[PATCH 1/2] Treat Windows Store's "app execution aliases" as symbolic links

Hans-Bernhard Bröker HBBroeker@t-online.de
Mon Mar 15 19:04:23 GMT 2021

Am 15.03.2021 um 04:19 schrieb Johannes Schindelin via Cygwin-patches:
> Hi Joe,
> On Sat, 13 Mar 2021, Joe Lowe wrote:
>> I agree on the usefulness to the user of showing appexec target executable as
>> symlink target. But I am uncertain about the effect on code.
> Maybe. But I am concerned about the effect of not being able to do
> anything useful with app execution aliases in the first place. 

That argument might hold more sway if Windows itself didn't quite so 
completely hide that information from users, too.

I found only one Windows native tool that will even show _any_ kind of 
information about these reparse points: fsutil.  That is a) only 
available as part of the highly optional WSL feature and b) only gives 
you a hexdump of the actual data, without any meaningful interpretation.

For something that Windows itself gives the "no user servicable parts 
inside" treatment to the extent it does for these reparse points, I 
rather doubt that Cygwin users really _need_ to see it.

More information about the Cygwin-patches mailing list