diff --git a/src/io/fs/sub.go b/src/io/fs/sub.go index 9999e63b26..70ac623077 100644 --- a/src/io/fs/sub.go +++ b/src/io/fs/sub.go @@ -33,7 +33,7 @@ type SubFS interface { // chroot-style security mechanism, and Sub does not change that fact. func Sub(fsys FS, dir string) (FS, error) { if !ValidPath(dir) { - return nil, &PathError{Op: "sub", Path: dir, Err: errors.New("invalid name")} + return nil, &PathError{Op: "sub", Path: dir, Err: ErrInvalid} } if dir == "." { return fsys, nil @@ -52,7 +52,7 @@ type subFS struct { // fullName maps name to the fully-qualified name dir/name. func (f *subFS) fullName(op string, name string) (string, error) { if !ValidPath(name) { - return "", &PathError{Op: op, Path: name, Err: errors.New("invalid name")} + return "", &PathError{Op: op, Path: name, Err: ErrInvalid} } return path.Join(f.dir, name), nil } diff --git a/src/io/fs/sub_test.go b/src/io/fs/sub_test.go index 451b0efb02..c0bb2fd5b8 100644 --- a/src/io/fs/sub_test.go +++ b/src/io/fs/sub_test.go @@ -5,6 +5,7 @@ package fs_test import ( + "errors" . "io/fs" "testing" ) @@ -54,4 +55,9 @@ func TestSub(t *testing.T) { if pe.Path != "nonexist" { t.Fatalf("Open(nonexist): err.Path = %q, want %q", pe.Path, "nonexist") } + + _, err = sub.Open("./") + if !errors.Is(err, ErrInvalid) { + t.Fatalf("Open(./): error is %v, want %v", err, ErrInvalid) + } }