tailscale/cmd
Denton Gentry d2480fd508 net/netns: support !CAP_NET_ADMIN
netns_linux checked whether "ip rule" could run to determine
whether to use SO_MARK for network namespacing. However in
Linux environments which lack CAP_NET_ADMIN, such as various
container runtimes, the "ip rule" command succeeds but SO_MARK
fails due to lack of permission. SO_BINDTODEVICE would work in
these environments, but isn't tried.

In addition to running "ip rule" check directly whether SO_MARK
works or not. Among others, this allows Microsoft Azure App
Service and AWS App Runner to work.

Signed-off-by: Denton Gentry <dgentry@tailscale.com>
2021-07-14 10:01:14 -07:00
..
cloner cmd/cloner: support maps with clone ptrs 2021-06-22 22:11:38 -07:00
derper cmd/derpprobe: move from cmd/derper/derpprobe 2021-07-13 09:31:00 -07:00
derpprobe cmd/derpprobe: move from cmd/derper/derpprobe 2021-07-13 09:31:00 -07:00
hello all: adapt to opaque netaddr types 2021-05-16 14:52:00 -07:00
microproxy tsweb: replace NewMux with a more flexible DebugHandler. 2021-06-16 19:00:47 -07:00
mkpkg cmd/mkpkg: allow zero files in a package. 2021-06-07 16:22:23 -07:00
tailscale net/netns: support !CAP_NET_ADMIN 2021-07-14 10:01:14 -07:00
tailscaled tstest/integration/vms: use an in-process logcatcher (#2360) 2021-07-08 14:39:45 -04:00
tsshd net/interfaces: return all Tailscale addresses from Tailscale(). 2021-04-29 12:25:47 -07:00