mirror of
https://github.com/tailscale/tailscale.git
synced 2024-11-29 13:05:46 +00:00
6b956b49e0
Require that requests to servers in manage mode are made to the Tailscale IP (either ipv4 or ipv6) or quad-100. Also set various security headers on those responses. These might be too restrictive, but we can relax them as needed. Allow requests to /ok (even in manage mode) with no checks. This will be used for the connectivity check from a login client to see if the management client is reachable. Updates tailscale/corp#14335 Signed-off-by: Will Norris <will@tailscale.com>
30 lines
555 B
Go
30 lines
555 B
Go
// Copyright (c) Tailscale Inc & AUTHORS
|
|
// SPDX-License-Identifier: BSD-3-Clause
|
|
|
|
//go:build ios || android
|
|
|
|
package ipnlocal
|
|
|
|
import (
|
|
"errors"
|
|
"net"
|
|
|
|
"tailscale.com/client/tailscale"
|
|
)
|
|
|
|
const webClientPort = 5252
|
|
|
|
type webClient struct{}
|
|
|
|
func (b *LocalBackend) SetWebLocalClient(lc *tailscale.LocalClient) {}
|
|
|
|
func (b *LocalBackend) WebClientInit() error {
|
|
return errors.New("not implemented")
|
|
}
|
|
|
|
func (b *LocalBackend) WebClientShutdown() {}
|
|
|
|
func (b *LocalBackend) handleWebClientConn(c net.Conn) error {
|
|
return errors.New("not implemented")
|
|
}
|