mirror of
https://github.com/adnanh/webhook.git
synced 2025-05-10 07:34:54 +00:00
* feat: add ability to listen on unix socket/named pipe Add a -socket option that configures the server to listen on a Unix-domain socket or Windows named pipe instead of a TCP port. This allows webhook to be used behind a reverse proxy on multi-tenant shared hosting without the need to choose (and the permission to bind to) a free port number. On Windows, -socket is expected to be a named pipe such as \\.\pipe\webhook, and the code uses https://github.com/microsoft/go-winio to bind the listening socket. On other platforms, -socket is the path to a Unix domain socket such as /tmp/webhook.sock, or an abstract socket name starting with @, bound using the regular net.Listen function with the "network" parameter set to "unix". Note: this pushes our minimum Go version up to 1.21 as that is what go-winio requires, but that is already the minimum version against which we are testing in the CI matrix. * tests: add test for the -socket option Refactored webhook_test so that the test HTTP requests are made using an explicitly-provided http.Client, so we can run at least one test with the server bound to a socket instead of a port number, using an http.Client whose transport has been configured with a suitable Unix-domain or Windows named pipe dialer function. * tests: use GOROOT to find go command This should ensure that, even if a developer or CI server has multiple versions of go installed, the version used to build the tools under test will be the same version that is running the test harness. * fix: clean up Unix socket file before exit If webhook is restarted with the same settings but the socket file has not been deleted, webhook will be unable to bind and will exit with an error. * docs: add -socket option to documentation * docs: add a note about reverse proxies - README mentions the idea of using webhook behind a reverse proxy, including with the -socket flag - added a note in Hook-Rules that the ip-whitelist rule type does not work as expected behind a reverse proxy, and you should configure IP restrictions at the proxy level instead
586 lines
16 KiB
Go
586 lines
16 KiB
Go
//go:build windows
|
|
// +build windows
|
|
|
|
package winio
|
|
|
|
import (
|
|
"context"
|
|
"errors"
|
|
"fmt"
|
|
"io"
|
|
"net"
|
|
"os"
|
|
"runtime"
|
|
"time"
|
|
"unsafe"
|
|
|
|
"golang.org/x/sys/windows"
|
|
|
|
"github.com/Microsoft/go-winio/internal/fs"
|
|
)
|
|
|
|
//sys connectNamedPipe(pipe windows.Handle, o *windows.Overlapped) (err error) = ConnectNamedPipe
|
|
//sys createNamedPipe(name string, flags uint32, pipeMode uint32, maxInstances uint32, outSize uint32, inSize uint32, defaultTimeout uint32, sa *windows.SecurityAttributes) (handle windows.Handle, err error) [failretval==windows.InvalidHandle] = CreateNamedPipeW
|
|
//sys disconnectNamedPipe(pipe windows.Handle) (err error) = DisconnectNamedPipe
|
|
//sys getNamedPipeInfo(pipe windows.Handle, flags *uint32, outSize *uint32, inSize *uint32, maxInstances *uint32) (err error) = GetNamedPipeInfo
|
|
//sys getNamedPipeHandleState(pipe windows.Handle, state *uint32, curInstances *uint32, maxCollectionCount *uint32, collectDataTimeout *uint32, userName *uint16, maxUserNameSize uint32) (err error) = GetNamedPipeHandleStateW
|
|
//sys ntCreateNamedPipeFile(pipe *windows.Handle, access ntAccessMask, oa *objectAttributes, iosb *ioStatusBlock, share ntFileShareMode, disposition ntFileCreationDisposition, options ntFileOptions, typ uint32, readMode uint32, completionMode uint32, maxInstances uint32, inboundQuota uint32, outputQuota uint32, timeout *int64) (status ntStatus) = ntdll.NtCreateNamedPipeFile
|
|
//sys rtlNtStatusToDosError(status ntStatus) (winerr error) = ntdll.RtlNtStatusToDosErrorNoTeb
|
|
//sys rtlDosPathNameToNtPathName(name *uint16, ntName *unicodeString, filePart uintptr, reserved uintptr) (status ntStatus) = ntdll.RtlDosPathNameToNtPathName_U
|
|
//sys rtlDefaultNpAcl(dacl *uintptr) (status ntStatus) = ntdll.RtlDefaultNpAcl
|
|
|
|
type PipeConn interface {
|
|
net.Conn
|
|
Disconnect() error
|
|
Flush() error
|
|
}
|
|
|
|
// type aliases for mkwinsyscall code
|
|
type (
|
|
ntAccessMask = fs.AccessMask
|
|
ntFileShareMode = fs.FileShareMode
|
|
ntFileCreationDisposition = fs.NTFileCreationDisposition
|
|
ntFileOptions = fs.NTCreateOptions
|
|
)
|
|
|
|
type ioStatusBlock struct {
|
|
Status, Information uintptr
|
|
}
|
|
|
|
// typedef struct _OBJECT_ATTRIBUTES {
|
|
// ULONG Length;
|
|
// HANDLE RootDirectory;
|
|
// PUNICODE_STRING ObjectName;
|
|
// ULONG Attributes;
|
|
// PVOID SecurityDescriptor;
|
|
// PVOID SecurityQualityOfService;
|
|
// } OBJECT_ATTRIBUTES;
|
|
//
|
|
// https://learn.microsoft.com/en-us/windows/win32/api/ntdef/ns-ntdef-_object_attributes
|
|
type objectAttributes struct {
|
|
Length uintptr
|
|
RootDirectory uintptr
|
|
ObjectName *unicodeString
|
|
Attributes uintptr
|
|
SecurityDescriptor *securityDescriptor
|
|
SecurityQoS uintptr
|
|
}
|
|
|
|
type unicodeString struct {
|
|
Length uint16
|
|
MaximumLength uint16
|
|
Buffer uintptr
|
|
}
|
|
|
|
// typedef struct _SECURITY_DESCRIPTOR {
|
|
// BYTE Revision;
|
|
// BYTE Sbz1;
|
|
// SECURITY_DESCRIPTOR_CONTROL Control;
|
|
// PSID Owner;
|
|
// PSID Group;
|
|
// PACL Sacl;
|
|
// PACL Dacl;
|
|
// } SECURITY_DESCRIPTOR, *PISECURITY_DESCRIPTOR;
|
|
//
|
|
// https://learn.microsoft.com/en-us/windows/win32/api/winnt/ns-winnt-security_descriptor
|
|
type securityDescriptor struct {
|
|
Revision byte
|
|
Sbz1 byte
|
|
Control uint16
|
|
Owner uintptr
|
|
Group uintptr
|
|
Sacl uintptr //revive:disable-line:var-naming SACL, not Sacl
|
|
Dacl uintptr //revive:disable-line:var-naming DACL, not Dacl
|
|
}
|
|
|
|
type ntStatus int32
|
|
|
|
func (status ntStatus) Err() error {
|
|
if status >= 0 {
|
|
return nil
|
|
}
|
|
return rtlNtStatusToDosError(status)
|
|
}
|
|
|
|
var (
|
|
// ErrPipeListenerClosed is returned for pipe operations on listeners that have been closed.
|
|
ErrPipeListenerClosed = net.ErrClosed
|
|
|
|
errPipeWriteClosed = errors.New("pipe has been closed for write")
|
|
)
|
|
|
|
type win32Pipe struct {
|
|
*win32File
|
|
path string
|
|
}
|
|
|
|
var _ PipeConn = (*win32Pipe)(nil)
|
|
|
|
type win32MessageBytePipe struct {
|
|
win32Pipe
|
|
writeClosed bool
|
|
readEOF bool
|
|
}
|
|
|
|
type pipeAddress string
|
|
|
|
func (f *win32Pipe) LocalAddr() net.Addr {
|
|
return pipeAddress(f.path)
|
|
}
|
|
|
|
func (f *win32Pipe) RemoteAddr() net.Addr {
|
|
return pipeAddress(f.path)
|
|
}
|
|
|
|
func (f *win32Pipe) SetDeadline(t time.Time) error {
|
|
if err := f.SetReadDeadline(t); err != nil {
|
|
return err
|
|
}
|
|
return f.SetWriteDeadline(t)
|
|
}
|
|
|
|
func (f *win32Pipe) Disconnect() error {
|
|
return disconnectNamedPipe(f.win32File.handle)
|
|
}
|
|
|
|
// CloseWrite closes the write side of a message pipe in byte mode.
|
|
func (f *win32MessageBytePipe) CloseWrite() error {
|
|
if f.writeClosed {
|
|
return errPipeWriteClosed
|
|
}
|
|
err := f.win32File.Flush()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
_, err = f.win32File.Write(nil)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
f.writeClosed = true
|
|
return nil
|
|
}
|
|
|
|
// Write writes bytes to a message pipe in byte mode. Zero-byte writes are ignored, since
|
|
// they are used to implement CloseWrite().
|
|
func (f *win32MessageBytePipe) Write(b []byte) (int, error) {
|
|
if f.writeClosed {
|
|
return 0, errPipeWriteClosed
|
|
}
|
|
if len(b) == 0 {
|
|
return 0, nil
|
|
}
|
|
return f.win32File.Write(b)
|
|
}
|
|
|
|
// Read reads bytes from a message pipe in byte mode. A read of a zero-byte message on a message
|
|
// mode pipe will return io.EOF, as will all subsequent reads.
|
|
func (f *win32MessageBytePipe) Read(b []byte) (int, error) {
|
|
if f.readEOF {
|
|
return 0, io.EOF
|
|
}
|
|
n, err := f.win32File.Read(b)
|
|
if err == io.EOF { //nolint:errorlint
|
|
// If this was the result of a zero-byte read, then
|
|
// it is possible that the read was due to a zero-size
|
|
// message. Since we are simulating CloseWrite with a
|
|
// zero-byte message, ensure that all future Read() calls
|
|
// also return EOF.
|
|
f.readEOF = true
|
|
} else if err == windows.ERROR_MORE_DATA { //nolint:errorlint // err is Errno
|
|
// ERROR_MORE_DATA indicates that the pipe's read mode is message mode
|
|
// and the message still has more bytes. Treat this as a success, since
|
|
// this package presents all named pipes as byte streams.
|
|
err = nil
|
|
}
|
|
return n, err
|
|
}
|
|
|
|
func (pipeAddress) Network() string {
|
|
return "pipe"
|
|
}
|
|
|
|
func (s pipeAddress) String() string {
|
|
return string(s)
|
|
}
|
|
|
|
// tryDialPipe attempts to dial the pipe at `path` until `ctx` cancellation or timeout.
|
|
func tryDialPipe(ctx context.Context, path *string, access fs.AccessMask, impLevel PipeImpLevel) (windows.Handle, error) {
|
|
for {
|
|
select {
|
|
case <-ctx.Done():
|
|
return windows.Handle(0), ctx.Err()
|
|
default:
|
|
h, err := fs.CreateFile(*path,
|
|
access,
|
|
0, // mode
|
|
nil, // security attributes
|
|
fs.OPEN_EXISTING,
|
|
fs.FILE_FLAG_OVERLAPPED|fs.SECURITY_SQOS_PRESENT|fs.FileSQSFlag(impLevel),
|
|
0, // template file handle
|
|
)
|
|
if err == nil {
|
|
return h, nil
|
|
}
|
|
if err != windows.ERROR_PIPE_BUSY { //nolint:errorlint // err is Errno
|
|
return h, &os.PathError{Err: err, Op: "open", Path: *path}
|
|
}
|
|
// Wait 10 msec and try again. This is a rather simplistic
|
|
// view, as we always try each 10 milliseconds.
|
|
time.Sleep(10 * time.Millisecond)
|
|
}
|
|
}
|
|
}
|
|
|
|
// DialPipe connects to a named pipe by path, timing out if the connection
|
|
// takes longer than the specified duration. If timeout is nil, then we use
|
|
// a default timeout of 2 seconds. (We do not use WaitNamedPipe.)
|
|
func DialPipe(path string, timeout *time.Duration) (net.Conn, error) {
|
|
var absTimeout time.Time
|
|
if timeout != nil {
|
|
absTimeout = time.Now().Add(*timeout)
|
|
} else {
|
|
absTimeout = time.Now().Add(2 * time.Second)
|
|
}
|
|
ctx, cancel := context.WithDeadline(context.Background(), absTimeout)
|
|
defer cancel()
|
|
conn, err := DialPipeContext(ctx, path)
|
|
if errors.Is(err, context.DeadlineExceeded) {
|
|
return nil, ErrTimeout
|
|
}
|
|
return conn, err
|
|
}
|
|
|
|
// DialPipeContext attempts to connect to a named pipe by `path` until `ctx`
|
|
// cancellation or timeout.
|
|
func DialPipeContext(ctx context.Context, path string) (net.Conn, error) {
|
|
return DialPipeAccess(ctx, path, uint32(fs.GENERIC_READ|fs.GENERIC_WRITE))
|
|
}
|
|
|
|
// PipeImpLevel is an enumeration of impersonation levels that may be set
|
|
// when calling DialPipeAccessImpersonation.
|
|
type PipeImpLevel uint32
|
|
|
|
const (
|
|
PipeImpLevelAnonymous = PipeImpLevel(fs.SECURITY_ANONYMOUS)
|
|
PipeImpLevelIdentification = PipeImpLevel(fs.SECURITY_IDENTIFICATION)
|
|
PipeImpLevelImpersonation = PipeImpLevel(fs.SECURITY_IMPERSONATION)
|
|
PipeImpLevelDelegation = PipeImpLevel(fs.SECURITY_DELEGATION)
|
|
)
|
|
|
|
// DialPipeAccess attempts to connect to a named pipe by `path` with `access` until `ctx`
|
|
// cancellation or timeout.
|
|
func DialPipeAccess(ctx context.Context, path string, access uint32) (net.Conn, error) {
|
|
return DialPipeAccessImpLevel(ctx, path, access, PipeImpLevelAnonymous)
|
|
}
|
|
|
|
// DialPipeAccessImpLevel attempts to connect to a named pipe by `path` with
|
|
// `access` at `impLevel` until `ctx` cancellation or timeout. The other
|
|
// DialPipe* implementations use PipeImpLevelAnonymous.
|
|
func DialPipeAccessImpLevel(ctx context.Context, path string, access uint32, impLevel PipeImpLevel) (net.Conn, error) {
|
|
var err error
|
|
var h windows.Handle
|
|
h, err = tryDialPipe(ctx, &path, fs.AccessMask(access), impLevel)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
var flags uint32
|
|
err = getNamedPipeInfo(h, &flags, nil, nil, nil)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
f, err := makeWin32File(h)
|
|
if err != nil {
|
|
windows.Close(h)
|
|
return nil, err
|
|
}
|
|
|
|
// If the pipe is in message mode, return a message byte pipe, which
|
|
// supports CloseWrite().
|
|
if flags&windows.PIPE_TYPE_MESSAGE != 0 {
|
|
return &win32MessageBytePipe{
|
|
win32Pipe: win32Pipe{win32File: f, path: path},
|
|
}, nil
|
|
}
|
|
return &win32Pipe{win32File: f, path: path}, nil
|
|
}
|
|
|
|
type acceptResponse struct {
|
|
f *win32File
|
|
err error
|
|
}
|
|
|
|
type win32PipeListener struct {
|
|
firstHandle windows.Handle
|
|
path string
|
|
config PipeConfig
|
|
acceptCh chan (chan acceptResponse)
|
|
closeCh chan int
|
|
doneCh chan int
|
|
}
|
|
|
|
func makeServerPipeHandle(path string, sd []byte, c *PipeConfig, first bool) (windows.Handle, error) {
|
|
path16, err := windows.UTF16FromString(path)
|
|
if err != nil {
|
|
return 0, &os.PathError{Op: "open", Path: path, Err: err}
|
|
}
|
|
|
|
var oa objectAttributes
|
|
oa.Length = unsafe.Sizeof(oa)
|
|
|
|
var ntPath unicodeString
|
|
if err := rtlDosPathNameToNtPathName(&path16[0],
|
|
&ntPath,
|
|
0,
|
|
0,
|
|
).Err(); err != nil {
|
|
return 0, &os.PathError{Op: "open", Path: path, Err: err}
|
|
}
|
|
defer windows.LocalFree(windows.Handle(ntPath.Buffer)) //nolint:errcheck
|
|
oa.ObjectName = &ntPath
|
|
oa.Attributes = windows.OBJ_CASE_INSENSITIVE
|
|
|
|
// The security descriptor is only needed for the first pipe.
|
|
if first {
|
|
if sd != nil {
|
|
//todo: does `sdb` need to be allocated on the heap, or can go allocate it?
|
|
l := uint32(len(sd))
|
|
sdb, err := windows.LocalAlloc(0, l)
|
|
if err != nil {
|
|
return 0, fmt.Errorf("LocalAlloc for security descriptor with of length %d: %w", l, err)
|
|
}
|
|
defer windows.LocalFree(windows.Handle(sdb)) //nolint:errcheck
|
|
copy((*[0xffff]byte)(unsafe.Pointer(sdb))[:], sd)
|
|
oa.SecurityDescriptor = (*securityDescriptor)(unsafe.Pointer(sdb))
|
|
} else {
|
|
// Construct the default named pipe security descriptor.
|
|
var dacl uintptr
|
|
if err := rtlDefaultNpAcl(&dacl).Err(); err != nil {
|
|
return 0, fmt.Errorf("getting default named pipe ACL: %w", err)
|
|
}
|
|
defer windows.LocalFree(windows.Handle(dacl)) //nolint:errcheck
|
|
|
|
sdb := &securityDescriptor{
|
|
Revision: 1,
|
|
Control: windows.SE_DACL_PRESENT,
|
|
Dacl: dacl,
|
|
}
|
|
oa.SecurityDescriptor = sdb
|
|
}
|
|
}
|
|
|
|
typ := uint32(windows.FILE_PIPE_REJECT_REMOTE_CLIENTS)
|
|
if c.MessageMode {
|
|
typ |= windows.FILE_PIPE_MESSAGE_TYPE
|
|
}
|
|
|
|
disposition := fs.FILE_OPEN
|
|
access := fs.GENERIC_READ | fs.GENERIC_WRITE | fs.SYNCHRONIZE
|
|
if first {
|
|
disposition = fs.FILE_CREATE
|
|
// By not asking for read or write access, the named pipe file system
|
|
// will put this pipe into an initially disconnected state, blocking
|
|
// client connections until the next call with first == false.
|
|
access = fs.SYNCHRONIZE
|
|
}
|
|
|
|
timeout := int64(-50 * 10000) // 50ms
|
|
|
|
var (
|
|
h windows.Handle
|
|
iosb ioStatusBlock
|
|
)
|
|
err = ntCreateNamedPipeFile(&h,
|
|
access,
|
|
&oa,
|
|
&iosb,
|
|
fs.FILE_SHARE_READ|fs.FILE_SHARE_WRITE,
|
|
disposition,
|
|
0,
|
|
typ,
|
|
0,
|
|
0,
|
|
0xffffffff,
|
|
uint32(c.InputBufferSize),
|
|
uint32(c.OutputBufferSize),
|
|
&timeout).Err()
|
|
if err != nil {
|
|
return 0, &os.PathError{Op: "open", Path: path, Err: err}
|
|
}
|
|
|
|
runtime.KeepAlive(ntPath)
|
|
return h, nil
|
|
}
|
|
|
|
func (l *win32PipeListener) makeServerPipe() (*win32File, error) {
|
|
h, err := makeServerPipeHandle(l.path, nil, &l.config, false)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
f, err := makeWin32File(h)
|
|
if err != nil {
|
|
windows.Close(h)
|
|
return nil, err
|
|
}
|
|
return f, nil
|
|
}
|
|
|
|
func (l *win32PipeListener) makeConnectedServerPipe() (*win32File, error) {
|
|
p, err := l.makeServerPipe()
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
// Wait for the client to connect.
|
|
ch := make(chan error)
|
|
go func(p *win32File) {
|
|
ch <- connectPipe(p)
|
|
}(p)
|
|
|
|
select {
|
|
case err = <-ch:
|
|
if err != nil {
|
|
p.Close()
|
|
p = nil
|
|
}
|
|
case <-l.closeCh:
|
|
// Abort the connect request by closing the handle.
|
|
p.Close()
|
|
p = nil
|
|
err = <-ch
|
|
if err == nil || err == ErrFileClosed { //nolint:errorlint // err is Errno
|
|
err = ErrPipeListenerClosed
|
|
}
|
|
}
|
|
return p, err
|
|
}
|
|
|
|
func (l *win32PipeListener) listenerRoutine() {
|
|
closed := false
|
|
for !closed {
|
|
select {
|
|
case <-l.closeCh:
|
|
closed = true
|
|
case responseCh := <-l.acceptCh:
|
|
var (
|
|
p *win32File
|
|
err error
|
|
)
|
|
for {
|
|
p, err = l.makeConnectedServerPipe()
|
|
// If the connection was immediately closed by the client, try
|
|
// again.
|
|
if err != windows.ERROR_NO_DATA { //nolint:errorlint // err is Errno
|
|
break
|
|
}
|
|
}
|
|
responseCh <- acceptResponse{p, err}
|
|
closed = err == ErrPipeListenerClosed //nolint:errorlint // err is Errno
|
|
}
|
|
}
|
|
windows.Close(l.firstHandle)
|
|
l.firstHandle = 0
|
|
// Notify Close() and Accept() callers that the handle has been closed.
|
|
close(l.doneCh)
|
|
}
|
|
|
|
// PipeConfig contain configuration for the pipe listener.
|
|
type PipeConfig struct {
|
|
// SecurityDescriptor contains a Windows security descriptor in SDDL format.
|
|
SecurityDescriptor string
|
|
|
|
// MessageMode determines whether the pipe is in byte or message mode. In either
|
|
// case the pipe is read in byte mode by default. The only practical difference in
|
|
// this implementation is that CloseWrite() is only supported for message mode pipes;
|
|
// CloseWrite() is implemented as a zero-byte write, but zero-byte writes are only
|
|
// transferred to the reader (and returned as io.EOF in this implementation)
|
|
// when the pipe is in message mode.
|
|
MessageMode bool
|
|
|
|
// InputBufferSize specifies the size of the input buffer, in bytes.
|
|
InputBufferSize int32
|
|
|
|
// OutputBufferSize specifies the size of the output buffer, in bytes.
|
|
OutputBufferSize int32
|
|
}
|
|
|
|
// ListenPipe creates a listener on a Windows named pipe path, e.g. \\.\pipe\mypipe.
|
|
// The pipe must not already exist.
|
|
func ListenPipe(path string, c *PipeConfig) (net.Listener, error) {
|
|
var (
|
|
sd []byte
|
|
err error
|
|
)
|
|
if c == nil {
|
|
c = &PipeConfig{}
|
|
}
|
|
if c.SecurityDescriptor != "" {
|
|
sd, err = SddlToSecurityDescriptor(c.SecurityDescriptor)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
}
|
|
h, err := makeServerPipeHandle(path, sd, c, true)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
l := &win32PipeListener{
|
|
firstHandle: h,
|
|
path: path,
|
|
config: *c,
|
|
acceptCh: make(chan (chan acceptResponse)),
|
|
closeCh: make(chan int),
|
|
doneCh: make(chan int),
|
|
}
|
|
go l.listenerRoutine()
|
|
return l, nil
|
|
}
|
|
|
|
func connectPipe(p *win32File) error {
|
|
c, err := p.prepareIO()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
defer p.wg.Done()
|
|
|
|
err = connectNamedPipe(p.handle, &c.o)
|
|
_, err = p.asyncIO(c, nil, 0, err)
|
|
if err != nil && err != windows.ERROR_PIPE_CONNECTED { //nolint:errorlint // err is Errno
|
|
return err
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func (l *win32PipeListener) Accept() (net.Conn, error) {
|
|
ch := make(chan acceptResponse)
|
|
select {
|
|
case l.acceptCh <- ch:
|
|
response := <-ch
|
|
err := response.err
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
if l.config.MessageMode {
|
|
return &win32MessageBytePipe{
|
|
win32Pipe: win32Pipe{win32File: response.f, path: l.path},
|
|
}, nil
|
|
}
|
|
return &win32Pipe{win32File: response.f, path: l.path}, nil
|
|
case <-l.doneCh:
|
|
return nil, ErrPipeListenerClosed
|
|
}
|
|
}
|
|
|
|
func (l *win32PipeListener) Close() error {
|
|
select {
|
|
case l.closeCh <- 1:
|
|
<-l.doneCh
|
|
case <-l.doneCh:
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func (l *win32PipeListener) Addr() net.Addr {
|
|
return pipeAddress(l.path)
|
|
}
|