[PATCH 1/2] Treat Windows Store's "app execution aliases" as symbolic links
Mon Mar 15 19:04:23 GMT 2021
Am 15.03.2021 um 04:19 schrieb Johannes Schindelin via Cygwin-patches:
> Hi Joe,
> On Sat, 13 Mar 2021, Joe Lowe wrote:
>> I agree on the usefulness to the user of showing appexec target executable as
>> symlink target. But I am uncertain about the effect on code.
> Maybe. But I am concerned about the effect of not being able to do
> anything useful with app execution aliases in the first place.
That argument might hold more sway if Windows itself didn't quite so
completely hide that information from users, too.
I found only one Windows native tool that will even show _any_ kind of
information about these reparse points: fsutil. That is a) only
available as part of the highly optional WSL feature and b) only gives
you a hexdump of the actual data, without any meaningful interpretation.
For something that Windows itself gives the "no user servicable parts
inside" treatment to the extent it does for these reparse points, I
rather doubt that Cygwin users really _need_ to see it.
More information about the Cygwin-patches