Skip to content

Commit c3a0a37

Browse files
zx2c4thaJeztah
authored andcommitted
Use newer x/sys/windows SecurityAttributes struct
This struct now has a properly typed member, so use the properly typed functions with it. Also update the vendor directory and hope nothing explodes. Signed-off-by: Jason A. Donenfeld <[email protected]> Signed-off-by: Sebastiaan van Stijn <[email protected]>
1 parent 4e0836f commit c3a0a37

File tree

3 files changed

+6
-21
lines changed

3 files changed

+6
-21
lines changed

builder/dockerfile/internals_windows.go

+2-15
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,6 @@ import (
1212
"github.com/docker/docker/pkg/idtools"
1313
"github.com/docker/docker/pkg/jsonmessage"
1414
"github.com/docker/docker/pkg/system"
15-
"github.com/pkg/errors"
1615
"golang.org/x/sys/windows"
1716
)
1817

@@ -31,13 +30,7 @@ func getAccountIdentity(builder *Builder, accountName string, ctrRootPath string
3130
sid, err := windows.StringToSid(accountName)
3231

3332
if err == nil {
34-
accountSid, err := sid.String()
35-
36-
if err != nil {
37-
return idtools.Identity{SID: ""}, errors.Wrapf(err, "error converting SID to string")
38-
}
39-
40-
return idtools.Identity{SID: accountSid}, nil
33+
return idtools.Identity{SID: sid.String()}, nil
4134
}
4235
}
4336

@@ -46,13 +39,7 @@ func getAccountIdentity(builder *Builder, accountName string, ctrRootPath string
4639

4740
// If this is a SID that is built-in and hence the same across all systems then use that.
4841
if err == nil && (accType == windows.SidTypeAlias || accType == windows.SidTypeWellKnownGroup) {
49-
accountSid, err := sid.String()
50-
51-
if err != nil {
52-
return idtools.Identity{SID: ""}, errors.Wrapf(err, "error converting SID to string")
53-
}
54-
55-
return idtools.Identity{SID: accountSid}, nil
42+
return idtools.Identity{SID: sid.String()}, nil
5643
}
5744

5845
// Check if the account name is one unique to containers.

daemon/debugtrap_windows.go

+2-3
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,6 @@ import (
55
"os"
66
"unsafe"
77

8-
winio "github.com/Microsoft/go-winio"
98
"github.com/docker/docker/pkg/signal"
109
"github.com/sirupsen/logrus"
1110
"golang.org/x/sys/windows"
@@ -17,15 +16,15 @@ func (d *Daemon) setupDumpStackTrap(root string) {
1716
// signaled. ACL'd to builtin administrators and local system
1817
event := "Global\\stackdump-" + fmt.Sprint(os.Getpid())
1918
ev, _ := windows.UTF16PtrFromString(event)
20-
sd, err := winio.SddlToSecurityDescriptor("D:P(A;;GA;;;BA)(A;;GA;;;SY)")
19+
sd, err := windows.SecurityDescriptorFromString("D:P(A;;GA;;;BA)(A;;GA;;;SY)")
2120
if err != nil {
2221
logrus.Errorf("failed to get security descriptor for debug stackdump event %s: %s", event, err.Error())
2322
return
2423
}
2524
var sa windows.SecurityAttributes
2625
sa.Length = uint32(unsafe.Sizeof(sa))
2726
sa.InheritHandle = 1
28-
sa.SecurityDescriptor = uintptr(unsafe.Pointer(&sd[0]))
27+
sa.SecurityDescriptor = sd
2928
h, err := windows.CreateEvent(&sa, 0, 0, ev)
3029
if h == 0 || err != nil {
3130
logrus.Errorf("failed to create debug stackdump event %s: %s", event, err.Error())

pkg/system/filesys_windows.go

+2-3
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,6 @@ import (
1111
"time"
1212
"unsafe"
1313

14-
winio "github.com/Microsoft/go-winio"
1514
"golang.org/x/sys/windows"
1615
)
1716

@@ -103,13 +102,13 @@ func mkdirall(path string, applyACL bool, sddl string) error {
103102
// and Local System.
104103
func mkdirWithACL(name string, sddl string) error {
105104
sa := windows.SecurityAttributes{Length: 0}
106-
sd, err := winio.SddlToSecurityDescriptor(sddl)
105+
sd, err := windows.SecurityDescriptorFromString(sddl)
107106
if err != nil {
108107
return &os.PathError{Op: "mkdir", Path: name, Err: err}
109108
}
110109
sa.Length = uint32(unsafe.Sizeof(sa))
111110
sa.InheritHandle = 1
112-
sa.SecurityDescriptor = uintptr(unsafe.Pointer(&sd[0]))
111+
sa.SecurityDescriptor = sd
113112

114113
namep, err := windows.UTF16PtrFromString(name)
115114
if err != nil {

0 commit comments

Comments
 (0)