# std::fs::canonicalize returns UNC paths on Windows, and a lot of software doesn't support UNC paths #42869

Open
opened this Issue Jun 23, 2017 · 14 comments

Projects
None yet
8 participants
Contributor

### radix commented Jun 23, 2017

 Hi, I hope this is the right forum/format to register this problem, let me know if it's not. Today I tried to use std::fs::canonicalize to make a path absolute so that I could execute it with std::process::Command. canonicalize returns so-called "UNC paths", which look like this: \\?\C:\foo\bar\... (sometimes the ? can be a hostname). It turns out you can't pass a UNC path as the current directory when starting a process (i.e., Command::new(...).current_dir(unc_path)). In fact, a lot of other apps will blow up if you pass them a UNC path: for example, Microsoft's own cl.exe compiler doesn't support it: alexcrichton/cc-rs#169 It feels to me that maybe returning UNC paths from canonicalize is the wrong choice, given that they don't work in so many places. It'd probably be better to return a simple "absolute path", which begins with the drive letter, instead of returning a UNC path, and instead provide a separate function specifically for generating UNC paths for people who need them. Maybe if this is too much of an incompatible change, a new function for creating absolute paths should be added to std? I'd bet, however, that making the change to canonicalize itself would suddenly make more software suddenly start working rather than suddenly break.

Member

### retep998 commented Jun 23, 2017 • edited

 canonicalize simply asks the kernel to canonicalize the path, which it does and happens to return the canonical path as a root local device path. Root local device paths are capable of representing some paths which normal absolute paths are incapable of representing accurately (such as components being named ".." or "." or having "/" in them), along with the fact that they're the only way to call many system functions with paths longer than MAX_PATH (aside from being on some recent version of Windows 10 and having a certain registry key enabled). As a result having libstd automatically strip the prefix would definitely break some situations. However I'm definitely in favor of having more support in libstd for converting between these different kinds of paths so the user can easily turn a root local device path into an absolute path. I'd also love to have an fs::normalize which merely normalizes a possibly relative path into an absolute path without hitting the filesystem on Windows.

 oops, don't use canonicalize to get the path to webpack: rust-lang/ru… 
…st#42869
 eef2d0a 
Member

### retep998 commented Jun 24, 2017

 In reference to your commit which referenced this PR, normalization is not the same as merely joining the path onto the current directory due to drive relative paths being relative to the current directory on the given drive. For example given a drive relative path of C:foo, and an env::current_dir() of D:\bar, normalizing C:foo will have to get the current directory for C:\ and could end up being normalized to something radically different such as C:\i\dont\even\foo.
Contributor

### radix commented Jun 24, 2017

 thanks, @retep998 :) it's just a hacked-together build tool that probably will eventually be replaced with something else, and I didn't intend to notify this ticket about my commit. but I guess it goes to show that a good way to get an absolute path in std would be really helpful.
Contributor

### nagisa commented Jun 25, 2017 • edited

 Command::current_dir should be fixed. I doubt we will change canonlicalize. Note, the i-wrong tag is only for the Command::current_dir, not the canonicalize behaviour.

Member

### retep998 commented Jun 25, 2017

 Quick testing on Windows 10.0.15063 indicates that both SetCurrentDirectoryW and CreateProcessW are okay with a current directory starting with \\?\. They are not okay with a current directory that exceeds MAX_PATH regardless of \\?\. CreateProcessW is okay with the path to the process itself starting with \\?\ regardless of whether the first parameter is used. CreateProcessW is only okay with the path to the process exceeding MAX_PATH if it starts with \\?\ and is specified as the first parameter which Rust does not currently use. I tested std::process::Command::current_dir and it works as expected, accepting paths starting with \\?\ but rejecting any paths exceeding MAX_PATH.

Merged

Open

Contributor

### kornelski commented Sep 5, 2017

 Technically, AFAIK it is safe to strip the prefix in common simple cases (absolute path with a drive letter, no reserved names, shorter than max_path), and leave it otherwise. So I think there's no need to compromise on correctness as far as stdlib goes. The trade-off is between failing early and exposing other software that doesn't support UNC paths vs maximizing interoperability with non-UNC software. Usually I would prefer the "fail early" approach, so that limitations are quickly found and removed. However, Windows/DOS path handling has exceptionally long and messy history and decades of Microsoft bending over backwards to let old software not upgrade its path handling. If Microsoft can't push developers towards UNC, and fails to enforce this even in their own products, I have no hope of Rust shifting the Windows ecosystem to UNC. It will rather just frustrate Rust users and make Rust seem less reliable on Windows. So in this case I suggest trying to maximize interoperability instead, and canonicalize to regular paths whenever possible (using UNC only for paths that can't be handled otherwise). Also, careful stripping of the prefix done in stdlib will be much safer than other crates stripping it unconditionally (because realistically whenever someone runs into this problem, they'll just strip it unconditionally)

Merged

### ofek commented Oct 9, 2017

 @pornel I completely agree. The current behavior is unexpected in my opinion.

Closed

### danielpclark commented Oct 10, 2017 • edited

 I hope this is helpful… According to Microsoft: Note File I/O functions in the Windows API convert / to \ as part of converting the name to an NT-style name, except when using the \\?\ prefix as detailed in the following sections. And the Ruby language uses forward slashes for File paths and that works on Windows.
Contributor

### kornelski commented Nov 22, 2017

 I've looked at this problem in detail. There are a few rules which need to be checked to safely strip the UNC prefix. It can be implemented as a simple state machine. I've implemented that using public APIs, but because OsStr is opaque it's not nearly as nice as stdlib's implementation could have been: https://gitlab.com/kornelski/dunce So I'm still hoping canonicalize would do it automatically, because if it's done only for legacy-compatible paths there's no downside: all paths work for UNC-aware programs, and all paths that can work for legacy programs work too.

Merged

### mykmelez commented May 9, 2018

 Another example of this issue that I encountered in alexcrichton/cargo-vendor#71: url::URL.to_file_path() returns a non-UNC path (even if the URL was initialized with a UNC path). And std::path::Path.starts_with() doesn't normalize its arguments to UNC paths. So calling to_file_path() on a file: URL and then comparing it to the output of canonicalize() via starts_with() always returns false, even if the two paths represent the same resource: extern crate url; use std::path::Path; use url::Url; fn main() { // Path.canonicalize() returns a UNC path. let unc_path_buf = Path::new(r"C:\Windows\System").canonicalize().expect("path"); let unc_path = unc_path_buf.as_path(); // Meanwhile, Url.to_file_path() returns a non-UNC path, // even when initialized from a UNC path. let file_url = Url::from_file_path(unc_path).expect("url"); let abs_path_buf = file_url.to_file_path().expect("path"); let abs_path = abs_path_buf.as_path(); // unc_path and abs_path refer to the same resource, // and they both "start with" themselves. assert!(unc_path.starts_with(unc_path)); assert!(abs_path.starts_with(abs_path)); // But they don't "start with" each other, so these fail. assert!(unc_path.starts_with(abs_path)); assert!(abs_path.starts_with(unc_path)); } Arguably, to_file_path() should return a UNC path, at least when initialized with one. And perhaps starts_with() should normalize its arguments (or perhaps clarify that it compares paths, not the resources to which they refer, and thus does no normalization). Also, the mitigation for consumers of this API is straightforward: canonicalize() all paths you compare if you do so to any of them. So maybe the current behavior is reasonable. Nevertheless, it does feel like something of a footgun, so it's worth at least documenting how it differs from that of some other APIs on Windows.

Open

Member

### retep998 commented May 9, 2018 • edited

 comparing it to the output of canonicalize() via starts_with() always returns false, even if the two paths represent the same resource: Comparing canonical paths is a footgun in general because it is the wrong thing to do! Things like hard links and so on mean that such comparisons will never be entirely accurate. Please don't abuse canonicalization for this use case. If you want to tell whether two paths point to the same file, compare their file IDs! That's what same-file does and it works great!
Contributor

### kornelski commented May 9, 2018

 but starts_with is not for is-file-a-file comparison, but is-file-in-a-directory check. There are no hardlinks involved (and AFAIK apart from private implementation detail of macOS time machine, no OS supports directory hardlinks).
Member

### retep998 commented May 9, 2018

 There are more ways than just \\?\C:\ and C:\ to represent the same path, so unfortunately any sort of file in directory check is a hard problem. For example, paths can refer to drives via names other than drive letters.
Contributor

### nagisa commented May 9, 2018

 bind mounts are equivalent to directory hardlinks. … On Wed, May 9, 2018, 16:20 Kornel ***@***.***> wrote: but starts_with is not for is-file-a-file comparison, but is-file-in-a-directory check. There are no hardlinks involved (and AFAIK apart from private implementation detail of macOS time machine, no OS supports directory hardlinks). — You are receiving this because you commented. Reply to this email directly, view it on GitHub <#42869 (comment)>, or mute the thread .

Closed

### alexheretic added a commit to alexheretic/rls that referenced this issue May 25, 2018

 Workaround UNC path fs::canonicalize return 
Reported in rust-lang#838
Also see rust-lang/rust#42869
 e653aa7 

Merged

### alexheretic added a commit to alexheretic/rls that referenced this issue May 28, 2018

 Workaround UNC path fs::canonicalize return 
Reported in rust-lang#838
Also see rust-lang/rust#42869
 ea18376 

Open

Merged

Merged

Merged