mirror of
https://github.com/tailscale/tailscale.git
synced 2025-04-06 16:25:50 +00:00

This makes it so that the user is notified that the action they are about to take may result in them getting disconnected from the machine. It then waits for 5s for the user to maybe Ctrl+C out of it. It also introduces a `--accept-risk=lose-ssh` flag for automation, which allows the caller to pre-acknowledge the risk. The two actions that cause this are: - updating `--ssh` from `true` to `false` - running `tailscale down` Updates #3802 Signed-off-by: Maisem Ali <maisem@tailscale.com>
52 lines
1.2 KiB
Go
52 lines
1.2 KiB
Go
// Copyright (c) 2022 Tailscale Inc & AUTHORS All rights reserved.
|
|
// Use of this source code is governed by a BSD-style
|
|
// license that can be found in the LICENSE file.
|
|
|
|
//go:build !js && !windows
|
|
// +build !js,!windows
|
|
|
|
package cli
|
|
|
|
import (
|
|
"bytes"
|
|
"os"
|
|
"path/filepath"
|
|
"runtime"
|
|
"strconv"
|
|
|
|
"golang.org/x/sys/unix"
|
|
)
|
|
|
|
func init() {
|
|
getSSHClientEnvVar = func() string {
|
|
if os.Getenv("SUDO_USER") == "" {
|
|
// No sudo, just check the env.
|
|
return os.Getenv("SSH_CLIENT")
|
|
}
|
|
if runtime.GOOS != "linux" {
|
|
// TODO(maisem): implement this for other platforms. It's not clear
|
|
// if there is a way to get the environment for a given process on
|
|
// darwin and bsd.
|
|
return ""
|
|
}
|
|
// SID is the session ID of the user's login session.
|
|
// It is also the process ID of the original shell that the user logged in with.
|
|
// We only need to check the environment of that process.
|
|
sid, err := unix.Getsid(os.Getpid())
|
|
if err != nil {
|
|
return ""
|
|
}
|
|
b, err := os.ReadFile(filepath.Join("/proc", strconv.Itoa(sid), "environ"))
|
|
if err != nil {
|
|
return ""
|
|
}
|
|
prefix := []byte("SSH_CLIENT=")
|
|
for _, env := range bytes.Split(b, []byte{0}) {
|
|
if bytes.HasPrefix(env, prefix) {
|
|
return string(env[len(prefix):])
|
|
}
|
|
}
|
|
return ""
|
|
}
|
|
}
|