3405691582 03fe46f43b
OpenBSD support. (#1126)
* Advise porter on where to make necessary change.

In #1075 the change was already made for BSD (thank you!); my working
edit had this guidance to ensure future porters get an error directing
them where to make a necessary change.

Otherwise, the FoundationEssentials build will fail and complain these
variables are not defined but not have guidance as to where they are
sourced from.

* OpenBSD does not support extended attributes.

* OpenBSD does not have secure_getenv.

* Remaining OpenBSD changes.

* OpenBSD also needs `pthread_mutex_t?`.

* Originally I followed Darwin's check with `d_namlen`, but this should
  work too.

* Correct statvfs type casts for OpenBSD.

On OpenBSD, fsblkcnt_t -- the type of f_blocks -- is a UInt64; therefore,
so must `blockSize` be.

Ultimately, both sides of the `totalSizeBytes` multiplication should
probably be type cast for all platforms, but that's a more significant
functional change for another time.

* Default activeProcessorCount to 1, not 0.

After a rather tedious debugging session trying to figure out why
swiftpm-bootstrap appeared to be deadlocked, this turned out to be the
culprit. Perhaps this should be #error instead, but for now, set a
sensible default.

* Use sysconf for activeProcessorCount.

This is what Dispatch does in some places for OpenBSD anyway, so do
likewise here.
2025-04-07 10:46:18 -07:00

298 lines
13 KiB
Swift

//===----------------------------------------------------------------------===//
//
// This source file is part of the Swift.org open source project
//
// Copyright (c) 2023 Apple Inc. and the Swift project authors
// Licensed under Apache License v2.0 with Runtime Library Exception
//
// See https://swift.org/LICENSE.txt for license information
// See https://swift.org/CONTRIBUTORS.txt for the list of Swift project authors
//
//===----------------------------------------------------------------------===//
#if FOUNDATION_FRAMEWORK
internal import XPCPrivate
internal import _ForSwiftFoundation
internal import Foundation_Private.NSFileManager
internal import DarwinPrivate
#if os(macOS)
internal import QuarantinePrivate
#endif
#endif
#if canImport(Darwin)
import Darwin
#elseif canImport(Android)
@preconcurrency import Android
#elseif canImport(Glibc)
@preconcurrency import Glibc
internal import _FoundationCShims
#elseif canImport(Musl)
@preconcurrency import Musl
internal import _FoundationCShims
#elseif os(Windows)
import CRT
import WinSDK
#elseif os(WASI)
@preconcurrency import WASILibc
#endif
#if os(Windows)
extension FILETIME {
package var timeIntervalSince1970: TimeInterval {
var count: Double = Double((UInt64(self.dwHighDateTime) << 32) | UInt64(self.dwLowDateTime))
count /= 1e7 // 100 nanoseconds to seconds
return count - Date.timeIntervalBetween1601AndReferenceDate + Date.timeIntervalBetween1970AndReferenceDate
}
}
#endif
#if !os(Windows)
extension stat {
var isDirectory: Bool {
(mode_t(self.st_mode) & S_IFMT) == S_IFDIR
}
var isRegular: Bool {
(mode_t(self.st_mode) & S_IFMT) == S_IFREG
}
var isSymbolicLink: Bool {
(mode_t(self.st_mode) & S_IFMT) == S_IFLNK
}
var isSpecial: Bool {
let type = mode_t(self.st_mode) & S_IFMT
return type == S_IFBLK || type == S_IFCHR
}
}
#endif
#if FOUNDATION_FRAMEWORK && os(macOS)
extension URLResourceKey {
static var _finderInfoKey: Self { URLResourceKey("_NSURLFinderInfoKey") }
}
#endif
extension _FileManagerImpl {
#if os(macOS) && FOUNDATION_FRAMEWORK
private struct _HFSFinderInfo {
var fileInfo: FndrFileInfo
var extendedFileInfo: FndrExtendedFileInfo
}
#endif
static func _catInfo(for url: URL, statInfo: stat, into attributes: inout [FileAttributeKey : Any]) throws {
#if FOUNDATION_FRAMEWORK
// Get the info we care about for the file (creatorCode, fileTypeCode, extensionHidden, creationDate, fileBusy) and set validFields for each of them.
#if os(macOS)
let keys: Set<URLResourceKey> = [.hasHiddenExtensionKey, .creationDateKey, ._finderInfoKey]
#else
let keys: Set<URLResourceKey> = [.hasHiddenExtensionKey, .creationDateKey]
#endif
let values = try url.resourceValues(forKeys: keys)
#if os(macOS)
if let finderInfoData = values.allValues[._finderInfoKey] as? Data {
let finderInfo = finderInfoData.withUnsafeBytes({ $0.load(as: _HFSFinderInfo.self) })
// Record the creator and file type of a file.
if statInfo.isRegular {
attributes[.hfsCreatorCode] = _writeFileAttributePrimitive(finderInfo.fileInfo.fdCreator, as: UInt.self)
attributes[.hfsTypeCode] = _writeFileAttributePrimitive(finderInfo.fileInfo.fdType, as: UInt.self)
} else if statInfo.isSymbolicLink {
attributes[.hfsCreatorCode] = _writeFileAttributePrimitive(kSymLinkCreator, as: UInt.self)
attributes[.hfsTypeCode] = _writeFileAttributePrimitive(kSymLinkFileType, as: UInt.self)
}
// To preserve historical behavior, only set this attribute if the value is true
let isBusy = (finderInfo.extendedFileInfo.extended_flags & 0x80 /*kExtendedFlagObjectIsBusy*/) != 0
if isBusy {
attributes[.busy] = _writeFileAttributePrimitive(true)
}
}
#endif
// Record whether or not the file or directory's name extension is hidden.
if let value = values.hasHiddenExtension {
attributes[.extensionHidden] = _writeFileAttributePrimitive(value)
}
// Record the creation date of the object.
attributes[.creationDate] = values.creationDate
#else
return // TODO: implement fetching cat info attributes in swift-foundation
#endif
}
private static let _catInfoKeys: [FileAttributeKey] = [.hfsCreatorCode, .hfsTypeCode, .busy, .extensionHidden, .creationDate]
private static let _swiftFoundationUnsupportedKeys: [FileAttributeKey] = [.hfsCreatorCode, .hfsTypeCode, .busy, .extensionHidden]
static func _setCatInfoAttributes(_ attributes: [FileAttributeKey : Any], path: String) throws {
let hasRelevantKeys = attributes.keys.contains(where: { _catInfoKeys.contains($0) })
guard hasRelevantKeys else { return }
#if !FOUNDATION_FRAMEWORK
// Exclude some attributes (like .creationDate) from this check since they are unconditionally, implicitly included in `attributesForItem(atPath:)` results
if attributes.keys.contains(where: { _swiftFoundationUnsupportedKeys.contains($0) }) {
throw CocoaError.errorWithFilePath(.featureUnsupported, path)
} else {
return // TODO: support relevant cat info keys in swift-foundation
}
#else
// -setAttributes:ofItemAtPath:error: follows symlinks (<rdar://5815920>), but the NSURL resource value API doesn't, so we have to manually resolve the symlink.
// We lie to fileURLWithPath:isDirectory: to avoid the extra stat. Since this URL isn't used as a base URL for another URL, it shouldn't make any difference.
var url = URL(fileURLWithPath: path.resolvingSymlinksInPath, isDirectory: false)
var urlAttributes: [URLResourceKey : Any] = [:]
#if os(macOS)
let creatorCode = _readFileAttributePrimitive(attributes[.hfsCreatorCode], as: UInt32.self)
let fileTypeCode = _readFileAttributePrimitive(attributes[.hfsTypeCode], as: UInt32.self)
let fileBusy = _readFileAttributePrimitive(attributes[.busy], as: Bool.self)
if creatorCode != nil || fileTypeCode != nil || fileBusy != nil {
let finderInfoData = try url.resourceValues(forKeys: [._finderInfoKey]).allValues[._finderInfoKey] as? Data
if var finderInfo = finderInfoData?.withUnsafeBytes({ $0.load(as: _HFSFinderInfo.self) }) {
if let creatorCode {
finderInfo.fileInfo.fdCreator = creatorCode
}
if let fileTypeCode {
finderInfo.fileInfo.fdType = fileTypeCode
}
if let fileBusy {
if fileBusy {
finderInfo.extendedFileInfo.extended_flags |= 0x0080 // kExtendedFlagObjectIsBusy
} else {
finderInfo.extendedFileInfo.extended_flags &= ~0x0080 // kExtendedFlagObjectIsBusy
}
}
withUnsafeBytes(of: &finderInfo) { buffer in
urlAttributes[._finderInfoKey] = Data(buffer)
}
}
}
#endif
if let extensionHidden = attributes[.extensionHidden] {
urlAttributes[.hasHiddenExtensionKey] = extensionHidden
}
if let creationDate = attributes[.creationDate] {
urlAttributes[.creationDateKey] = creationDate
}
try url.setResourceValues(URLResourceValues(values: urlAttributes))
#endif
}
#if !os(Windows) && !os(WASI) && !os(OpenBSD)
static func _setAttribute(_ key: UnsafePointer<CChar>, value: Data, at path: UnsafePointer<CChar>, followSymLinks: Bool) throws {
try value.withUnsafeBytes { buffer in
#if canImport(Darwin)
let result = setxattr(path, key, buffer.baseAddress!, buffer.count, 0, followSymLinks ? 0 : XATTR_NOFOLLOW)
#elseif os(FreeBSD)
var result: Int32
if followSymLinks {
result = Int32(extattr_set_file(path, EXTATTR_NAMESPACE_USER, key, buffer.baseAddress!, buffer.count))
} else {
result = Int32(extattr_set_link(path, EXTATTR_NAMESPACE_USER, key, buffer.baseAddress!, buffer.count))
}
#else
var result: Int32
if followSymLinks {
result = lsetxattr(path, key, buffer.baseAddress!, buffer.count, 0)
} else {
result = setxattr(path, key, buffer.baseAddress!, buffer.count, 0)
}
#endif
#if os(macOS) && FOUNDATION_FRAMEWORK
// if setxaddr failed and its a permission error for a sandbox app trying to set quaratine attribute, ignore it since its not
// permitted, the attribute will be put on the file by the quaratine MAC hook
if result == -1 && errno == EPERM && _xpc_runtime_is_app_sandboxed() && strcmp(key, "com.apple.quarantine") == 0 {
return
}
#endif
if result == -1 {
throw CocoaError.errorWithFilePath(String(cString: path), errno: errno, reading: false)
}
}
}
static func _setAttributes(_ attributes: [String : Data], at path: UnsafePointer<CChar>, followSymLinks: Bool) throws {
for (key, value) in attributes {
try key.withCString {
try Self._setAttribute($0, value: value, at: path, followSymLinks: followSymLinks)
}
}
}
#endif
#if FOUNDATION_FRAMEWORK
static func _fileProtectionValueForPath(_ fileSystemRepresentation: UnsafePointer<CChar>) -> Int32? {
var attrList = attrlist()
attrList.bitmapcount = u_short(ATTR_BIT_MAP_COUNT)
attrList.commonattr = attrgroup_t(ATTR_CMN_DATA_PROTECT_FLAGS)
typealias Buffer = (length: UInt32, class: Int32)
var attributesBuffer: Buffer = (0, 0)
let result = withUnsafeMutableBytes(of: &attributesBuffer) { buffer in
getattrlist(fileSystemRepresentation, &attrList, buffer.baseAddress!, buffer.count, .init(FSOPT_NOFOLLOW))
}
guard result == 0 else {
return nil
}
return attributesBuffer.class
}
static func _setFileProtectionValueForPath(_ path: String, _ fileSystemRepresentation: UnsafePointer<CChar>, newValue: Int32) throws {
// It's probably better to do a single getattrlist than and open()/fcntl()/close(), so skip the work in case the value is already set correctly.
guard Self._fileProtectionValueForPath(fileSystemRepresentation) != newValue else {
return
}
var fd = open(fileSystemRepresentation, O_WRONLY)
var dir: UnsafeMutablePointer<DIR>?
defer {
// For opendir(), the DIR structure owns the fd. Don't attempt to close it ourselves. 14323986.
if let dir {
closedir(dir)
} else if fd >= 0 {
close(fd)
}
}
// If open() failed because the file is a directory, try again using opendir/dirfd.
if fd < 0 && errno == EISDIR {
dir = opendir(fileSystemRepresentation)
if let dir {
fd = dirfd(dir)
}
}
if fd >= 0 {
if fcntl(fd, F_SETPROTECTIONCLASS, newValue) != 0 {
guard errno == ENOTSUP else {
throw CocoaError.errorWithFilePath(path, errno: errno, reading: true)
}
// If we fail with ENOTSUP because the volume doesn't support file protection, then no-op.
var s = statfs()
guard fstatfs(fd, &s) != 0 || s.f_flags & UInt32(MNT_CPROTECT) == 0 else {
throw CocoaError.errorWithFilePath(path, errno: ENOTSUP, reading: true)
}
}
} else if errno == EACCES {
// We don't have any alternative API for setting the protection class, so we must open() for fnctl(). If we don't have write permissions, the open() will fail with EACCES. None of the other NSFileManager attributes fail in this case, so it is unreasonable (and binary incompatible) to cause the NSFileManager methods to fail when this happens. <rdar://7796261>
// This results in silent failures, but we simply don't have any other alternatives. <rdar://7837261> was a request for a path-based API with similar semantics to chmod, etc., but the OS team decided not to fix it.
return
} else {
throw CocoaError.errorWithFilePath(path, errno: errno, reading: true)
}
}
#endif
}
extension FileManager {
@nonobjc
var safeDelegate: FileManagerDelegate? {
#if FOUNDATION_FRAMEWORK
self._safeDelegate()
#else
self.delegate
#endif
}
}