
2011-09-05 17:59:08 -06:00
|
|
|
d := &file.dirinfo.data
|
2013-01-06 18:48:32 -07:00
|
|
|
for n != 0 && !file.dirinfo.isempty {
|
2011-09-05 17:59:08 -06:00
|
|
|
if file.dirinfo.needdata {
|
2012-06-08 11:54:48 -06:00
|
|
|
e := syscall.FindNextFile(syscall.Handle(file.fd), d)
|
2011-11-13 20:44:52 -07:00
|
|
|
if e != nil {
|
2010-04-13 17:30:11 -06:00
|
|
|
if e == syscall.ERROR_NO_MORE_FILES {
|
|
|
|
break
|
|
|
|
} else {
|
2011-11-13 20:44:52 -07:00
|
|
|
err = &PathError{"FindNextFile", file.name, e}
|
2011-05-16 10:26:16 -06:00
|
|
|
if !wantAll {
|
|
|
|
fi = nil
|
|
|
|
}
|
|
|
|
return
|
2010-04-13 17:30:11 -06:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2011-09-05 17:59:08 -06:00
|
|
|
file.dirinfo.needdata = true
|
2011-11-30 10:04:16 -07:00
|
|
|
name := string(syscall.UTF16ToString(d.FileName[0:]))
|
|
|
|
if name == "." || name == ".." { // Useless names
|
2010-04-13 17:30:11 -06:00
|
|
|
continue
|
|
|
|
}
|
2012-02-26 18:29:33 -07:00
|
|
|
f := &fileStat{
|
2013-01-30 23:17:37 -07:00
|
|
|
name: name,
|
|
|
|
sys: syscall.Win32FileAttributeData{
|
|
|
|
FileAttributes: d.FileAttributes,
|
|
|
|
CreationTime: d.CreationTime,
|
|
|
|
LastAccessTime: d.LastAccessTime,
|
|
|
|
LastWriteTime: d.LastWriteTime,
|
|
|
|
FileSizeHigh: d.FileSizeHigh,
|
|
|
|
FileSizeLow: d.FileSizeLow,
|
|
|
|
},
|
|
|
|
path: file.dirinfo.path + `\` + name,
|
2012-02-26 18:29:33 -07:00
|
|
|
}
|
2011-05-16 10:26:16 -06:00
|
|
|
n--
|
2010-10-27 20:47:23 -06:00
|
|
|
fi = append(fi, f)
|
2010-04-13 17:30:11 -06:00
|
|
|
}
|
2011-05-16 10:26:16 -06:00
|
|
|
if !wantAll && len(fi) == 0 {
|
2011-11-01 19:49:08 -06:00
|
|
|
return fi, io.EOF
|
2011-05-16 10:26:16 -06:00
|
|
|
}
|
2010-04-13 17:30:11 -06:00
|
|
|
return fi, nil
|
|
|
|
}
|
2010-04-27 00:17:14 -06:00
|
|
|
|
2013-03-20 17:32:37 -06:00
|
|
|
// readConsole reads utf16 characters from console File,
|
2013-02-25 20:18:48 -07:00
|
|
|
// encodes them into utf8 and stores them in buffer b.
|
|
|
|
// It returns the number of utf8 bytes read and an error, if any.
|
|
|
|
func (f *File) readConsole(b []byte) (n int, err error) {
|
|
|
|
if len(b) == 0 {
|
|
|
|
return 0, nil
|
|
|
|
}
|
|
|
|
if len(f.readbuf) == 0 {
|
2013-05-16 01:20:13 -06:00
|
|
|
// syscall.ReadConsole seems to fail, if given large buffer.
|
|
|
|
// So limit the buffer to 16000 characters.
|
2013-05-17 01:26:44 -06:00
|
|
|
numBytes := len(b)
|
|
|
|
if numBytes > 16000 {
|
|
|
|
numBytes = 16000
|
2013-05-16 01:20:13 -06:00
|
|
|
}
|
2013-02-25 20:18:48 -07:00
|
|
|
// get more input data from os
|
2013-05-17 01:26:44 -06:00
|
|
|
wchars := make([]uint16, numBytes)
|
2013-02-25 20:18:48 -07:00
|
|
|
var p *uint16
|
|
|
|
if len(b) > 0 {
|
|
|
|
p = &wchars[0]
|
|
|
|
}
|
|
|
|
var nw uint32
|
|
|
|
err := syscall.ReadConsole(f.fd, p, uint32(len(wchars)), &nw, nil)
|
|
|
|
if err != nil {
|
|
|
|
return 0, err
|
|
|
|
}
|
|
|
|
f.readbuf = utf16.Decode(wchars[:nw])
|
|
|
|
}
|
|
|
|
for i, r := range f.readbuf {
|
|
|
|
if utf8.RuneLen(r) > len(b) {
|
|
|
|
f.readbuf = f.readbuf[i:]
|
|
|
|
return n, nil
|
|
|
|
}
|
|
|
|
nr := utf8.EncodeRune(b, r)
|
|
|
|
b = b[nr:]
|
|
|
|
n += nr
|
|
|
|
}
|
|
|
|
f.readbuf = nil
|
|
|
|
return n, nil
|
|
|
|
}
|
|
|
|
|
2011-04-26 02:09:46 -06:00
|
|
|
// read reads up to len(b) bytes from the File.
|
|
|
|
// It returns the number of bytes read and an error, if any.
|
2011-11-13 20:44:52 -07:00
|
|
|
func (f *File) read(b []byte) (n int, err error) {
|
2011-04-26 02:09:46 -06:00
|
|
|
f.l.Lock()
|
|
|
|
defer f.l.Unlock()
|
2013-02-25 20:18:48 -07:00
|
|
|
if f.isConsole {
|
|
|
|
return f.readConsole(b)
|
|
|
|
}
|
2011-04-26 02:09:46 -06:00
|
|
|
return syscall.Read(f.fd, b)
|
|
|
|
}
|
|
|
|
|
|
|
|
// pread reads len(b) bytes from the File starting at byte offset off.
|
|
|
|
// It returns the number of bytes read and the error, if any.
|
|
|
|
// EOF is signaled by a zero count with err set to 0.
|
2011-11-13 20:44:52 -07:00
|
|
|
func (f *File) pread(b []byte, off int64) (n int, err error) {
|
2011-04-26 02:09:46 -06:00
|
|
|
f.l.Lock()
|
|
|
|
defer f.l.Unlock()
|
|
|
|
curoffset, e := syscall.Seek(f.fd, 0, 1)
|
2011-11-13 20:44:52 -07:00
|
|
|
if e != nil {
|
2011-04-26 02:09:46 -06:00
|
|
|
return 0, e
|
|
|
|
}
|
|
|
|
defer syscall.Seek(f.fd, curoffset, 0)
|
|
|
|
o := syscall.Overlapped{
|
|
|
|
OffsetHigh: uint32(off >> 32),
|
|
|
|
Offset: uint32(off),
|
|
|
|
}
|
|
|
|
var done uint32
|
2011-07-01 08:18:07 -06:00
|
|
|
e = syscall.ReadFile(syscall.Handle(f.fd), b, &done, &o)
|
2011-11-13 20:44:52 -07:00
|
|
|
if e != nil {
|
2011-04-26 02:09:46 -06:00
|
|
|
return 0, e
|
|
|
|
}
|
2011-11-13 20:44:52 -07:00
|
|
|
return int(done), nil
|
2011-04-26 02:09:46 -06:00
|
|
|
}
|
|
|
|
|
2012-09-11 20:04:45 -06:00
|
|
|
// writeConsole writes len(b) bytes to the console File.
|
|
|
|
// It returns the number of bytes written and an error, if any.
|
|
|
|
func (f *File) writeConsole(b []byte) (n int, err error) {
|
|
|
|
n = len(b)
|
|
|
|
runes := make([]rune, 0, 256)
|
|
|
|
if len(f.lastbits) > 0 {
|
|
|
|
b = append(f.lastbits, b...)
|
|
|
|
f.lastbits = nil
|
|
|
|
|
|
|
|
}
|
|
|
|
for len(b) >= utf8.UTFMax || utf8.FullRune(b) {
|
|
|
|
r, l := utf8.DecodeRune(b)
|
|
|
|
runes = append(runes, r)
|
|
|
|
b = b[l:]
|
|
|
|
}
|
|
|
|
if len(b) > 0 {
|
|
|
|
f.lastbits = make([]byte, len(b))
|
|
|
|
copy(f.lastbits, b)
|
|
|
|
}
|
2012-09-19 00:55:21 -06:00
|
|
|
// syscall.WriteConsole seems to fail, if given large buffer.
|
|
|
|
// So limit the buffer to 16000 characters. This number was
|
|
|
|
// discovered by experimenting with syscall.WriteConsole.
|
|
|
|
const maxWrite = 16000
|
|
|
|
for len(runes) > 0 {
|
|
|
|
m := len(runes)
|
|
|
|
if m > maxWrite {
|
|
|
|
m = maxWrite
|
|
|
|
}
|
|
|
|
chunk := runes[:m]
|
|
|
|
runes = runes[m:]
|
|
|
|
uint16s := utf16.Encode(chunk)
|
2012-09-11 20:04:45 -06:00
|
|
|
for len(uint16s) > 0 {
|
|
|
|
var written uint32
|
|
|
|
err = syscall.WriteConsole(f.fd, &uint16s[0], uint32(len(uint16s)), &written, nil)
|
|
|
|
if err != nil {
|
|
|
|
return 0, nil
|
|
|
|
}
|
|
|
|
uint16s = uint16s[written:]
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return n, nil
|
|
|
|
}
|
|
|
|
|
2011-04-26 02:09:46 -06:00
|
|
|
// write writes len(b) bytes to the File.
|
|
|
|
// It returns the number of bytes written and an error, if any.
|
2011-11-13 20:44:52 -07:00
|
|
|
func (f *File) write(b []byte) (n int, err error) {
|
2011-04-26 02:09:46 -06:00
|
|
|
f.l.Lock()
|
|
|
|
defer f.l.Unlock()
|
2012-09-11 20:04:45 -06:00
|
|
|
if f.isConsole {
|
|
|
|
return f.writeConsole(b)
|
|
|
|
}
|
2011-04-26 02:09:46 -06:00
|
|
|
return syscall.Write(f.fd, b)
|
|
|
|
}
|
|
|
|
|
|
|
|
// pwrite writes len(b) bytes to the File starting at byte offset off.
|
|
|
|
// It returns the number of bytes written and an error, if any.
|
2011-11-13 20:44:52 -07:00
|
|
|
func (f *File) pwrite(b []byte, off int64) (n int, err error) {
|
2011-04-26 02:09:46 -06:00
|
|
|
f.l.Lock()
|
|
|
|
defer f.l.Unlock()
|
|
|
|
curoffset, e := syscall.Seek(f.fd, 0, 1)
|
2011-11-13 20:44:52 -07:00
|
|
|
if e != nil {
|
2011-04-26 02:09:46 -06:00
|
|
|
return 0, e
|
|
|
|
}
|
|
|
|
defer syscall.Seek(f.fd, curoffset, 0)
|
|
|
|
o := syscall.Overlapped{
|
|
|
|
OffsetHigh: uint32(off >> 32),
|
|
|
|
Offset: uint32(off),
|
|
|
|
}
|
|
|
|
var done uint32
|
2011-07-01 08:18:07 -06:00
|
|
|
e = syscall.WriteFile(syscall.Handle(f.fd), b, &done, &o)
|
2011-11-13 20:44:52 -07:00
|
|
|
if e != nil {
|
2011-04-26 02:09:46 -06:00
|
|
|
return 0, e
|
|
|
|
}
|
2011-11-13 20:44:52 -07:00
|
|
|
return int(done), nil
|
2011-04-26 02:09:46 -06:00
|
|
|
}
|
|
|
|
|
|
|
|
// seek sets the offset for the next Read or Write on file to offset, interpreted
|
|
|
|
// according to whence: 0 means relative to the origin of the file, 1 means
|
|
|
|
// relative to the current offset, and 2 means relative to the end.
|
|
|
|
// It returns the new offset and an error, if any.
|
2011-11-13 20:44:52 -07:00
|
|
|
func (f *File) seek(offset int64, whence int) (ret int64, err error) {
|
2011-04-26 02:09:46 -06:00
|
|
|
f.l.Lock()
|
|
|
|
defer f.l.Unlock()
|
|
|
|
return syscall.Seek(f.fd, offset, whence)
|
|
|
|
}
|
|
|
|
|
2010-04-27 00:17:14 -06:00
|
|
|
// Truncate changes the size of the named file.
|
|
|
|
// If the file is a symbolic link, it changes the size of the link's target.
|
2011-11-01 19:49:08 -06:00
|
|
|
func Truncate(name string, size int64) error {
|
2011-04-05 00:57:08 -06:00
|
|
|
f, e := OpenFile(name, O_WRONLY|O_CREATE, 0666)
|
2010-04-27 00:17:14 -06:00
|
|
|
if e != nil {
|
|
|
|
return e
|
|
|
|
}
|
|
|
|
defer f.Close()
|
|
|
|
e1 := f.Truncate(size)
|
|
|
|
if e1 != nil {
|
|
|
|
return e1
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
2011-07-01 08:18:07 -06:00
|
|
|
|
2011-12-19 17:52:20 -07:00
|
|
|
// Remove removes the named file or directory.
|
2012-02-08 22:55:36 -07:00
|
|
|
// If there is an error, it will be of type *PathError.
|
2011-12-19 17:52:20 -07:00
|
|
|
func Remove(name string) error {
|
syscall: return EINVAL when string arguments have NUL characters
Since NUL usually terminates strings in underlying syscalls, allowing
it when converting string arguments is a security risk, especially
when dealing with filenames. For example, a program might reason that
filename like "/root/..\x00/" is a subdirectory or "/root/" and allow
access to it, while underlying syscall will treat "\x00" as an end of
that string and the actual filename will be "/root/..", which might
be unexpected. Returning EINVAL when string arguments have NUL in
them makes sure this attack vector is unusable.
R=golang-dev, r, bradfitz, fullung, rsc, minux.ma
CC=golang-dev
https://golang.org/cl/6458050
2012-08-05 15:24:32 -06:00
|
|
|
p, e := syscall.UTF16PtrFromString(name)
|
|
|
|
if e != nil {
|
|
|
|
return &PathError{"remove", name, e}
|
|
|
|
}
|
2011-12-19 17:52:20 -07:00
|
|
|
|
|
|
|
// Go file interface forces us to know whether
|
|
|
|
// name is a file or directory. Try both.
|
syscall: return EINVAL when string arguments have NUL characters
Since NUL usually terminates strings in underlying syscalls, allowing
it when converting string arguments is a security risk, especially
when dealing with filenames. For example, a program might reason that
filename like "/root/..\x00/" is a subdirectory or "/root/" and allow
access to it, while underlying syscall will treat "\x00" as an end of
that string and the actual filename will be "/root/..", which might
be unexpected. Returning EINVAL when string arguments have NUL in
them makes sure this attack vector is unusable.
R=golang-dev, r, bradfitz, fullung, rsc, minux.ma
CC=golang-dev
https://golang.org/cl/6458050
2012-08-05 15:24:32 -06:00
|
|
|
e = syscall.DeleteFile(p)
|
2011-12-19 17:52:20 -07:00
|
|
|
if e == nil {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
e1 := syscall.RemoveDirectory(p)
|
|
|
|
if e1 == nil {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// Both failed: figure out which error to return.
|
|
|
|
if e1 != e {
|
|
|
|
a, e2 := syscall.GetFileAttributes(p)
|
|
|
|
if e2 != nil {
|
|
|
|
e = e2
|
|
|
|
} else {
|
|
|
|
if a&syscall.FILE_ATTRIBUTE_DIRECTORY != 0 {
|
|
|
|
e = e1
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return &PathError{"remove", name, e}
|
|
|
|
}
|
|
|
|
|
2011-07-01 08:18:07 -06:00
|
|
|
// Pipe returns a connected pair of Files; reads from r return bytes written to w.
|
2011-11-01 19:49:08 -06:00
|
|
|
// It returns the files and an error, if any.
|
|
|
|
func Pipe() (r *File, w *File, err error) {
|
2011-07-01 08:18:07 -06:00
|
|
|
var p [2]syscall.Handle
|
|
|
|
|
|
|
|
// See ../syscall/exec.go for description of lock.
|
|
|
|
syscall.ForkLock.RLock()
|
|
|
|
e := syscall.Pipe(p[0:])
|
2011-11-13 20:44:52 -07:00
|
|
|
if e != nil {
|
2011-07-01 08:18:07 -06:00
|
|
|
syscall.ForkLock.RUnlock()
|
|
|
|
return nil, nil, NewSyscallError("pipe", e)
|
|
|
|
}
|
|
|
|
syscall.CloseOnExec(p[0])
|
|
|
|
syscall.CloseOnExec(p[1])
|
|
|
|
syscall.ForkLock.RUnlock()
|
|
|
|
|
2012-02-10 14:47:19 -07:00
|
|
|
return NewFile(uintptr(p[0]), "|0"), NewFile(uintptr(p[1]), "|1"), nil
|
2011-07-01 08:18:07 -06:00
|
|
|
}
|
2011-11-14 12:06:50 -07:00
|
|
|
|
|
|
|
// TempDir returns the default directory to use for temporary files.
|
|
|
|
func TempDir() string {
|
|
|
|
const pathSep = '\\'
|
2011-11-15 10:48:22 -07:00
|
|
|
dirw := make([]uint16, syscall.MAX_PATH)
|
2011-11-14 12:06:50 -07:00
|
|
|
n, _ := syscall.GetTempPath(uint32(len(dirw)), &dirw[0])
|
|
|
|
if n > uint32(len(dirw)) {
|
|
|
|
dirw = make([]uint16, n)
|
|
|
|
n, _ = syscall.GetTempPath(uint32(len(dirw)), &dirw[0])
|
|
|
|
if n > uint32(len(dirw)) {
|
|
|
|
n = 0
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if n > 0 && dirw[n-1] == pathSep {
|
|
|
|
n--
|
|
|
|
}
|
|
|
|
return string(utf16.Decode(dirw[0:n]))
|
|
|
|
}
|