mirror of
https://github.com/tailscale/tailscale.git
synced 2024-11-27 03:55:36 +00:00
90be06bd5b
Updates tailscale/tailscale#1634 This PR introduces a new `captive-portal-detected` Warnable which is set to an unhealthy state whenever a captive portal is detected on the local network, preventing Tailscale from connecting. ipn/ipnlocal: fix captive portal loop shutdown Change-Id: I7cafdbce68463a16260091bcec1741501a070c95 net/captivedetection: fix mutex misuse ipn/ipnlocal: ensure that we don't fail to start the timer Change-Id: I3e43fb19264d793e8707c5031c0898e48e3e7465 Signed-off-by: Andrew Dunham <andrew@du.nham.ca> Signed-off-by: Andrea Gottardo <andrea@gottardo.me>
20 lines
466 B
Go
20 lines
466 B
Go
// Copyright (c) Tailscale Inc & AUTHORS
|
|
// SPDX-License-Identifier: BSD-3-Clause
|
|
|
|
//go:build !(ios || darwin)
|
|
|
|
package captivedetection
|
|
|
|
import (
|
|
"syscall"
|
|
|
|
"tailscale.com/types/logger"
|
|
)
|
|
|
|
// setSocketInterfaceIndex sets the IP_BOUND_IF socket option on the given RawConn.
|
|
// This forces the socket to use the given interface.
|
|
func setSocketInterfaceIndex(c syscall.RawConn, ifIndex int, logf logger.Logf) error {
|
|
// No-op on non-Darwin platforms.
|
|
return nil
|
|
}
|