Named pipes

Commands related to named pipes

SYNOPSIS

package require twapi_namedpipe
impersonate_namedpipe_client CHANNEL
namedpipe_client PIPENAME ?-access ACCESS?
namedpipe_server PIPENAME ?options?

DESCRIPTION

This module provides a Tcl channel based interface to Windows named pipes.

Overview

This module provides commands to perform I/O over Windows named pipes using standard Tcl commands like puts, gets, read and the Tcl 8.5 chan command. Named pipe channels support blocking and non-blocking operations in the same manner as the standard Tcl channel types. The Tcl commands fileevent and fconfigure, or its newer version chan configure, can be used with named pipe channels.

Windows named pipes support two data transmission modes - byte stream and message. TWAPI supports only the byte stream mode of operation as message mode is not supported by the Tcl channel based script commands. In byte stream mode, data is sent and received as a stream of bytes with no boundaries between consecutive writes or reads. This is similar to the TCP socket based operation of the Tcl socket command.

Named pipes are an alternative to sockets for communicating between processes on either the same or different systems. Named pipes are very efficient when both processes are on the same system but lag TCP socket based protocols when communicating between systems, particularly across a slow link. Named pipes are also not as scalable as sockets when servicing a very large number of clients. The primary advantage of named pipes over sockets is that they provide a very easy way of authenticating clients using the Windows security authentication infrastructure. An example might be a Windows service running in the LocalSystem account that needs to communicate with an application running on the user desktop. For local system communication, named pipes also have an advantage over Windows sockets in certain limited configurations in that they do not require a configured network adapter to be present (on some Windows versions, event the loopback interface, 127.0.0.1, will not work without a enabled network adapter).

Named Pipe Servers

A named pipe server creates a named pipe channel through the namedpipe_server command. This creates a single instance of the specified named pipe. To allow multiple clients to connect, the server must open multiple instances of the pipe using this command. Note the difference in behaviour compared to sockets. In the case of a socket-based server, a single listening socket is created and as clients connect, a new socket is created automatically for each new connection. This is not the case with named pipes where the incoming connection uses the existing named pipe instance. The server application must create a new instance to accept the next connection. Because incoming connect requests will be denied until the new instance is created, the application may open multiple instance of the named pipe to reduce the likelihood of missed connections.

Named Pipe Clients

A client application can connect to a named pipe using the namedpipe_client command. When the command returns the named pipe is connected and the channel can be used to send and receive data.

Named Pipe Access Control

Client access to a named pipes can be controlled through standard Windows security mechanisms. When a server creates a named pipe instance, it can specify a security descriptor to be attached to the pipe. When a client attempts a connect, its credentials are checked against the descriptor and access is granted accordingly.

Servers can also retrieve and impersonate the client's credentials through impersonate_namedpipe_client. Conversely, the client can specify options to namedpipe_client to control the degree to which the server can impersonate its security context.

Commands

impersonate_namedpipe_client CHANNEL
Changes the security context of the calling thread to that of the client of a named pipe. CHANNEL is a Tcl channel identifier for the server end of a named pipe. This call will fail unless some data is first read from the channel.

The caller must be careful that exceptions raised by this command are handled correctly. It should not continue with normal processing as though the security context was changed to that of the named pipe client.
namedpipe_client PIPENAME ?-access ACCESS?
Connects to the named pipe specified by PIPENAME and returns a Tcl channel identifier that can be used with the Tcl channel commands.

The command raises a Tcl exception on error. One possible error is caused by all instances of the server pipe being busy. In this case, the Tcl errorCode global is set to the value TWAPI_WIN32 231 LANGUAGE_DEPENDENT_ERROR_MESSAGE. The application may check for this and retry after some interval.

Unlike sockets, named pipes may be opened in read-only or write-only mode. This is configured through the -access option. ACCESS is a list consisting one or both of read and write depending on the access desired. By default, the pipe is opened for both read and write access.

For consistency with the Tcl socket command, the channel is configured with the default system encoding with line ending translation enabled. Use the fconfigure command to change this. Note the encoding and line ending options must match those the server side else data might appear to be corrupted.
-access ACCESS Unlike sockets, named pipes may be opened in read-only or write-only mode. This is configured through the -access option. ACCESS is a list consisting one or both of read and write depending on the access desired. By default, the pipe is opened for both read and write access. Subsequent calls to create new instances of the pipe must also specify the same access mode else the call will fail.
-impersonatecontexttracking BOOLEAN If specified as TRUE, the client security context is dynamically tracked by the server. Default is FALSE. This option is ignored unless -impersonationlevel is also specified.
-impersonateeffectiveonly BOOLEAN If specified as FALSE (default), all aspects of the client security context are visible to the server. If TRUE, only the enabled aspects (groups and privileges) are visible to the server. This option is ignored unless -impersonationlevel is also specified.
-impersonationlevel IMPERSONATIONLEVEL Sets the impersonation level at which the server is allowed to impersonate the client. Must be one of anonymous, identification, impersonation or delegation. See Impersonation for details.
namedpipe_server PIPENAME ?options?
Creates an instance of the named pipe specified by PIPENAME and returns a Tcl channel identifier that can be used with the Tcl channel commands. The command returns immediately. However, no input or output can be done on the pipe until a client establishes a connection on the pipe instance. To determine when the completion is completed, the application can register callbacks on the channel using the Tcl fileevent command. Alternatively, the application can poll the channel by attempting to read or write from it. This is not however recommended.

For consistency with the Tcl socket command, the channel is configured with the default system encoding with line ending translation enabled. Use the fconfigure command to change this. Note the encoding and line ending options must match those the server side else data might appear to be corrupted.

The following options may be specified with the command:
-access ACCESS Unlike sockets, named pipes may be opened in read-only or write-only mode. This is configured through the -access option. ACCESS is a list consisting one or both of read and write depending on the access desired. By default, the pipe is opened for both read and write access. Subsequent calls to create new instances of the pipe must also specify the same access mode else the call will fail.
-denyremote If specified, connections from remote clients are not accepted. This option requires Windows Vista or newer Windows versions. The command will raise an error if this option is specified on older versions of Windows.
-maxinstances MAXINSTANCES Specifies the maximum number of instances of the named pipe that can exist. This only has effect for the call that creates the first instance of the pipe in the system. Subsequent calls must also specify the same value for MAXINSTANCES else the call will fail. and only checks that the pipe creation call will not cause the number of pipe instances to exceed the MAXINSTANCES value specified in the first call.
-secd BOOLEAN Allows specifying a security descriptor that restricts access to the named pipe to specific Windows accounts. If unspecified, the security descriptor defaults to on that allows full access to the LocalSystem account, the Administrators group and to the creator owner, and read access to the Everyone group and anonymous account.

COPYRIGHT

Copyright © 2010, Ashok P. Nadkarni

Tcl Windows API 5.0