mirror of
				https://github.com/tailscale/tailscale.git
				synced 2025-11-04 02:01:14 +01:00 
			
		
		
		
	Saves 270 KB. Updates #12614 Change-Id: I4c3fe06d32c49edb3a4bb0758a8617d83f291cf5 Signed-off-by: Brad Fitzpatrick <bradfitz@tailscale.com>
		
			
				
	
	
		
			128 lines
		
	
	
		
			3.4 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			128 lines
		
	
	
		
			3.4 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
// Copyright (c) Tailscale Inc & AUTHORS
 | 
						|
// SPDX-License-Identifier: BSD-3-Clause
 | 
						|
 | 
						|
// Package safesocket creates either a Unix socket, if possible, or
 | 
						|
// otherwise a localhost TCP connection.
 | 
						|
package safesocket
 | 
						|
 | 
						|
import (
 | 
						|
	"context"
 | 
						|
	"errors"
 | 
						|
	"net"
 | 
						|
	"runtime"
 | 
						|
	"time"
 | 
						|
 | 
						|
	"tailscale.com/feature"
 | 
						|
	"tailscale.com/feature/buildfeatures"
 | 
						|
)
 | 
						|
 | 
						|
type closeable interface {
 | 
						|
	CloseRead() error
 | 
						|
	CloseWrite() error
 | 
						|
}
 | 
						|
 | 
						|
// ConnCloseRead calls c's CloseRead method. c is expected to be
 | 
						|
// either a UnixConn or TCPConn as returned from this package.
 | 
						|
func ConnCloseRead(c net.Conn) error {
 | 
						|
	return c.(closeable).CloseRead()
 | 
						|
}
 | 
						|
 | 
						|
// ConnCloseWrite calls c's CloseWrite method. c is expected to be
 | 
						|
// either a UnixConn or TCPConn as returned from this package.
 | 
						|
func ConnCloseWrite(c net.Conn) error {
 | 
						|
	return c.(closeable).CloseWrite()
 | 
						|
}
 | 
						|
 | 
						|
var processStartTime = time.Now()
 | 
						|
 | 
						|
var tailscaledProcExists feature.Hook[func() bool]
 | 
						|
 | 
						|
// tailscaledStillStarting reports whether tailscaled is probably
 | 
						|
// still starting up. That is, it reports whether the caller should
 | 
						|
// keep retrying to connect.
 | 
						|
func tailscaledStillStarting() bool {
 | 
						|
	d := time.Since(processStartTime)
 | 
						|
	if d < 2*time.Second {
 | 
						|
		// Without even checking the process table, assume
 | 
						|
		// that for the first two seconds that tailscaled is
 | 
						|
		// probably still starting.  That is, assume they're
 | 
						|
		// running "tailscaled & tailscale up ...." and make
 | 
						|
		// the tailscale client block for a bit for tailscaled
 | 
						|
		// to start accepting on the socket.
 | 
						|
		return true
 | 
						|
	}
 | 
						|
	if d > 5*time.Second {
 | 
						|
		return false
 | 
						|
	}
 | 
						|
	f, ok := tailscaledProcExists.GetOk()
 | 
						|
	return ok && f()
 | 
						|
}
 | 
						|
 | 
						|
// ConnectContext connects to tailscaled using a unix socket or named pipe.
 | 
						|
func ConnectContext(ctx context.Context, path string) (net.Conn, error) {
 | 
						|
	for {
 | 
						|
		c, err := connect(ctx, path)
 | 
						|
		if err != nil && tailscaledStillStarting() {
 | 
						|
			if ctx.Err() != nil {
 | 
						|
				return nil, ctx.Err()
 | 
						|
			}
 | 
						|
			select {
 | 
						|
			case <-ctx.Done():
 | 
						|
				return nil, ctx.Err()
 | 
						|
			case <-time.After(250 * time.Millisecond):
 | 
						|
			}
 | 
						|
			continue
 | 
						|
		}
 | 
						|
		return c, err
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
// Connect connects to tailscaled using a unix socket or named pipe.
 | 
						|
// Deprecated: use ConnectContext instead.
 | 
						|
func Connect(path string) (net.Conn, error) {
 | 
						|
	return ConnectContext(context.Background(), path)
 | 
						|
}
 | 
						|
 | 
						|
// Listen returns a listener either on Unix socket path (on Unix), or
 | 
						|
// the NamedPipe path (on Windows).
 | 
						|
func Listen(path string) (net.Listener, error) {
 | 
						|
	return listen(path)
 | 
						|
}
 | 
						|
 | 
						|
var (
 | 
						|
	ErrTokenNotFound = errors.New("no token found")
 | 
						|
	ErrNoTokenOnOS   = errors.New("no token on " + runtime.GOOS)
 | 
						|
)
 | 
						|
 | 
						|
var localTCPPortAndToken func() (port int, token string, err error)
 | 
						|
 | 
						|
// LocalTCPPortAndToken returns the port number and auth token to connect to
 | 
						|
// the local Tailscale daemon. It's currently only applicable on macOS
 | 
						|
// when tailscaled is being run in the Mac Sandbox from the App Store version
 | 
						|
// of Tailscale.
 | 
						|
func LocalTCPPortAndToken() (port int, token string, err error) {
 | 
						|
	if localTCPPortAndToken == nil {
 | 
						|
		return 0, "", ErrNoTokenOnOS
 | 
						|
	}
 | 
						|
	return localTCPPortAndToken()
 | 
						|
}
 | 
						|
 | 
						|
// PlatformUsesPeerCreds reports whether the current platform uses peer credentials
 | 
						|
// to authenticate connections.
 | 
						|
func PlatformUsesPeerCreds() bool {
 | 
						|
	if !buildfeatures.HasUnixSocketIdentity {
 | 
						|
		return false
 | 
						|
	}
 | 
						|
	return GOOSUsesPeerCreds(runtime.GOOS)
 | 
						|
}
 | 
						|
 | 
						|
// GOOSUsesPeerCreds is like PlatformUsesPeerCreds but takes a
 | 
						|
// runtime.GOOS value instead of using the current one.
 | 
						|
func GOOSUsesPeerCreds(goos string) bool {
 | 
						|
	switch goos {
 | 
						|
	case "linux", "darwin", "freebsd":
 | 
						|
		return true
 | 
						|
	}
 | 
						|
	return false
 | 
						|
}
 |