tailscale/client/web
Will Norris 37eab31f68 client/web: simply csrf key caching in cgi mode
Instead of trying to use the user config dir, and then fail back to the
OS temp dir, just always use the temp dir. Also use a filename that is
less likely to cause collisions.

This addresses an issue on a test synology instance that was
mysteriously failing because there was a file at /tmp/tailscale. We
could still technically run into this issue if a
/tmp/tailscale-web-csrf.key file exists, but that seems far less likely.

Updates tailscale/corp#13775

Signed-off-by: Will Norris <will@tailscale.com>
2023-08-30 11:49:09 -07:00
..
build client/web: always use new web client; remove old client 2023-08-28 11:11:16 -07:00
src client/web: pipe unraid csrf token through apiFetch 2023-08-29 18:55:52 -04:00
dev.go client/web: add barebones vite dev setup 2023-08-10 21:54:43 -04:00
index.html client/web: always use new web client; remove old client 2023-08-28 11:11:16 -07:00
package.json client/web: add csrf protection to web client api 2023-08-21 15:02:02 -04:00
postcss.config.js client/web: add tailwind styling to react app 2023-08-14 15:29:12 -04:00
qnap.go client/web: enforce full path for CGI platforms 2023-08-24 14:17:41 -07:00
synology.go client/web: enforce full path for CGI platforms 2023-08-24 14:17:41 -07:00
tailwind.config.js client/web: add tailwind styling to react app 2023-08-14 15:29:12 -04:00
tsconfig.json client/web: add tsconfig.json 2023-08-11 11:55:29 -04:00
vite.config.ts client/web: enforce full path for CGI platforms 2023-08-24 14:17:41 -07:00
web_test.go client/web: fix data race 2023-08-29 19:00:20 -07:00
web.go client/web: simply csrf key caching in cgi mode 2023-08-30 11:49:09 -07:00
yarn.lock client/web: add csrf protection to web client api 2023-08-21 15:02:02 -04:00