2023-01-27 13:37:20 -08:00
// Copyright (c) Tailscale Inc & AUTHORS
// SPDX-License-Identifier: BSD-3-Clause
2021-03-05 12:08:20 -08:00
package cli
import (
2021-11-16 11:38:40 -08:00
"bufio"
"bytes"
2021-03-05 12:08:20 -08:00
"context"
2022-04-20 14:25:27 -07:00
"encoding/binary"
2021-03-30 10:42:35 -07:00
"encoding/json"
2021-03-05 12:08:20 -08:00
"errors"
"flag"
2021-03-30 10:42:35 -07:00
"fmt"
2021-03-30 12:56:00 -07:00
"io"
"log"
2022-06-08 08:15:16 -07:00
"net"
"net/http"
2022-11-21 09:00:20 -08:00
"net/http/httputil"
2022-07-24 20:08:42 -07:00
"net/netip"
2022-11-13 09:48:50 -08:00
"net/url"
2021-03-05 12:08:20 -08:00
"os"
2023-01-19 14:28:49 -08:00
"os/exec"
2021-04-06 14:04:59 -07:00
"runtime"
2024-07-29 19:23:26 -07:00
"runtime/debug"
2021-11-16 11:38:40 -08:00
"strconv"
2021-03-30 12:56:00 -07:00
"strings"
2021-11-16 11:38:40 -08:00
"time"
2021-03-05 12:08:20 -08:00
2021-08-19 11:10:27 -07:00
"github.com/peterbourgon/ff/v3/ffcli"
2022-11-13 09:48:50 -08:00
"golang.org/x/net/http/httpproxy"
2024-06-19 18:30:55 -04:00
"golang.org/x/net/http2"
2023-08-21 16:53:47 -04:00
"tailscale.com/client/tailscale"
2022-11-21 09:00:20 -08:00
"tailscale.com/client/tailscale/apitype"
2022-06-08 08:15:16 -07:00
"tailscale.com/control/controlhttp"
2022-02-20 07:59:26 -08:00
"tailscale.com/hostinfo"
2024-06-19 18:30:55 -04:00
"tailscale.com/internal/noiseconn"
2021-03-30 10:42:35 -07:00
"tailscale.com/ipn"
2024-11-20 17:48:06 -05:00
"tailscale.com/net/netmon"
2022-04-20 14:25:27 -07:00
"tailscale.com/net/tsaddr"
2022-11-13 09:48:50 -08:00
"tailscale.com/net/tshttpproxy"
2021-04-06 14:04:59 -07:00
"tailscale.com/paths"
"tailscale.com/safesocket"
2022-06-08 08:15:16 -07:00
"tailscale.com/tailcfg"
"tailscale.com/types/key"
2022-11-13 09:48:50 -08:00
"tailscale.com/types/logger"
2022-11-26 14:23:00 -08:00
"tailscale.com/util/must"
2023-01-19 14:28:49 -08:00
"tailscale.com/wgengine/capture"
2021-03-05 12:08:20 -08:00
)
var debugCmd = & ffcli . Command {
2024-04-04 17:06:09 +01:00
Name : "debug" ,
Exec : runDebug ,
ShortUsage : "tailscale debug <debug-flags | subcommand>" ,
2024-02-29 22:56:25 +00:00
ShortHelp : "Debug commands" ,
LongHelp : hidden + ` "tailscale debug" contains misc debug facilities; it is not a stable interface. ` ,
2021-03-05 12:08:20 -08:00
FlagSet : ( func ( ) * flag . FlagSet {
2021-10-27 13:57:05 -07:00
fs := newFlagSet ( "debug" )
2021-03-30 12:56:00 -07:00
fs . StringVar ( & debugArgs . file , "file" , "" , "get, delete:NAME, or NAME" )
2022-10-16 08:41:38 -07:00
fs . StringVar ( & debugArgs . cpuFile , "cpu-profile" , "" , "if non-empty, grab a CPU profile for --profile-seconds seconds and write it to this file; - for stdout" )
2021-09-23 15:03:10 -07:00
fs . StringVar ( & debugArgs . memFile , "mem-profile" , "" , "if non-empty, grab a memory profile and write it to this file; - for stdout" )
2021-09-23 09:20:14 -07:00
fs . IntVar ( & debugArgs . cpuSec , "profile-seconds" , 15 , "number of seconds to run a CPU profile for, when --cpu-profile is non-empty" )
2021-03-05 12:08:20 -08:00
return fs
} ) ( ) ,
2021-11-15 14:21:55 -08:00
Subcommands : [ ] * ffcli . Command {
{
2024-04-04 17:06:09 +01:00
Name : "derp-map" ,
ShortUsage : "tailscale debug derp-map" ,
Exec : runDERPMap ,
ShortHelp : "Print DERP map" ,
2021-11-15 14:21:55 -08:00
} ,
2022-10-03 20:39:45 -07:00
{
2023-10-03 12:31:56 +02:00
Name : "component-logs" ,
ShortUsage : "tailscale debug component-logs [" + strings . Join ( ipn . DebuggableComponents , "|" ) + "]" ,
2024-04-04 17:06:09 +01:00
Exec : runDebugComponentLogs ,
ShortHelp : "Enable/disable debug logs for a component" ,
2022-10-03 20:39:45 -07:00
FlagSet : ( func ( ) * flag . FlagSet {
fs := newFlagSet ( "component-logs" )
fs . DurationVar ( & debugComponentLogsArgs . forDur , "for" , time . Hour , "how long to enable debug logs for; zero or negative means to disable" )
return fs
} ) ( ) ,
} ,
2021-11-15 14:21:55 -08:00
{
2024-04-04 17:06:09 +01:00
Name : "daemon-goroutines" ,
ShortUsage : "tailscale debug daemon-goroutines" ,
Exec : runDaemonGoroutines ,
ShortHelp : "Print tailscaled's goroutines" ,
2021-11-15 14:21:55 -08:00
} ,
2022-12-23 20:54:30 -08:00
{
2024-04-04 17:06:09 +01:00
Name : "daemon-logs" ,
ShortUsage : "tailscale debug daemon-logs" ,
Exec : runDaemonLogs ,
ShortHelp : "Watch tailscaled's server logs" ,
2022-12-23 20:54:30 -08:00
FlagSet : ( func ( ) * flag . FlagSet {
fs := newFlagSet ( "daemon-logs" )
fs . IntVar ( & daemonLogsArgs . verbose , "verbose" , 0 , "verbosity level" )
fs . BoolVar ( & daemonLogsArgs . time , "time" , false , "include client time" )
return fs
} ) ( ) ,
} ,
2021-11-15 15:06:37 -08:00
{
2024-04-04 17:06:09 +01:00
Name : "metrics" ,
ShortUsage : "tailscale debug metrics" ,
Exec : runDaemonMetrics ,
ShortHelp : "Print tailscaled's metrics" ,
2021-11-16 11:38:40 -08:00
FlagSet : ( func ( ) * flag . FlagSet {
fs := newFlagSet ( "metrics" )
fs . BoolVar ( & metricsArgs . watch , "watch" , false , "print JSON dump of delta values" )
return fs
} ) ( ) ,
2021-11-15 15:06:37 -08:00
} ,
{
2024-04-04 17:06:09 +01:00
Name : "env" ,
ShortUsage : "tailscale debug env" ,
Exec : runEnv ,
ShortHelp : "Print cmd/tailscale environment" ,
2021-11-15 14:21:55 -08:00
} ,
2022-04-26 06:09:02 -07:00
{
2024-04-04 17:06:09 +01:00
Name : "stat" ,
ShortUsage : "tailscale debug stat <files...>" ,
Exec : runStat ,
ShortHelp : "Stat a file" ,
2022-04-26 06:09:02 -07:00
} ,
2022-02-20 07:59:26 -08:00
{
2024-04-04 17:06:09 +01:00
Name : "hostinfo" ,
ShortUsage : "tailscale debug hostinfo" ,
Exec : runHostinfo ,
ShortHelp : "Print hostinfo" ,
2022-02-20 07:59:26 -08:00
} ,
2021-11-15 15:06:37 -08:00
{
2024-04-04 17:06:09 +01:00
Name : "local-creds" ,
ShortUsage : "tailscale debug local-creds" ,
Exec : runLocalCreds ,
ShortHelp : "Print how to access Tailscale LocalAPI" ,
2021-11-15 14:21:55 -08:00
} ,
2021-12-28 19:41:41 -08:00
{
2024-04-04 17:06:09 +01:00
Name : "restun" ,
ShortUsage : "tailscale debug restun" ,
Exec : localAPIAction ( "restun" ) ,
ShortHelp : "Force a magicsock restun" ,
2021-12-28 19:41:41 -08:00
} ,
{
2024-04-04 17:06:09 +01:00
Name : "rebind" ,
ShortUsage : "tailscale debug rebind" ,
Exec : localAPIAction ( "rebind" ) ,
ShortHelp : "Force a magicsock rebind" ,
2021-12-28 19:41:41 -08:00
} ,
2023-11-15 15:10:45 -08:00
{
2024-04-04 17:06:09 +01:00
Name : "derp-set-on-demand" ,
ShortUsage : "tailscale debug derp-set-on-demand" ,
Exec : localAPIAction ( "derp-set-homeless" ) ,
ShortHelp : "Enable DERP on-demand mode (breaks reachability)" ,
2023-11-15 15:10:45 -08:00
} ,
{
2024-04-04 17:06:09 +01:00
Name : "derp-unset-on-demand" ,
ShortUsage : "tailscale debug derp-unset-on-demand" ,
Exec : localAPIAction ( "derp-unset-homeless" ) ,
ShortHelp : "Disable DERP on-demand mode" ,
2023-11-15 15:10:45 -08:00
} ,
2023-08-10 21:45:16 -07:00
{
2024-04-04 17:06:09 +01:00
Name : "break-tcp-conns" ,
ShortUsage : "tailscale debug break-tcp-conns" ,
Exec : localAPIAction ( "break-tcp-conns" ) ,
ShortHelp : "Break any open TCP connections from the daemon" ,
2023-08-10 21:45:16 -07:00
} ,
{
2024-04-04 17:06:09 +01:00
Name : "break-derp-conns" ,
ShortUsage : "tailscale debug break-derp-conns" ,
Exec : localAPIAction ( "break-derp-conns" ) ,
ShortHelp : "Break any open DERP connections from the daemon" ,
2023-08-10 21:45:16 -07:00
} ,
2023-10-06 20:39:23 -07:00
{
2024-04-04 17:06:09 +01:00
Name : "pick-new-derp" ,
ShortUsage : "tailscale debug pick-new-derp" ,
Exec : localAPIAction ( "pick-new-derp" ) ,
ShortHelp : "Switch to some other random DERP home region for a short time" ,
2023-10-06 20:39:23 -07:00
} ,
2024-12-04 12:02:59 -08:00
{
Name : "force-prefer-derp" ,
ShortUsage : "tailscale debug force-prefer-derp" ,
Exec : forcePreferDERP ,
ShortHelp : "Prefer the given region ID if reachable (until restart, or 0 to clear)" ,
} ,
2023-09-24 08:08:28 -07:00
{
2024-04-04 17:06:09 +01:00
Name : "force-netmap-update" ,
ShortUsage : "tailscale debug force-netmap-update" ,
Exec : localAPIAction ( "force-netmap-update" ) ,
ShortHelp : "Force a full no-op netmap update (for load testing)" ,
2023-09-24 08:08:28 -07:00
} ,
2023-10-11 13:55:57 -07:00
{
// TODO(bradfitz,maisem): eventually promote this out of debug
2024-04-04 17:06:09 +01:00
Name : "reload-config" ,
ShortUsage : "tailscale debug reload-config" ,
Exec : reloadConfig ,
ShortHelp : "Reload config" ,
2023-10-11 13:55:57 -07:00
} ,
2023-09-11 21:44:38 -07:00
{
2024-04-04 17:06:09 +01:00
Name : "control-knobs" ,
ShortUsage : "tailscale debug control-knobs" ,
Exec : debugControlKnobs ,
ShortHelp : "See current control knobs" ,
2023-09-11 21:44:38 -07:00
} ,
2021-11-15 15:06:37 -08:00
{
2024-04-04 17:06:09 +01:00
Name : "prefs" ,
ShortUsage : "tailscale debug prefs" ,
Exec : runPrefs ,
ShortHelp : "Print prefs" ,
2021-11-15 14:21:55 -08:00
FlagSet : ( func ( ) * flag . FlagSet {
fs := newFlagSet ( "prefs" )
fs . BoolVar ( & prefsArgs . pretty , "pretty" , false , "If true, pretty-print output" )
return fs
} ) ( ) ,
} ,
2021-11-15 15:06:37 -08:00
{
2024-04-04 17:06:09 +01:00
Name : "watch-ipn" ,
ShortUsage : "tailscale debug watch-ipn" ,
Exec : runWatchIPN ,
ShortHelp : "Subscribe to IPN message bus" ,
2021-11-15 14:21:55 -08:00
FlagSet : ( func ( ) * flag . FlagSet {
fs := newFlagSet ( "watch-ipn" )
fs . BoolVar ( & watchIPNArgs . netmap , "netmap" , true , "include netmap in messages" )
2022-11-30 17:39:43 -08:00
fs . BoolVar ( & watchIPNArgs . initial , "initial" , false , "include initial status" )
2024-11-15 13:31:35 -08:00
fs . BoolVar ( & watchIPNArgs . rateLimit , "rate-limit" , true , "rate limit messags" )
2022-12-21 12:44:51 -08:00
fs . BoolVar ( & watchIPNArgs . showPrivateKey , "show-private-key" , false , "include node private key in printed netmap" )
2023-11-18 14:29:02 -08:00
fs . IntVar ( & watchIPNArgs . count , "count" , 0 , "exit after printing this many statuses, or 0 to keep going forever" )
2021-11-15 14:21:55 -08:00
return fs
} ) ( ) ,
} ,
2023-11-18 14:40:13 -08:00
{
2024-04-04 17:06:09 +01:00
Name : "netmap" ,
ShortUsage : "tailscale debug netmap" ,
Exec : runNetmap ,
ShortHelp : "Print the current network map" ,
2023-11-18 14:40:13 -08:00
FlagSet : ( func ( ) * flag . FlagSet {
fs := newFlagSet ( "netmap" )
fs . BoolVar ( & netmapArgs . showPrivateKey , "show-private-key" , false , "include node private key in printed netmap" )
return fs
} ) ( ) ,
} ,
2022-04-20 14:25:27 -07:00
{
2024-04-04 17:06:09 +01:00
Name : "via" ,
2024-04-16 11:59:03 +01:00
ShortUsage : "tailscale debug via <site-id> <v4-cidr>\n" +
"tailscale debug via <v6-route>" ,
2022-04-20 14:25:27 -07:00
Exec : runVia ,
2024-04-04 17:06:09 +01:00
ShortHelp : "Convert between site-specific IPv4 CIDRs and IPv6 'via' routes" ,
2022-04-20 14:25:27 -07:00
} ,
2022-06-08 08:15:16 -07:00
{
2024-04-04 17:06:09 +01:00
Name : "ts2021" ,
ShortUsage : "tailscale debug ts2021" ,
Exec : runTS2021 ,
ShortHelp : "Debug ts2021 protocol connectivity" ,
2022-06-08 08:15:16 -07:00
FlagSet : ( func ( ) * flag . FlagSet {
fs := newFlagSet ( "ts2021" )
fs . StringVar ( & ts2021Args . host , "host" , "controlplane.tailscale.com" , "hostname of control plane" )
fs . IntVar ( & ts2021Args . version , "version" , int ( tailcfg . CurrentCapabilityVersion ) , "protocol version" )
2022-11-13 09:48:50 -08:00
fs . BoolVar ( & ts2021Args . verbose , "verbose" , false , "be extra verbose" )
2022-06-08 08:15:16 -07:00
return fs
} ) ( ) ,
} ,
2023-01-23 14:55:36 -08:00
{
2024-04-04 17:06:09 +01:00
Name : "set-expire" ,
ShortUsage : "tailscale debug set-expire --in=1m" ,
Exec : runSetExpire ,
ShortHelp : "Manipulate node key expiry for testing" ,
2023-01-23 14:55:36 -08:00
FlagSet : ( func ( ) * flag . FlagSet {
fs := newFlagSet ( "set-expire" )
fs . DurationVar ( & setExpireArgs . in , "in" , 0 , "if non-zero, set node key to expire this duration from now" )
return fs
} ) ( ) ,
} ,
2022-11-07 13:04:10 -08:00
{
2024-04-04 17:06:09 +01:00
Name : "dev-store-set" ,
ShortUsage : "tailscale debug dev-store-set" ,
Exec : runDevStoreSet ,
ShortHelp : "Set a key/value pair during development" ,
2022-11-07 13:04:10 -08:00
FlagSet : ( func ( ) * flag . FlagSet {
fs := newFlagSet ( "store-set" )
fs . BoolVar ( & devStoreSetArgs . danger , "danger" , false , "accept danger" )
return fs
} ) ( ) ,
} ,
2022-11-26 14:23:00 -08:00
{
2024-04-04 17:06:09 +01:00
Name : "derp" ,
ShortUsage : "tailscale debug derp" ,
Exec : runDebugDERP ,
ShortHelp : "Test a DERP configuration" ,
2022-11-26 14:23:00 -08:00
} ,
2023-01-19 14:28:49 -08:00
{
2024-04-04 17:06:09 +01:00
Name : "capture" ,
ShortUsage : "tailscale debug capture" ,
Exec : runCapture ,
2025-01-23 18:40:17 -08:00
ShortHelp : "Stream pcaps for debugging" ,
2023-01-19 14:28:49 -08:00
FlagSet : ( func ( ) * flag . FlagSet {
fs := newFlagSet ( "capture" )
fs . StringVar ( & captureArgs . outFile , "o" , "" , "path to stream the pcap (or - for stdout), leave empty to start wireshark" )
return fs
} ) ( ) ,
} ,
2023-03-02 18:05:30 -05:00
{
2024-04-04 17:06:09 +01:00
Name : "portmap" ,
ShortUsage : "tailscale debug portmap" ,
Exec : debugPortmap ,
ShortHelp : "Run portmap debugging" ,
2023-03-02 18:05:30 -05:00
FlagSet : ( func ( ) * flag . FlagSet {
fs := newFlagSet ( "portmap" )
fs . DurationVar ( & debugPortmapArgs . duration , "duration" , 5 * time . Second , "timeout for port mapping" )
fs . StringVar ( & debugPortmapArgs . ty , "type" , "" , ` portmap debug type (one of "", "pmp", "pcp", or "upnp") ` )
2023-08-21 16:53:47 -04:00
fs . StringVar ( & debugPortmapArgs . gatewayAddr , "gateway-addr" , "" , ` override gateway IP (must also pass --self-addr) ` )
fs . StringVar ( & debugPortmapArgs . selfAddr , "self-addr" , "" , ` override self IP (must also pass --gateway-addr) ` )
fs . BoolVar ( & debugPortmapArgs . logHTTP , "log-http" , false , ` print all HTTP requests and responses to the log ` )
2023-03-02 18:05:30 -05:00
return fs
} ) ( ) ,
} ,
2023-02-21 15:57:08 -05:00
{
2024-04-04 17:06:09 +01:00
Name : "peer-endpoint-changes" ,
ShortUsage : "tailscale debug peer-endpoint-changes <hostname-or-IP>" ,
Exec : runPeerEndpointChanges ,
2025-01-23 18:40:17 -08:00
ShortHelp : "Print debug information about a peer's endpoint changes" ,
2023-02-21 15:57:08 -05:00
} ,
2024-01-05 11:28:09 -05:00
{
2024-04-04 17:06:09 +01:00
Name : "dial-types" ,
ShortUsage : "tailscale debug dial-types <hostname-or-IP> <port>" ,
Exec : runDebugDialTypes ,
2025-01-23 18:40:17 -08:00
ShortHelp : "Print debug information about connecting to a given host or IP" ,
2024-01-05 11:28:09 -05:00
FlagSet : ( func ( ) * flag . FlagSet {
fs := newFlagSet ( "dial-types" )
fs . StringVar ( & debugDialTypesArgs . network , "network" , "tcp" , ` network type to dial ("tcp", "udp", etc.) ` )
return fs
} ) ( ) ,
} ,
2024-08-21 19:38:48 -07:00
{
Name : "resolve" ,
ShortUsage : "tailscale debug resolve <hostname>" ,
Exec : runDebugResolve ,
ShortHelp : "Does a DNS lookup" ,
FlagSet : ( func ( ) * flag . FlagSet {
fs := newFlagSet ( "resolve" )
fs . StringVar ( & resolveArgs . net , "net" , "ip" , "network type to resolve (ip, ip4, ip6)" )
return fs
} ) ( ) ,
} ,
2024-07-29 19:23:26 -07:00
{
Name : "go-buildinfo" ,
ShortUsage : "tailscale debug go-buildinfo" ,
2025-01-23 18:40:17 -08:00
ShortHelp : "Print Go's runtime/debug.BuildInfo" ,
2024-07-29 19:23:26 -07:00
Exec : runGoBuildInfo ,
} ,
2021-11-15 14:21:55 -08:00
} ,
2021-03-05 12:08:20 -08:00
}
2024-07-29 19:23:26 -07:00
func runGoBuildInfo ( ctx context . Context , args [ ] string ) error {
bi , ok := debug . ReadBuildInfo ( )
if ! ok {
return errors . New ( "no Go build info" )
}
e := json . NewEncoder ( os . Stdout )
e . SetIndent ( "" , "\t" )
return e . Encode ( bi )
}
2021-03-05 12:08:20 -08:00
var debugArgs struct {
2021-11-15 14:21:55 -08:00
file string
cpuSec int
cpuFile string
memFile string
2021-03-05 12:08:20 -08:00
}
2021-09-23 15:03:10 -07:00
func writeProfile ( dst string , v [ ] byte ) error {
if dst == "-" {
2021-10-27 14:53:46 -07:00
_ , err := Stdout . Write ( v )
2021-09-23 15:03:10 -07:00
return err
}
return os . WriteFile ( dst , v , 0600 )
}
func outName ( dst string ) string {
if dst == "-" {
return "stdout"
}
if runtime . GOOS == "darwin" {
return fmt . Sprintf ( "%s (warning: sandboxed macOS binaries write to Library/Containers; use - to write to stdout and redirect to file instead)" , dst )
}
return dst
}
2021-03-05 12:08:20 -08:00
func runDebug ( ctx context . Context , args [ ] string ) error {
if len ( args ) > 0 {
2024-04-16 15:18:57 +01:00
return fmt . Errorf ( "tailscale debug: unknown subcommand: %s" , args [ 0 ] )
2021-03-05 12:08:20 -08:00
}
2021-11-15 14:21:55 -08:00
var usedFlag bool
2021-09-23 09:20:14 -07:00
if out := debugArgs . cpuFile ; out != "" {
2022-11-10 11:41:04 -08:00
usedFlag = true // TODO(bradfitz): add "pprof" subcommand
2021-09-23 09:20:14 -07:00
log . Printf ( "Capturing CPU profile for %v seconds ..." , debugArgs . cpuSec )
2022-11-10 11:41:04 -08:00
if v , err := localClient . Pprof ( ctx , "profile" , debugArgs . cpuSec ) ; err != nil {
2021-09-23 09:20:14 -07:00
return err
} else {
2021-09-23 15:03:10 -07:00
if err := writeProfile ( out , v ) ; err != nil {
2021-09-23 09:20:14 -07:00
return err
}
2021-09-23 15:03:10 -07:00
log . Printf ( "CPU profile written to %s" , outName ( out ) )
2021-09-23 09:20:14 -07:00
}
}
if out := debugArgs . memFile ; out != "" {
2022-11-10 11:41:04 -08:00
usedFlag = true // TODO(bradfitz): add "pprof" subcommand
2021-09-23 09:20:14 -07:00
log . Printf ( "Capturing memory profile ..." )
2022-11-10 11:41:04 -08:00
if v , err := localClient . Pprof ( ctx , "heap" , 0 ) ; err != nil {
2021-09-23 09:20:14 -07:00
return err
} else {
2021-09-23 15:03:10 -07:00
if err := writeProfile ( out , v ) ; err != nil {
2021-09-23 09:20:14 -07:00
return err
}
2021-09-23 15:03:10 -07:00
log . Printf ( "Memory profile written to %s" , outName ( out ) )
2021-09-23 09:20:14 -07:00
}
}
2021-03-30 12:56:00 -07:00
if debugArgs . file != "" {
2021-11-15 14:21:55 -08:00
usedFlag = true // TODO(bradfitz): add "file" subcommand
2021-03-30 12:56:00 -07:00
if debugArgs . file == "get" {
2022-04-29 11:20:11 -07:00
wfs , err := localClient . WaitingFiles ( ctx )
2021-03-30 12:56:00 -07:00
if err != nil {
2021-10-27 15:18:48 -07:00
fatalf ( "%v\n" , err )
2021-03-30 12:56:00 -07:00
}
2021-10-27 14:53:46 -07:00
e := json . NewEncoder ( Stdout )
2021-03-30 12:56:00 -07:00
e . SetIndent ( "" , "\t" )
e . Encode ( wfs )
return nil
}
2023-02-01 13:43:06 -08:00
if name , ok := strings . CutPrefix ( debugArgs . file , "delete:" ) ; ok {
2022-11-18 10:13:14 -08:00
return localClient . DeleteWaitingFile ( ctx , name )
2021-03-30 12:56:00 -07:00
}
2022-04-29 11:20:11 -07:00
rc , size , err := localClient . GetWaitingFile ( ctx , debugArgs . file )
2021-03-30 12:56:00 -07:00
if err != nil {
return err
}
log . Printf ( "Size: %v\n" , size )
2021-10-27 14:53:46 -07:00
io . Copy ( Stdout , rc )
2021-03-30 12:56:00 -07:00
return nil
}
2021-11-15 14:21:55 -08:00
if usedFlag {
// TODO(bradfitz): delete this path when all debug flags are migrated
// to subcommands.
return nil
}
2024-04-16 15:18:57 +01:00
return errors . New ( "tailscale debug: subcommand or flag required" )
2021-11-15 14:21:55 -08:00
}
func runLocalCreds ( ctx context . Context , args [ ] string ) error {
port , token , err := safesocket . LocalTCPPortAndToken ( )
if err == nil {
printf ( "curl -u:%s http://localhost:%d/localapi/v0/status\n" , token , port )
return nil
}
if runtime . GOOS == "windows" {
2022-11-21 09:00:20 -08:00
runLocalAPIProxy ( )
2021-11-15 14:21:55 -08:00
return nil
}
2022-11-23 09:44:50 -08:00
printf ( "curl --unix-socket %s http://local-tailscaled.sock/localapi/v0/status\n" , paths . DefaultTailscaledSocket ( ) )
2021-11-15 14:21:55 -08:00
return nil
}
2022-11-21 09:00:20 -08:00
type localClientRoundTripper struct { }
func ( localClientRoundTripper ) RoundTrip ( req * http . Request ) ( * http . Response , error ) {
return localClient . DoLocalRequest ( req )
}
func runLocalAPIProxy ( ) {
rp := httputil . NewSingleHostReverseProxy ( & url . URL {
Scheme : "http" ,
Host : apitype . LocalAPIHost ,
Path : "/" ,
} )
dir := rp . Director
rp . Director = func ( req * http . Request ) {
dir ( req )
req . Host = ""
req . RequestURI = ""
}
rp . Transport = localClientRoundTripper { }
lc , err := net . Listen ( "tcp" , "localhost:0" )
if err != nil {
log . Fatal ( err )
}
fmt . Printf ( "Serving LocalAPI proxy on http://%s\n" , lc . Addr ( ) )
fmt . Printf ( "curl.exe http://%v/localapi/v0/status\n" , lc . Addr ( ) )
fmt . Printf ( "Ctrl+C to stop" )
http . Serve ( lc , rp )
}
2021-11-15 14:21:55 -08:00
var prefsArgs struct {
pretty bool
}
func runPrefs ( ctx context . Context , args [ ] string ) error {
2022-04-29 11:20:11 -07:00
prefs , err := localClient . GetPrefs ( ctx )
2021-11-15 14:21:55 -08:00
if err != nil {
return err
}
if prefsArgs . pretty {
outln ( prefs . Pretty ( ) )
} else {
j , _ := json . MarshalIndent ( prefs , "" , "\t" )
outln ( string ( j ) )
}
return nil
}
var watchIPNArgs struct {
2022-12-21 12:44:51 -08:00
netmap bool
initial bool
showPrivateKey bool
2024-11-15 13:31:35 -08:00
rateLimit bool
2023-11-18 14:29:02 -08:00
count int
2021-11-15 14:21:55 -08:00
}
func runWatchIPN ( ctx context . Context , args [ ] string ) error {
2022-11-30 17:39:43 -08:00
var mask ipn . NotifyWatchOpt
if watchIPNArgs . initial {
mask = ipn . NotifyInitialState | ipn . NotifyInitialPrefs | ipn . NotifyInitialNetMap
}
2022-12-21 12:44:51 -08:00
if ! watchIPNArgs . showPrivateKey {
mask |= ipn . NotifyNoPrivateKeys
}
2024-11-15 13:31:35 -08:00
if watchIPNArgs . rateLimit {
mask |= ipn . NotifyRateLimit
}
2022-11-30 17:39:43 -08:00
watcher , err := localClient . WatchIPNBus ( ctx , mask )
2022-11-22 11:41:03 -08:00
if err != nil {
return err
}
defer watcher . Close ( )
2024-04-07 18:17:25 -07:00
fmt . Fprintf ( Stderr , "Connected.\n" )
2023-11-18 14:29:02 -08:00
for seen := 0 ; watchIPNArgs . count == 0 || seen < watchIPNArgs . count ; seen ++ {
2022-11-22 11:41:03 -08:00
n , err := watcher . Next ( )
if err != nil {
return err
}
2021-11-15 14:21:55 -08:00
if ! watchIPNArgs . netmap {
n . NetMap = nil
}
j , _ := json . MarshalIndent ( n , "" , "\t" )
2023-11-18 14:29:02 -08:00
fmt . Printf ( "%s\n" , j )
2022-11-22 11:41:03 -08:00
}
2023-11-18 14:29:02 -08:00
return nil
2021-11-15 14:21:55 -08:00
}
2023-11-18 14:40:13 -08:00
var netmapArgs struct {
showPrivateKey bool
}
func runNetmap ( ctx context . Context , args [ ] string ) error {
ctx , cancel := context . WithTimeout ( ctx , 5 * time . Second )
defer cancel ( )
var mask ipn . NotifyWatchOpt = ipn . NotifyInitialNetMap
if ! netmapArgs . showPrivateKey {
mask |= ipn . NotifyNoPrivateKeys
}
watcher , err := localClient . WatchIPNBus ( ctx , mask )
if err != nil {
return err
}
defer watcher . Close ( )
n , err := watcher . Next ( )
if err != nil {
return err
}
j , _ := json . MarshalIndent ( n . NetMap , "" , "\t" )
fmt . Printf ( "%s\n" , j )
return nil
}
2021-11-15 14:21:55 -08:00
func runDERPMap ( ctx context . Context , args [ ] string ) error {
2022-04-29 11:20:11 -07:00
dm , err := localClient . CurrentDERPMap ( ctx )
2021-11-15 14:21:55 -08:00
if err != nil {
return fmt . Errorf (
"failed to get local derp map, instead `curl %s/derpmap/default`: %w" , ipn . DefaultControlURL , err ,
)
}
enc := json . NewEncoder ( Stdout )
enc . SetIndent ( "" , "\t" )
enc . Encode ( dm )
return nil
}
2024-12-04 12:02:59 -08:00
func forcePreferDERP ( ctx context . Context , args [ ] string ) error {
var n int
if len ( args ) != 1 {
return errors . New ( "expected exactly one integer argument" )
}
n , err := strconv . Atoi ( args [ 0 ] )
if err != nil {
return fmt . Errorf ( "expected exactly one integer argument: %w" , err )
}
b , err := json . Marshal ( n )
if err != nil {
return fmt . Errorf ( "failed to marshal DERP region: %w" , err )
}
if err := localClient . DebugActionBody ( ctx , "force-prefer-derp" , bytes . NewReader ( b ) ) ; err != nil {
return fmt . Errorf ( "failed to force preferred DERP: %w" , err )
}
return nil
}
2021-12-28 19:41:41 -08:00
func localAPIAction ( action string ) func ( context . Context , [ ] string ) error {
return func ( ctx context . Context , args [ ] string ) error {
if len ( args ) > 0 {
return errors . New ( "unexpected arguments" )
}
2022-04-29 11:20:11 -07:00
return localClient . DebugAction ( ctx , action )
2021-12-28 19:41:41 -08:00
}
}
2023-10-11 13:55:57 -07:00
func reloadConfig ( ctx context . Context , args [ ] string ) error {
ok , err := localClient . ReloadConfig ( ctx )
if err != nil {
return err
}
if ok {
printf ( "config reloaded\n" )
return nil
}
printf ( "config mode not in use\n" )
os . Exit ( 1 )
panic ( "unreachable" )
}
2021-11-15 14:21:55 -08:00
func runEnv ( ctx context . Context , args [ ] string ) error {
for _ , e := range os . Environ ( ) {
outln ( e )
}
return nil
}
2022-04-26 06:09:02 -07:00
func runStat ( ctx context . Context , args [ ] string ) error {
for _ , a := range args {
fi , err := os . Lstat ( a )
if err != nil {
2022-08-02 12:23:35 -07:00
printf ( "%s: %v\n" , a , err )
2022-04-26 06:09:02 -07:00
continue
}
2022-08-02 12:23:35 -07:00
printf ( "%s: %v, %v\n" , a , fi . Mode ( ) , fi . Size ( ) )
2022-04-26 06:09:02 -07:00
if fi . IsDir ( ) {
ents , _ := os . ReadDir ( a )
for i , ent := range ents {
if i == 25 {
2022-08-02 12:23:35 -07:00
printf ( " ...\n" )
2022-04-26 06:09:02 -07:00
break
}
2022-08-02 12:23:35 -07:00
printf ( " - %s\n" , ent . Name ( ) )
2022-04-26 06:09:02 -07:00
}
}
}
return nil
}
2022-02-20 07:59:26 -08:00
func runHostinfo ( ctx context . Context , args [ ] string ) error {
hi := hostinfo . New ( )
j , _ := json . MarshalIndent ( hi , "" , " " )
2024-04-07 18:17:25 -07:00
Stdout . Write ( j )
2022-02-20 07:59:26 -08:00
return nil
}
2021-11-15 14:21:55 -08:00
func runDaemonGoroutines ( ctx context . Context , args [ ] string ) error {
2022-04-29 11:20:11 -07:00
goroutines , err := localClient . Goroutines ( ctx )
2021-11-15 14:21:55 -08:00
if err != nil {
return err
}
Stdout . Write ( goroutines )
2021-03-05 12:08:20 -08:00
return nil
}
2021-11-15 15:06:37 -08:00
2022-12-23 20:54:30 -08:00
var daemonLogsArgs struct {
verbose int
time bool
}
func runDaemonLogs ( ctx context . Context , args [ ] string ) error {
logs , err := localClient . TailDaemonLogs ( ctx )
if err != nil {
return err
}
d := json . NewDecoder ( logs )
for {
var line struct {
Text string ` json:"text" `
Verbose int ` json:"v" `
Time string ` json:"client_time" `
}
err := d . Decode ( & line )
if err != nil {
return err
}
line . Text = strings . TrimSpace ( line . Text )
if line . Text == "" || line . Verbose > daemonLogsArgs . verbose {
continue
}
if daemonLogsArgs . time {
fmt . Printf ( "%s %s\n" , line . Time , line . Text )
} else {
fmt . Println ( line . Text )
}
}
}
2021-11-16 11:38:40 -08:00
var metricsArgs struct {
watch bool
}
2021-11-15 15:06:37 -08:00
func runDaemonMetrics ( ctx context . Context , args [ ] string ) error {
2021-11-16 11:38:40 -08:00
last := map [ string ] int64 { }
for {
2022-04-29 11:20:11 -07:00
out , err := localClient . DaemonMetrics ( ctx )
2021-11-16 11:38:40 -08:00
if err != nil {
return err
}
if ! metricsArgs . watch {
Stdout . Write ( out )
return nil
}
bs := bufio . NewScanner ( bytes . NewReader ( out ) )
type change struct {
name string
from , to int64
}
var changes [ ] change
var maxNameLen int
for bs . Scan ( ) {
line := bytes . TrimSpace ( bs . Bytes ( ) )
if len ( line ) == 0 || line [ 0 ] == '#' {
continue
}
f := strings . Fields ( string ( line ) )
if len ( f ) != 2 {
continue
}
name := f [ 0 ]
n , _ := strconv . ParseInt ( f [ 1 ] , 10 , 64 )
prev , ok := last [ name ]
if ok && prev == n {
continue
}
last [ name ] = n
if ! ok {
continue
}
changes = append ( changes , change { name , prev , n } )
if len ( name ) > maxNameLen {
maxNameLen = len ( name )
}
}
if len ( changes ) > 0 {
format := fmt . Sprintf ( "%%-%ds %%+5d => %%v\n" , maxNameLen )
for _ , c := range changes {
fmt . Fprintf ( Stdout , format , c . name , c . to - c . from , c . to )
}
io . WriteString ( Stdout , "\n" )
}
time . Sleep ( time . Second )
2021-11-15 15:06:37 -08:00
}
}
2022-04-20 14:25:27 -07:00
func runVia ( ctx context . Context , args [ ] string ) error {
switch len ( args ) {
default :
return errors . New ( "expect either <site-id> <v4-cidr> or <v6-route>" )
case 1 :
2022-07-25 20:55:44 -07:00
ipp , err := netip . ParsePrefix ( args [ 0 ] )
2022-04-20 14:25:27 -07:00
if err != nil {
return err
}
2022-07-24 20:08:42 -07:00
if ! ipp . Addr ( ) . Is6 ( ) {
2022-04-20 14:25:27 -07:00
return errors . New ( "with one argument, expect an IPv6 CIDR" )
}
2022-07-24 20:08:42 -07:00
if ! tsaddr . TailscaleViaRange ( ) . Contains ( ipp . Addr ( ) ) {
2022-04-20 14:25:27 -07:00
return errors . New ( "not a via route" )
}
if ipp . Bits ( ) < 96 {
return errors . New ( "short length, want /96 or more" )
}
2022-07-24 20:08:42 -07:00
v4 := tsaddr . UnmapVia ( ipp . Addr ( ) )
a := ipp . Addr ( ) . As16 ( )
2022-04-20 14:25:27 -07:00
siteID := binary . BigEndian . Uint32 ( a [ 8 : 12 ] )
2022-08-02 12:23:35 -07:00
printf ( "site %v (0x%x), %v\n" , siteID , siteID , netip . PrefixFrom ( v4 , ipp . Bits ( ) - 96 ) )
2022-04-20 14:25:27 -07:00
case 2 :
siteID , err := strconv . ParseUint ( args [ 0 ] , 0 , 32 )
if err != nil {
return fmt . Errorf ( "invalid site-id %q; must be decimal or hex with 0x prefix" , args [ 0 ] )
}
2024-01-05 15:21:48 -05:00
if siteID > 0xffff {
return fmt . Errorf ( "site-id values over 65535 are currently reserved" )
2022-04-20 14:25:27 -07:00
}
2022-07-25 20:55:44 -07:00
ipp , err := netip . ParsePrefix ( args [ 1 ] )
2022-04-20 14:25:27 -07:00
if err != nil {
return err
}
via , err := tsaddr . MapVia ( uint32 ( siteID ) , ipp )
if err != nil {
return err
}
2022-08-02 12:23:35 -07:00
outln ( via )
2022-04-20 14:25:27 -07:00
}
return nil
}
2022-06-08 08:15:16 -07:00
var ts2021Args struct {
host string // "controlplane.tailscale.com"
version int // 27 or whatever
2022-11-13 09:48:50 -08:00
verbose bool
2022-06-08 08:15:16 -07:00
}
func runTS2021 ( ctx context . Context , args [ ] string ) error {
2024-04-07 18:17:25 -07:00
log . SetOutput ( Stdout )
2022-06-08 08:15:16 -07:00
log . SetFlags ( log . Ltime | log . Lmicroseconds )
2022-11-13 09:48:50 -08:00
keysURL := "https://" + ts2021Args . host + "/key?v=" + strconv . Itoa ( ts2021Args . version )
if ts2021Args . verbose {
u , err := url . Parse ( keysURL )
if err != nil {
return err
}
envConf := httpproxy . FromEnvironment ( )
if * envConf == ( httpproxy . Config { } ) {
log . Printf ( "HTTP proxy env: (none)" )
} else {
log . Printf ( "HTTP proxy env: %+v" , envConf )
}
proxy , err := tshttpproxy . ProxyFromEnvironment ( & http . Request { URL : u } )
log . Printf ( "tshttpproxy.ProxyFromEnvironment = (%v, %v)" , proxy , err )
}
2022-06-08 08:15:16 -07:00
machinePrivate := key . NewMachine ( )
var dialer net . Dialer
var keys struct {
PublicKey key . MachinePublic
}
log . Printf ( "Fetching keys from %s ..." , keysURL )
req , err := http . NewRequestWithContext ( ctx , "GET" , keysURL , nil )
if err != nil {
return err
}
res , err := http . DefaultClient . Do ( req )
if err != nil {
log . Printf ( "Do: %v" , err )
return err
}
if res . StatusCode != 200 {
log . Printf ( "Status: %v" , res . Status )
return errors . New ( res . Status )
}
if err := json . NewDecoder ( res . Body ) . Decode ( & keys ) ; err != nil {
log . Printf ( "JSON: %v" , err )
return fmt . Errorf ( "decoding /keys JSON: %w" , err )
}
res . Body . Close ( )
2022-11-13 09:48:50 -08:00
if ts2021Args . verbose {
log . Printf ( "got public key: %v" , keys . PublicKey )
}
2022-06-08 08:15:16 -07:00
dialFunc := func ( ctx context . Context , network , address string ) ( net . Conn , error ) {
log . Printf ( "Dial(%q, %q) ..." , network , address )
c , err := dialer . DialContext ( ctx , network , address )
if err != nil {
2024-06-19 18:30:55 -04:00
// skip logging context cancellation errors
if ! errors . Is ( err , context . Canceled ) {
log . Printf ( "Dial(%q, %q) = %v" , network , address , err )
}
2022-06-08 08:15:16 -07:00
} else {
log . Printf ( "Dial(%q, %q) = %v / %v" , network , address , c . LocalAddr ( ) , c . RemoteAddr ( ) )
}
return c , err
}
2022-11-13 09:48:50 -08:00
var logf logger . Logf
if ts2021Args . verbose {
logf = log . Printf
}
2024-10-01 09:12:39 -07:00
2024-11-20 17:48:06 -05:00
netMon , err := netmon . New ( logger . WithPrefix ( logf , "netmon: " ) )
if err != nil {
return fmt . Errorf ( "creating netmon: %w" , err )
}
2024-10-01 09:12:39 -07:00
noiseDialer := & controlhttp . Dialer {
2022-09-16 15:06:25 -04:00
Hostname : ts2021Args . host ,
HTTPPort : "80" ,
HTTPSPort : "443" ,
MachineKey : machinePrivate ,
ControlKey : keys . PublicKey ,
ProtocolVersion : uint16 ( ts2021Args . version ) ,
Dialer : dialFunc ,
2022-11-13 09:48:50 -08:00
Logf : logf ,
2024-11-20 17:48:06 -05:00
NetMon : netMon ,
2024-10-01 09:12:39 -07:00
}
const tries = 2
for i := range tries {
err := tryConnect ( ctx , keys . PublicKey , noiseDialer )
if err != nil {
log . Printf ( "error on attempt %d/%d: %v" , i + 1 , tries , err )
continue
}
break
}
return nil
}
func tryConnect ( ctx context . Context , controlPublic key . MachinePublic , noiseDialer * controlhttp . Dialer ) error {
conn , err := noiseDialer . Dial ( ctx )
2022-06-08 08:15:16 -07:00
log . Printf ( "controlhttp.Dial = %p, %v" , conn , err )
if err != nil {
return err
}
log . Printf ( "did noise handshake" )
gotPeer := conn . Peer ( )
2024-10-01 09:12:39 -07:00
if gotPeer != controlPublic {
log . Printf ( "peer = %v, want %v" , gotPeer , controlPublic )
2022-06-08 08:15:16 -07:00
return errors . New ( "key mismatch" )
}
log . Printf ( "final underlying conn: %v / %v" , conn . LocalAddr ( ) , conn . RemoteAddr ( ) )
2024-06-19 18:23:01 -04:00
2024-06-19 18:30:55 -04:00
h2Transport , err := http2 . ConfigureTransports ( & http . Transport {
IdleConnTimeout : time . Second ,
} )
2024-06-19 18:23:01 -04:00
if err != nil {
2024-06-19 18:30:55 -04:00
return fmt . Errorf ( "http2.ConfigureTransports: %w" , err )
2024-06-19 18:23:01 -04:00
}
2024-06-19 18:30:55 -04:00
// Now, create a Noise conn over the existing conn.
nc , err := noiseconn . New ( conn . Conn , h2Transport , 0 , nil )
if err != nil {
return fmt . Errorf ( "noiseconn.New: %w" , err )
2024-06-19 18:23:01 -04:00
}
2024-06-19 18:30:55 -04:00
defer nc . Close ( )
// Reserve a RoundTrip for the whoami request.
ok , _ , err := nc . ReserveNewRequest ( ctx )
2024-06-19 18:23:01 -04:00
if err != nil {
2024-06-19 18:30:55 -04:00
return fmt . Errorf ( "ReserveNewRequest: %w" , err )
2024-06-19 18:23:01 -04:00
}
2024-06-19 18:30:55 -04:00
if ! ok {
return errors . New ( "ReserveNewRequest failed" )
}
// Make a /whoami request to the server to verify that we can actually
// communicate over the newly-established connection.
whoamiURL := "http://" + ts2021Args . host + "/machine/whoami"
2024-10-01 09:12:39 -07:00
req , err := http . NewRequestWithContext ( ctx , "GET" , whoamiURL , nil )
2024-06-19 18:23:01 -04:00
if err != nil {
2024-06-19 18:30:55 -04:00
return err
2024-06-19 18:23:01 -04:00
}
2024-06-19 18:30:55 -04:00
resp , err := nc . RoundTrip ( req )
if err != nil {
return fmt . Errorf ( "RoundTrip whoami request: %w" , err )
}
defer resp . Body . Close ( )
2024-06-19 18:23:01 -04:00
2024-06-19 18:30:55 -04:00
if resp . StatusCode != 200 {
log . Printf ( "whoami request returned status %v" , resp . Status )
} else {
body , err := io . ReadAll ( resp . Body )
if err != nil {
return fmt . Errorf ( "reading whoami response: %w" , err )
}
log . Printf ( "whoami response: %q" , body )
}
2022-06-08 08:15:16 -07:00
return nil
}
2022-10-03 20:39:45 -07:00
var debugComponentLogsArgs struct {
forDur time . Duration
}
func runDebugComponentLogs ( ctx context . Context , args [ ] string ) error {
if len ( args ) != 1 {
2024-04-17 08:05:04 +01:00
return errors . New ( "usage: tailscale debug component-logs [" + strings . Join ( ipn . DebuggableComponents , "|" ) + "]" )
2022-10-03 20:39:45 -07:00
}
component := args [ 0 ]
dur := debugComponentLogsArgs . forDur
err := localClient . SetComponentDebugLogging ( ctx , component , dur )
if err != nil {
return err
}
if debugComponentLogsArgs . forDur <= 0 {
fmt . Printf ( "Disabled debug logs for component %q\n" , component )
} else {
fmt . Printf ( "Enabled debug logs for component %q for %v\n" , component , dur )
}
return nil
}
2022-11-07 13:04:10 -08:00
var devStoreSetArgs struct {
danger bool
}
func runDevStoreSet ( ctx context . Context , args [ ] string ) error {
if len ( args ) != 2 {
2024-04-17 08:05:04 +01:00
return errors . New ( "usage: tailscale debug dev-store-set --danger <key> <value>" )
2022-11-07 13:04:10 -08:00
}
if ! devStoreSetArgs . danger {
return errors . New ( "this command is dangerous; use --danger to proceed" )
}
2022-11-07 15:32:53 -08:00
key , val := args [ 0 ] , args [ 1 ]
if val == "-" {
valb , err := io . ReadAll ( os . Stdin )
if err != nil {
return err
}
val = string ( valb )
}
return localClient . SetDevStoreKeyValue ( ctx , key , val )
2022-11-07 13:04:10 -08:00
}
2022-11-26 14:23:00 -08:00
func runDebugDERP ( ctx context . Context , args [ ] string ) error {
if len ( args ) != 1 {
2024-04-17 08:05:04 +01:00
return errors . New ( "usage: tailscale debug derp <region>" )
2022-11-26 14:23:00 -08:00
}
st , err := localClient . DebugDERPRegion ( ctx , args [ 0 ] )
if err != nil {
return err
}
fmt . Printf ( "%s\n" , must . Get ( json . MarshalIndent ( st , "" , " " ) ) )
return nil
}
2023-01-23 14:55:36 -08:00
var setExpireArgs struct {
in time . Duration
}
func runSetExpire ( ctx context . Context , args [ ] string ) error {
if len ( args ) != 0 || setExpireArgs . in == 0 {
2024-04-04 17:06:09 +01:00
return errors . New ( "usage: tailscale debug set-expire --in=<duration>" )
2023-01-23 14:55:36 -08:00
}
return localClient . DebugSetExpireIn ( ctx , setExpireArgs . in )
}
2023-01-19 14:28:49 -08:00
var captureArgs struct {
outFile string
}
func runCapture ( ctx context . Context , args [ ] string ) error {
stream , err := localClient . StreamDebugCapture ( ctx )
if err != nil {
return err
}
defer stream . Close ( )
switch captureArgs . outFile {
case "-" :
2024-04-07 18:17:25 -07:00
fmt . Fprintln ( Stderr , "Press Ctrl-C to stop the capture." )
2023-01-19 14:28:49 -08:00
_ , err = io . Copy ( os . Stdout , stream )
return err
case "" :
lua , err := os . CreateTemp ( "" , "ts-dissector" )
if err != nil {
return err
}
defer os . Remove ( lua . Name ( ) )
lua . Write ( [ ] byte ( capture . DissectorLua ) )
if err := lua . Close ( ) ; err != nil {
return err
}
wireshark := exec . CommandContext ( ctx , "wireshark" , "-X" , "lua_script:" + lua . Name ( ) , "-k" , "-i" , "-" )
wireshark . Stdin = stream
wireshark . Stdout = os . Stdout
wireshark . Stderr = os . Stderr
return wireshark . Run ( )
}
f , err := os . OpenFile ( captureArgs . outFile , os . O_WRONLY | os . O_CREATE | os . O_TRUNC , 0644 )
if err != nil {
return err
}
defer f . Close ( )
2024-04-07 18:17:25 -07:00
fmt . Fprintln ( Stderr , "Press Ctrl-C to stop the capture." )
2023-01-19 14:28:49 -08:00
_ , err = io . Copy ( f , stream )
return err
}
2023-03-02 18:05:30 -05:00
var debugPortmapArgs struct {
2023-08-21 16:53:47 -04:00
duration time . Duration
gatewayAddr string
selfAddr string
ty string
logHTTP bool
2023-03-02 18:05:30 -05:00
}
func debugPortmap ( ctx context . Context , args [ ] string ) error {
2023-08-21 16:53:47 -04:00
opts := & tailscale . DebugPortmapOpts {
Duration : debugPortmapArgs . duration ,
Type : debugPortmapArgs . ty ,
LogHTTP : debugPortmapArgs . logHTTP ,
}
if ( debugPortmapArgs . gatewayAddr != "" ) != ( debugPortmapArgs . selfAddr != "" ) {
return fmt . Errorf ( "if one of --gateway-addr and --self-addr is provided, the other must be as well" )
}
if debugPortmapArgs . gatewayAddr != "" {
var err error
opts . GatewayAddr , err = netip . ParseAddr ( debugPortmapArgs . gatewayAddr )
if err != nil {
return fmt . Errorf ( "invalid --gateway-addr: %w" , err )
}
opts . SelfAddr , err = netip . ParseAddr ( debugPortmapArgs . selfAddr )
if err != nil {
return fmt . Errorf ( "invalid --self-addr: %w" , err )
}
}
rc , err := localClient . DebugPortmap ( ctx , opts )
2023-03-02 18:05:30 -05:00
if err != nil {
return err
}
defer rc . Close ( )
_ , err = io . Copy ( os . Stdout , rc )
return err
}
2023-02-21 15:57:08 -05:00
func runPeerEndpointChanges ( ctx context . Context , args [ ] string ) error {
st , err := localClient . Status ( ctx )
if err != nil {
return fixTailscaledConnectError ( err )
}
description , ok := isRunningOrStarting ( st )
if ! ok {
printf ( "%s\n" , description )
os . Exit ( 1 )
}
if len ( args ) != 1 || args [ 0 ] == "" {
2024-04-04 17:06:09 +01:00
return errors . New ( "usage: tailscale debug peer-endpoint-changes <hostname-or-IP>" )
2023-02-21 15:57:08 -05:00
}
var ip string
hostOrIP := args [ 0 ]
ip , self , err := tailscaleIPFromArg ( ctx , hostOrIP )
if err != nil {
return err
}
if self {
printf ( "%v is local Tailscale IP\n" , ip )
return nil
}
if ip != hostOrIP {
log . Printf ( "lookup %q => %q" , hostOrIP , ip )
}
req , err := http . NewRequestWithContext ( ctx , "GET" , "http://local-tailscaled.sock/localapi/v0/debug-peer-endpoint-changes?ip=" + ip , nil )
if err != nil {
return err
}
resp , err := localClient . DoLocalRequest ( req )
if err != nil {
return err
}
defer resp . Body . Close ( )
body , err := io . ReadAll ( resp . Body )
if err != nil {
return err
}
var dst bytes . Buffer
if err := json . Indent ( & dst , body , "" , " " ) ; err != nil {
return fmt . Errorf ( "indenting returned JSON: %w" , err )
}
if ss := dst . String ( ) ; ! strings . HasSuffix ( ss , "\n" ) {
dst . WriteByte ( '\n' )
}
fmt . Printf ( "%s" , dst . String ( ) )
return nil
}
2023-09-11 21:44:38 -07:00
func debugControlKnobs ( ctx context . Context , args [ ] string ) error {
if len ( args ) > 0 {
return errors . New ( "unexpected arguments" )
}
v , err := localClient . DebugResultJSON ( ctx , "control-knobs" )
if err != nil {
return err
}
e := json . NewEncoder ( os . Stdout )
e . SetIndent ( "" , " " )
e . Encode ( v )
return nil
}
2024-01-05 11:28:09 -05:00
var debugDialTypesArgs struct {
network string
}
func runDebugDialTypes ( ctx context . Context , args [ ] string ) error {
st , err := localClient . Status ( ctx )
if err != nil {
return fixTailscaledConnectError ( err )
}
description , ok := isRunningOrStarting ( st )
if ! ok {
printf ( "%s\n" , description )
os . Exit ( 1 )
}
if len ( args ) != 2 || args [ 0 ] == "" || args [ 1 ] == "" {
2024-04-04 17:06:09 +01:00
return errors . New ( "usage: tailscale debug dial-types <hostname-or-IP> <port>" )
2024-01-05 11:28:09 -05:00
}
port , err := strconv . ParseUint ( args [ 1 ] , 10 , 16 )
if err != nil {
return fmt . Errorf ( "invalid port %q: %w" , args [ 1 ] , err )
}
hostOrIP := args [ 0 ]
ip , _ , err := tailscaleIPFromArg ( ctx , hostOrIP )
if err != nil {
return err
}
if ip != hostOrIP {
log . Printf ( "lookup %q => %q" , hostOrIP , ip )
}
qparams := make ( url . Values )
qparams . Set ( "ip" , ip )
qparams . Set ( "port" , strconv . FormatUint ( port , 10 ) )
qparams . Set ( "network" , debugDialTypesArgs . network )
req , err := http . NewRequestWithContext ( ctx , "POST" , "http://local-tailscaled.sock/localapi/v0/debug-dial-types?" + qparams . Encode ( ) , nil )
if err != nil {
return err
}
resp , err := localClient . DoLocalRequest ( req )
if err != nil {
return err
}
defer resp . Body . Close ( )
body , err := io . ReadAll ( resp . Body )
if err != nil {
return err
}
fmt . Printf ( "%s" , body )
return nil
}
2024-08-21 19:38:48 -07:00
var resolveArgs struct {
net string // "ip", "ip4", "ip6""
}
func runDebugResolve ( ctx context . Context , args [ ] string ) error {
if len ( args ) != 1 {
return errors . New ( "usage: tailscale debug resolve <hostname>" )
}
ctx , cancel := context . WithTimeout ( ctx , 5 * time . Second )
defer cancel ( )
host := args [ 0 ]
ips , err := net . DefaultResolver . LookupIP ( ctx , resolveArgs . net , host )
if err != nil {
return err
}
for _ , ip := range ips {
fmt . Printf ( "%s\n" , ip )
}
return nil
}