mirror of
https://github.com/tailscale/tailscale.git
synced 2025-02-18 02:48:40 +00:00
tailcfg: add DNS routes and advanced resolver config.
Signed-off-by: David Anderson <danderson@tailscale.com>
This commit is contained in:
parent
6a7912e37a
commit
fad21af01c
@ -1486,16 +1486,30 @@ func (b *LocalBackend) authReconfig() {
|
|||||||
|
|
||||||
// If CorpDNS is false, dcfg remains the zero value.
|
// If CorpDNS is false, dcfg remains the zero value.
|
||||||
if uc.CorpDNS {
|
if uc.CorpDNS {
|
||||||
proxied := nm.DNS.Proxied
|
for _, resolver := range nm.DNS.Resolvers {
|
||||||
if proxied && len(nm.DNS.Nameservers) == 0 {
|
res, err := parseResolver(resolver)
|
||||||
b.logf("[unexpected] dns proxied but no nameservers")
|
if err != nil {
|
||||||
proxied = false
|
b.logf(err.Error())
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
dcfg.DefaultResolvers = append(dcfg.DefaultResolvers, res)
|
||||||
|
}
|
||||||
|
if len(nm.DNS.Routes) > 0 {
|
||||||
|
dcfg.Routes = map[string][]netaddr.IPPort{}
|
||||||
|
}
|
||||||
|
for suffix, resolvers := range nm.DNS.Routes {
|
||||||
|
if !strings.HasSuffix(suffix, ".") || strings.HasPrefix(suffix, ".") {
|
||||||
|
b.logf("[unexpected] malformed DNS route suffix %q", suffix)
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
for _, resolver := range resolvers {
|
||||||
|
res, err := parseResolver(resolver)
|
||||||
|
if err != nil {
|
||||||
|
b.logf(err.Error())
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
dcfg.Routes[suffix] = append(dcfg.Routes[suffix], res)
|
||||||
}
|
}
|
||||||
for _, ip := range nm.DNS.Nameservers {
|
|
||||||
dcfg.DefaultResolvers = append(dcfg.DefaultResolvers, netaddr.IPPort{
|
|
||||||
IP: ip,
|
|
||||||
Port: 53,
|
|
||||||
})
|
|
||||||
}
|
}
|
||||||
dcfg.SearchDomains = nm.DNS.Domains
|
dcfg.SearchDomains = nm.DNS.Domains
|
||||||
dcfg.AuthoritativeSuffixes = magicDNSRootDomains(nm)
|
dcfg.AuthoritativeSuffixes = magicDNSRootDomains(nm)
|
||||||
@ -1509,9 +1523,12 @@ func (b *LocalBackend) authReconfig() {
|
|||||||
}
|
}
|
||||||
dcfg.Hosts[name] = ips
|
dcfg.Hosts[name] = ips
|
||||||
}
|
}
|
||||||
// TODO: hack to make the current code continue to work while
|
enableMagicDNS := nm.DNS.Proxied
|
||||||
// refactoring happens.
|
if enableMagicDNS && len(nm.DNS.Resolvers) == 0 {
|
||||||
if proxied {
|
b.logf("[unexpected] dns proxied but no nameservers")
|
||||||
|
enableMagicDNS = false
|
||||||
|
}
|
||||||
|
if enableMagicDNS {
|
||||||
dcfg.Hosts = map[string][]netaddr.IP{}
|
dcfg.Hosts = map[string][]netaddr.IP{}
|
||||||
set(nm.Name, nm.Addresses)
|
set(nm.Name, nm.Addresses)
|
||||||
for _, peer := range nm.Peers {
|
for _, peer := range nm.Peers {
|
||||||
@ -1529,6 +1546,17 @@ func (b *LocalBackend) authReconfig() {
|
|||||||
b.initPeerAPIListener()
|
b.initPeerAPIListener()
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func parseResolver(cfg tailcfg.DNSResolver) (netaddr.IPPort, error) {
|
||||||
|
ip, err := netaddr.ParseIP(cfg.Addr)
|
||||||
|
if err != nil {
|
||||||
|
return netaddr.IPPort{}, fmt.Errorf("[unexpected] non-IP resolver %q", cfg.Addr)
|
||||||
|
}
|
||||||
|
return netaddr.IPPort{
|
||||||
|
IP: ip,
|
||||||
|
Port: 53,
|
||||||
|
}, nil
|
||||||
|
}
|
||||||
|
|
||||||
// tailscaleVarRoot returns the root directory of Tailscale's writable
|
// tailscaleVarRoot returns the root directory of Tailscale's writable
|
||||||
// storage area. (e.g. "/var/lib/tailscale")
|
// storage area. (e.g. "/var/lib/tailscale")
|
||||||
func tailscaleVarRoot() string {
|
func tailscaleVarRoot() string {
|
||||||
|
@ -4,7 +4,7 @@
|
|||||||
|
|
||||||
package tailcfg
|
package tailcfg
|
||||||
|
|
||||||
//go:generate go run tailscale.com/cmd/cloner --type=User,Node,Hostinfo,NetInfo,Login,DNSConfig,RegisterResponse --clonefunc=true --output=tailcfg_clone.go
|
//go:generate go run tailscale.com/cmd/cloner --type=User,Node,Hostinfo,NetInfo,Login,DNSConfig,DNSResolver,RegisterResponse --clonefunc=true --output=tailcfg_clone.go
|
||||||
|
|
||||||
import (
|
import (
|
||||||
"bytes"
|
"bytes"
|
||||||
@ -36,7 +36,8 @@ import (
|
|||||||
// 11: 2021-03-03: client understands IPv6, multiple default routes, and goroutine dumping
|
// 11: 2021-03-03: client understands IPv6, multiple default routes, and goroutine dumping
|
||||||
// 12: 2021-03-04: client understands PingRequest
|
// 12: 2021-03-04: client understands PingRequest
|
||||||
// 13: 2021-03-19: client understands FilterRule.IPProto
|
// 13: 2021-03-19: client understands FilterRule.IPProto
|
||||||
const CurrentMapRequestVersion = 13
|
// 14: 2021-04-07: client understands DNSConfig.Routes and DNSConfig.Resolvers
|
||||||
|
const CurrentMapRequestVersion = 14
|
||||||
|
|
||||||
type StableID string
|
type StableID string
|
||||||
|
|
||||||
@ -763,19 +764,52 @@ var FilterAllowAll = []FilterRule{
|
|||||||
},
|
},
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// DNSResolver is the configuration for one DNS resolver.
|
||||||
|
type DNSResolver struct {
|
||||||
|
// Addr is the address of the DNS resolver, one of:
|
||||||
|
// - A plain IP address for a "classic" UDP+TCP DNS resolver
|
||||||
|
// - [TODO] "tls://resolver.com" for DNS over TCP+TLS
|
||||||
|
// - [TODO] "https://resolver.com/query-tmpl" for DNS over HTTPS
|
||||||
|
Addr string `json:",omitempty"`
|
||||||
|
|
||||||
|
// BootstrapResolution is an optional suggested resolution for the
|
||||||
|
// DoT/DoH resolver, if the resolver URL does not reference an IP
|
||||||
|
// address directly.
|
||||||
|
// BootstrapResolution may be empty, in which case clients should
|
||||||
|
// look up the DoT/DoH server using their local "classic" DNS
|
||||||
|
// resolver.
|
||||||
|
BootstrapResolution []netaddr.IP `json:",omitempty"`
|
||||||
|
}
|
||||||
|
|
||||||
// DNSConfig is the DNS configuration.
|
// DNSConfig is the DNS configuration.
|
||||||
type DNSConfig struct {
|
type DNSConfig struct {
|
||||||
|
// Resolvers are the DNS resolvers to use, in order of preference.
|
||||||
|
Resolvers []DNSResolver `json:",omitempty"`
|
||||||
|
// Routes maps DNS name suffixes to a set of DNS resolvers to
|
||||||
|
// use. It is used to implement "split DNS" and other advanced DNS
|
||||||
|
// routing overlays.
|
||||||
|
// Map keys must be fully-qualified DNS name suffixes, with a
|
||||||
|
// trailing dot but no leading dot.
|
||||||
|
Routes map[string][]DNSResolver `json:",omitempty"`
|
||||||
|
// Domains are the search domains to use.
|
||||||
|
// Search domains must be FQDNs, but *without* the trailing dot.
|
||||||
|
Domains []string `json:",omitempty"`
|
||||||
|
// Proxied turns on automatic resolution of hostnames for devices
|
||||||
|
// in the network map, aka MagicDNS.
|
||||||
|
// Despite the (legacy) name, does not necessarily cause request
|
||||||
|
// proxying to be enabled.
|
||||||
|
Proxied bool `json:",omitempty"`
|
||||||
|
|
||||||
|
// The following fields are only set and used by
|
||||||
|
// MapRequest.Version >=9 and <14.
|
||||||
|
|
||||||
// Nameservers are the IP addresses of the nameservers to use.
|
// Nameservers are the IP addresses of the nameservers to use.
|
||||||
Nameservers []netaddr.IP `json:",omitempty"`
|
Nameservers []netaddr.IP `json:",omitempty"`
|
||||||
// Domains are the search domains to use.
|
|
||||||
Domains []string `json:",omitempty"`
|
|
||||||
// PerDomain is not set by the control server, and does nothing.
|
// PerDomain is not set by the control server, and does nothing.
|
||||||
// TODO(danderson): revise DNS configuration to make this useful
|
// TODO(danderson): revise DNS configuration to make this useful
|
||||||
// again.
|
// again.
|
||||||
PerDomain bool
|
PerDomain bool `json:",omitempty"`
|
||||||
// Proxied indicates whether DNS requests are proxied through a dns.Resolver.
|
|
||||||
// This enables MagicDNS.
|
|
||||||
Proxied bool
|
|
||||||
}
|
}
|
||||||
|
|
||||||
// PingRequest is a request to send an HTTP request to prove the
|
// PingRequest is a request to send an HTTP request to prove the
|
||||||
@ -829,15 +863,11 @@ type MapResponse struct {
|
|||||||
PeerSeenChange map[NodeID]bool `json:",omitempty"`
|
PeerSeenChange map[NodeID]bool `json:",omitempty"`
|
||||||
|
|
||||||
// DNS is the same as DNSConfig.Nameservers.
|
// DNS is the same as DNSConfig.Nameservers.
|
||||||
//
|
// Only populated if MapRequest.Version < 9.
|
||||||
// TODO(dmytro): should be sent in DNSConfig.Nameservers once clients have updated.
|
|
||||||
DNS []netaddr.IP `json:",omitempty"`
|
DNS []netaddr.IP `json:",omitempty"`
|
||||||
|
|
||||||
// SearchPaths is the old way to specify DNS search
|
// SearchPaths is the old way to specify DNS search domains.
|
||||||
// domains. Clients should use these values if set, but the
|
// Only populated if MapRequest.Version < 9.
|
||||||
// server will omit this field for clients with
|
|
||||||
// MapRequest.Version >= 9. Clients should prefer to use
|
|
||||||
// DNSConfig.Domains instead.
|
|
||||||
SearchPaths []string `json:",omitempty"`
|
SearchPaths []string `json:",omitempty"`
|
||||||
|
|
||||||
// DNSConfig contains the DNS settings for the client to use.
|
// DNSConfig contains the DNS settings for the client to use.
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
// Use of this source code is governed by a BSD-style
|
// Use of this source code is governed by a BSD-style
|
||||||
// license that can be found in the LICENSE file.
|
// license that can be found in the LICENSE file.
|
||||||
|
|
||||||
// Code generated by tailscale.com/cmd/cloner -type User,Node,Hostinfo,NetInfo,Login,DNSConfig,RegisterResponse; DO NOT EDIT.
|
// Code generated by tailscale.com/cmd/cloner -type User,Node,Hostinfo,NetInfo,Login,DNSConfig,DNSResolver,RegisterResponse; DO NOT EDIT.
|
||||||
|
|
||||||
package tailcfg
|
package tailcfg
|
||||||
|
|
||||||
@ -26,7 +26,7 @@ func (src *User) Clone() *User {
|
|||||||
}
|
}
|
||||||
|
|
||||||
// A compilation failure here means this code must be regenerated, with command:
|
// A compilation failure here means this code must be regenerated, with command:
|
||||||
// tailscale.com/cmd/cloner -type User,Node,Hostinfo,NetInfo,Login,DNSConfig,RegisterResponse
|
// tailscale.com/cmd/cloner -type User,Node,Hostinfo,NetInfo,Login,DNSConfig,DNSResolver,RegisterResponse
|
||||||
var _UserNeedsRegeneration = User(struct {
|
var _UserNeedsRegeneration = User(struct {
|
||||||
ID UserID
|
ID UserID
|
||||||
LoginName string
|
LoginName string
|
||||||
@ -58,7 +58,7 @@ func (src *Node) Clone() *Node {
|
|||||||
}
|
}
|
||||||
|
|
||||||
// A compilation failure here means this code must be regenerated, with command:
|
// A compilation failure here means this code must be regenerated, with command:
|
||||||
// tailscale.com/cmd/cloner -type User,Node,Hostinfo,NetInfo,Login,DNSConfig,RegisterResponse
|
// tailscale.com/cmd/cloner -type User,Node,Hostinfo,NetInfo,Login,DNSConfig,DNSResolver,RegisterResponse
|
||||||
var _NodeNeedsRegeneration = Node(struct {
|
var _NodeNeedsRegeneration = Node(struct {
|
||||||
ID NodeID
|
ID NodeID
|
||||||
StableID StableNodeID
|
StableID StableNodeID
|
||||||
@ -100,7 +100,7 @@ func (src *Hostinfo) Clone() *Hostinfo {
|
|||||||
}
|
}
|
||||||
|
|
||||||
// A compilation failure here means this code must be regenerated, with command:
|
// A compilation failure here means this code must be regenerated, with command:
|
||||||
// tailscale.com/cmd/cloner -type User,Node,Hostinfo,NetInfo,Login,DNSConfig,RegisterResponse
|
// tailscale.com/cmd/cloner -type User,Node,Hostinfo,NetInfo,Login,DNSConfig,DNSResolver,RegisterResponse
|
||||||
var _HostinfoNeedsRegeneration = Hostinfo(struct {
|
var _HostinfoNeedsRegeneration = Hostinfo(struct {
|
||||||
IPNVersion string
|
IPNVersion string
|
||||||
FrontendLogID string
|
FrontendLogID string
|
||||||
@ -137,7 +137,7 @@ func (src *NetInfo) Clone() *NetInfo {
|
|||||||
}
|
}
|
||||||
|
|
||||||
// A compilation failure here means this code must be regenerated, with command:
|
// A compilation failure here means this code must be regenerated, with command:
|
||||||
// tailscale.com/cmd/cloner -type User,Node,Hostinfo,NetInfo,Login,DNSConfig,RegisterResponse
|
// tailscale.com/cmd/cloner -type User,Node,Hostinfo,NetInfo,Login,DNSConfig,DNSResolver,RegisterResponse
|
||||||
var _NetInfoNeedsRegeneration = NetInfo(struct {
|
var _NetInfoNeedsRegeneration = NetInfo(struct {
|
||||||
MappingVariesByDestIP opt.Bool
|
MappingVariesByDestIP opt.Bool
|
||||||
HairPinning opt.Bool
|
HairPinning opt.Bool
|
||||||
@ -164,7 +164,7 @@ func (src *Login) Clone() *Login {
|
|||||||
}
|
}
|
||||||
|
|
||||||
// A compilation failure here means this code must be regenerated, with command:
|
// A compilation failure here means this code must be regenerated, with command:
|
||||||
// tailscale.com/cmd/cloner -type User,Node,Hostinfo,NetInfo,Login,DNSConfig,RegisterResponse
|
// tailscale.com/cmd/cloner -type User,Node,Hostinfo,NetInfo,Login,DNSConfig,DNSResolver,RegisterResponse
|
||||||
var _LoginNeedsRegeneration = Login(struct {
|
var _LoginNeedsRegeneration = Login(struct {
|
||||||
_ structs.Incomparable
|
_ structs.Incomparable
|
||||||
ID LoginID
|
ID LoginID
|
||||||
@ -183,18 +183,49 @@ func (src *DNSConfig) Clone() *DNSConfig {
|
|||||||
}
|
}
|
||||||
dst := new(DNSConfig)
|
dst := new(DNSConfig)
|
||||||
*dst = *src
|
*dst = *src
|
||||||
dst.Nameservers = append(src.Nameservers[:0:0], src.Nameservers...)
|
dst.Resolvers = make([]DNSResolver, len(src.Resolvers))
|
||||||
|
for i := range dst.Resolvers {
|
||||||
|
dst.Resolvers[i] = *src.Resolvers[i].Clone()
|
||||||
|
}
|
||||||
|
if dst.Routes != nil {
|
||||||
|
dst.Routes = map[string][]DNSResolver{}
|
||||||
|
for k := range src.Routes {
|
||||||
|
dst.Routes[k] = append([]DNSResolver{}, src.Routes[k]...)
|
||||||
|
}
|
||||||
|
}
|
||||||
dst.Domains = append(src.Domains[:0:0], src.Domains...)
|
dst.Domains = append(src.Domains[:0:0], src.Domains...)
|
||||||
|
dst.Nameservers = append(src.Nameservers[:0:0], src.Nameservers...)
|
||||||
return dst
|
return dst
|
||||||
}
|
}
|
||||||
|
|
||||||
// A compilation failure here means this code must be regenerated, with command:
|
// A compilation failure here means this code must be regenerated, with command:
|
||||||
// tailscale.com/cmd/cloner -type User,Node,Hostinfo,NetInfo,Login,DNSConfig,RegisterResponse
|
// tailscale.com/cmd/cloner -type User,Node,Hostinfo,NetInfo,Login,DNSConfig,DNSResolver,RegisterResponse
|
||||||
var _DNSConfigNeedsRegeneration = DNSConfig(struct {
|
var _DNSConfigNeedsRegeneration = DNSConfig(struct {
|
||||||
Nameservers []netaddr.IP
|
Resolvers []DNSResolver
|
||||||
|
Routes map[string][]DNSResolver
|
||||||
Domains []string
|
Domains []string
|
||||||
PerDomain bool
|
|
||||||
Proxied bool
|
Proxied bool
|
||||||
|
Nameservers []netaddr.IP
|
||||||
|
PerDomain bool
|
||||||
|
}{})
|
||||||
|
|
||||||
|
// Clone makes a deep copy of DNSResolver.
|
||||||
|
// The result aliases no memory with the original.
|
||||||
|
func (src *DNSResolver) Clone() *DNSResolver {
|
||||||
|
if src == nil {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
dst := new(DNSResolver)
|
||||||
|
*dst = *src
|
||||||
|
dst.BootstrapResolution = append(src.BootstrapResolution[:0:0], src.BootstrapResolution...)
|
||||||
|
return dst
|
||||||
|
}
|
||||||
|
|
||||||
|
// A compilation failure here means this code must be regenerated, with command:
|
||||||
|
// tailscale.com/cmd/cloner -type User,Node,Hostinfo,NetInfo,Login,DNSConfig,DNSResolver,RegisterResponse
|
||||||
|
var _DNSResolverNeedsRegeneration = DNSResolver(struct {
|
||||||
|
Addr string
|
||||||
|
BootstrapResolution []netaddr.IP
|
||||||
}{})
|
}{})
|
||||||
|
|
||||||
// Clone makes a deep copy of RegisterResponse.
|
// Clone makes a deep copy of RegisterResponse.
|
||||||
@ -210,7 +241,7 @@ func (src *RegisterResponse) Clone() *RegisterResponse {
|
|||||||
}
|
}
|
||||||
|
|
||||||
// A compilation failure here means this code must be regenerated, with command:
|
// A compilation failure here means this code must be regenerated, with command:
|
||||||
// tailscale.com/cmd/cloner -type User,Node,Hostinfo,NetInfo,Login,DNSConfig,RegisterResponse
|
// tailscale.com/cmd/cloner -type User,Node,Hostinfo,NetInfo,Login,DNSConfig,DNSResolver,RegisterResponse
|
||||||
var _RegisterResponseNeedsRegeneration = RegisterResponse(struct {
|
var _RegisterResponseNeedsRegeneration = RegisterResponse(struct {
|
||||||
User User
|
User User
|
||||||
Login Login
|
Login Login
|
||||||
@ -221,7 +252,7 @@ var _RegisterResponseNeedsRegeneration = RegisterResponse(struct {
|
|||||||
|
|
||||||
// Clone duplicates src into dst and reports whether it succeeded.
|
// Clone duplicates src into dst and reports whether it succeeded.
|
||||||
// To succeed, <src, dst> must be of types <*T, *T> or <*T, **T>,
|
// To succeed, <src, dst> must be of types <*T, *T> or <*T, **T>,
|
||||||
// where T is one of User,Node,Hostinfo,NetInfo,Login,DNSConfig,RegisterResponse.
|
// where T is one of User,Node,Hostinfo,NetInfo,Login,DNSConfig,DNSResolver,RegisterResponse.
|
||||||
func Clone(dst, src interface{}) bool {
|
func Clone(dst, src interface{}) bool {
|
||||||
switch src := src.(type) {
|
switch src := src.(type) {
|
||||||
case *User:
|
case *User:
|
||||||
@ -278,6 +309,15 @@ func Clone(dst, src interface{}) bool {
|
|||||||
*dst = src.Clone()
|
*dst = src.Clone()
|
||||||
return true
|
return true
|
||||||
}
|
}
|
||||||
|
case *DNSResolver:
|
||||||
|
switch dst := dst.(type) {
|
||||||
|
case *DNSResolver:
|
||||||
|
*dst = *src.Clone()
|
||||||
|
return true
|
||||||
|
case **DNSResolver:
|
||||||
|
*dst = src.Clone()
|
||||||
|
return true
|
||||||
|
}
|
||||||
case *RegisterResponse:
|
case *RegisterResponse:
|
||||||
switch dst := dst.(type) {
|
switch dst := dst.(type) {
|
||||||
case *RegisterResponse:
|
case *RegisterResponse:
|
||||||
|
Loading…
x
Reference in New Issue
Block a user