2020-02-05 22:16:58 +00:00
|
|
|
// Copyright (c) 2020 Tailscale Inc & AUTHORS All rights reserved.
|
|
|
|
// Use of this source code is governed by a BSD-style
|
|
|
|
// license that can be found in the LICENSE file.
|
|
|
|
|
|
|
|
package ipn
|
|
|
|
|
|
|
|
import (
|
2020-11-22 00:34:26 +00:00
|
|
|
"bytes"
|
2020-02-05 22:16:58 +00:00
|
|
|
"encoding/json"
|
|
|
|
"fmt"
|
|
|
|
"io/ioutil"
|
|
|
|
"log"
|
|
|
|
"os"
|
|
|
|
"path/filepath"
|
2021-04-01 04:35:21 +00:00
|
|
|
"reflect"
|
ipn, ipnserver, cmd/tailscale: add "server mode" support on Windows
This partially (but not yet fully) migrates Windows to tailscaled's
StateStore storage system.
This adds a new bool Pref, ForceDaemon, defined as:
// ForceDaemon specifies whether a platform that normally
// operates in "client mode" (that is, requires an active user
// logged in with the GUI app running) should keep running after the
// GUI ends and/or the user logs out.
//
// The only current applicable platform is Windows. This
// forced Windows to go into "server mode" where Tailscale is
// running even with no users logged in. This might also be
// used for macOS in the future. This setting has no effect
// for Linux/etc, which always operate in daemon mode.
Then, when ForceDaemon becomes true, we now write use the StateStore
to track which user started it in server mode, and store their prefs
under that key.
The ipnserver validates the connections/identities and informs that
LocalBackend which userid is currently in charge.
The GUI can then enable/disable server mode at runtime, without using
the CLI.
But the "tailscale up" CLI was also fixed, so Windows users can use
authkeys or ACL tags, etc.
Updates #275
2020-10-12 21:28:21 +00:00
|
|
|
"runtime"
|
|
|
|
"strings"
|
2020-02-05 22:16:58 +00:00
|
|
|
|
2020-12-24 20:33:55 +00:00
|
|
|
"inet.af/netaddr"
|
2020-02-05 22:16:58 +00:00
|
|
|
"tailscale.com/atomicfile"
|
2021-01-21 01:24:16 +00:00
|
|
|
"tailscale.com/tailcfg"
|
2021-02-05 23:23:01 +00:00
|
|
|
"tailscale.com/types/persist"
|
2021-02-04 21:12:42 +00:00
|
|
|
"tailscale.com/types/preftype"
|
2020-02-05 22:16:58 +00:00
|
|
|
)
|
|
|
|
|
2020-10-19 17:46:30 +00:00
|
|
|
//go:generate go run tailscale.com/cmd/cloner -type=Prefs -output=prefs_clone.go
|
|
|
|
|
2020-02-17 23:45:30 +00:00
|
|
|
// Prefs are the user modifiable settings of the Tailscale node agent.
|
2020-02-05 22:16:58 +00:00
|
|
|
type Prefs struct {
|
2020-02-19 05:03:22 +00:00
|
|
|
// ControlURL is the URL of the control server to use.
|
|
|
|
ControlURL string
|
ipn, ipnserver, cmd/tailscale: add "server mode" support on Windows
This partially (but not yet fully) migrates Windows to tailscaled's
StateStore storage system.
This adds a new bool Pref, ForceDaemon, defined as:
// ForceDaemon specifies whether a platform that normally
// operates in "client mode" (that is, requires an active user
// logged in with the GUI app running) should keep running after the
// GUI ends and/or the user logs out.
//
// The only current applicable platform is Windows. This
// forced Windows to go into "server mode" where Tailscale is
// running even with no users logged in. This might also be
// used for macOS in the future. This setting has no effect
// for Linux/etc, which always operate in daemon mode.
Then, when ForceDaemon becomes true, we now write use the StateStore
to track which user started it in server mode, and store their prefs
under that key.
The ipnserver validates the connections/identities and informs that
LocalBackend which userid is currently in charge.
The GUI can then enable/disable server mode at runtime, without using
the CLI.
But the "tailscale up" CLI was also fixed, so Windows users can use
authkeys or ACL tags, etc.
Updates #275
2020-10-12 21:28:21 +00:00
|
|
|
|
2021-01-21 01:24:16 +00:00
|
|
|
// RouteAll specifies whether to accept subnets advertised by
|
|
|
|
// other nodes on the Tailscale network. Note that this does not
|
|
|
|
// include default routes (0.0.0.0/0 and ::/0), those are
|
|
|
|
// controlled by ExitNodeID/IP below.
|
2020-02-17 23:45:30 +00:00
|
|
|
RouteAll bool
|
ipn, ipnserver, cmd/tailscale: add "server mode" support on Windows
This partially (but not yet fully) migrates Windows to tailscaled's
StateStore storage system.
This adds a new bool Pref, ForceDaemon, defined as:
// ForceDaemon specifies whether a platform that normally
// operates in "client mode" (that is, requires an active user
// logged in with the GUI app running) should keep running after the
// GUI ends and/or the user logs out.
//
// The only current applicable platform is Windows. This
// forced Windows to go into "server mode" where Tailscale is
// running even with no users logged in. This might also be
// used for macOS in the future. This setting has no effect
// for Linux/etc, which always operate in daemon mode.
Then, when ForceDaemon becomes true, we now write use the StateStore
to track which user started it in server mode, and store their prefs
under that key.
The ipnserver validates the connections/identities and informs that
LocalBackend which userid is currently in charge.
The GUI can then enable/disable server mode at runtime, without using
the CLI.
But the "tailscale up" CLI was also fixed, so Windows users can use
authkeys or ACL tags, etc.
Updates #275
2020-10-12 21:28:21 +00:00
|
|
|
|
2020-02-17 23:45:30 +00:00
|
|
|
// AllowSingleHosts specifies whether to install routes for each
|
|
|
|
// node IP on the tailscale network, in addition to a route for
|
|
|
|
// the whole network.
|
ipn, ipnserver, cmd/tailscale: add "server mode" support on Windows
This partially (but not yet fully) migrates Windows to tailscaled's
StateStore storage system.
This adds a new bool Pref, ForceDaemon, defined as:
// ForceDaemon specifies whether a platform that normally
// operates in "client mode" (that is, requires an active user
// logged in with the GUI app running) should keep running after the
// GUI ends and/or the user logs out.
//
// The only current applicable platform is Windows. This
// forced Windows to go into "server mode" where Tailscale is
// running even with no users logged in. This might also be
// used for macOS in the future. This setting has no effect
// for Linux/etc, which always operate in daemon mode.
Then, when ForceDaemon becomes true, we now write use the StateStore
to track which user started it in server mode, and store their prefs
under that key.
The ipnserver validates the connections/identities and informs that
LocalBackend which userid is currently in charge.
The GUI can then enable/disable server mode at runtime, without using
the CLI.
But the "tailscale up" CLI was also fixed, so Windows users can use
authkeys or ACL tags, etc.
Updates #275
2020-10-12 21:28:21 +00:00
|
|
|
// This corresponds to the "tailscale up --host-routes" value,
|
|
|
|
// which defaults to true.
|
2020-02-17 23:45:30 +00:00
|
|
|
//
|
|
|
|
// TODO(danderson): why do we have this? It dumps a lot of stuff
|
|
|
|
// into the routing table, and a single network route _should_ be
|
|
|
|
// all that we need. But when I turn this off in my tailscaled,
|
|
|
|
// packets stop flowing. What's up with that?
|
2020-02-05 22:16:58 +00:00
|
|
|
AllowSingleHosts bool
|
ipn, ipnserver, cmd/tailscale: add "server mode" support on Windows
This partially (but not yet fully) migrates Windows to tailscaled's
StateStore storage system.
This adds a new bool Pref, ForceDaemon, defined as:
// ForceDaemon specifies whether a platform that normally
// operates in "client mode" (that is, requires an active user
// logged in with the GUI app running) should keep running after the
// GUI ends and/or the user logs out.
//
// The only current applicable platform is Windows. This
// forced Windows to go into "server mode" where Tailscale is
// running even with no users logged in. This might also be
// used for macOS in the future. This setting has no effect
// for Linux/etc, which always operate in daemon mode.
Then, when ForceDaemon becomes true, we now write use the StateStore
to track which user started it in server mode, and store their prefs
under that key.
The ipnserver validates the connections/identities and informs that
LocalBackend which userid is currently in charge.
The GUI can then enable/disable server mode at runtime, without using
the CLI.
But the "tailscale up" CLI was also fixed, so Windows users can use
authkeys or ACL tags, etc.
Updates #275
2020-10-12 21:28:21 +00:00
|
|
|
|
2021-01-21 01:24:16 +00:00
|
|
|
// ExitNodeID and ExitNodeIP specify the node that should be used
|
|
|
|
// as an exit node for internet traffic. At most one of these
|
|
|
|
// should be non-zero.
|
|
|
|
//
|
|
|
|
// The preferred way to express the chosen node is ExitNodeID, but
|
|
|
|
// in some cases it's not possible to use that ID (e.g. in the
|
|
|
|
// linux CLI, before tailscaled has a netmap). For those
|
|
|
|
// situations, we allow specifying the exit node by IP, and
|
|
|
|
// ipnlocal.LocalBackend will translate the IP into an ID when the
|
|
|
|
// node is found in the netmap.
|
|
|
|
//
|
|
|
|
// If the selected exit node doesn't exist (e.g. it's not part of
|
|
|
|
// the current tailnet), or it doesn't offer exit node services, a
|
|
|
|
// blackhole route will be installed on the local system to
|
|
|
|
// prevent any traffic escaping to the local network.
|
|
|
|
ExitNodeID tailcfg.StableNodeID
|
|
|
|
ExitNodeIP netaddr.IP
|
|
|
|
|
2020-02-17 23:45:30 +00:00
|
|
|
// CorpDNS specifies whether to install the Tailscale network's
|
|
|
|
// DNS configuration, if it exists.
|
|
|
|
CorpDNS bool
|
ipn, ipnserver, cmd/tailscale: add "server mode" support on Windows
This partially (but not yet fully) migrates Windows to tailscaled's
StateStore storage system.
This adds a new bool Pref, ForceDaemon, defined as:
// ForceDaemon specifies whether a platform that normally
// operates in "client mode" (that is, requires an active user
// logged in with the GUI app running) should keep running after the
// GUI ends and/or the user logs out.
//
// The only current applicable platform is Windows. This
// forced Windows to go into "server mode" where Tailscale is
// running even with no users logged in. This might also be
// used for macOS in the future. This setting has no effect
// for Linux/etc, which always operate in daemon mode.
Then, when ForceDaemon becomes true, we now write use the StateStore
to track which user started it in server mode, and store their prefs
under that key.
The ipnserver validates the connections/identities and informs that
LocalBackend which userid is currently in charge.
The GUI can then enable/disable server mode at runtime, without using
the CLI.
But the "tailscale up" CLI was also fixed, so Windows users can use
authkeys or ACL tags, etc.
Updates #275
2020-10-12 21:28:21 +00:00
|
|
|
|
2020-02-17 23:45:30 +00:00
|
|
|
// WantRunning indicates whether networking should be active on
|
|
|
|
// this node.
|
|
|
|
WantRunning bool
|
ipn, ipnserver, cmd/tailscale: add "server mode" support on Windows
This partially (but not yet fully) migrates Windows to tailscaled's
StateStore storage system.
This adds a new bool Pref, ForceDaemon, defined as:
// ForceDaemon specifies whether a platform that normally
// operates in "client mode" (that is, requires an active user
// logged in with the GUI app running) should keep running after the
// GUI ends and/or the user logs out.
//
// The only current applicable platform is Windows. This
// forced Windows to go into "server mode" where Tailscale is
// running even with no users logged in. This might also be
// used for macOS in the future. This setting has no effect
// for Linux/etc, which always operate in daemon mode.
Then, when ForceDaemon becomes true, we now write use the StateStore
to track which user started it in server mode, and store their prefs
under that key.
The ipnserver validates the connections/identities and informs that
LocalBackend which userid is currently in charge.
The GUI can then enable/disable server mode at runtime, without using
the CLI.
But the "tailscale up" CLI was also fixed, so Windows users can use
authkeys or ACL tags, etc.
Updates #275
2020-10-12 21:28:21 +00:00
|
|
|
|
2020-04-29 06:37:35 +00:00
|
|
|
// ShieldsUp indicates whether to block all incoming connections,
|
|
|
|
// regardless of the control-provided packet filter. If false, we
|
|
|
|
// use the packet filter as provided. If true, we block incoming
|
2020-11-24 15:51:13 +00:00
|
|
|
// connections. This overrides tailcfg.Hostinfo's ShieldsUp.
|
2020-04-29 06:37:35 +00:00
|
|
|
ShieldsUp bool
|
ipn, ipnserver, cmd/tailscale: add "server mode" support on Windows
This partially (but not yet fully) migrates Windows to tailscaled's
StateStore storage system.
This adds a new bool Pref, ForceDaemon, defined as:
// ForceDaemon specifies whether a platform that normally
// operates in "client mode" (that is, requires an active user
// logged in with the GUI app running) should keep running after the
// GUI ends and/or the user logs out.
//
// The only current applicable platform is Windows. This
// forced Windows to go into "server mode" where Tailscale is
// running even with no users logged in. This might also be
// used for macOS in the future. This setting has no effect
// for Linux/etc, which always operate in daemon mode.
Then, when ForceDaemon becomes true, we now write use the StateStore
to track which user started it in server mode, and store their prefs
under that key.
The ipnserver validates the connections/identities and informs that
LocalBackend which userid is currently in charge.
The GUI can then enable/disable server mode at runtime, without using
the CLI.
But the "tailscale up" CLI was also fixed, so Windows users can use
authkeys or ACL tags, etc.
Updates #275
2020-10-12 21:28:21 +00:00
|
|
|
|
2020-05-01 05:01:27 +00:00
|
|
|
// AdvertiseTags specifies groups that this node wants to join, for
|
|
|
|
// purposes of ACL enforcement. These can be referenced from the ACL
|
|
|
|
// security policy. Note that advertising a tag doesn't guarantee that
|
|
|
|
// the control server will allow you to take on the rights for that
|
|
|
|
// tag.
|
|
|
|
AdvertiseTags []string
|
ipn, ipnserver, cmd/tailscale: add "server mode" support on Windows
This partially (but not yet fully) migrates Windows to tailscaled's
StateStore storage system.
This adds a new bool Pref, ForceDaemon, defined as:
// ForceDaemon specifies whether a platform that normally
// operates in "client mode" (that is, requires an active user
// logged in with the GUI app running) should keep running after the
// GUI ends and/or the user logs out.
//
// The only current applicable platform is Windows. This
// forced Windows to go into "server mode" where Tailscale is
// running even with no users logged in. This might also be
// used for macOS in the future. This setting has no effect
// for Linux/etc, which always operate in daemon mode.
Then, when ForceDaemon becomes true, we now write use the StateStore
to track which user started it in server mode, and store their prefs
under that key.
The ipnserver validates the connections/identities and informs that
LocalBackend which userid is currently in charge.
The GUI can then enable/disable server mode at runtime, without using
the CLI.
But the "tailscale up" CLI was also fixed, so Windows users can use
authkeys or ACL tags, etc.
Updates #275
2020-10-12 21:28:21 +00:00
|
|
|
|
2020-06-02 16:12:05 +00:00
|
|
|
// Hostname is the hostname to use for identifying the node. If
|
|
|
|
// not set, os.Hostname is used.
|
|
|
|
Hostname string
|
ipn, ipnserver, cmd/tailscale: add "server mode" support on Windows
This partially (but not yet fully) migrates Windows to tailscaled's
StateStore storage system.
This adds a new bool Pref, ForceDaemon, defined as:
// ForceDaemon specifies whether a platform that normally
// operates in "client mode" (that is, requires an active user
// logged in with the GUI app running) should keep running after the
// GUI ends and/or the user logs out.
//
// The only current applicable platform is Windows. This
// forced Windows to go into "server mode" where Tailscale is
// running even with no users logged in. This might also be
// used for macOS in the future. This setting has no effect
// for Linux/etc, which always operate in daemon mode.
Then, when ForceDaemon becomes true, we now write use the StateStore
to track which user started it in server mode, and store their prefs
under that key.
The ipnserver validates the connections/identities and informs that
LocalBackend which userid is currently in charge.
The GUI can then enable/disable server mode at runtime, without using
the CLI.
But the "tailscale up" CLI was also fixed, so Windows users can use
authkeys or ACL tags, etc.
Updates #275
2020-10-12 21:28:21 +00:00
|
|
|
|
2020-07-24 21:05:04 +00:00
|
|
|
// OSVersion overrides tailcfg.Hostinfo's OSVersion.
|
|
|
|
OSVersion string
|
ipn, ipnserver, cmd/tailscale: add "server mode" support on Windows
This partially (but not yet fully) migrates Windows to tailscaled's
StateStore storage system.
This adds a new bool Pref, ForceDaemon, defined as:
// ForceDaemon specifies whether a platform that normally
// operates in "client mode" (that is, requires an active user
// logged in with the GUI app running) should keep running after the
// GUI ends and/or the user logs out.
//
// The only current applicable platform is Windows. This
// forced Windows to go into "server mode" where Tailscale is
// running even with no users logged in. This might also be
// used for macOS in the future. This setting has no effect
// for Linux/etc, which always operate in daemon mode.
Then, when ForceDaemon becomes true, we now write use the StateStore
to track which user started it in server mode, and store their prefs
under that key.
The ipnserver validates the connections/identities and informs that
LocalBackend which userid is currently in charge.
The GUI can then enable/disable server mode at runtime, without using
the CLI.
But the "tailscale up" CLI was also fixed, so Windows users can use
authkeys or ACL tags, etc.
Updates #275
2020-10-12 21:28:21 +00:00
|
|
|
|
2020-07-24 21:05:04 +00:00
|
|
|
// DeviceModel overrides tailcfg.Hostinfo's DeviceModel.
|
|
|
|
DeviceModel string
|
2020-02-17 23:45:30 +00:00
|
|
|
|
|
|
|
// NotepadURLs is a debugging setting that opens OAuth URLs in
|
|
|
|
// notepad.exe on Windows, rather than loading them in a browser.
|
|
|
|
//
|
2020-04-29 06:37:35 +00:00
|
|
|
// apenwarr 2020-04-29: Unfortunately this is still needed sometimes.
|
|
|
|
// Windows' default browser setting is sometimes screwy and this helps
|
2020-05-01 05:01:27 +00:00
|
|
|
// users narrow it down a bit.
|
2020-02-17 23:45:30 +00:00
|
|
|
NotepadURLs bool
|
2020-02-05 22:16:58 +00:00
|
|
|
|
ipn, ipnserver, cmd/tailscale: add "server mode" support on Windows
This partially (but not yet fully) migrates Windows to tailscaled's
StateStore storage system.
This adds a new bool Pref, ForceDaemon, defined as:
// ForceDaemon specifies whether a platform that normally
// operates in "client mode" (that is, requires an active user
// logged in with the GUI app running) should keep running after the
// GUI ends and/or the user logs out.
//
// The only current applicable platform is Windows. This
// forced Windows to go into "server mode" where Tailscale is
// running even with no users logged in. This might also be
// used for macOS in the future. This setting has no effect
// for Linux/etc, which always operate in daemon mode.
Then, when ForceDaemon becomes true, we now write use the StateStore
to track which user started it in server mode, and store their prefs
under that key.
The ipnserver validates the connections/identities and informs that
LocalBackend which userid is currently in charge.
The GUI can then enable/disable server mode at runtime, without using
the CLI.
But the "tailscale up" CLI was also fixed, so Windows users can use
authkeys or ACL tags, etc.
Updates #275
2020-10-12 21:28:21 +00:00
|
|
|
// ForceDaemon specifies whether a platform that normally
|
|
|
|
// operates in "client mode" (that is, requires an active user
|
|
|
|
// logged in with the GUI app running) should keep running after the
|
|
|
|
// GUI ends and/or the user logs out.
|
|
|
|
//
|
|
|
|
// The only current applicable platform is Windows. This
|
|
|
|
// forced Windows to go into "server mode" where Tailscale is
|
|
|
|
// running even with no users logged in. This might also be
|
|
|
|
// used for macOS in the future. This setting has no effect
|
|
|
|
// for Linux/etc, which always operate in daemon mode.
|
|
|
|
ForceDaemon bool `json:"ForceDaemon,omitempty"`
|
|
|
|
|
2020-05-13 22:35:22 +00:00
|
|
|
// The following block of options only have an effect on Linux.
|
|
|
|
|
|
|
|
// AdvertiseRoutes specifies CIDR prefixes to advertise into the
|
|
|
|
// Tailscale network as reachable through the current
|
|
|
|
// node.
|
2020-12-24 20:33:55 +00:00
|
|
|
AdvertiseRoutes []netaddr.IPPrefix
|
ipn, ipnserver, cmd/tailscale: add "server mode" support on Windows
This partially (but not yet fully) migrates Windows to tailscaled's
StateStore storage system.
This adds a new bool Pref, ForceDaemon, defined as:
// ForceDaemon specifies whether a platform that normally
// operates in "client mode" (that is, requires an active user
// logged in with the GUI app running) should keep running after the
// GUI ends and/or the user logs out.
//
// The only current applicable platform is Windows. This
// forced Windows to go into "server mode" where Tailscale is
// running even with no users logged in. This might also be
// used for macOS in the future. This setting has no effect
// for Linux/etc, which always operate in daemon mode.
Then, when ForceDaemon becomes true, we now write use the StateStore
to track which user started it in server mode, and store their prefs
under that key.
The ipnserver validates the connections/identities and informs that
LocalBackend which userid is currently in charge.
The GUI can then enable/disable server mode at runtime, without using
the CLI.
But the "tailscale up" CLI was also fixed, so Windows users can use
authkeys or ACL tags, etc.
Updates #275
2020-10-12 21:28:21 +00:00
|
|
|
|
2020-05-13 22:35:22 +00:00
|
|
|
// NoSNAT specifies whether to source NAT traffic going to
|
|
|
|
// destinations in AdvertiseRoutes. The default is to apply source
|
|
|
|
// NAT, which makes the traffic appear to come from the router
|
|
|
|
// machine rather than the peer's Tailscale IP.
|
|
|
|
//
|
|
|
|
// Disabling SNAT requires additional manual configuration in your
|
|
|
|
// network to route Tailscale traffic back to the subnet relay
|
|
|
|
// machine.
|
|
|
|
//
|
|
|
|
// Linux-only.
|
|
|
|
NoSNAT bool
|
ipn, ipnserver, cmd/tailscale: add "server mode" support on Windows
This partially (but not yet fully) migrates Windows to tailscaled's
StateStore storage system.
This adds a new bool Pref, ForceDaemon, defined as:
// ForceDaemon specifies whether a platform that normally
// operates in "client mode" (that is, requires an active user
// logged in with the GUI app running) should keep running after the
// GUI ends and/or the user logs out.
//
// The only current applicable platform is Windows. This
// forced Windows to go into "server mode" where Tailscale is
// running even with no users logged in. This might also be
// used for macOS in the future. This setting has no effect
// for Linux/etc, which always operate in daemon mode.
Then, when ForceDaemon becomes true, we now write use the StateStore
to track which user started it in server mode, and store their prefs
under that key.
The ipnserver validates the connections/identities and informs that
LocalBackend which userid is currently in charge.
The GUI can then enable/disable server mode at runtime, without using
the CLI.
But the "tailscale up" CLI was also fixed, so Windows users can use
authkeys or ACL tags, etc.
Updates #275
2020-10-12 21:28:21 +00:00
|
|
|
|
2020-05-15 02:07:06 +00:00
|
|
|
// NetfilterMode specifies how much to manage netfilter rules for
|
|
|
|
// Tailscale, if at all.
|
2021-02-04 21:12:42 +00:00
|
|
|
NetfilterMode preftype.NetfilterMode
|
2020-05-13 22:35:22 +00:00
|
|
|
|
2020-02-05 22:16:58 +00:00
|
|
|
// The Persist field is named 'Config' in the file for backward
|
|
|
|
// compatibility with earlier versions.
|
|
|
|
// TODO(apenwarr): We should move this out of here, it's not a pref.
|
|
|
|
// We can maybe do that once we're sure which module should persist
|
|
|
|
// it (backend or frontend?)
|
2021-02-05 23:23:01 +00:00
|
|
|
Persist *persist.Persist `json:"Config"`
|
2020-02-05 22:16:58 +00:00
|
|
|
}
|
|
|
|
|
2021-04-01 04:35:21 +00:00
|
|
|
// MaskedPrefs is a Prefs with an associated bitmask of which fields are set.
|
|
|
|
type MaskedPrefs struct {
|
|
|
|
Prefs
|
|
|
|
|
|
|
|
ControlURLSet bool `json:",omitempty"`
|
|
|
|
RouteAllSet bool `json:",omitempty"`
|
|
|
|
AllowSingleHostsSet bool `json:",omitempty"`
|
|
|
|
ExitNodeIDSet bool `json:",omitempty"`
|
|
|
|
ExitNodeIPSet bool `json:",omitempty"`
|
|
|
|
CorpDNSSet bool `json:",omitempty"`
|
|
|
|
WantRunningSet bool `json:",omitempty"`
|
|
|
|
ShieldsUpSet bool `json:",omitempty"`
|
|
|
|
AdvertiseTagsSet bool `json:",omitempty"`
|
|
|
|
HostnameSet bool `json:",omitempty"`
|
|
|
|
OSVersionSet bool `json:",omitempty"`
|
|
|
|
DeviceModelSet bool `json:",omitempty"`
|
|
|
|
NotepadURLsSet bool `json:",omitempty"`
|
|
|
|
ForceDaemonSet bool `json:",omitempty"`
|
|
|
|
AdvertiseRoutesSet bool `json:",omitempty"`
|
|
|
|
NoSNATSet bool `json:",omitempty"`
|
|
|
|
NetfilterModeSet bool `json:",omitempty"`
|
|
|
|
}
|
|
|
|
|
|
|
|
// ApplyEdits mutates p, assigning fields from m.Prefs for each MaskedPrefs
|
|
|
|
// Set field that's true.
|
|
|
|
func (p *Prefs) ApplyEdits(m *MaskedPrefs) {
|
|
|
|
if p == nil {
|
|
|
|
panic("can't edit nil Prefs")
|
|
|
|
}
|
|
|
|
pv := reflect.ValueOf(p).Elem()
|
|
|
|
mv := reflect.ValueOf(m).Elem()
|
|
|
|
mpv := reflect.ValueOf(&m.Prefs).Elem()
|
|
|
|
fields := mv.NumField()
|
|
|
|
for i := 1; i < fields; i++ {
|
|
|
|
if mv.Field(i).Bool() {
|
|
|
|
newFieldValue := mpv.Field(i - 1)
|
|
|
|
pv.Field(i - 1).Set(newFieldValue)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (m *MaskedPrefs) Pretty() string {
|
|
|
|
if m == nil {
|
|
|
|
return "MaskedPrefs{<nil>}"
|
|
|
|
}
|
|
|
|
var sb strings.Builder
|
|
|
|
sb.WriteString("MaskedPrefs{")
|
|
|
|
mv := reflect.ValueOf(m).Elem()
|
|
|
|
mt := mv.Type()
|
|
|
|
mpv := reflect.ValueOf(&m.Prefs).Elem()
|
|
|
|
first := true
|
|
|
|
for i := 1; i < mt.NumField(); i++ {
|
|
|
|
name := mt.Field(i).Name
|
|
|
|
if mv.Field(i).Bool() {
|
|
|
|
if !first {
|
|
|
|
sb.WriteString(" ")
|
|
|
|
}
|
|
|
|
first = false
|
|
|
|
fmt.Fprintf(&sb, "%s=%#v",
|
|
|
|
strings.TrimSuffix(name, "Set"),
|
|
|
|
mpv.Field(i-1).Interface())
|
|
|
|
}
|
|
|
|
}
|
|
|
|
sb.WriteString("}")
|
|
|
|
return sb.String()
|
|
|
|
}
|
|
|
|
|
2020-02-03 18:35:52 +00:00
|
|
|
// IsEmpty reports whether p is nil or pointing to a Prefs zero value.
|
2020-02-17 23:01:23 +00:00
|
|
|
func (p *Prefs) IsEmpty() bool { return p == nil || p.Equals(&Prefs{}) }
|
2020-02-03 18:35:52 +00:00
|
|
|
|
ipn, ipnserver, cmd/tailscale: add "server mode" support on Windows
This partially (but not yet fully) migrates Windows to tailscaled's
StateStore storage system.
This adds a new bool Pref, ForceDaemon, defined as:
// ForceDaemon specifies whether a platform that normally
// operates in "client mode" (that is, requires an active user
// logged in with the GUI app running) should keep running after the
// GUI ends and/or the user logs out.
//
// The only current applicable platform is Windows. This
// forced Windows to go into "server mode" where Tailscale is
// running even with no users logged in. This might also be
// used for macOS in the future. This setting has no effect
// for Linux/etc, which always operate in daemon mode.
Then, when ForceDaemon becomes true, we now write use the StateStore
to track which user started it in server mode, and store their prefs
under that key.
The ipnserver validates the connections/identities and informs that
LocalBackend which userid is currently in charge.
The GUI can then enable/disable server mode at runtime, without using
the CLI.
But the "tailscale up" CLI was also fixed, so Windows users can use
authkeys or ACL tags, etc.
Updates #275
2020-10-12 21:28:21 +00:00
|
|
|
func (p *Prefs) Pretty() string { return p.pretty(runtime.GOOS) }
|
|
|
|
func (p *Prefs) pretty(goos string) string {
|
|
|
|
var sb strings.Builder
|
|
|
|
sb.WriteString("Prefs{")
|
|
|
|
fmt.Fprintf(&sb, "ra=%v ", p.RouteAll)
|
|
|
|
if !p.AllowSingleHosts {
|
|
|
|
sb.WriteString("mesh=false ")
|
|
|
|
}
|
|
|
|
fmt.Fprintf(&sb, "dns=%v want=%v ", p.CorpDNS, p.WantRunning)
|
|
|
|
if p.ForceDaemon {
|
|
|
|
sb.WriteString("server=true ")
|
|
|
|
}
|
|
|
|
if p.NotepadURLs {
|
|
|
|
sb.WriteString("notepad=true ")
|
|
|
|
}
|
|
|
|
if p.ShieldsUp {
|
|
|
|
sb.WriteString("shields=true ")
|
|
|
|
}
|
2021-02-25 04:06:15 +00:00
|
|
|
if !p.ExitNodeIP.IsZero() {
|
|
|
|
fmt.Fprintf(&sb, "exit=%v ", p.ExitNodeIP)
|
|
|
|
} else if !p.ExitNodeID.IsZero() {
|
|
|
|
fmt.Fprintf(&sb, "exit=%v ", p.ExitNodeID)
|
|
|
|
}
|
ipn, ipnserver, cmd/tailscale: add "server mode" support on Windows
This partially (but not yet fully) migrates Windows to tailscaled's
StateStore storage system.
This adds a new bool Pref, ForceDaemon, defined as:
// ForceDaemon specifies whether a platform that normally
// operates in "client mode" (that is, requires an active user
// logged in with the GUI app running) should keep running after the
// GUI ends and/or the user logs out.
//
// The only current applicable platform is Windows. This
// forced Windows to go into "server mode" where Tailscale is
// running even with no users logged in. This might also be
// used for macOS in the future. This setting has no effect
// for Linux/etc, which always operate in daemon mode.
Then, when ForceDaemon becomes true, we now write use the StateStore
to track which user started it in server mode, and store their prefs
under that key.
The ipnserver validates the connections/identities and informs that
LocalBackend which userid is currently in charge.
The GUI can then enable/disable server mode at runtime, without using
the CLI.
But the "tailscale up" CLI was also fixed, so Windows users can use
authkeys or ACL tags, etc.
Updates #275
2020-10-12 21:28:21 +00:00
|
|
|
if len(p.AdvertiseRoutes) > 0 || goos == "linux" {
|
|
|
|
fmt.Fprintf(&sb, "routes=%v ", p.AdvertiseRoutes)
|
|
|
|
}
|
|
|
|
if len(p.AdvertiseRoutes) > 0 || p.NoSNAT {
|
|
|
|
fmt.Fprintf(&sb, "snat=%v ", !p.NoSNAT)
|
|
|
|
}
|
2020-11-04 18:24:33 +00:00
|
|
|
if len(p.AdvertiseTags) > 0 {
|
|
|
|
fmt.Fprintf(&sb, "tags=%s ", strings.Join(p.AdvertiseTags, ","))
|
|
|
|
}
|
ipn, ipnserver, cmd/tailscale: add "server mode" support on Windows
This partially (but not yet fully) migrates Windows to tailscaled's
StateStore storage system.
This adds a new bool Pref, ForceDaemon, defined as:
// ForceDaemon specifies whether a platform that normally
// operates in "client mode" (that is, requires an active user
// logged in with the GUI app running) should keep running after the
// GUI ends and/or the user logs out.
//
// The only current applicable platform is Windows. This
// forced Windows to go into "server mode" where Tailscale is
// running even with no users logged in. This might also be
// used for macOS in the future. This setting has no effect
// for Linux/etc, which always operate in daemon mode.
Then, when ForceDaemon becomes true, we now write use the StateStore
to track which user started it in server mode, and store their prefs
under that key.
The ipnserver validates the connections/identities and informs that
LocalBackend which userid is currently in charge.
The GUI can then enable/disable server mode at runtime, without using
the CLI.
But the "tailscale up" CLI was also fixed, so Windows users can use
authkeys or ACL tags, etc.
Updates #275
2020-10-12 21:28:21 +00:00
|
|
|
if goos == "linux" {
|
|
|
|
fmt.Fprintf(&sb, "nf=%v ", p.NetfilterMode)
|
|
|
|
}
|
2020-11-04 18:24:33 +00:00
|
|
|
if p.ControlURL != "" && p.ControlURL != "https://login.tailscale.com" {
|
|
|
|
fmt.Fprintf(&sb, "url=%q ", p.ControlURL)
|
|
|
|
}
|
2021-04-12 17:45:33 +00:00
|
|
|
if p.Hostname != "" {
|
|
|
|
fmt.Fprintf(&sb, "host=%q ", p.Hostname)
|
|
|
|
}
|
2020-02-17 23:01:23 +00:00
|
|
|
if p.Persist != nil {
|
ipn, ipnserver, cmd/tailscale: add "server mode" support on Windows
This partially (but not yet fully) migrates Windows to tailscaled's
StateStore storage system.
This adds a new bool Pref, ForceDaemon, defined as:
// ForceDaemon specifies whether a platform that normally
// operates in "client mode" (that is, requires an active user
// logged in with the GUI app running) should keep running after the
// GUI ends and/or the user logs out.
//
// The only current applicable platform is Windows. This
// forced Windows to go into "server mode" where Tailscale is
// running even with no users logged in. This might also be
// used for macOS in the future. This setting has no effect
// for Linux/etc, which always operate in daemon mode.
Then, when ForceDaemon becomes true, we now write use the StateStore
to track which user started it in server mode, and store their prefs
under that key.
The ipnserver validates the connections/identities and informs that
LocalBackend which userid is currently in charge.
The GUI can then enable/disable server mode at runtime, without using
the CLI.
But the "tailscale up" CLI was also fixed, so Windows users can use
authkeys or ACL tags, etc.
Updates #275
2020-10-12 21:28:21 +00:00
|
|
|
sb.WriteString(p.Persist.Pretty())
|
2020-02-05 22:16:58 +00:00
|
|
|
} else {
|
ipn, ipnserver, cmd/tailscale: add "server mode" support on Windows
This partially (but not yet fully) migrates Windows to tailscaled's
StateStore storage system.
This adds a new bool Pref, ForceDaemon, defined as:
// ForceDaemon specifies whether a platform that normally
// operates in "client mode" (that is, requires an active user
// logged in with the GUI app running) should keep running after the
// GUI ends and/or the user logs out.
//
// The only current applicable platform is Windows. This
// forced Windows to go into "server mode" where Tailscale is
// running even with no users logged in. This might also be
// used for macOS in the future. This setting has no effect
// for Linux/etc, which always operate in daemon mode.
Then, when ForceDaemon becomes true, we now write use the StateStore
to track which user started it in server mode, and store their prefs
under that key.
The ipnserver validates the connections/identities and informs that
LocalBackend which userid is currently in charge.
The GUI can then enable/disable server mode at runtime, without using
the CLI.
But the "tailscale up" CLI was also fixed, so Windows users can use
authkeys or ACL tags, etc.
Updates #275
2020-10-12 21:28:21 +00:00
|
|
|
sb.WriteString("Persist=nil")
|
2020-02-05 22:16:58 +00:00
|
|
|
}
|
ipn, ipnserver, cmd/tailscale: add "server mode" support on Windows
This partially (but not yet fully) migrates Windows to tailscaled's
StateStore storage system.
This adds a new bool Pref, ForceDaemon, defined as:
// ForceDaemon specifies whether a platform that normally
// operates in "client mode" (that is, requires an active user
// logged in with the GUI app running) should keep running after the
// GUI ends and/or the user logs out.
//
// The only current applicable platform is Windows. This
// forced Windows to go into "server mode" where Tailscale is
// running even with no users logged in. This might also be
// used for macOS in the future. This setting has no effect
// for Linux/etc, which always operate in daemon mode.
Then, when ForceDaemon becomes true, we now write use the StateStore
to track which user started it in server mode, and store their prefs
under that key.
The ipnserver validates the connections/identities and informs that
LocalBackend which userid is currently in charge.
The GUI can then enable/disable server mode at runtime, without using
the CLI.
But the "tailscale up" CLI was also fixed, so Windows users can use
authkeys or ACL tags, etc.
Updates #275
2020-10-12 21:28:21 +00:00
|
|
|
sb.WriteString("}")
|
|
|
|
return sb.String()
|
2020-02-05 22:16:58 +00:00
|
|
|
}
|
|
|
|
|
2020-02-17 23:01:23 +00:00
|
|
|
func (p *Prefs) ToBytes() []byte {
|
|
|
|
data, err := json.MarshalIndent(p, "", "\t")
|
2020-02-05 22:16:58 +00:00
|
|
|
if err != nil {
|
|
|
|
log.Fatalf("Prefs marshal: %v\n", err)
|
|
|
|
}
|
|
|
|
return data
|
|
|
|
}
|
|
|
|
|
2020-02-17 23:01:23 +00:00
|
|
|
func (p *Prefs) Equals(p2 *Prefs) bool {
|
|
|
|
if p == nil && p2 == nil {
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
if p == nil || p2 == nil {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
|
|
|
return p != nil && p2 != nil &&
|
2020-02-19 05:03:22 +00:00
|
|
|
p.ControlURL == p2.ControlURL &&
|
2020-02-17 23:01:23 +00:00
|
|
|
p.RouteAll == p2.RouteAll &&
|
|
|
|
p.AllowSingleHosts == p2.AllowSingleHosts &&
|
2021-01-21 01:24:16 +00:00
|
|
|
p.ExitNodeID == p2.ExitNodeID &&
|
|
|
|
p.ExitNodeIP == p2.ExitNodeIP &&
|
2020-02-17 23:01:23 +00:00
|
|
|
p.CorpDNS == p2.CorpDNS &&
|
|
|
|
p.WantRunning == p2.WantRunning &&
|
|
|
|
p.NotepadURLs == p2.NotepadURLs &&
|
2020-04-29 06:37:35 +00:00
|
|
|
p.ShieldsUp == p2.ShieldsUp &&
|
2020-05-11 20:16:52 +00:00
|
|
|
p.NoSNAT == p2.NoSNAT &&
|
2020-05-15 02:07:06 +00:00
|
|
|
p.NetfilterMode == p2.NetfilterMode &&
|
2020-06-02 16:12:05 +00:00
|
|
|
p.Hostname == p2.Hostname &&
|
2020-07-24 21:05:04 +00:00
|
|
|
p.OSVersion == p2.OSVersion &&
|
|
|
|
p.DeviceModel == p2.DeviceModel &&
|
ipn, ipnserver, cmd/tailscale: add "server mode" support on Windows
This partially (but not yet fully) migrates Windows to tailscaled's
StateStore storage system.
This adds a new bool Pref, ForceDaemon, defined as:
// ForceDaemon specifies whether a platform that normally
// operates in "client mode" (that is, requires an active user
// logged in with the GUI app running) should keep running after the
// GUI ends and/or the user logs out.
//
// The only current applicable platform is Windows. This
// forced Windows to go into "server mode" where Tailscale is
// running even with no users logged in. This might also be
// used for macOS in the future. This setting has no effect
// for Linux/etc, which always operate in daemon mode.
Then, when ForceDaemon becomes true, we now write use the StateStore
to track which user started it in server mode, and store their prefs
under that key.
The ipnserver validates the connections/identities and informs that
LocalBackend which userid is currently in charge.
The GUI can then enable/disable server mode at runtime, without using
the CLI.
But the "tailscale up" CLI was also fixed, so Windows users can use
authkeys or ACL tags, etc.
Updates #275
2020-10-12 21:28:21 +00:00
|
|
|
p.ForceDaemon == p2.ForceDaemon &&
|
2020-02-17 23:01:23 +00:00
|
|
|
compareIPNets(p.AdvertiseRoutes, p2.AdvertiseRoutes) &&
|
2020-05-01 05:01:27 +00:00
|
|
|
compareStrings(p.AdvertiseTags, p2.AdvertiseTags) &&
|
2020-02-17 23:01:23 +00:00
|
|
|
p.Persist.Equals(p2.Persist)
|
|
|
|
}
|
|
|
|
|
2020-12-24 20:33:55 +00:00
|
|
|
func compareIPNets(a, b []netaddr.IPPrefix) bool {
|
2020-02-17 23:01:23 +00:00
|
|
|
if len(a) != len(b) {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
for i := range a {
|
2020-12-24 20:33:55 +00:00
|
|
|
if a[i] != b[i] {
|
2020-02-17 23:01:23 +00:00
|
|
|
return false
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return true
|
2020-02-05 22:16:58 +00:00
|
|
|
}
|
|
|
|
|
2020-05-01 05:01:27 +00:00
|
|
|
func compareStrings(a, b []string) bool {
|
|
|
|
if len(a) != len(b) {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
for i := range a {
|
|
|
|
if a[i] != b[i] {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
|
2020-02-20 19:07:00 +00:00
|
|
|
func NewPrefs() *Prefs {
|
|
|
|
return &Prefs{
|
|
|
|
// Provide default values for options which might be missing
|
|
|
|
// from the json data for any reason. The json can still
|
|
|
|
// override them to false.
|
2020-02-19 05:03:22 +00:00
|
|
|
ControlURL: "https://login.tailscale.com",
|
2020-02-05 22:16:58 +00:00
|
|
|
RouteAll: true,
|
|
|
|
AllowSingleHosts: true,
|
|
|
|
CorpDNS: true,
|
2021-04-02 15:21:40 +00:00
|
|
|
WantRunning: false,
|
2021-02-04 21:12:42 +00:00
|
|
|
NetfilterMode: preftype.NetfilterOn,
|
2020-02-05 22:16:58 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-02-20 19:07:00 +00:00
|
|
|
// PrefsFromBytes deserializes Prefs from a JSON blob. If
|
|
|
|
// enforceDefaults is true, Prefs.RouteAll and Prefs.AllowSingleHosts
|
|
|
|
// are forced on.
|
|
|
|
func PrefsFromBytes(b []byte, enforceDefaults bool) (*Prefs, error) {
|
2020-02-17 23:01:23 +00:00
|
|
|
p := NewPrefs()
|
2020-02-05 22:16:58 +00:00
|
|
|
if len(b) == 0 {
|
2020-02-17 23:01:23 +00:00
|
|
|
return p, nil
|
2020-02-05 22:16:58 +00:00
|
|
|
}
|
2021-02-05 23:23:01 +00:00
|
|
|
persist := &persist.Persist{}
|
2020-02-05 22:16:58 +00:00
|
|
|
err := json.Unmarshal(b, persist)
|
|
|
|
if err == nil && (persist.Provider != "" || persist.LoginName != "") {
|
|
|
|
// old-style relaynode config; import it
|
2020-02-17 23:01:23 +00:00
|
|
|
p.Persist = persist
|
2020-02-05 22:16:58 +00:00
|
|
|
} else {
|
2020-02-17 23:01:23 +00:00
|
|
|
err = json.Unmarshal(b, &p)
|
2020-02-05 22:16:58 +00:00
|
|
|
if err != nil {
|
|
|
|
log.Printf("Prefs parse: %v: %v\n", err, b)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if enforceDefaults {
|
2020-02-17 23:01:23 +00:00
|
|
|
p.RouteAll = true
|
|
|
|
p.AllowSingleHosts = true
|
2020-02-05 22:16:58 +00:00
|
|
|
}
|
2020-02-17 23:01:23 +00:00
|
|
|
return p, err
|
2020-02-05 22:16:58 +00:00
|
|
|
}
|
|
|
|
|
2020-07-22 17:31:28 +00:00
|
|
|
// LoadPrefs loads a legacy relaynode config file into Prefs
|
|
|
|
// with sensible migration defaults set.
|
|
|
|
func LoadPrefs(filename string) (*Prefs, error) {
|
2020-02-05 22:16:58 +00:00
|
|
|
data, err := ioutil.ReadFile(filename)
|
|
|
|
if err != nil {
|
2020-09-17 14:59:55 +00:00
|
|
|
return nil, fmt.Errorf("LoadPrefs open: %w", err) // err includes path
|
2020-02-05 22:16:58 +00:00
|
|
|
}
|
2020-11-22 00:34:26 +00:00
|
|
|
if bytes.Contains(data, jsonEscapedZero) {
|
2020-11-24 19:07:49 +00:00
|
|
|
// Tailscale 1.2.0 - 1.2.8 on Windows had a memory corruption bug
|
|
|
|
// in the backend process that ended up sending NULL bytes over JSON
|
|
|
|
// to the frontend which wrote them out to JSON files on disk.
|
|
|
|
// So if we see one, treat is as corrupt and the user will need
|
|
|
|
// to log in again. (better than crashing)
|
2020-11-22 00:34:26 +00:00
|
|
|
return nil, os.ErrNotExist
|
|
|
|
}
|
2020-02-20 19:07:00 +00:00
|
|
|
p, err := PrefsFromBytes(data, false)
|
2020-02-05 22:16:58 +00:00
|
|
|
if err != nil {
|
2020-09-17 14:59:55 +00:00
|
|
|
return nil, fmt.Errorf("LoadPrefs(%q) decode: %w", filename, err)
|
2020-02-05 22:16:58 +00:00
|
|
|
}
|
2020-02-20 19:07:00 +00:00
|
|
|
return p, nil
|
2020-02-05 22:16:58 +00:00
|
|
|
}
|
|
|
|
|
2020-02-17 23:01:23 +00:00
|
|
|
func SavePrefs(filename string, p *Prefs) {
|
|
|
|
log.Printf("Saving prefs %v %v\n", filename, p.Pretty())
|
|
|
|
data := p.ToBytes()
|
2020-02-05 22:16:58 +00:00
|
|
|
os.MkdirAll(filepath.Dir(filename), 0700)
|
2021-01-12 03:16:14 +00:00
|
|
|
if err := atomicfile.WriteFile(filename, data, 0600); err != nil {
|
2020-02-05 22:16:58 +00:00
|
|
|
log.Printf("SavePrefs: %v\n", err)
|
|
|
|
}
|
|
|
|
}
|