tailscale/net
Brad Fitzpatrick 723c775dbb tsd, ipnlocal, etc: add tsd.System.HealthTracker, start some plumbing
This adds a health.Tracker to tsd.System, accessible via
a new tsd.System.HealthTracker method.

In the future, that new method will return a tsd.System-specific
HealthTracker, so multiple tsnet.Servers in the same process are
isolated. For now, though, it just always returns the temporary
health.Global value. That permits incremental plumbing over a number
of changes. When the second to last health.Global reference is gone,
then the tsd.System.HealthTracker implementation can return a private
Tracker.

The primary plumbing this does is adding it to LocalBackend and its
dozen and change health calls. A few misc other callers are also
plumbed. Subsequent changes will flesh out other parts of the tree
(magicsock, controlclient, etc).

Updates #11874
Updates #4136

Change-Id: Id51e73cfc8a39110425b6dc19d18b3975eac75ce
Signed-off-by: Brad Fitzpatrick <bradfitz@tailscale.com>
2024-04-25 22:13:04 -07:00
..
art all: use Go 1.22 range-over-int 2024-04-16 15:32:38 -07:00
connstats all: use Go 1.22 range-over-int 2024-04-16 15:32:38 -07:00
dns health: break Warnable into a global and per-Tracker value halves 2024-04-25 14:40:11 -07:00
dnscache util/cmpx: delete now that we're using Go 1.22 2024-02-07 18:10:15 -08:00
dnsfallback tsd, ipnlocal, etc: add tsd.System.HealthTracker, start some plumbing 2024-04-25 22:13:04 -07:00
flowtrack all: update copyright and license headers 2023-01-27 15:36:29 -08:00
interfaces interfaces: create android impl (#11784) 2024-04-18 12:49:02 -07:00
ktimeout net/ktimeout: add a package to set TCP user timeout 2024-02-20 10:49:58 -08:00
memnet net/memnet: export the network name (#9111) 2023-08-28 11:43:51 -07:00
netaddr all: update copyright and license headers 2023-01-27 15:36:29 -08:00
netcheck net/netcheck,wgengine/magicsock: align DERP frame receive time heuristics 2024-04-05 13:04:42 -07:00
neterror net/neterror, wgengine/magicsock: use UDP GSO and GRO on Linux (#7791) 2023-04-04 16:32:16 -07:00
netkernelconf client/tailscale,ipn/{ipnlocal,localapi}: check UDP GRO config (#10071) 2023-11-09 11:34:41 -08:00
netknob all: update copyright and license headers 2023-01-27 15:36:29 -08:00
netmon net/netmon: when a new network is added, trigger netmon update (#10840) 2024-01-12 16:03:04 -08:00
netns net/{interfaces,netmon}: remove "interesting", EqualFiltered API 2023-08-29 11:57:30 -07:00
netstat net/{netns,netstat}: use new x/sys/cpu.IsBigEndian 2023-02-02 07:41:49 -08:00
netutil health: warn about reverse path filtering and exit nodes 2024-02-27 00:43:01 +00:00
packet all: use Go 1.22 range-over-int 2024-04-16 15:32:38 -07:00
ping net/ping: fix ICMP echo code field to 0 2023-09-15 17:08:39 -07:00
portmapper all: use Go 1.22 range-over-int 2024-04-16 15:32:38 -07:00
proxymux all: cleanup unused code, part 1 (#10661) 2023-12-20 14:50:30 -08:00
routetable net/routetable: increase route limit used by the test 2024-03-14 16:10:40 +00:00
socks5 net/socks5: add password auth support 2023-03-05 14:08:34 -08:00
sockstats all: use Go 1.22 range-over-int 2024-04-16 15:32:38 -07:00
speedtest all: update copyright and license headers 2023-01-27 15:36:29 -08:00
stun wgengine/magicsock, types/nettype, etc: finish ReadFromUDPAddrPort netip migration 2023-04-15 13:40:15 -07:00
stunserver all: use Go 1.22 range-over-int 2024-04-16 15:32:38 -07:00
tcpinfo all: use Go 1.22 range-over-int 2024-04-16 15:32:38 -07:00
tlsdial tsd, ipnlocal, etc: add tsd.System.HealthTracker, start some plumbing 2024-04-25 22:13:04 -07:00
tsaddr all: use Go 1.22 range-over-int 2024-04-16 15:32:38 -07:00
tsdial net/tsdial: assume all connections are affected if no default route is present 2024-04-19 22:14:36 -04:00
tshttpproxy all: use Go 1.22 range-over-int 2024-04-16 15:32:38 -07:00
tstun all: use Go 1.22 range-over-int 2024-04-16 15:32:38 -07:00
wsconn net/wsconn: accept a remote addr string and plumb it through 2023-08-29 16:57:16 -07:00