all: illumos/solaris userspace only support

Updates #14565

Change-Id: I743148144938794db0a224873ce76c10dbe6fa5f
Signed-off-by: Nahum Shalman <nahamu@gmail.com>
This commit is contained in:
Nahum Shalman 2023-04-23 15:57:35 +00:00 committed by Brad Fitzpatrick
parent 6ddeae7556
commit 9373a1b902
14 changed files with 60 additions and 12 deletions

View File

@ -313,6 +313,12 @@ jobs:
# AIX # AIX
- goos: aix - goos: aix
goarch: ppc64 goarch: ppc64
# Solaris
- goos: solaris
goarch: amd64
# illumos
- goos: illumos
goarch: amd64
runs-on: ubuntu-22.04 runs-on: ubuntu-22.04
steps: steps:

View File

@ -81,7 +81,7 @@ func defaultTunName() string {
// "utun" is recognized by wireguard-go/tun/tun_darwin.go // "utun" is recognized by wireguard-go/tun/tun_darwin.go
// as a magic value that uses/creates any free number. // as a magic value that uses/creates any free number.
return "utun" return "utun"
case "plan9", "aix": case "plan9", "aix", "solaris", "illumos":
return "userspace-networking" return "userspace-networking"
case "linux": case "linux":
switch distro.Get() { switch distro.Get() {
@ -665,7 +665,7 @@ func handleSubnetsInNetstack() bool {
return true return true
} }
switch runtime.GOOS { switch runtime.GOOS {
case "windows", "darwin", "freebsd", "openbsd": case "windows", "darwin", "freebsd", "openbsd", "solaris", "illumos":
// Enable on Windows and tailscaled-on-macOS (this doesn't // Enable on Windows and tailscaled-on-macOS (this doesn't
// affect the GUI clients), and on FreeBSD. // affect the GUI clients), and on FreeBSD.
return true return true

View File

@ -4176,7 +4176,7 @@ func (b *LocalBackend) peerAPIServicesLocked() (ret []tailcfg.Service) {
}) })
} }
switch runtime.GOOS { switch runtime.GOOS {
case "linux", "freebsd", "openbsd", "illumos", "darwin", "windows", "android", "ios": case "linux", "freebsd", "openbsd", "illumos", "solaris", "darwin", "windows", "android", "ios":
// These are the platforms currently supported by // These are the platforms currently supported by
// net/dns/resolver/tsdns.go:Resolver.HandleExitNodeDNSQuery. // net/dns/resolver/tsdns.go:Resolver.HandleExitNodeDNSQuery.
ret = append(ret, tailcfg.Service{ ret = append(ret, tailcfg.Service{

View File

@ -96,7 +96,7 @@ func (a *actor) Username() (string, error) {
} }
defer tok.Close() defer tok.Close()
return tok.Username() return tok.Username()
case "darwin", "linux": case "darwin", "linux", "illumos", "solaris":
uid, ok := a.ci.Creds().UserID() uid, ok := a.ci.Creds().UserID()
if !ok { if !ok {
return "", errors.New("missing user ID") return "", errors.New("missing user ID")

View File

@ -650,6 +650,8 @@ func osEmoji(os string) string {
return "🐡" return "🐡"
case "illumos": case "illumos":
return "☀️" return "☀️"
case "solaris":
return "🌤️"
} }
return "👽" return "👽"
} }

View File

@ -1097,7 +1097,7 @@ func (h *Handler) serveServeConfig(w http.ResponseWriter, r *http.Request) {
func authorizeServeConfigForGOOSAndUserContext(goos string, configIn *ipn.ServeConfig, h *Handler) error { func authorizeServeConfigForGOOSAndUserContext(goos string, configIn *ipn.ServeConfig, h *Handler) error {
switch goos { switch goos {
case "windows", "linux", "darwin": case "windows", "linux", "darwin", "illumos", "solaris":
default: default:
return nil return nil
} }
@ -1117,7 +1117,7 @@ func authorizeServeConfigForGOOSAndUserContext(goos string, configIn *ipn.ServeC
switch goos { switch goos {
case "windows": case "windows":
return errors.New("must be a Windows local admin to serve a path") return errors.New("must be a Windows local admin to serve a path")
case "linux", "darwin": case "linux", "darwin", "illumos", "solaris":
return errors.New("must be root, or be an operator and able to run 'sudo tailscale' to serve a path") return errors.New("must be root, or be an operator and able to run 'sudo tailscale' to serve a path")
default: default:
// We filter goos at the start of the func, this default case // We filter goos at the start of the func, this default case

View File

@ -237,7 +237,7 @@ func TestShouldDenyServeConfigForGOOSAndUserContext(t *testing.T) {
} }
for _, tt := range tests { for _, tt := range tests {
for _, goos := range []string{"linux", "windows", "darwin"} { for _, goos := range []string{"linux", "windows", "darwin", "illumos", "solaris"} {
t.Run(goos+"-"+tt.name, func(t *testing.T) { t.Run(goos+"-"+tt.name, func(t *testing.T) {
err := authorizeServeConfigForGOOSAndUserContext(goos, tt.configIn, tt.h) err := authorizeServeConfigForGOOSAndUserContext(goos, tt.configIn, tt.h)
gotErr := err != nil gotErr := err != nil

View File

@ -1,7 +1,7 @@
// Copyright (c) Tailscale Inc & AUTHORS // Copyright (c) Tailscale Inc & AUTHORS
// SPDX-License-Identifier: BSD-3-Clause // SPDX-License-Identifier: BSD-3-Clause
//go:build !linux && !freebsd && !openbsd && !windows && !darwin //go:build !linux && !freebsd && !openbsd && !windows && !darwin && !illumos && !solaris
package dns package dns

View File

@ -0,0 +1,14 @@
// Copyright (c) Tailscale Inc & AUTHORS
// SPDX-License-Identifier: BSD-3-Clause
package dns
import (
"tailscale.com/control/controlknobs"
"tailscale.com/health"
"tailscale.com/types/logger"
)
func NewOSConfigurator(logf logger.Logf, health *health.Tracker, _ *controlknobs.Knobs, iface string) (OSConfigurator, error) {
return newDirectManager(logf, health), nil
}

View File

@ -384,7 +384,7 @@ func (r *Resolver) HandlePeerDNSQuery(ctx context.Context, q []byte, from netip.
// but for now that's probably good enough. Later we'll // but for now that's probably good enough. Later we'll
// want to blend in everything from scutil --dns. // want to blend in everything from scutil --dns.
fallthrough fallthrough
case "linux", "freebsd", "openbsd", "illumos", "ios": case "linux", "freebsd", "openbsd", "illumos", "solaris", "ios":
nameserver, err := stubResolverForOS() nameserver, err := stubResolverForOS()
if err != nil { if err != nil {
r.logf("stubResolverForOS: %v", err) r.logf("stubResolverForOS: %v", err)

View File

@ -63,6 +63,11 @@ func CheckIPForwarding(routes []netip.Prefix, state *netmon.State) (warn, err er
switch runtime.GOOS { switch runtime.GOOS {
case "dragonfly", "freebsd", "netbsd", "openbsd": case "dragonfly", "freebsd", "netbsd", "openbsd":
return fmt.Errorf("Subnet routing and exit nodes only work with additional manual configuration on %v, and is not currently officially supported.", runtime.GOOS), nil return fmt.Errorf("Subnet routing and exit nodes only work with additional manual configuration on %v, and is not currently officially supported.", runtime.GOOS), nil
case "illumos", "solaris":
_, err := ipForwardingEnabledSunOS(ipv4, "")
if err != nil {
return nil, fmt.Errorf("Couldn't check system's IP forwarding configuration, subnet routing/exit nodes may not work: %w%s", err, "")
}
} }
return nil, nil return nil, nil
} }
@ -325,3 +330,24 @@ func reversePathFilterValueLinux(iface string) (int, error) {
} }
return v, nil return v, nil
} }
func ipForwardingEnabledSunOS(p protocol, iface string) (bool, error) {
var proto string
if p == ipv4 {
proto = "ipv4"
} else if p == ipv6 {
proto = "ipv6"
} else {
return false, fmt.Errorf("unknown protocol")
}
ipadmCmd := "\"ipadm show-prop " + proto + " -p forwarding -o CURRENT -c\""
bs, err := exec.Command("ipadm", "show-prop", proto, "-p", "forwarding", "-o", "CURRENT", "-c").Output()
if err != nil {
return false, fmt.Errorf("couldn't check %s (%v).\nSubnet routes won't work without IP forwarding.", ipadmCmd, err)
}
if string(bs) != "on\n" {
return false, fmt.Errorf("IP forwarding is set to off. Subnet routes won't work. Try 'routeadm -u -e %s-forwarding'", proto)
}
return true, nil
}

View File

@ -1,7 +1,7 @@
// Copyright (c) Tailscale Inc & AUTHORS // Copyright (c) Tailscale Inc & AUTHORS
// SPDX-License-Identifier: BSD-3-Clause // SPDX-License-Identifier: BSD-3-Clause
//go:build plan9 || aix //go:build plan9 || aix || solaris || illumos
package tstun package tstun

View File

@ -1,7 +1,7 @@
// Copyright (c) Tailscale Inc & AUTHORS // Copyright (c) Tailscale Inc & AUTHORS
// SPDX-License-Identifier: BSD-3-Clause // SPDX-License-Identifier: BSD-3-Clause
//go:build !wasm && !plan9 && !tamago && !aix //go:build !wasm && !plan9 && !tamago && !aix && !solaris && !illumos
// Package tun creates a tuntap device, working around OS-specific // Package tun creates a tuntap device, working around OS-specific
// quirks if necessary. // quirks if necessary.

View File

@ -22,7 +22,7 @@ func init() {
func statePath() string { func statePath() string {
switch runtime.GOOS { switch runtime.GOOS {
case "linux": case "linux", "illumos", "solaris":
return "/var/lib/tailscale/tailscaled.state" return "/var/lib/tailscale/tailscaled.state"
case "freebsd", "openbsd": case "freebsd", "openbsd":
return "/var/db/tailscale/tailscaled.state" return "/var/db/tailscale/tailscaled.state"