mirror of
				https://github.com/tailscale/tailscale.git
				synced 2025-10-29 23:31:28 +01:00 
			
		
		
		
	Saves 270 KB. Updates #12614 Change-Id: I4c3fe06d32c49edb3a4bb0758a8617d83f291cf5 Signed-off-by: Brad Fitzpatrick <bradfitz@tailscale.com>
		
			
				
	
	
		
			128 lines
		
	
	
		
			3.4 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			128 lines
		
	
	
		
			3.4 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| // Copyright (c) Tailscale Inc & AUTHORS
 | |
| // SPDX-License-Identifier: BSD-3-Clause
 | |
| 
 | |
| // Package safesocket creates either a Unix socket, if possible, or
 | |
| // otherwise a localhost TCP connection.
 | |
| package safesocket
 | |
| 
 | |
| import (
 | |
| 	"context"
 | |
| 	"errors"
 | |
| 	"net"
 | |
| 	"runtime"
 | |
| 	"time"
 | |
| 
 | |
| 	"tailscale.com/feature"
 | |
| 	"tailscale.com/feature/buildfeatures"
 | |
| )
 | |
| 
 | |
| type closeable interface {
 | |
| 	CloseRead() error
 | |
| 	CloseWrite() error
 | |
| }
 | |
| 
 | |
| // ConnCloseRead calls c's CloseRead method. c is expected to be
 | |
| // either a UnixConn or TCPConn as returned from this package.
 | |
| func ConnCloseRead(c net.Conn) error {
 | |
| 	return c.(closeable).CloseRead()
 | |
| }
 | |
| 
 | |
| // ConnCloseWrite calls c's CloseWrite method. c is expected to be
 | |
| // either a UnixConn or TCPConn as returned from this package.
 | |
| func ConnCloseWrite(c net.Conn) error {
 | |
| 	return c.(closeable).CloseWrite()
 | |
| }
 | |
| 
 | |
| var processStartTime = time.Now()
 | |
| 
 | |
| var tailscaledProcExists feature.Hook[func() bool]
 | |
| 
 | |
| // tailscaledStillStarting reports whether tailscaled is probably
 | |
| // still starting up. That is, it reports whether the caller should
 | |
| // keep retrying to connect.
 | |
| func tailscaledStillStarting() bool {
 | |
| 	d := time.Since(processStartTime)
 | |
| 	if d < 2*time.Second {
 | |
| 		// Without even checking the process table, assume
 | |
| 		// that for the first two seconds that tailscaled is
 | |
| 		// probably still starting.  That is, assume they're
 | |
| 		// running "tailscaled & tailscale up ...." and make
 | |
| 		// the tailscale client block for a bit for tailscaled
 | |
| 		// to start accepting on the socket.
 | |
| 		return true
 | |
| 	}
 | |
| 	if d > 5*time.Second {
 | |
| 		return false
 | |
| 	}
 | |
| 	f, ok := tailscaledProcExists.GetOk()
 | |
| 	return ok && f()
 | |
| }
 | |
| 
 | |
| // ConnectContext connects to tailscaled using a unix socket or named pipe.
 | |
| func ConnectContext(ctx context.Context, path string) (net.Conn, error) {
 | |
| 	for {
 | |
| 		c, err := connect(ctx, path)
 | |
| 		if err != nil && tailscaledStillStarting() {
 | |
| 			if ctx.Err() != nil {
 | |
| 				return nil, ctx.Err()
 | |
| 			}
 | |
| 			select {
 | |
| 			case <-ctx.Done():
 | |
| 				return nil, ctx.Err()
 | |
| 			case <-time.After(250 * time.Millisecond):
 | |
| 			}
 | |
| 			continue
 | |
| 		}
 | |
| 		return c, err
 | |
| 	}
 | |
| }
 | |
| 
 | |
| // Connect connects to tailscaled using a unix socket or named pipe.
 | |
| // Deprecated: use ConnectContext instead.
 | |
| func Connect(path string) (net.Conn, error) {
 | |
| 	return ConnectContext(context.Background(), path)
 | |
| }
 | |
| 
 | |
| // Listen returns a listener either on Unix socket path (on Unix), or
 | |
| // the NamedPipe path (on Windows).
 | |
| func Listen(path string) (net.Listener, error) {
 | |
| 	return listen(path)
 | |
| }
 | |
| 
 | |
| var (
 | |
| 	ErrTokenNotFound = errors.New("no token found")
 | |
| 	ErrNoTokenOnOS   = errors.New("no token on " + runtime.GOOS)
 | |
| )
 | |
| 
 | |
| var localTCPPortAndToken func() (port int, token string, err error)
 | |
| 
 | |
| // LocalTCPPortAndToken returns the port number and auth token to connect to
 | |
| // the local Tailscale daemon. It's currently only applicable on macOS
 | |
| // when tailscaled is being run in the Mac Sandbox from the App Store version
 | |
| // of Tailscale.
 | |
| func LocalTCPPortAndToken() (port int, token string, err error) {
 | |
| 	if localTCPPortAndToken == nil {
 | |
| 		return 0, "", ErrNoTokenOnOS
 | |
| 	}
 | |
| 	return localTCPPortAndToken()
 | |
| }
 | |
| 
 | |
| // PlatformUsesPeerCreds reports whether the current platform uses peer credentials
 | |
| // to authenticate connections.
 | |
| func PlatformUsesPeerCreds() bool {
 | |
| 	if !buildfeatures.HasUnixSocketIdentity {
 | |
| 		return false
 | |
| 	}
 | |
| 	return GOOSUsesPeerCreds(runtime.GOOS)
 | |
| }
 | |
| 
 | |
| // GOOSUsesPeerCreds is like PlatformUsesPeerCreds but takes a
 | |
| // runtime.GOOS value instead of using the current one.
 | |
| func GOOSUsesPeerCreds(goos string) bool {
 | |
| 	switch goos {
 | |
| 	case "linux", "darwin", "freebsd":
 | |
| 		return true
 | |
| 	}
 | |
| 	return false
 | |
| }
 |