-
Notifications
You must be signed in to change notification settings - Fork 208
Comparing changes
Open a pull request
base repository: microsoft/go-winio
base: v0.6.1
head repository: microsoft/go-winio
compare: v0.6.2
- 16 commits
- 55 files changed
- 6 contributors
Commits on Apr 26, 2023
-
[etw] Add String() functions, JSON field option (#285)
Add `String()` functions to `etw.Level` and `etw.Opcode` types. Add `etw.JSONStringField()`, which denotes a string field containing JSON data. Fix doc comment casing. Signed-off-by: Hamza El-Saawy <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 6a0f8b6 - Browse repository at this point
Copy the full SHA 6a0f8b6View commit details
Commits on May 11, 2023
-
enable dependency updates (#287)
Signed-off-by: Hamza El-Saawy <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 4f41be6 - Browse repository at this point
Copy the full SHA 4f41be6View commit details
Commits on Jul 21, 2023
-
Isolate tools dependencies in tools package (#293)
Use `./tools` to prevent callers of `go-winio` from needing to add tools to their dependencies. Similar to microsoft/hcsshim#1840 Signed-off-by: Hamza El-Saawy <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 10d5703 - Browse repository at this point
Copy the full SHA 10d5703View commit details -
Update tests; run fuzzing (#294)
Run fuzzing tests in CI. Use race detector when running tests. Add missing `t.Helper()` calls. Update test helpers in `pkg/bindfilter` to use `RtlGetNtVersionNumbers` instead of reading registry, and skip tests if not running as admin. Signed-off-by: Hamza El-Saawy <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 19a9f65 - Browse repository at this point
Copy the full SHA 19a9f65View commit details
Commits on Jul 24, 2023
-
Add support for flushing and disconnecting named pipes (#292)
* Add support for disconnecting pipes Signed-off-by: David Golub <[email protected]> * Expose Flush Signed-off-by: David Golub <[email protected]> * Add test Signed-off-by: David Golub <[email protected]> * Fix lint errors Signed-off-by: David Golub <[email protected]> --------- Signed-off-by: David Golub <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for b29bbd5 - Browse repository at this point
Copy the full SHA b29bbd5View commit details
Commits on Aug 3, 2023
-
Add required computestorage APIs to allow for running tests of `ResolvePath`. Signed-off-by: Hamza El-Saawy <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 704d6c6 - Browse repository at this point
Copy the full SHA 704d6c6View commit details -
[lint] Fix errors from #276 (#296)
Signed-off-by: Hamza El-Saawy <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for fec52bd - Browse repository at this point
Copy the full SHA fec52bdView commit details
Commits on Aug 7, 2023
-
Switch from sycall to windows (#295)
Where ever possible, use `golang.org/x/sys/windows` instead of `syscall` (which has been deprecated since go1.11). Using `windows.LocalFree` requires using `unsafe.Pointer`, which ensures that the Go garbage collector does not try to free memory pre-maturely if it was previously declared as a pointer. Since `syscall.Handle` is part of API for `vhd` package, it was left unchanged. For security descriptor functions, switch to using `windows.SECURITY_DESCRIPTOR` to avoid unnecessary byte manipulation and panics due to missing input validation and error checking. Signed-off-by: Hamza El-Saawy <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 9f0d5dc - Browse repository at this point
Copy the full SHA 9f0d5dcView commit details
Commits on Aug 9, 2023
-
[lint] Remove deprecated tar.TypeRegA (#300)
Signed-off-by: Hamza El-Saawy <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 87c84cf - Browse repository at this point
Copy the full SHA 87c84cfView commit details
Commits on Aug 10, 2023
-
sd.go: fix calculation of security descriptor length in SddlToSecurit…
…yDescriptor (#299) unsafe.Sizeof(windows.SECURITY_DESCRIPTOR{}) is the minimum length of the SD, not the actual length. Use the actual length for computing the length of the slice. This path also removes getSecurityDescriptorLength, which is no longer used. Fixes #298 Signed-off-by: Aaron Klotz <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for eb5b095 - Browse repository at this point
Copy the full SHA eb5b095View commit details
Commits on Aug 28, 2023
-
Signed-off-by: guoguangwu <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for e6aebd6 - Browse repository at this point
Copy the full SHA e6aebd6View commit details
Commits on Sep 28, 2023
-
pipe.go: add DialPipeAccessImpLevel
I would like to use impersonation on the server side of the pipe, but I currently cannot because all pipes are connected using the anonymous impersonation level. This patch adds a new function that provides the ability to explicitly specify the desired impersonation level. Fixes #297 Signed-off-by: Aaron Klotz <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 1963303 - Browse repository at this point
Copy the full SHA 1963303View commit details
Commits on Nov 5, 2023
-
Merge pull request #302 from dblohm7/implevel2
pipe.go: add DialPipeAccessImpLevel
Configuration menu - View commit details
-
Copy full SHA for 553a715 - Browse repository at this point
Copy the full SHA 553a715View commit details
Commits on Dec 18, 2023
-
Bug: Close hvsock handle on listen error; fix tests (#310)
* Bug: Close hvsock handle on listen error; fix tests Close the socket created in `github.com/Microsoft/go-winio/pkg/ListenHvsock` if either the `Bind` or `Listen` calls fail. Go changed `filepath.VolumeName` code, resulting in different behavior in `github.com/Microsoft/go-winio/pkg/fs.GetFileSystemType`. Update test accordingly. Also add more debug logs to `pkg\fs\resolve_test.go`. Also, move add skip for fuzzing on WS2019 or older to `FuzzHvSockRxTx` code directly, instead of in ci.yml. See: https://go-review.googlesource.com/c/go/+/540277 Signed-off-by: Hamza El-Saawy <[email protected]> * PR: unskip TestResolvePath Signed-off-by: Hamza El-Saawy <[email protected]> --------- Signed-off-by: Hamza El-Saawy <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for bc421d9 - Browse repository at this point
Copy the full SHA bc421d9View commit details
Commits on Jan 16, 2024
-
fileinfo: internally fix FileBasicInfo memory alignment (#312)
* fileinfo: internally fix FileBasicInfo memory alignment Signed-off-by: Davis Goodin <[email protected]> * Update test with review feedback Remove unused winName. Extract more into Windows alignment consts to repeat less. Document reason for having multiple alignment consts for the same value. Signed-off-by: Davis Goodin <[email protected]> --------- Signed-off-by: Davis Goodin <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 008bc6e - Browse repository at this point
Copy the full SHA 008bc6eView commit details
Commits on Apr 9, 2024
-
* Update to go 1.21 Use `atomic.Bool` stdlib instead of including our own. Include `tools\mkwinsyscall` updates from go-winio/283 to switch to `syscallN`. Note: removed `// TODO` about `print`/`ln`, since the latter adds spaces between args when printing, which is undesired. Also update CI to run steps on windows-2022 instead of windows-2019, similar to our hcsshim CI. Signed-off-by: Hamza El-Saawy <[email protected]> * PR: simplify type checking Signed-off-by: Hamza El-Saawy <[email protected]> --------- Signed-off-by: Hamza El-Saawy <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 3c9576c - Browse repository at this point
Copy the full SHA 3c9576cView commit details
This comparison is taking too long to generate.
Unfortunately it looks like we can’t render this comparison for you right now. It might be too big, or there might be something weird with your repository.
You can try running this command locally to see the comparison on your machine:
git diff v0.6.1...v0.6.2