mirror of
https://github.com/tailscale/tailscale.git
synced 2025-04-02 22:35:59 +00:00
all: illumos/solaris userspace only support
Updates #14565 Change-Id: I743148144938794db0a224873ce76c10dbe6fa5f Signed-off-by: Nahum Shalman <nahamu@gmail.com>
This commit is contained in:
parent
6ddeae7556
commit
9373a1b902
6
.github/workflows/test.yml
vendored
6
.github/workflows/test.yml
vendored
@ -313,6 +313,12 @@ jobs:
|
|||||||
# AIX
|
# AIX
|
||||||
- goos: aix
|
- goos: aix
|
||||||
goarch: ppc64
|
goarch: ppc64
|
||||||
|
# Solaris
|
||||||
|
- goos: solaris
|
||||||
|
goarch: amd64
|
||||||
|
# illumos
|
||||||
|
- goos: illumos
|
||||||
|
goarch: amd64
|
||||||
|
|
||||||
runs-on: ubuntu-22.04
|
runs-on: ubuntu-22.04
|
||||||
steps:
|
steps:
|
||||||
|
@ -81,7 +81,7 @@ func defaultTunName() string {
|
|||||||
// "utun" is recognized by wireguard-go/tun/tun_darwin.go
|
// "utun" is recognized by wireguard-go/tun/tun_darwin.go
|
||||||
// as a magic value that uses/creates any free number.
|
// as a magic value that uses/creates any free number.
|
||||||
return "utun"
|
return "utun"
|
||||||
case "plan9", "aix":
|
case "plan9", "aix", "solaris", "illumos":
|
||||||
return "userspace-networking"
|
return "userspace-networking"
|
||||||
case "linux":
|
case "linux":
|
||||||
switch distro.Get() {
|
switch distro.Get() {
|
||||||
@ -665,7 +665,7 @@ func handleSubnetsInNetstack() bool {
|
|||||||
return true
|
return true
|
||||||
}
|
}
|
||||||
switch runtime.GOOS {
|
switch runtime.GOOS {
|
||||||
case "windows", "darwin", "freebsd", "openbsd":
|
case "windows", "darwin", "freebsd", "openbsd", "solaris", "illumos":
|
||||||
// Enable on Windows and tailscaled-on-macOS (this doesn't
|
// Enable on Windows and tailscaled-on-macOS (this doesn't
|
||||||
// affect the GUI clients), and on FreeBSD.
|
// affect the GUI clients), and on FreeBSD.
|
||||||
return true
|
return true
|
||||||
|
@ -4176,7 +4176,7 @@ func (b *LocalBackend) peerAPIServicesLocked() (ret []tailcfg.Service) {
|
|||||||
})
|
})
|
||||||
}
|
}
|
||||||
switch runtime.GOOS {
|
switch runtime.GOOS {
|
||||||
case "linux", "freebsd", "openbsd", "illumos", "darwin", "windows", "android", "ios":
|
case "linux", "freebsd", "openbsd", "illumos", "solaris", "darwin", "windows", "android", "ios":
|
||||||
// These are the platforms currently supported by
|
// These are the platforms currently supported by
|
||||||
// net/dns/resolver/tsdns.go:Resolver.HandleExitNodeDNSQuery.
|
// net/dns/resolver/tsdns.go:Resolver.HandleExitNodeDNSQuery.
|
||||||
ret = append(ret, tailcfg.Service{
|
ret = append(ret, tailcfg.Service{
|
||||||
|
@ -96,7 +96,7 @@ func (a *actor) Username() (string, error) {
|
|||||||
}
|
}
|
||||||
defer tok.Close()
|
defer tok.Close()
|
||||||
return tok.Username()
|
return tok.Username()
|
||||||
case "darwin", "linux":
|
case "darwin", "linux", "illumos", "solaris":
|
||||||
uid, ok := a.ci.Creds().UserID()
|
uid, ok := a.ci.Creds().UserID()
|
||||||
if !ok {
|
if !ok {
|
||||||
return "", errors.New("missing user ID")
|
return "", errors.New("missing user ID")
|
||||||
|
@ -650,6 +650,8 @@ func osEmoji(os string) string {
|
|||||||
return "🐡"
|
return "🐡"
|
||||||
case "illumos":
|
case "illumos":
|
||||||
return "☀️"
|
return "☀️"
|
||||||
|
case "solaris":
|
||||||
|
return "🌤️"
|
||||||
}
|
}
|
||||||
return "👽"
|
return "👽"
|
||||||
}
|
}
|
||||||
|
@ -1097,7 +1097,7 @@ func (h *Handler) serveServeConfig(w http.ResponseWriter, r *http.Request) {
|
|||||||
|
|
||||||
func authorizeServeConfigForGOOSAndUserContext(goos string, configIn *ipn.ServeConfig, h *Handler) error {
|
func authorizeServeConfigForGOOSAndUserContext(goos string, configIn *ipn.ServeConfig, h *Handler) error {
|
||||||
switch goos {
|
switch goos {
|
||||||
case "windows", "linux", "darwin":
|
case "windows", "linux", "darwin", "illumos", "solaris":
|
||||||
default:
|
default:
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
@ -1117,7 +1117,7 @@ func authorizeServeConfigForGOOSAndUserContext(goos string, configIn *ipn.ServeC
|
|||||||
switch goos {
|
switch goos {
|
||||||
case "windows":
|
case "windows":
|
||||||
return errors.New("must be a Windows local admin to serve a path")
|
return errors.New("must be a Windows local admin to serve a path")
|
||||||
case "linux", "darwin":
|
case "linux", "darwin", "illumos", "solaris":
|
||||||
return errors.New("must be root, or be an operator and able to run 'sudo tailscale' to serve a path")
|
return errors.New("must be root, or be an operator and able to run 'sudo tailscale' to serve a path")
|
||||||
default:
|
default:
|
||||||
// We filter goos at the start of the func, this default case
|
// We filter goos at the start of the func, this default case
|
||||||
|
@ -237,7 +237,7 @@ func TestShouldDenyServeConfigForGOOSAndUserContext(t *testing.T) {
|
|||||||
}
|
}
|
||||||
|
|
||||||
for _, tt := range tests {
|
for _, tt := range tests {
|
||||||
for _, goos := range []string{"linux", "windows", "darwin"} {
|
for _, goos := range []string{"linux", "windows", "darwin", "illumos", "solaris"} {
|
||||||
t.Run(goos+"-"+tt.name, func(t *testing.T) {
|
t.Run(goos+"-"+tt.name, func(t *testing.T) {
|
||||||
err := authorizeServeConfigForGOOSAndUserContext(goos, tt.configIn, tt.h)
|
err := authorizeServeConfigForGOOSAndUserContext(goos, tt.configIn, tt.h)
|
||||||
gotErr := err != nil
|
gotErr := err != nil
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
// Copyright (c) Tailscale Inc & AUTHORS
|
// Copyright (c) Tailscale Inc & AUTHORS
|
||||||
// SPDX-License-Identifier: BSD-3-Clause
|
// SPDX-License-Identifier: BSD-3-Clause
|
||||||
|
|
||||||
//go:build !linux && !freebsd && !openbsd && !windows && !darwin
|
//go:build !linux && !freebsd && !openbsd && !windows && !darwin && !illumos && !solaris
|
||||||
|
|
||||||
package dns
|
package dns
|
||||||
|
|
||||||
|
14
net/dns/manager_solaris.go
Normal file
14
net/dns/manager_solaris.go
Normal file
@ -0,0 +1,14 @@
|
|||||||
|
// Copyright (c) Tailscale Inc & AUTHORS
|
||||||
|
// SPDX-License-Identifier: BSD-3-Clause
|
||||||
|
|
||||||
|
package dns
|
||||||
|
|
||||||
|
import (
|
||||||
|
"tailscale.com/control/controlknobs"
|
||||||
|
"tailscale.com/health"
|
||||||
|
"tailscale.com/types/logger"
|
||||||
|
)
|
||||||
|
|
||||||
|
func NewOSConfigurator(logf logger.Logf, health *health.Tracker, _ *controlknobs.Knobs, iface string) (OSConfigurator, error) {
|
||||||
|
return newDirectManager(logf, health), nil
|
||||||
|
}
|
@ -384,7 +384,7 @@ func (r *Resolver) HandlePeerDNSQuery(ctx context.Context, q []byte, from netip.
|
|||||||
// but for now that's probably good enough. Later we'll
|
// but for now that's probably good enough. Later we'll
|
||||||
// want to blend in everything from scutil --dns.
|
// want to blend in everything from scutil --dns.
|
||||||
fallthrough
|
fallthrough
|
||||||
case "linux", "freebsd", "openbsd", "illumos", "ios":
|
case "linux", "freebsd", "openbsd", "illumos", "solaris", "ios":
|
||||||
nameserver, err := stubResolverForOS()
|
nameserver, err := stubResolverForOS()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
r.logf("stubResolverForOS: %v", err)
|
r.logf("stubResolverForOS: %v", err)
|
||||||
|
@ -63,6 +63,11 @@ func CheckIPForwarding(routes []netip.Prefix, state *netmon.State) (warn, err er
|
|||||||
switch runtime.GOOS {
|
switch runtime.GOOS {
|
||||||
case "dragonfly", "freebsd", "netbsd", "openbsd":
|
case "dragonfly", "freebsd", "netbsd", "openbsd":
|
||||||
return fmt.Errorf("Subnet routing and exit nodes only work with additional manual configuration on %v, and is not currently officially supported.", runtime.GOOS), nil
|
return fmt.Errorf("Subnet routing and exit nodes only work with additional manual configuration on %v, and is not currently officially supported.", runtime.GOOS), nil
|
||||||
|
case "illumos", "solaris":
|
||||||
|
_, err := ipForwardingEnabledSunOS(ipv4, "")
|
||||||
|
if err != nil {
|
||||||
|
return nil, fmt.Errorf("Couldn't check system's IP forwarding configuration, subnet routing/exit nodes may not work: %w%s", err, "")
|
||||||
|
}
|
||||||
}
|
}
|
||||||
return nil, nil
|
return nil, nil
|
||||||
}
|
}
|
||||||
@ -325,3 +330,24 @@ func reversePathFilterValueLinux(iface string) (int, error) {
|
|||||||
}
|
}
|
||||||
return v, nil
|
return v, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func ipForwardingEnabledSunOS(p protocol, iface string) (bool, error) {
|
||||||
|
var proto string
|
||||||
|
if p == ipv4 {
|
||||||
|
proto = "ipv4"
|
||||||
|
} else if p == ipv6 {
|
||||||
|
proto = "ipv6"
|
||||||
|
} else {
|
||||||
|
return false, fmt.Errorf("unknown protocol")
|
||||||
|
}
|
||||||
|
|
||||||
|
ipadmCmd := "\"ipadm show-prop " + proto + " -p forwarding -o CURRENT -c\""
|
||||||
|
bs, err := exec.Command("ipadm", "show-prop", proto, "-p", "forwarding", "-o", "CURRENT", "-c").Output()
|
||||||
|
if err != nil {
|
||||||
|
return false, fmt.Errorf("couldn't check %s (%v).\nSubnet routes won't work without IP forwarding.", ipadmCmd, err)
|
||||||
|
}
|
||||||
|
if string(bs) != "on\n" {
|
||||||
|
return false, fmt.Errorf("IP forwarding is set to off. Subnet routes won't work. Try 'routeadm -u -e %s-forwarding'", proto)
|
||||||
|
}
|
||||||
|
return true, nil
|
||||||
|
}
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
// Copyright (c) Tailscale Inc & AUTHORS
|
// Copyright (c) Tailscale Inc & AUTHORS
|
||||||
// SPDX-License-Identifier: BSD-3-Clause
|
// SPDX-License-Identifier: BSD-3-Clause
|
||||||
|
|
||||||
//go:build plan9 || aix
|
//go:build plan9 || aix || solaris || illumos
|
||||||
|
|
||||||
package tstun
|
package tstun
|
||||||
|
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
// Copyright (c) Tailscale Inc & AUTHORS
|
// Copyright (c) Tailscale Inc & AUTHORS
|
||||||
// SPDX-License-Identifier: BSD-3-Clause
|
// SPDX-License-Identifier: BSD-3-Clause
|
||||||
|
|
||||||
//go:build !wasm && !plan9 && !tamago && !aix
|
//go:build !wasm && !plan9 && !tamago && !aix && !solaris && !illumos
|
||||||
|
|
||||||
// Package tun creates a tuntap device, working around OS-specific
|
// Package tun creates a tuntap device, working around OS-specific
|
||||||
// quirks if necessary.
|
// quirks if necessary.
|
||||||
|
@ -22,7 +22,7 @@ func init() {
|
|||||||
|
|
||||||
func statePath() string {
|
func statePath() string {
|
||||||
switch runtime.GOOS {
|
switch runtime.GOOS {
|
||||||
case "linux":
|
case "linux", "illumos", "solaris":
|
||||||
return "/var/lib/tailscale/tailscaled.state"
|
return "/var/lib/tailscale/tailscaled.state"
|
||||||
case "freebsd", "openbsd":
|
case "freebsd", "openbsd":
|
||||||
return "/var/db/tailscale/tailscaled.state"
|
return "/var/db/tailscale/tailscaled.state"
|
||||||
|
Loading…
x
Reference in New Issue
Block a user