"fmt"
"io/fs"
"os"
+ slashpath "path"
"path/filepath"
+ "runtime"
"ruderich.org/simon/safcm"
)
basePath := filepath.Join(group, "files")
const errMsg = `
+
The actual permissions and user/group of files and directories are not used
(except for +x on files). 0644/0755 and current remote user/group is used per
default. Apply different file permissions via permissions.yaml. To prevent
via "safcm fixperms".
`
+ // No permission checks on windows which doesn't track them.
+ windows := runtime.GOOS == "windows"
+
files := make(map[string]*safcm.File)
err := filepath.WalkDir(basePath, func(path string, d fs.DirEntry,
err error) error {
// permissions they could assume that these permissions are
// respected. This is not the case.
if typ == 0 /* regular file */ {
+ if windows {
+ perm = 0644
+ // 0755 must be set via permissions.yaml if
+ // windows is used
+ }
if perm != 0644 && perm != 0755 {
return fmt.Errorf(
"%q: invalid permissions %#o%s",
return err
}
} else if typ == fs.ModeDir {
+ if windows {
+ perm = 0755
+ }
if perm != 0755 {
return fmt.Errorf(
"%q: invalid permissions %#o%s",
return err
}
data = []byte(x)
+ perm |= 0777 // see cmd/safcm-remote/sync/files.go
} else {
return fmt.Errorf("%q: file type not supported", path)
}
- // Convert to absolute path as used on the target host
+ // Convert to absolute and slash-separated path as used on the
+ // target host
x, err := filepath.Rel(basePath, path)
if err != nil {
return err
}
- x = filepath.Join("/", x)
+ x = slashpath.Join("/", filepath.ToSlash(x))
files[x] = &safcm.File{
Path: x,