safesocket: simplify API.

On unix, we want to provide a full path to the desired unix socket.

On windows, currently we want to provide a TCP port, but someday
we'll also provide a "path-ish" object for a named pipe.

For now, simplify the API down to exactly a path and a TCP port.

Signed-off-by: David Anderson <dave@natulte.net>
pull/80/head
David Anderson 5 years ago committed by Dave Anderson
parent b72e6446e2
commit 4460bd638b

@ -52,6 +52,7 @@ func main() {
log.Printf("fixConsoleOutput: %v\n", err) log.Printf("fixConsoleOutput: %v\n", err)
} }
socket := getopt.StringLong("socket", 0, "/run/tailscale/tailscaled.sock", "path of tailscaled's unix socket")
server := getopt.StringLong("server", 's', "https://login.tailscale.com", "URL to tailcontrol server") server := getopt.StringLong("server", 's', "https://login.tailscale.com", "URL to tailcontrol server")
nuroutes := getopt.BoolLong("no-single-routes", 'N', "disallow (non-subnet) routes to single nodes") nuroutes := getopt.BoolLong("no-single-routes", 'N', "disallow (non-subnet) routes to single nodes")
routeall := getopt.BoolLong("remote-routes", 'R', "accept routes advertised by remote nodes") routeall := getopt.BoolLong("remote-routes", 'R', "accept routes advertised by remote nodes")
@ -84,7 +85,7 @@ func main() {
AdvertiseRoutes: adv, AdvertiseRoutes: adv,
} }
c, err := safesocket.Connect("", "Tailscale", "tailscaled", 41112) c, err := safesocket.Connect(*socket, 0)
if err != nil { if err != nil {
log.Fatalf("safesocket.Connect: %v\n", err) log.Fatalf("safesocket.Connect: %v\n", err)
} }

@ -38,6 +38,7 @@ func main() {
tunname := getopt.StringLong("tun", 0, "ts0", "tunnel interface name") tunname := getopt.StringLong("tun", 0, "ts0", "tunnel interface name")
listenport := getopt.Uint16Long("port", 'p', magicsock.DefaultPort, "WireGuard port (0=autoselect)") listenport := getopt.Uint16Long("port", 'p', magicsock.DefaultPort, "WireGuard port (0=autoselect)")
statepath := getopt.StringLong("state", 0, "", "Path of state file") statepath := getopt.StringLong("state", 0, "", "Path of state file")
socketpath := getopt.StringLong("socket", 's', "/run/tailscale/tailscaled.sock", "Path of the service unix socket")
logf := wgengine.RusagePrefixLog(log.Printf) logf := wgengine.RusagePrefixLog(log.Printf)
@ -56,6 +57,10 @@ func main() {
log.Fatalf("--state is required") log.Fatalf("--state is required")
} }
if *socketpath == "" {
log.Fatalf("--socket is required")
}
if *debug != "" { if *debug != "" {
go runDebugServer(*debug) go runDebugServer(*debug)
} }
@ -72,6 +77,7 @@ func main() {
e = wgengine.NewWatchdog(e) e = wgengine.NewWatchdog(e)
opts := ipnserver.Options{ opts := ipnserver.Options{
SocketPath: *socketpath,
StatePath: *statepath, StatePath: *statepath,
AutostartStateKey: globalStateKey, AutostartStateKey: globalStateKey,
SurviveDisconnects: true, SurviveDisconnects: true,

@ -39,6 +39,12 @@ const defaultLoginServer = "https://login.tailscale.com"
// Options is the configuration of the Tailscale node agent. // Options is the configuration of the Tailscale node agent.
type Options struct { type Options struct {
// SocketPath, on unix systems, is the unix socket path to listen
// on for frontend connections.
SocketPath string
// Port, on windows, is the localhost TCP port to listen on for
// frontend connections.
Port int
// StatePath is the path to the stored agent state. // StatePath is the path to the stored agent state.
StatePath string StatePath string
// AutostartStateKey, if non-empty, immediately starts the agent // AutostartStateKey, if non-empty, immediately starts the agent
@ -72,7 +78,7 @@ func pump(logf logger.Logf, ctx context.Context, bs *ipn.BackendServer, s net.Co
func Run(rctx context.Context, logf logger.Logf, logid string, opts Options, e wgengine.Engine) error { func Run(rctx context.Context, logf logger.Logf, logid string, opts Options, e wgengine.Engine) error {
bo := backoff.Backoff{Name: "ipnserver"} bo := backoff.Backoff{Name: "ipnserver"}
listen, _, err := safesocket.Listen("", "Tailscale", "tailscaled", 41112) listen, _, err := safesocket.Listen(opts.SocketPath, uint16(opts.Port))
if err != nil { if err != nil {
return fmt.Errorf("safesocket.Listen: %v", err) return fmt.Errorf("safesocket.Listen: %v", err)
} }

@ -10,7 +10,7 @@ import (
) )
func TestBasics(t *testing.T) { func TestBasics(t *testing.T) {
l, port, err := Listen("COOKIE", "Tailscale", "test", 0) l, port, err := Listen("test", 0)
if err != nil { if err != nil {
t.Fatal(err) t.Fatal(err)
} }
@ -42,7 +42,7 @@ func TestBasics(t *testing.T) {
}() }()
go func() { go func() {
c, err := Connect("COOKIE", "Tailscale", "test", port) c, err := Connect("test", port)
if err != nil { if err != nil {
errs <- err errs <- err
return return

@ -24,9 +24,8 @@ func ConnCloseWrite(c net.Conn) error {
} }
// TODO(apenwarr): handle magic cookie auth // TODO(apenwarr): handle magic cookie auth
func Connect(cookie, vendor, name string, port uint16) (net.Conn, error) { func Connect(path string, port uint16) (net.Conn, error) {
p := path(vendor, name, port) pipe, err := net.Dial("tcp", fmt.Sprintf("127.0.0.1:%d", port))
pipe, err := net.Dial("tcp", p)
if err != nil { if err != nil {
return nil, err return nil, err
} }
@ -46,12 +45,11 @@ func setFlags(network, address string, c syscall.RawConn) error {
// just always using a TCP session on a fixed port on localhost. As a // just always using a TCP session on a fixed port on localhost. As a
// result, on Windows we ignore the vendor and name strings. // result, on Windows we ignore the vendor and name strings.
// TODO(apenwarr): handle magic cookie auth // TODO(apenwarr): handle magic cookie auth
func Listen(cookie, vendor, name string, port uint16) (net.Listener, uint16, error) { func Listen(path string, port uint16) (net.Listener, uint16, error) {
lc := net.ListenConfig{ lc := net.ListenConfig{
Control: setFlags, Control: setFlags,
} }
p := path(vendor, name, port) pipe, err := lc.Listen(context.Background(), "tcp", fmt.Sprintf("127.0.0.1:%d", port))
pipe, err := lc.Listen(context.Background(), "tcp", p)
if err != nil { if err != nil {
return nil, 0, err return nil, 0, err
} }

@ -12,10 +12,6 @@ import (
"os" "os"
) )
func path(vendor, name string) string {
return fmt.Sprintf("%s-%s.sock", vendor, name)
}
func ConnCloseRead(c net.Conn) error { func ConnCloseRead(c net.Conn) error {
return c.(*net.UnixConn).CloseRead() return c.(*net.UnixConn).CloseRead()
} }
@ -25,8 +21,8 @@ func ConnCloseWrite(c net.Conn) error {
} }
// TODO(apenwarr): handle magic cookie auth // TODO(apenwarr): handle magic cookie auth
func Connect(cookie, vendor, name string, port uint16) (net.Conn, error) { func Connect(path string, port uint16) (net.Conn, error) {
pipe, err := net.Dial("unix", path(vendor, name)) pipe, err := net.Dial("unix", path)
if err != nil { if err != nil {
return nil, err return nil, err
} }
@ -34,7 +30,7 @@ func Connect(cookie, vendor, name string, port uint16) (net.Conn, error) {
} }
// TODO(apenwarr): handle magic cookie auth // TODO(apenwarr): handle magic cookie auth
func Listen(cookie, vendor, name string, port uint16) (net.Listener, uint16, error) { func Listen(path string, port uint16) (net.Listener, uint16, error) {
// Unix sockets hang around in the filesystem even after nobody // Unix sockets hang around in the filesystem even after nobody
// is listening on them. (Which is really unfortunate but long- // is listening on them. (Which is really unfortunate but long-
// entrenched semantics.) Try connecting first; if it works, then // entrenched semantics.) Try connecting first; if it works, then
@ -45,17 +41,16 @@ func Listen(cookie, vendor, name string, port uint16) (net.Listener, uint16, err
// "proper" daemon usually uses a dance involving pidfiles to first // "proper" daemon usually uses a dance involving pidfiles to first
// ensure that no other instances of itself are running, but that's // ensure that no other instances of itself are running, but that's
// beyond the scope of our simple socket library. // beyond the scope of our simple socket library.
p := path(vendor, name) c, err := net.Dial("unix", path)
c, err := net.Dial("unix", p)
if err == nil { if err == nil {
c.Close() c.Close()
return nil, 0, fmt.Errorf("%v: address already in use", p) return nil, 0, fmt.Errorf("%v: address already in use", path)
} }
_ = os.Remove(p) _ = os.Remove(path)
pipe, err := net.Listen("unix", p) pipe, err := net.Listen("unix", path)
if err != nil { if err != nil {
return nil, 0, err return nil, 0, err
} }
os.Chmod(p, 0666) os.Chmod(path, 0666)
return pipe, 0, err return pipe, 0, err
} }

Loading…
Cancel
Save