OSDN Git Service

add package
[bytom/vapor.git] / vendor / github.com / whyrusleeping / tar-utils / sanitize_windows.go
diff --git a/vendor/github.com/whyrusleeping/tar-utils/sanitize_windows.go b/vendor/github.com/whyrusleeping/tar-utils/sanitize_windows.go
new file mode 100644 (file)
index 0000000..36fbe52
--- /dev/null
@@ -0,0 +1,83 @@
+package tar
+
+import (
+       "fmt"
+       "net/url"
+       "os"
+       "path/filepath"
+       "regexp"
+       "strings"
+)
+
+//https://msdn.microsoft.com/en-us/library/windows/desktop/aa365247(v=vs.85).aspx
+var reservedNames = [...]string{"CON", "PRN", "AUX", "NUL", "COM1", "COM2", "COM3", "COM4", "COM5", "COM6", "COM7", "COM8", "COM9", "LPT1", "LPT2", "LPT3", "LPT4", "LPT5", "LPT6", "LPT7", "LPT8", "LPT9"}
+var reservedCharsRegex *regexp.Regexp
+
+const reservedCharsStr = `[<>:"\\|?*]`                    //NOTE: `/` is not included as it is our standard path separator
+const reservedNamesRegexFmt = `(?i)^(%s)(?: *%s*)?[^\w ]` // $reservedName, $reservedCharsStr
+
+func init() {
+       reservedCharsRegex = regexp.MustCompile(reservedCharsStr)
+}
+
+func isNullDevice(path string) bool {
+       if len(path) != 3 {
+               return false
+       }
+       if path[0]|0x20 != 'n' {
+               return false
+       }
+       if path[1]|0x20 != 'u' {
+               return false
+       }
+       if path[2]|0x20 != 'l' {
+               return false
+       }
+       return true
+}
+
+func sanitizePath(path string) (string, error) {
+       pathElements := strings.Split(path, "/")
+
+       //first pass: strip illegal tail & prefix reserved names `CON .` -> `_CON`
+       for pi := range pathElements {
+               pathElements[pi] = strings.TrimRight(pathElements[pi], ". ") //MSDN: Do not end a file or directory name with a space or a period
+
+               for _, rn := range reservedNames {
+                       re, _ := regexp.Compile(fmt.Sprintf(reservedNamesRegexFmt, rn, reservedCharsStr)) //no err, regex is a constant with guaranteed constant arguments
+                       if matched := re.MatchString(pathElements[pi]); matched {
+                               pathElements[pi] = "_" + pathElements[pi]
+                               break
+                       }
+               }
+       }
+
+       //second pass: scan and encode reserved characters ? -> %3F
+       res := strings.Join(pathElements, `/`) //intentionally avoiding [file]path.Clean() being called with Join(); we do our own filtering first
+       illegalIndices := reservedCharsRegex.FindAllStringIndex(res, -1)
+
+       if illegalIndices != nil {
+               var lastIndex int
+               var builder strings.Builder
+               allocAssist := (len(res) - len(illegalIndices)) + (len(illegalIndices) * 3) //3 = encoded length
+               builder.Grow(allocAssist)
+
+               for _, si := range illegalIndices {
+                       builder.WriteString(res[lastIndex:si[0]])              //append up to problem char
+                       builder.WriteString(url.QueryEscape(res[si[0]:si[1]])) //escape and append problem char
+                       lastIndex = si[1]
+               }
+               builder.WriteString(res[lastIndex:]) //append remainder
+               res = builder.String()
+       }
+
+       return filepath.FromSlash(res), nil
+}
+
+func platformLink(inLink Link) error {
+       if strings.HasPrefix(inLink.Target, string(os.PathSeparator)) || strings.HasPrefix(inLink.Target, "/") {
+               return fmt.Errorf("Link target %q is relative to drive root (forbidden)", inLink.Target)
+       }
+
+       return nil
+}