mirror of
https://github.com/tailscale/tailscale.git
synced 2024-11-29 04:55:31 +00:00
d2480fd508
netns_linux checked whether "ip rule" could run to determine whether to use SO_MARK for network namespacing. However in Linux environments which lack CAP_NET_ADMIN, such as various container runtimes, the "ip rule" command succeeds but SO_MARK fails due to lack of permission. SO_BINDTODEVICE would work in these environments, but isn't tried. In addition to running "ip rule" check directly whether SO_MARK works or not. Among others, this allows Microsoft Azure App Service and AWS App Runner to work. Signed-off-by: Denton Gentry <dgentry@tailscale.com> |
||
---|---|---|
.. | ||
netns_android.go | ||
netns_darwin_tailscaled.go | ||
netns_default.go | ||
netns_linux_test.go | ||
netns_linux.go | ||
netns_macios.go | ||
netns_test.go | ||
netns_windows.go | ||
netns.go | ||
socks.go |