2021-03-05 12:08:20 -08:00
// Copyright (c) 2021 Tailscale Inc & AUTHORS All rights reserved.
// Use of this source code is governed by a BSD-style
// license that can be found in the LICENSE file.
package cli
import (
2021-11-16 11:38:40 -08:00
"bufio"
"bytes"
2021-03-05 12:08:20 -08:00
"context"
2022-04-20 14:25:27 -07:00
"encoding/binary"
2021-03-30 10:42:35 -07:00
"encoding/json"
2021-03-05 12:08:20 -08:00
"errors"
"flag"
2021-03-30 10:42:35 -07:00
"fmt"
2021-03-30 12:56:00 -07:00
"io"
"log"
2022-06-08 08:15:16 -07:00
"net"
"net/http"
2022-11-21 09:00:20 -08:00
"net/http/httputil"
2022-07-24 20:08:42 -07:00
"net/netip"
2022-11-13 09:48:50 -08:00
"net/url"
2021-03-05 12:08:20 -08:00
"os"
2021-04-06 14:04:59 -07:00
"runtime"
2021-11-16 11:38:40 -08:00
"strconv"
2021-03-30 12:56:00 -07:00
"strings"
2021-11-16 11:38:40 -08:00
"time"
2021-03-05 12:08:20 -08:00
2021-08-19 11:10:27 -07:00
"github.com/peterbourgon/ff/v3/ffcli"
2022-11-13 09:48:50 -08:00
"golang.org/x/net/http/httpproxy"
2022-11-21 09:00:20 -08:00
"tailscale.com/client/tailscale/apitype"
2022-06-08 08:15:16 -07:00
"tailscale.com/control/controlhttp"
2022-02-20 07:59:26 -08:00
"tailscale.com/hostinfo"
2021-03-30 10:42:35 -07:00
"tailscale.com/ipn"
2022-04-20 14:25:27 -07:00
"tailscale.com/net/tsaddr"
2022-11-13 09:48:50 -08:00
"tailscale.com/net/tshttpproxy"
2021-04-06 14:04:59 -07:00
"tailscale.com/paths"
"tailscale.com/safesocket"
2022-06-08 08:15:16 -07:00
"tailscale.com/tailcfg"
"tailscale.com/types/key"
2022-11-13 09:48:50 -08:00
"tailscale.com/types/logger"
2022-11-26 14:23:00 -08:00
"tailscale.com/util/must"
2022-11-18 10:13:14 -08:00
"tailscale.com/util/strs"
2021-03-05 12:08:20 -08:00
)
var debugCmd = & ffcli . Command {
2021-11-15 14:21:55 -08:00
Name : "debug" ,
Exec : runDebug ,
LongHelp : ` "tailscale debug" contains misc debug facilities; it is not a stable interface. ` ,
2021-03-05 12:08:20 -08:00
FlagSet : ( func ( ) * flag . FlagSet {
2021-10-27 13:57:05 -07:00
fs := newFlagSet ( "debug" )
2021-03-30 12:56:00 -07:00
fs . StringVar ( & debugArgs . file , "file" , "" , "get, delete:NAME, or NAME" )
2022-10-16 08:41:38 -07:00
fs . StringVar ( & debugArgs . cpuFile , "cpu-profile" , "" , "if non-empty, grab a CPU profile for --profile-seconds seconds and write it to this file; - for stdout" )
2021-09-23 15:03:10 -07:00
fs . StringVar ( & debugArgs . memFile , "mem-profile" , "" , "if non-empty, grab a memory profile and write it to this file; - for stdout" )
2021-09-23 09:20:14 -07:00
fs . IntVar ( & debugArgs . cpuSec , "profile-seconds" , 15 , "number of seconds to run a CPU profile for, when --cpu-profile is non-empty" )
2021-03-05 12:08:20 -08:00
return fs
} ) ( ) ,
2021-11-15 14:21:55 -08:00
Subcommands : [ ] * ffcli . Command {
{
Name : "derp-map" ,
Exec : runDERPMap ,
ShortHelp : "print DERP map" ,
} ,
2022-10-03 20:39:45 -07:00
{
Name : "component-logs" ,
Exec : runDebugComponentLogs ,
ShortHelp : "enable/disable debug logs for a component" ,
FlagSet : ( func ( ) * flag . FlagSet {
fs := newFlagSet ( "component-logs" )
fs . DurationVar ( & debugComponentLogsArgs . forDur , "for" , time . Hour , "how long to enable debug logs for; zero or negative means to disable" )
return fs
} ) ( ) ,
} ,
2021-11-15 14:21:55 -08:00
{
Name : "daemon-goroutines" ,
Exec : runDaemonGoroutines ,
ShortHelp : "print tailscaled's goroutines" ,
} ,
2021-11-15 15:06:37 -08:00
{
Name : "metrics" ,
Exec : runDaemonMetrics ,
ShortHelp : "print tailscaled's metrics" ,
2021-11-16 11:38:40 -08:00
FlagSet : ( func ( ) * flag . FlagSet {
fs := newFlagSet ( "metrics" )
fs . BoolVar ( & metricsArgs . watch , "watch" , false , "print JSON dump of delta values" )
return fs
} ) ( ) ,
2021-11-15 15:06:37 -08:00
} ,
{
2021-11-15 14:21:55 -08:00
Name : "env" ,
Exec : runEnv ,
ShortHelp : "print cmd/tailscale environment" ,
} ,
2022-04-26 06:09:02 -07:00
{
Name : "stat" ,
Exec : runStat ,
ShortHelp : "stat a file" ,
} ,
2022-02-20 07:59:26 -08:00
{
Name : "hostinfo" ,
Exec : runHostinfo ,
ShortHelp : "print hostinfo" ,
} ,
2021-11-15 15:06:37 -08:00
{
2021-11-15 14:21:55 -08:00
Name : "local-creds" ,
Exec : runLocalCreds ,
2022-11-16 23:04:07 +05:00
ShortHelp : "print how to access Tailscale LocalAPI" ,
2021-11-15 14:21:55 -08:00
} ,
2021-12-28 19:41:41 -08:00
{
Name : "restun" ,
Exec : localAPIAction ( "restun" ) ,
ShortHelp : "force a magicsock restun" ,
} ,
{
Name : "rebind" ,
Exec : localAPIAction ( "rebind" ) ,
ShortHelp : "force a magicsock rebind" ,
} ,
2021-11-15 15:06:37 -08:00
{
2021-11-15 14:21:55 -08:00
Name : "prefs" ,
Exec : runPrefs ,
ShortHelp : "print prefs" ,
FlagSet : ( func ( ) * flag . FlagSet {
fs := newFlagSet ( "prefs" )
fs . BoolVar ( & prefsArgs . pretty , "pretty" , false , "If true, pretty-print output" )
return fs
} ) ( ) ,
} ,
2021-11-15 15:06:37 -08:00
{
2021-11-15 14:21:55 -08:00
Name : "watch-ipn" ,
Exec : runWatchIPN ,
ShortHelp : "subscribe to IPN message bus" ,
FlagSet : ( func ( ) * flag . FlagSet {
fs := newFlagSet ( "watch-ipn" )
fs . BoolVar ( & watchIPNArgs . netmap , "netmap" , true , "include netmap in messages" )
2022-11-30 17:39:43 -08:00
fs . BoolVar ( & watchIPNArgs . initial , "initial" , false , "include initial status" )
2021-11-15 14:21:55 -08:00
return fs
} ) ( ) ,
} ,
2022-04-20 14:25:27 -07:00
{
Name : "via" ,
Exec : runVia ,
ShortHelp : "convert between site-specific IPv4 CIDRs and IPv6 'via' routes" ,
} ,
2022-06-08 08:15:16 -07:00
{
Name : "ts2021" ,
Exec : runTS2021 ,
ShortHelp : "debug ts2021 protocol connectivity" ,
FlagSet : ( func ( ) * flag . FlagSet {
fs := newFlagSet ( "ts2021" )
fs . StringVar ( & ts2021Args . host , "host" , "controlplane.tailscale.com" , "hostname of control plane" )
fs . IntVar ( & ts2021Args . version , "version" , int ( tailcfg . CurrentCapabilityVersion ) , "protocol version" )
2022-11-13 09:48:50 -08:00
fs . BoolVar ( & ts2021Args . verbose , "verbose" , false , "be extra verbose" )
2022-06-08 08:15:16 -07:00
return fs
} ) ( ) ,
} ,
2022-11-07 13:04:10 -08:00
{
Name : "dev-store-set" ,
Exec : runDevStoreSet ,
ShortHelp : "set a key/value pair during development" ,
FlagSet : ( func ( ) * flag . FlagSet {
fs := newFlagSet ( "store-set" )
fs . BoolVar ( & devStoreSetArgs . danger , "danger" , false , "accept danger" )
return fs
} ) ( ) ,
} ,
2022-11-26 14:23:00 -08:00
{
Name : "derp" ,
Exec : runDebugDERP ,
ShortHelp : "test a DERP configuration" ,
} ,
2021-11-15 14:21:55 -08:00
} ,
2021-03-05 12:08:20 -08:00
}
var debugArgs struct {
2021-11-15 14:21:55 -08:00
file string
cpuSec int
cpuFile string
memFile string
2021-03-05 12:08:20 -08:00
}
2021-09-23 15:03:10 -07:00
func writeProfile ( dst string , v [ ] byte ) error {
if dst == "-" {
2021-10-27 14:53:46 -07:00
_ , err := Stdout . Write ( v )
2021-09-23 15:03:10 -07:00
return err
}
return os . WriteFile ( dst , v , 0600 )
}
func outName ( dst string ) string {
if dst == "-" {
return "stdout"
}
if runtime . GOOS == "darwin" {
return fmt . Sprintf ( "%s (warning: sandboxed macOS binaries write to Library/Containers; use - to write to stdout and redirect to file instead)" , dst )
}
return dst
}
2021-03-05 12:08:20 -08:00
func runDebug ( ctx context . Context , args [ ] string ) error {
if len ( args ) > 0 {
return errors . New ( "unknown arguments" )
}
2021-11-15 14:21:55 -08:00
var usedFlag bool
2021-09-23 09:20:14 -07:00
if out := debugArgs . cpuFile ; out != "" {
2022-11-10 11:41:04 -08:00
usedFlag = true // TODO(bradfitz): add "pprof" subcommand
2021-09-23 09:20:14 -07:00
log . Printf ( "Capturing CPU profile for %v seconds ..." , debugArgs . cpuSec )
2022-11-10 11:41:04 -08:00
if v , err := localClient . Pprof ( ctx , "profile" , debugArgs . cpuSec ) ; err != nil {
2021-09-23 09:20:14 -07:00
return err
} else {
2021-09-23 15:03:10 -07:00
if err := writeProfile ( out , v ) ; err != nil {
2021-09-23 09:20:14 -07:00
return err
}
2021-09-23 15:03:10 -07:00
log . Printf ( "CPU profile written to %s" , outName ( out ) )
2021-09-23 09:20:14 -07:00
}
}
if out := debugArgs . memFile ; out != "" {
2022-11-10 11:41:04 -08:00
usedFlag = true // TODO(bradfitz): add "pprof" subcommand
2021-09-23 09:20:14 -07:00
log . Printf ( "Capturing memory profile ..." )
2022-11-10 11:41:04 -08:00
if v , err := localClient . Pprof ( ctx , "heap" , 0 ) ; err != nil {
2021-09-23 09:20:14 -07:00
return err
} else {
2021-09-23 15:03:10 -07:00
if err := writeProfile ( out , v ) ; err != nil {
2021-09-23 09:20:14 -07:00
return err
}
2021-09-23 15:03:10 -07:00
log . Printf ( "Memory profile written to %s" , outName ( out ) )
2021-09-23 09:20:14 -07:00
}
}
2021-03-30 12:56:00 -07:00
if debugArgs . file != "" {
2021-11-15 14:21:55 -08:00
usedFlag = true // TODO(bradfitz): add "file" subcommand
2021-03-30 12:56:00 -07:00
if debugArgs . file == "get" {
2022-04-29 11:20:11 -07:00
wfs , err := localClient . WaitingFiles ( ctx )
2021-03-30 12:56:00 -07:00
if err != nil {
2021-10-27 15:18:48 -07:00
fatalf ( "%v\n" , err )
2021-03-30 12:56:00 -07:00
}
2021-10-27 14:53:46 -07:00
e := json . NewEncoder ( Stdout )
2021-03-30 12:56:00 -07:00
e . SetIndent ( "" , "\t" )
e . Encode ( wfs )
return nil
}
2022-11-18 10:13:14 -08:00
if name , ok := strs . CutPrefix ( debugArgs . file , "delete:" ) ; ok {
return localClient . DeleteWaitingFile ( ctx , name )
2021-03-30 12:56:00 -07:00
}
2022-04-29 11:20:11 -07:00
rc , size , err := localClient . GetWaitingFile ( ctx , debugArgs . file )
2021-03-30 12:56:00 -07:00
if err != nil {
return err
}
log . Printf ( "Size: %v\n" , size )
2021-10-27 14:53:46 -07:00
io . Copy ( Stdout , rc )
2021-03-30 12:56:00 -07:00
return nil
}
2021-11-15 14:21:55 -08:00
if usedFlag {
// TODO(bradfitz): delete this path when all debug flags are migrated
// to subcommands.
return nil
}
return errors . New ( "see 'tailscale debug --help" )
}
func runLocalCreds ( ctx context . Context , args [ ] string ) error {
port , token , err := safesocket . LocalTCPPortAndToken ( )
if err == nil {
printf ( "curl -u:%s http://localhost:%d/localapi/v0/status\n" , token , port )
return nil
}
if runtime . GOOS == "windows" {
2022-11-21 09:00:20 -08:00
runLocalAPIProxy ( )
2021-11-15 14:21:55 -08:00
return nil
}
2022-11-23 09:44:50 -08:00
printf ( "curl --unix-socket %s http://local-tailscaled.sock/localapi/v0/status\n" , paths . DefaultTailscaledSocket ( ) )
2021-11-15 14:21:55 -08:00
return nil
}
2022-11-21 09:00:20 -08:00
type localClientRoundTripper struct { }
func ( localClientRoundTripper ) RoundTrip ( req * http . Request ) ( * http . Response , error ) {
return localClient . DoLocalRequest ( req )
}
func runLocalAPIProxy ( ) {
rp := httputil . NewSingleHostReverseProxy ( & url . URL {
Scheme : "http" ,
Host : apitype . LocalAPIHost ,
Path : "/" ,
} )
dir := rp . Director
rp . Director = func ( req * http . Request ) {
dir ( req )
req . Host = ""
req . RequestURI = ""
}
rp . Transport = localClientRoundTripper { }
lc , err := net . Listen ( "tcp" , "localhost:0" )
if err != nil {
log . Fatal ( err )
}
fmt . Printf ( "Serving LocalAPI proxy on http://%s\n" , lc . Addr ( ) )
fmt . Printf ( "curl.exe http://%v/localapi/v0/status\n" , lc . Addr ( ) )
fmt . Printf ( "Ctrl+C to stop" )
http . Serve ( lc , rp )
}
2021-11-15 14:21:55 -08:00
var prefsArgs struct {
pretty bool
}
func runPrefs ( ctx context . Context , args [ ] string ) error {
2022-04-29 11:20:11 -07:00
prefs , err := localClient . GetPrefs ( ctx )
2021-11-15 14:21:55 -08:00
if err != nil {
return err
}
if prefsArgs . pretty {
outln ( prefs . Pretty ( ) )
} else {
j , _ := json . MarshalIndent ( prefs , "" , "\t" )
outln ( string ( j ) )
}
return nil
}
var watchIPNArgs struct {
2022-11-30 17:39:43 -08:00
netmap bool
initial bool
2021-11-15 14:21:55 -08:00
}
func runWatchIPN ( ctx context . Context , args [ ] string ) error {
2022-11-30 17:39:43 -08:00
var mask ipn . NotifyWatchOpt
if watchIPNArgs . initial {
mask = ipn . NotifyInitialState | ipn . NotifyInitialPrefs | ipn . NotifyInitialNetMap
}
watcher , err := localClient . WatchIPNBus ( ctx , mask )
2022-11-22 11:41:03 -08:00
if err != nil {
return err
}
defer watcher . Close ( )
printf ( "Connected.\n" )
for {
n , err := watcher . Next ( )
if err != nil {
return err
}
2021-11-15 14:21:55 -08:00
if ! watchIPNArgs . netmap {
n . NetMap = nil
}
j , _ := json . MarshalIndent ( n , "" , "\t" )
printf ( "%s\n" , j )
2022-11-22 11:41:03 -08:00
}
2021-11-15 14:21:55 -08:00
}
func runDERPMap ( ctx context . Context , args [ ] string ) error {
2022-04-29 11:20:11 -07:00
dm , err := localClient . CurrentDERPMap ( ctx )
2021-11-15 14:21:55 -08:00
if err != nil {
return fmt . Errorf (
"failed to get local derp map, instead `curl %s/derpmap/default`: %w" , ipn . DefaultControlURL , err ,
)
}
enc := json . NewEncoder ( Stdout )
enc . SetIndent ( "" , "\t" )
enc . Encode ( dm )
return nil
}
2021-12-28 19:41:41 -08:00
func localAPIAction ( action string ) func ( context . Context , [ ] string ) error {
return func ( ctx context . Context , args [ ] string ) error {
if len ( args ) > 0 {
return errors . New ( "unexpected arguments" )
}
2022-04-29 11:20:11 -07:00
return localClient . DebugAction ( ctx , action )
2021-12-28 19:41:41 -08:00
}
}
2021-11-15 14:21:55 -08:00
func runEnv ( ctx context . Context , args [ ] string ) error {
for _ , e := range os . Environ ( ) {
outln ( e )
}
return nil
}
2022-04-26 06:09:02 -07:00
func runStat ( ctx context . Context , args [ ] string ) error {
for _ , a := range args {
fi , err := os . Lstat ( a )
if err != nil {
2022-08-02 12:23:35 -07:00
printf ( "%s: %v\n" , a , err )
2022-04-26 06:09:02 -07:00
continue
}
2022-08-02 12:23:35 -07:00
printf ( "%s: %v, %v\n" , a , fi . Mode ( ) , fi . Size ( ) )
2022-04-26 06:09:02 -07:00
if fi . IsDir ( ) {
ents , _ := os . ReadDir ( a )
for i , ent := range ents {
if i == 25 {
2022-08-02 12:23:35 -07:00
printf ( " ...\n" )
2022-04-26 06:09:02 -07:00
break
}
2022-08-02 12:23:35 -07:00
printf ( " - %s\n" , ent . Name ( ) )
2022-04-26 06:09:02 -07:00
}
}
}
return nil
}
2022-02-20 07:59:26 -08:00
func runHostinfo ( ctx context . Context , args [ ] string ) error {
hi := hostinfo . New ( )
j , _ := json . MarshalIndent ( hi , "" , " " )
os . Stdout . Write ( j )
return nil
}
2021-11-15 14:21:55 -08:00
func runDaemonGoroutines ( ctx context . Context , args [ ] string ) error {
2022-04-29 11:20:11 -07:00
goroutines , err := localClient . Goroutines ( ctx )
2021-11-15 14:21:55 -08:00
if err != nil {
return err
}
Stdout . Write ( goroutines )
2021-03-05 12:08:20 -08:00
return nil
}
2021-11-15 15:06:37 -08:00
2021-11-16 11:38:40 -08:00
var metricsArgs struct {
watch bool
}
2021-11-15 15:06:37 -08:00
func runDaemonMetrics ( ctx context . Context , args [ ] string ) error {
2021-11-16 11:38:40 -08:00
last := map [ string ] int64 { }
for {
2022-04-29 11:20:11 -07:00
out , err := localClient . DaemonMetrics ( ctx )
2021-11-16 11:38:40 -08:00
if err != nil {
return err
}
if ! metricsArgs . watch {
Stdout . Write ( out )
return nil
}
bs := bufio . NewScanner ( bytes . NewReader ( out ) )
type change struct {
name string
from , to int64
}
var changes [ ] change
var maxNameLen int
for bs . Scan ( ) {
line := bytes . TrimSpace ( bs . Bytes ( ) )
if len ( line ) == 0 || line [ 0 ] == '#' {
continue
}
f := strings . Fields ( string ( line ) )
if len ( f ) != 2 {
continue
}
name := f [ 0 ]
n , _ := strconv . ParseInt ( f [ 1 ] , 10 , 64 )
prev , ok := last [ name ]
if ok && prev == n {
continue
}
last [ name ] = n
if ! ok {
continue
}
changes = append ( changes , change { name , prev , n } )
if len ( name ) > maxNameLen {
maxNameLen = len ( name )
}
}
if len ( changes ) > 0 {
format := fmt . Sprintf ( "%%-%ds %%+5d => %%v\n" , maxNameLen )
for _ , c := range changes {
fmt . Fprintf ( Stdout , format , c . name , c . to - c . from , c . to )
}
io . WriteString ( Stdout , "\n" )
}
time . Sleep ( time . Second )
2021-11-15 15:06:37 -08:00
}
}
2022-04-20 14:25:27 -07:00
func runVia ( ctx context . Context , args [ ] string ) error {
switch len ( args ) {
default :
return errors . New ( "expect either <site-id> <v4-cidr> or <v6-route>" )
case 1 :
2022-07-25 20:55:44 -07:00
ipp , err := netip . ParsePrefix ( args [ 0 ] )
2022-04-20 14:25:27 -07:00
if err != nil {
return err
}
2022-07-24 20:08:42 -07:00
if ! ipp . Addr ( ) . Is6 ( ) {
2022-04-20 14:25:27 -07:00
return errors . New ( "with one argument, expect an IPv6 CIDR" )
}
2022-07-24 20:08:42 -07:00
if ! tsaddr . TailscaleViaRange ( ) . Contains ( ipp . Addr ( ) ) {
2022-04-20 14:25:27 -07:00
return errors . New ( "not a via route" )
}
if ipp . Bits ( ) < 96 {
return errors . New ( "short length, want /96 or more" )
}
2022-07-24 20:08:42 -07:00
v4 := tsaddr . UnmapVia ( ipp . Addr ( ) )
a := ipp . Addr ( ) . As16 ( )
2022-04-20 14:25:27 -07:00
siteID := binary . BigEndian . Uint32 ( a [ 8 : 12 ] )
2022-08-02 12:23:35 -07:00
printf ( "site %v (0x%x), %v\n" , siteID , siteID , netip . PrefixFrom ( v4 , ipp . Bits ( ) - 96 ) )
2022-04-20 14:25:27 -07:00
case 2 :
siteID , err := strconv . ParseUint ( args [ 0 ] , 0 , 32 )
if err != nil {
return fmt . Errorf ( "invalid site-id %q; must be decimal or hex with 0x prefix" , args [ 0 ] )
}
if siteID > 0xff {
return fmt . Errorf ( "site-id values over 255 are currently reserved" )
}
2022-07-25 20:55:44 -07:00
ipp , err := netip . ParsePrefix ( args [ 1 ] )
2022-04-20 14:25:27 -07:00
if err != nil {
return err
}
via , err := tsaddr . MapVia ( uint32 ( siteID ) , ipp )
if err != nil {
return err
}
2022-08-02 12:23:35 -07:00
outln ( via )
2022-04-20 14:25:27 -07:00
}
return nil
}
2022-06-08 08:15:16 -07:00
var ts2021Args struct {
host string // "controlplane.tailscale.com"
version int // 27 or whatever
2022-11-13 09:48:50 -08:00
verbose bool
2022-06-08 08:15:16 -07:00
}
func runTS2021 ( ctx context . Context , args [ ] string ) error {
log . SetOutput ( os . Stdout )
log . SetFlags ( log . Ltime | log . Lmicroseconds )
2022-11-13 09:48:50 -08:00
keysURL := "https://" + ts2021Args . host + "/key?v=" + strconv . Itoa ( ts2021Args . version )
if ts2021Args . verbose {
u , err := url . Parse ( keysURL )
if err != nil {
return err
}
envConf := httpproxy . FromEnvironment ( )
if * envConf == ( httpproxy . Config { } ) {
log . Printf ( "HTTP proxy env: (none)" )
} else {
log . Printf ( "HTTP proxy env: %+v" , envConf )
}
proxy , err := tshttpproxy . ProxyFromEnvironment ( & http . Request { URL : u } )
log . Printf ( "tshttpproxy.ProxyFromEnvironment = (%v, %v)" , proxy , err )
}
2022-06-08 08:15:16 -07:00
machinePrivate := key . NewMachine ( )
var dialer net . Dialer
var keys struct {
PublicKey key . MachinePublic
}
log . Printf ( "Fetching keys from %s ..." , keysURL )
req , err := http . NewRequestWithContext ( ctx , "GET" , keysURL , nil )
if err != nil {
return err
}
res , err := http . DefaultClient . Do ( req )
if err != nil {
log . Printf ( "Do: %v" , err )
return err
}
if res . StatusCode != 200 {
log . Printf ( "Status: %v" , res . Status )
return errors . New ( res . Status )
}
if err := json . NewDecoder ( res . Body ) . Decode ( & keys ) ; err != nil {
log . Printf ( "JSON: %v" , err )
return fmt . Errorf ( "decoding /keys JSON: %w" , err )
}
res . Body . Close ( )
2022-11-13 09:48:50 -08:00
if ts2021Args . verbose {
log . Printf ( "got public key: %v" , keys . PublicKey )
}
2022-06-08 08:15:16 -07:00
dialFunc := func ( ctx context . Context , network , address string ) ( net . Conn , error ) {
log . Printf ( "Dial(%q, %q) ..." , network , address )
c , err := dialer . DialContext ( ctx , network , address )
if err != nil {
log . Printf ( "Dial(%q, %q) = %v" , network , address , err )
} else {
log . Printf ( "Dial(%q, %q) = %v / %v" , network , address , c . LocalAddr ( ) , c . RemoteAddr ( ) )
}
return c , err
}
2022-11-13 09:48:50 -08:00
var logf logger . Logf
if ts2021Args . verbose {
logf = log . Printf
}
2022-09-16 15:06:25 -04:00
conn , err := ( & controlhttp . Dialer {
Hostname : ts2021Args . host ,
HTTPPort : "80" ,
HTTPSPort : "443" ,
MachineKey : machinePrivate ,
ControlKey : keys . PublicKey ,
ProtocolVersion : uint16 ( ts2021Args . version ) ,
Dialer : dialFunc ,
2022-11-13 09:48:50 -08:00
Logf : logf ,
2022-09-16 15:06:25 -04:00
} ) . Dial ( ctx )
2022-06-08 08:15:16 -07:00
log . Printf ( "controlhttp.Dial = %p, %v" , conn , err )
if err != nil {
return err
}
log . Printf ( "did noise handshake" )
gotPeer := conn . Peer ( )
if gotPeer != keys . PublicKey {
log . Printf ( "peer = %v, want %v" , gotPeer , keys . PublicKey )
return errors . New ( "key mismatch" )
}
log . Printf ( "final underlying conn: %v / %v" , conn . LocalAddr ( ) , conn . RemoteAddr ( ) )
return nil
}
2022-10-03 20:39:45 -07:00
var debugComponentLogsArgs struct {
forDur time . Duration
}
func runDebugComponentLogs ( ctx context . Context , args [ ] string ) error {
if len ( args ) != 1 {
return errors . New ( "usage: debug component-logs <component>" )
}
component := args [ 0 ]
dur := debugComponentLogsArgs . forDur
err := localClient . SetComponentDebugLogging ( ctx , component , dur )
if err != nil {
return err
}
if debugComponentLogsArgs . forDur <= 0 {
fmt . Printf ( "Disabled debug logs for component %q\n" , component )
} else {
fmt . Printf ( "Enabled debug logs for component %q for %v\n" , component , dur )
}
return nil
}
2022-11-07 13:04:10 -08:00
var devStoreSetArgs struct {
danger bool
}
func runDevStoreSet ( ctx context . Context , args [ ] string ) error {
if len ( args ) != 2 {
return errors . New ( "usage: dev-store-set --danger <key> <value>" )
}
if ! devStoreSetArgs . danger {
return errors . New ( "this command is dangerous; use --danger to proceed" )
}
2022-11-07 15:32:53 -08:00
key , val := args [ 0 ] , args [ 1 ]
if val == "-" {
valb , err := io . ReadAll ( os . Stdin )
if err != nil {
return err
}
val = string ( valb )
}
return localClient . SetDevStoreKeyValue ( ctx , key , val )
2022-11-07 13:04:10 -08:00
}
2022-11-26 14:23:00 -08:00
func runDebugDERP ( ctx context . Context , args [ ] string ) error {
if len ( args ) != 1 {
return errors . New ( "usage: debug derp <region>" )
}
st , err := localClient . DebugDERPRegion ( ctx , args [ 0 ] )
if err != nil {
return err
}
fmt . Printf ( "%s\n" , must . Get ( json . MarshalIndent ( st , "" , " " ) ) )
return nil
}