mirror of
https://github.com/tailscale/tailscale.git
synced 2025-02-18 02:48:40 +00:00
xcode/iOS: set MatchDomains when no route requires a custom DNS resolver (#10576)
Updates https://github.com/tailscale/corp/issues/15802. On iOS exclusively, this PR adds logic to use a split DNS configuration in more cases, with the goal of improving battery life. Acting as the global DNS resolver on iOS should be avoided, as it leads to frequent wakes of IPNExtension. We try to determine if we can have Tailscale only handle DNS queries for resources inside the tailnet, that is, all routes in the DNS configuration do not require a custom resolver (this is the case for app connectors, for instance). If so, we set all Routes as MatchDomains. This enables a split DNS configuration which will help preserve battery life. Effectively, for the average Tailscale user who only relies on MagicDNS to resolve *.ts.net domains, this means that Tailscale DNS will only be used for those domains. This PR doesn't affect users with Override Local DNS enabled. For these users, there should be no difference and Tailscale will continue acting as a global DNS resolver. Signed-off-by: Andrea Gottardo <andrea@tailscale.com>
This commit is contained in:
parent
08a9551a73
commit
dd77111462
@ -262,6 +262,18 @@ func (m *Manager) compileConfig(cfg Config) (rcfg resolver.Config, ocfg OSConfig
|
||||
// config is empty, then we need to fallback to SplitDNS mode.
|
||||
ocfg.MatchDomains = cfg.matchDomains()
|
||||
} else {
|
||||
// On iOS only (for now), check if all route names point to resources inside the tailnet.
|
||||
// If so, we can set those names as MatchDomains to enable a split DNS configuration
|
||||
// which will help preserve battery life.
|
||||
// Because on iOS MatchDomains must equal SearchDomains, we cannot do this when
|
||||
// we have any Routes outside the tailnet. Otherwise when app connectors are enabled,
|
||||
// a query for 'work-laptop' might lead to search domain expansion, resolving
|
||||
// as 'work-laptop.aws.com' for example.
|
||||
if runtime.GOOS == "ios" && rcfg.RoutesRequireNoCustomResolvers() {
|
||||
for r := range rcfg.Routes {
|
||||
ocfg.MatchDomains = append(ocfg.MatchDomains, r)
|
||||
}
|
||||
}
|
||||
var defaultRoutes []*dnstype.Resolver
|
||||
for _, ip := range baseCfg.Nameservers {
|
||||
defaultRoutes = append(defaultRoutes, &dnstype.Resolver{Addr: ip.String()})
|
||||
|
@ -175,6 +175,25 @@ func WriteRoutes(w *bufio.Writer, routes map[dnsname.FQDN][]*dnstype.Resolver) {
|
||||
}
|
||||
}
|
||||
|
||||
// RoutesRequireNoCustomResolvers returns true if this resolver.Config only contains routes
|
||||
// that do not specify a set of custom resolver(s), i.e. they can be resolved by the local
|
||||
// upstream DNS resolver.
|
||||
func (c *Config) RoutesRequireNoCustomResolvers() bool {
|
||||
for route, resolvers := range c.Routes {
|
||||
if route.WithoutTrailingDot() == "ts.net" {
|
||||
// Ignore the "ts.net" route here. It always specifies the corp resolvers but
|
||||
// its presence is not an issue, as ts.net will be a search domain.
|
||||
continue
|
||||
}
|
||||
if len(resolvers) != 0 {
|
||||
// Found a route with custom resolvers.
|
||||
return false
|
||||
}
|
||||
}
|
||||
// No routes other than ts.net have specified one or more resolvers.
|
||||
return true
|
||||
}
|
||||
|
||||
// Resolver is a DNS resolver for nodes on the Tailscale network,
|
||||
// associating them with domain names of the form <mynode>.<mydomain>.<root>.
|
||||
// If it is asked to resolve a domain that is not of that form,
|
||||
|
@ -243,6 +243,43 @@ func mustIP(str string) netip.Addr {
|
||||
return ip
|
||||
}
|
||||
|
||||
func TestRoutesRequireNoCustomResolvers(t *testing.T) {
|
||||
tests := []struct {
|
||||
name string
|
||||
config Config
|
||||
expected bool
|
||||
}{
|
||||
{"noRoutes", Config{Routes: map[dnsname.FQDN][]*dnstype.Resolver{}}, true},
|
||||
{"onlyDefault", Config{Routes: map[dnsname.FQDN][]*dnstype.Resolver{
|
||||
"ts.net.": {
|
||||
{},
|
||||
},
|
||||
}}, true},
|
||||
{"oneOther", Config{Routes: map[dnsname.FQDN][]*dnstype.Resolver{
|
||||
"example.com.": {
|
||||
{},
|
||||
},
|
||||
}}, false},
|
||||
{"defaultAndOneOther", Config{Routes: map[dnsname.FQDN][]*dnstype.Resolver{
|
||||
"ts.net.": {
|
||||
{},
|
||||
},
|
||||
"example.com.": {
|
||||
{},
|
||||
},
|
||||
}}, false},
|
||||
}
|
||||
|
||||
for _, tt := range tests {
|
||||
t.Run(tt.name, func(t *testing.T) {
|
||||
result := tt.config.RoutesRequireNoCustomResolvers()
|
||||
if result != tt.expected {
|
||||
t.Errorf("result = %v; want %v", result, tt.expected)
|
||||
}
|
||||
})
|
||||
}
|
||||
}
|
||||
|
||||
func TestRDNSNameToIPv4(t *testing.T) {
|
||||
tests := []struct {
|
||||
name string
|
||||
|
Loading…
x
Reference in New Issue
Block a user