mirror of
https://github.com/tailscale/tailscale.git
synced 2025-02-27 10:47:35 +00:00
fix: typo spelling grammar
Signed-off-by: slowy07 <slowy.arfy@gmail.com>
This commit is contained in:
parent
780e65a613
commit
ac0353e982
2
api.md
2
api.md
@ -474,7 +474,7 @@ Determines what rules match for a user on an ACL without saving the ACL to the s
|
|||||||
###### Query Parameters
|
###### Query Parameters
|
||||||
`type` - can be 'user' or 'ipport'
|
`type` - can be 'user' or 'ipport'
|
||||||
`previewFor` - if type=user, a user's email. If type=ipport, a IP address + port like "10.0.0.1:80".
|
`previewFor` - if type=user, a user's email. If type=ipport, a IP address + port like "10.0.0.1:80".
|
||||||
The provided ACL is queried with this paramater to determine which rules match.
|
The provided ACL is queried with this parameter to determine which rules match.
|
||||||
|
|
||||||
###### POST Body
|
###### POST Body
|
||||||
ACL JSON or HuJSON (see https://tailscale.com/kb/1018/acls)
|
ACL JSON or HuJSON (see https://tailscale.com/kb/1018/acls)
|
||||||
|
@ -823,7 +823,7 @@ func (c *Direct) sendMapRequest(ctx context.Context, maxPolls int, cb func(*netm
|
|||||||
}
|
}
|
||||||
|
|
||||||
// Get latest localPort. This might've changed if
|
// Get latest localPort. This might've changed if
|
||||||
// a lite map update occured meanwhile. This only affects
|
// a lite map update occurred meanwhile. This only affects
|
||||||
// the end-to-end test.
|
// the end-to-end test.
|
||||||
// TODO(bradfitz): remove the NetworkMap.LocalPort field entirely.
|
// TODO(bradfitz): remove the NetworkMap.LocalPort field entirely.
|
||||||
c.mu.Lock()
|
c.mu.Lock()
|
||||||
|
@ -150,7 +150,7 @@ type Server struct {
|
|||||||
|
|
||||||
// PacketForwarder is something that can forward packets.
|
// PacketForwarder is something that can forward packets.
|
||||||
//
|
//
|
||||||
// It's mostly an inteface for circular dependency reasons; the
|
// It's mostly an interface for circular dependency reasons; the
|
||||||
// typical implementation is derphttp.Client. The other implementation
|
// typical implementation is derphttp.Client. The other implementation
|
||||||
// is a multiForwarder, which this package creates as needed if a
|
// is a multiForwarder, which this package creates as needed if a
|
||||||
// public key gets more than one PacketForwarder registered for it.
|
// public key gets more than one PacketForwarder registered for it.
|
||||||
|
@ -334,7 +334,7 @@ func (r *Resolver) resolveLocal(domain dnsname.FQDN, typ dns.Type) (netaddr.IP,
|
|||||||
case dns.TypeNS, dns.TypeSOA, dns.TypeAXFR, dns.TypeHINFO:
|
case dns.TypeNS, dns.TypeSOA, dns.TypeAXFR, dns.TypeHINFO:
|
||||||
return netaddr.IP{}, dns.RCodeNotImplemented
|
return netaddr.IP{}, dns.RCodeNotImplemented
|
||||||
|
|
||||||
// For everything except for the few types above that are explictly not implemented, return no records.
|
// For everything except for the few types above that are explicitly not implemented, return no records.
|
||||||
// This is what other DNS systems do: always return NOERROR
|
// This is what other DNS systems do: always return NOERROR
|
||||||
// without any records whenever the requested record type is unknown.
|
// without any records whenever the requested record type is unknown.
|
||||||
// You can try this with:
|
// You can try this with:
|
||||||
|
@ -49,7 +49,7 @@ type entry struct {
|
|||||||
value interface{}
|
value interface{}
|
||||||
}
|
}
|
||||||
|
|
||||||
// Add adds a value to the cache, set or updating its assoicated
|
// Add adds a value to the cache, set or updating its associated
|
||||||
// value.
|
// value.
|
||||||
//
|
//
|
||||||
// If MaxEntries is non-zero and the length of the cache is greater
|
// If MaxEntries is non-zero and the length of the cache is greater
|
||||||
|
@ -362,7 +362,7 @@ func makeProbePlan(dm *tailcfg.DERPMap, ifState *interfaces.State, last *Report)
|
|||||||
tries = 2
|
tries = 2
|
||||||
} else if hadBoth {
|
} else if hadBoth {
|
||||||
// For dual stack machines, make the 3rd & slower nodes alternate
|
// For dual stack machines, make the 3rd & slower nodes alternate
|
||||||
// beetween.
|
// between.
|
||||||
if ri%2 == 0 {
|
if ri%2 == 0 {
|
||||||
do4, do6 = true, false
|
do4, do6 = true, false
|
||||||
} else {
|
} else {
|
||||||
|
@ -113,7 +113,7 @@ func socketPermissionsForOS() os.FileMode {
|
|||||||
// connectMacOSAppSandbox connects to the Tailscale Network Extension,
|
// connectMacOSAppSandbox connects to the Tailscale Network Extension,
|
||||||
// which is necessarily running within the macOS App Sandbox. Our
|
// which is necessarily running within the macOS App Sandbox. Our
|
||||||
// little dance to connect a regular user binary to the sandboxed
|
// little dance to connect a regular user binary to the sandboxed
|
||||||
// nework extension is:
|
// network extension is:
|
||||||
//
|
//
|
||||||
// * the sandboxed IPNExtension picks a random localhost:0 TCP port
|
// * the sandboxed IPNExtension picks a random localhost:0 TCP port
|
||||||
// to listen on
|
// to listen on
|
||||||
|
@ -34,7 +34,7 @@ type Packet struct {
|
|||||||
Payload []byte
|
Payload []byte
|
||||||
|
|
||||||
// Prefix set by various internal methods of natlab, to locate
|
// Prefix set by various internal methods of natlab, to locate
|
||||||
// where in the network a trace occured.
|
// where in the network a trace occurred.
|
||||||
locator string
|
locator string
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -87,7 +87,7 @@ func AllowDebugAccess(r *http.Request) bool {
|
|||||||
}
|
}
|
||||||
|
|
||||||
// Protected wraps a provided debug handler, h, returning a Handler
|
// Protected wraps a provided debug handler, h, returning a Handler
|
||||||
// that enforces AllowDebugAccess and returns forbiden replies for
|
// that enforces AllowDebugAccess and returns forbidden replies for
|
||||||
// unauthorized requests.
|
// unauthorized requests.
|
||||||
func Protected(h http.Handler) http.Handler {
|
func Protected(h http.Handler) http.Handler {
|
||||||
return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
||||||
|
@ -34,7 +34,7 @@ import (
|
|||||||
)
|
)
|
||||||
|
|
||||||
// There is much overlap between the theory of serialization and hashing.
|
// There is much overlap between the theory of serialization and hashing.
|
||||||
// A hash (useful for determing equality) can be produced by printing a value
|
// A hash (useful for determining equality) can be produced by printing a value
|
||||||
// and hashing the output. The format must:
|
// and hashing the output. The format must:
|
||||||
// * be deterministic such that the same value hashes to the same output, and
|
// * be deterministic such that the same value hashes to the same output, and
|
||||||
// * be parsable such that the same value can be reproduced by the output.
|
// * be parsable such that the same value can be reproduced by the output.
|
||||||
|
@ -15,7 +15,7 @@ var ErrNotImplemented = errors.New("not implemented for GOOS=" + runtime.GOOS)
|
|||||||
|
|
||||||
// IsMemberOfGroup verifies if the provided user is member of the provided
|
// IsMemberOfGroup verifies if the provided user is member of the provided
|
||||||
// system group.
|
// system group.
|
||||||
// If verfication fails, an error is returned.
|
// If verification fails, an error is returned.
|
||||||
func IsMemberOfGroup(group, userName string) (bool, error) {
|
func IsMemberOfGroup(group, userName string) (bool, error) {
|
||||||
return isMemberOfGroup(group, userName)
|
return isMemberOfGroup(group, userName)
|
||||||
}
|
}
|
||||||
|
@ -2777,7 +2777,7 @@ func (c *Conn) ParseEndpoint(endpointStr string) (conn.Endpoint, error) {
|
|||||||
de := &discoEndpoint{
|
de := &discoEndpoint{
|
||||||
c: c,
|
c: c,
|
||||||
publicKey: tailcfg.NodeKey(pk), // peer public key (for WireGuard + DERP)
|
publicKey: tailcfg.NodeKey(pk), // peer public key (for WireGuard + DERP)
|
||||||
discoKey: tailcfg.DiscoKey(discoKey), // for discovery mesages
|
discoKey: tailcfg.DiscoKey(discoKey), // for discovery messages
|
||||||
discoShort: tailcfg.DiscoKey(discoKey).ShortString(),
|
discoShort: tailcfg.DiscoKey(discoKey).ShortString(),
|
||||||
wgEndpoint: endpointStr,
|
wgEndpoint: endpointStr,
|
||||||
sentPing: map[stun.TxID]sentPing{},
|
sentPing: map[stun.TxID]sentPing{},
|
||||||
@ -3128,7 +3128,7 @@ type discoEndpoint struct {
|
|||||||
// These fields are initialized once and never modified.
|
// These fields are initialized once and never modified.
|
||||||
c *Conn
|
c *Conn
|
||||||
publicKey tailcfg.NodeKey // peer public key (for WireGuard + DERP)
|
publicKey tailcfg.NodeKey // peer public key (for WireGuard + DERP)
|
||||||
discoKey tailcfg.DiscoKey // for discovery mesages
|
discoKey tailcfg.DiscoKey // for discovery messages
|
||||||
discoShort string // ShortString of discoKey
|
discoShort string // ShortString of discoKey
|
||||||
fakeWGAddr netaddr.IPPort // the UDP address we tell wireguard-go we're using
|
fakeWGAddr netaddr.IPPort // the UDP address we tell wireguard-go we're using
|
||||||
wgEndpoint string // string from ParseEndpoint, holds a JSON-serialized wgcfg.Endpoints
|
wgEndpoint string // string from ParseEndpoint, holds a JSON-serialized wgcfg.Endpoints
|
||||||
@ -3285,7 +3285,7 @@ func (de *discoEndpoint) initFakeUDPAddr() {
|
|||||||
de.fakeWGAddr = netaddr.IPPortFrom(netaddr.IPFrom16(addr), 12345)
|
de.fakeWGAddr = netaddr.IPPortFrom(netaddr.IPFrom16(addr), 12345)
|
||||||
}
|
}
|
||||||
|
|
||||||
// isFirstRecvActivityInAwhile notes that receive activity has occured for this
|
// isFirstRecvActivityInAwhile notes that receive activity has occurred for this
|
||||||
// endpoint and reports whether it's been at least 10 seconds since the last
|
// endpoint and reports whether it's been at least 10 seconds since the last
|
||||||
// receive activity (including having never received from this peer before).
|
// receive activity (including having never received from this peer before).
|
||||||
func (de *discoEndpoint) isFirstRecvActivityInAwhile() bool {
|
func (de *discoEndpoint) isFirstRecvActivityInAwhile() bool {
|
||||||
|
Loading…
x
Reference in New Issue
Block a user