kaniko/vendor/github.com/Microsoft/go-winio
Joe Kimmel 906cc96b59
Upgrade docker (#2440)
* somehow now the only thing that doesnt work is devices.Device

Signed-off-by: Joe Kimmel <jkimmel@vmware.com>

* this gets rid of all the compiler errors in the vendored code

Signed-off-by: Joe Kimmel <jkimmel@vmware.com>

* fixed some things but a bunch of tests and maybe some compiler steps are still failing

Signed-off-by: Joe Kimmel <jkimmel@vmware.com>

* all the things i figured out how to fix so far

Signed-off-by: Joe Kimmel <jkimmel@vmware.com>

* guess i had to redo go mods after rebasing again

Signed-off-by: Joe Kimmel <jkimmel@vmware.com>

* update docker constants to be SHOUTY CASE now

Signed-off-by: Joe Kimmel <jkimmel@vmware.com>

* include DestPath in resolveEnv

Signed-off-by: Joe Kimmel <jkimmel@vmware.com>

* fix one mistake in Docker lib upgrade and some typos/deprecations in the file

Signed-off-by: Joe Kimmel <jkimmel@vmware.com>

* last changes (hopefully) to update to new docker libs

Signed-off-by: Joe Kimmel <jkimmel@vmware.com>

---------

Signed-off-by: Joe Kimmel <jkimmel@vmware.com>
2023-03-23 20:34:25 -04:00
..
internal/socket fix(executor): make pax tar builds reproducible again (#2384) 2023-03-21 18:08:29 -04:00
pkg/guid Upgrade docker (#2440) 2023-03-23 20:34:25 -04:00
.gitattributes fix(executor): make pax tar builds reproducible again (#2384) 2023-03-21 18:08:29 -04:00
.gitignore fix(executor): make pax tar builds reproducible again (#2384) 2023-03-21 18:08:29 -04:00
.golangci.yml fix(executor): make pax tar builds reproducible again (#2384) 2023-03-21 18:08:29 -04:00
CODEOWNERS Bump deps (#1885) 2022-01-21 13:59:16 -05:00
LICENSE Unpack filesystem and whitelist from /proc/self/mountinfo 2018-02-21 11:02:30 -08:00
README.md fix(executor): make pax tar builds reproducible again (#2384) 2023-03-21 18:08:29 -04:00
SECURITY.md fix(executor): make pax tar builds reproducible again (#2384) 2023-03-21 18:08:29 -04:00
backup.go fix(executor): make pax tar builds reproducible again (#2384) 2023-03-21 18:08:29 -04:00
doc.go fix(executor): make pax tar builds reproducible again (#2384) 2023-03-21 18:08:29 -04:00
ea.go fix(executor): make pax tar builds reproducible again (#2384) 2023-03-21 18:08:29 -04:00
file.go fix(executor): make pax tar builds reproducible again (#2384) 2023-03-21 18:08:29 -04:00
fileinfo.go fix(executor): make pax tar builds reproducible again (#2384) 2023-03-21 18:08:29 -04:00
hvsock.go fix(executor): make pax tar builds reproducible again (#2384) 2023-03-21 18:08:29 -04:00
pipe.go fix(executor): make pax tar builds reproducible again (#2384) 2023-03-21 18:08:29 -04:00
privilege.go fix(executor): make pax tar builds reproducible again (#2384) 2023-03-21 18:08:29 -04:00
reparse.go fix(executor): make pax tar builds reproducible again (#2384) 2023-03-21 18:08:29 -04:00
sd.go fix(executor): make pax tar builds reproducible again (#2384) 2023-03-21 18:08:29 -04:00
syscall.go fix(executor): make pax tar builds reproducible again (#2384) 2023-03-21 18:08:29 -04:00
tools.go fix(executor): make pax tar builds reproducible again (#2384) 2023-03-21 18:08:29 -04:00
zsyscall_windows.go fix(executor): make pax tar builds reproducible again (#2384) 2023-03-21 18:08:29 -04:00

README.md

go-winio Build Status

This repository contains utilities for efficiently performing Win32 IO operations in Go. Currently, this is focused on accessing named pipes and other file handles, and for using named pipes as a net transport.

This code relies on IO completion ports to avoid blocking IO on system threads, allowing Go to reuse the thread to schedule another goroutine. This limits support to Windows Vista and newer operating systems. This is similar to the implementation of network sockets in Go's net package.

Please see the LICENSE file for licensing information.

Contributing

This project welcomes contributions and suggestions. Most contributions require you to agree to a Contributor License Agreement (CLA) declaring that you have the right to, and actually do, grant us the rights to use your contribution. For details, visit Microsoft CLA.

When you submit a pull request, a CLA-bot will automatically determine whether you need to provide a CLA and decorate the PR appropriately (e.g., label, comment). Simply follow the instructions provided by the bot. You will only need to do this once across all repos using our CLA.

Additionally, the pull request pipeline requires the following steps to be performed before mergining.

Code Sign-Off

We require that contributors sign their commits using git commit --signoff to certify they either authored the work themselves or otherwise have permission to use it in this project.

A range of commits can be signed off using git rebase --signoff.

Please see the developer certificate for more info, as well as to make sure that you can attest to the rules listed. Our CI uses the DCO Github app to ensure that all commits in a given PR are signed-off.

Linting

Code must pass a linting stage, which uses golangci-lint. The linting settings are stored in .golangci.yaml, and can be run automatically with VSCode by adding the following to your workspace or folder settings:

    "go.lintTool": "golangci-lint",
    "go.lintOnSave": "package",

Additional editor integrations options are also available.

Alternatively, golangci-lint can be installed locally and run from the repo root:

# use . or specify a path to only lint a package
# to show all lint errors, use flags "--max-issues-per-linter=0 --max-same-issues=0"
> golangci-lint run ./...

Go Generate

The pipeline checks that auto-generated code, via go generate, are up to date.

This can be done for the entire repo:

> go generate ./...

Code of Conduct

This project has adopted the Microsoft Open Source Code of Conduct. For more information see the Code of Conduct FAQ or contact opencode@microsoft.com with any additional questions or comments.

Special Thanks

Thanks to natefinch for the inspiration for this library. See npipe for another named pipe implementation.