-
-
Notifications
You must be signed in to change notification settings - Fork 31.5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Handle /:/
for ntpath.isabs
#117352
Comments
Returning On Windows, "/:foo" is a rooted path, but it's not an absolute path. When a rooted path is opened directly, it's relative to the drive or UNC share of the current working directory. When a rooted path is the target path of a symlink, it's relative to the drive or UNC share of the opened path of the symlink. Note that "/:foo" also happens to be invalid in practice, because ":" is reserved by Microsoft's filesystems as an illegal filename character. NTFS and ReFS use colon as the separator in file stream names (e.g. "filename:streamname:streamtype", such as "spam:eggs:$DATA"). |
Yeah, you're right. But, for this exact reason |
|
Eh, why do the other functions need to handle it correctly then? If you follow the same logic, these wouldn't have been accepted. |
It's possible that a non-Microsoft filesystem on Windows might allow creating a directory named ":", but that's not explicitly supported by Microsoft. Still, I'd prefer to keep the implementation generic and in principle behave the same as checking for a drive and root via >>> os.path.splitroot('/:/foo')
('', '/', ':/foo') Also, >>> pathlib.Path('/:/foo').drive
''
>>> pathlib.Path('/:/foo').root
'\\' But >>> pathlib.Path('/:/foo').is_absolute()
True |
Fun fact: You can actually create a directory named ":" on a USB stick on Linux, but Windows treats that as |
I guess you mean creating a directory named ":" in a Microsoft filesystem type (e.g. FAT32, NTFS), assuming the Linux driver is configured to allow it. In that case, maybe the driver on Linux is what translates the reserved character to the private use area, or maybe it's done at access time by the filesystem driver on Windows, but mostly likely not by the system I/O manager (i.e. system The example I had in mind is the VirtualBox shared-folder filesystem, which is lenient about accessing names in the host filesystem (e.g. a Linux host running a Windows guest). But the shared-folder filesystem driver is also broken in many cases. For example, it can open a directory named ":" to set it as the current working directory of a process, but trying to open files in the directory causes the driver to fail with |
I can confirm it's the Linux driver: |
What other functions do you mean? It's possible there was more logic at play there than what is guiding this one, or it's also possible that they were merged by different committers following different logic. Right now, I'm with @barneygale. Invalid paths are allowed to have invalid behaviour. |
Probably just |
I got an upvote from Barney that it would be better to make The choice made here should be consistent with whether nineteendo's other issue about calling |
Okay then, I'll phrase my preference as:
This means that if we had an This also means we can wontfix |
I probably should've mentioned this sooner, but this also breaks the fallback implementation for >>> import ntpath
>>> ntpath.abspath("/:/foo"), ntpath._abspath_fallback("/:/foo")
('C:\\:\\foo', '/:\\foo') Ideally these should behave the same, and I think here fixing |
I don't feel strongly about this, but for me the garbage-in-garbage-out principal applies to |
OK, I'm closing this. If you change your mind this can be re-opened. |
Bug report
Bug description:
Expected:
False
, as/:/foo
is relative to the drive or UNC share of the current working directory.CPython versions tested on:
CPython main branch
Operating systems tested on:
Windows
Linked PRs
/:/
forntpath.isabs
#117362The text was updated successfully, but these errors were encountered: