Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Fix compile error on windows #172

Closed

Conversation

syokensyo
Copy link
Contributor

PR Content Desc

  • Compile on Windows will fail because of file capabilities feature introduced, even thought rpm is specific for Linux, but there are may be some cross platform tools build on top of this lib(such as my developing tools for rpm package info read and display)

📜 Checklist

  • Commits are cleanly separated and have useful messages
  • A changelog entry or entries has been added to CHANGELOG.md
  • Documentation is thorough
  • Test coverage is excellent and passes
  • Works when tests are run --all-features enabled

@dralley
Copy link
Collaborator

dralley commented Oct 9, 2023

@syokensyo Do you plan to undraft this?

@syokensyo
Copy link
Contributor Author

@syokensyo Do you plan to undraft this?

There are some file conflicts, I'll resolve it first and then submit it again.

@syokensyo syokensyo marked this pull request as ready for review October 9, 2023 06:16
@dralley
Copy link
Collaborator

dralley commented Oct 9, 2023

@syokensyo Could you rebase and squash the commits?

@dralley
Copy link
Collaborator

dralley commented Oct 10, 2023

What do you think about simply disabling the validation on Windows rather than removing the whole feature?

edit: nvm, I suppose we couldn't do that without changing the representation from FileCaps to a String.

@syokensyo
Copy link
Contributor Author

Yes, and capctl is platform specific, we also need some changes on it to make it work on Windows, I think that beyond the scope.

@dralley
Copy link
Collaborator

dralley commented Oct 21, 2023

Ideally, the functionality for parsing capability info could be split off of the rest of the capctl crate, whether by feature or by splitting the actual crate, and then we could use that without pulling in the unix-specific bits. I'm not 100% certain but from a brief skim it looks possible. But, like you said, out of scope.

I'm thinking it is perhaps better to just store a string, and do validation via capctl on unix platforms where it is possible. I don't see a great reason to lock off the ability to set caps entirely.

@dralley
Copy link
Collaborator

dralley commented Oct 28, 2023

I've filed cptpcrd/capctl#5 (comment)

@dralley
Copy link
Collaborator

dralley commented Dec 5, 2023

No longer an issue

@dralley dralley closed this Dec 5, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants