cmd/tailscale: surface node-key for locked out tailnet-lock peers

Signed-off-by: Tom DNetto <tom@tailscale.com>
pull/7523/head
Tom DNetto 2 years ago committed by Tom
parent b797f773c7
commit 3471fbf8dc

@ -252,6 +252,8 @@ func runNetworkLockStatus(ctx context.Context, args []string) error {
}
line.WriteString("\t")
line.WriteString(string(p.StableID))
line.WriteString("\t")
line.WriteString(p.NodeKey.String())
fmt.Println(line.String())
}
}

@ -106,6 +106,7 @@ func (b *LocalBackend) tkaFilterNetmapLocked(nm *netmap.NetworkMap) {
ID: p.ID,
StableID: p.StableID,
TailscaleIPs: make([]netip.Addr, len(p.Addresses)),
NodeKey: p.Key,
}
for i, addr := range p.Addresses {
if addr.IsSingleIP() && tsaddr.IsTailscaleIP(addr.Addr()) {

@ -88,6 +88,7 @@ type TKAFilteredPeer struct {
ID tailcfg.NodeID
StableID tailcfg.StableNodeID
TailscaleIPs []netip.Addr // Tailscale IP(s) assigned to this node
NodeKey key.NodePublic
}
// NetworkLockStatus represents whether network-lock is enabled,

@ -9,6 +9,7 @@ import (
"net/netip"
"tailscale.com/tailcfg"
"tailscale.com/types/key"
)
// Clone makes a deep copy of TKAFilteredPeer.
@ -29,4 +30,5 @@ var _TKAFilteredPeerCloneNeedsRegeneration = TKAFilteredPeer(struct {
ID tailcfg.NodeID
StableID tailcfg.StableNodeID
TailscaleIPs []netip.Addr
NodeKey key.NodePublic
}{})

Loading…
Cancel
Save