2020-03-03 17:33:09 +00:00
|
|
|
// Copyright (c) 2020 Tailscale Inc & AUTHORS All rights reserved.
|
|
|
|
// Use of this source code is governed by a BSD-style
|
|
|
|
// license that can be found in the LICENSE file.
|
|
|
|
|
|
|
|
// Package paths returns platform and user-specific default paths to
|
|
|
|
// Tailscale files and directories.
|
|
|
|
package paths
|
|
|
|
|
|
|
|
import (
|
|
|
|
"os"
|
2021-02-05 17:53:54 +00:00
|
|
|
"path/filepath"
|
2020-03-03 17:33:09 +00:00
|
|
|
"runtime"
|
2021-05-30 05:48:22 +00:00
|
|
|
|
2022-08-04 17:43:49 +00:00
|
|
|
"tailscale.com/syncs"
|
2021-05-30 05:48:22 +00:00
|
|
|
"tailscale.com/version/distro"
|
2020-03-03 17:33:09 +00:00
|
|
|
)
|
|
|
|
|
2021-05-20 12:33:49 +00:00
|
|
|
// AppSharedDir is a string set by the iOS or Android app on start
|
2021-03-31 21:08:32 +00:00
|
|
|
// containing a directory we can read/write in.
|
2022-08-04 17:43:49 +00:00
|
|
|
var AppSharedDir syncs.AtomicValue[string]
|
2021-03-31 21:08:32 +00:00
|
|
|
|
2020-03-03 17:33:09 +00:00
|
|
|
// DefaultTailscaledSocket returns the path to the tailscaled Unix socket
|
|
|
|
// or the empty string if there's no reasonable default.
|
|
|
|
func DefaultTailscaledSocket() string {
|
|
|
|
if runtime.GOOS == "windows" {
|
|
|
|
return ""
|
|
|
|
}
|
2021-02-13 20:10:20 +00:00
|
|
|
if runtime.GOOS == "darwin" {
|
|
|
|
return "/var/run/tailscaled.socket"
|
|
|
|
}
|
2022-03-02 03:49:24 +00:00
|
|
|
switch distro.Get() {
|
|
|
|
case distro.Synology:
|
2021-05-30 05:48:22 +00:00
|
|
|
// TODO(maisem): be smarter about this. We can parse /etc/VERSION.
|
|
|
|
const dsm6Sock = "/var/packages/Tailscale/etc/tailscaled.sock"
|
|
|
|
const dsm7Sock = "/var/packages/Tailscale/var/tailscaled.sock"
|
|
|
|
if fi, err := os.Stat(dsm6Sock); err == nil && !fi.IsDir() {
|
|
|
|
return dsm6Sock
|
|
|
|
}
|
|
|
|
if fi, err := os.Stat(dsm7Sock); err == nil && !fi.IsDir() {
|
|
|
|
return dsm7Sock
|
2021-04-02 16:02:53 +00:00
|
|
|
}
|
2022-03-02 03:49:24 +00:00
|
|
|
case distro.Gokrazy:
|
|
|
|
return "/perm/tailscaled/tailscaled.sock"
|
2021-04-02 16:02:53 +00:00
|
|
|
}
|
2020-03-04 01:37:37 +00:00
|
|
|
if fi, err := os.Stat("/var/run"); err == nil && fi.IsDir() {
|
|
|
|
return "/var/run/tailscale/tailscaled.sock"
|
2020-03-03 17:33:09 +00:00
|
|
|
}
|
|
|
|
return "tailscaled.sock"
|
|
|
|
}
|
|
|
|
|
|
|
|
var stateFileFunc func() string
|
|
|
|
|
|
|
|
// DefaultTailscaledStateFile returns the default path to the
|
|
|
|
// tailscaled state file, or the empty string if there's no reasonable
|
|
|
|
// default value.
|
|
|
|
func DefaultTailscaledStateFile() string {
|
|
|
|
if f := stateFileFunc; f != nil {
|
|
|
|
return f()
|
|
|
|
}
|
2021-02-05 17:53:54 +00:00
|
|
|
if runtime.GOOS == "windows" {
|
2021-09-15 02:29:07 +00:00
|
|
|
return filepath.Join(os.Getenv("ProgramData"), "Tailscale", "server-state.conf")
|
2021-02-05 17:53:54 +00:00
|
|
|
}
|
2020-03-03 17:33:09 +00:00
|
|
|
return ""
|
|
|
|
}
|
2021-09-21 21:00:30 +00:00
|
|
|
|
|
|
|
// MkStateDir ensures that dirPath, the daemon's configurtaion directory
|
|
|
|
// containing machine keys etc, both exists and has the correct permissions.
|
|
|
|
// We want it to only be accessible to the user the daemon is running under.
|
|
|
|
func MkStateDir(dirPath string) error {
|
|
|
|
if err := os.MkdirAll(dirPath, 0700); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
return ensureStateDirPerms(dirPath)
|
|
|
|
}
|