@ -416,6 +416,9 @@ func (b *LocalBackend) updateStatus(sb *ipnstate.StatusBuilder, extraLocked func
s . Health = append ( s . Health , err . Error ( ) )
s . Health = append ( s . Health , err . Error ( ) )
}
}
}
}
if m := b . sshOnButUnusableHealthCheckMessageLocked ( ) ; m != "" {
s . Health = append ( s . Health , m )
}
if b . netMap != nil {
if b . netMap != nil {
s . CertDomains = append ( [ ] string ( nil ) , b . netMap . DNS . CertDomains ... )
s . CertDomains = append ( [ ] string ( nil ) , b . netMap . DNS . CertDomains ... )
s . MagicDNSSuffix = b . netMap . MagicDNSSuffix ( )
s . MagicDNSSuffix = b . netMap . MagicDNSSuffix ( )
@ -1840,39 +1843,88 @@ func (b *LocalBackend) CheckPrefs(p *ipn.Prefs) error {
}
}
func ( b * LocalBackend ) checkPrefsLocked ( p * ipn . Prefs ) error {
func ( b * LocalBackend ) checkPrefsLocked ( p * ipn . Prefs ) error {
var errs [ ] error
if p . Hostname == "badhostname.tailscale." {
if p . Hostname == "badhostname.tailscale." {
// Keep this one just for testing.
// Keep this one just for testing.
return errors . New ( "bad hostname [test]" )
errs = append ( errs , errors . New ( "bad hostname [test]" ) )
}
}
if p . RunSSH {
if err := b . checkSSHPrefsLocked ( p ) ; err != nil {
switch runtime . GOOS {
errs = append ( errs , err )
case "linux" :
}
if distro . Get ( ) == distro . Synology && ! envknob . UseWIPCode ( ) {
return multierr . New ( errs ... )
return errors . New ( "The Tailscale SSH server does not run on Synology." )
}
}
// otherwise okay
func ( b * LocalBackend ) checkSSHPrefsLocked ( p * ipn . Prefs ) error {
case "darwin" :
if ! p . RunSSH {
// okay only in tailscaled mode for now.
return nil
if version . IsSandboxedMacOS ( ) {
}
return errors . New ( "The Tailscale SSH server does not run in sandboxed Tailscale GUI builds." )
switch runtime . GOOS {
}
case "linux" :
if ! envknob . UseWIPCode ( ) {
if distro . Get ( ) == distro . Synology && ! envknob . UseWIPCode ( ) {
return errors . New ( "The Tailscale SSH server is disabled on macOS tailscaled by default. To try, set env TAILSCALE_USE_WIP_CODE=1" )
return errors . New ( "The Tailscale SSH server does not run on Synology." )
}
}
default :
// otherwise okay
return errors . New ( "The Tailscale SSH server is not supported on " + runtime . GOOS )
case "darwin" :
// okay only in tailscaled mode for now.
if version . IsSandboxedMacOS ( ) {
return errors . New ( "The Tailscale SSH server does not run in sandboxed Tailscale GUI builds." )
}
}
if ! canSSH {
if ! envknob. UseWIPCode ( ) {
return errors . New ( "The Tailscale SSH server has been administratively disabled." )
return errors . New ( "The Tailscale SSH server is disabled on macOS tailscaled by default. To try, set env TAILSCALE_USE_WIP_CODE=1 ")
}
}
if b . netMap != nil && b . netMap . SSHPolicy == nil &&
default :
envknob . SSHPolicyFile ( ) == "" && ! envknob . SSHIgnoreTailnetPolicy ( ) {
return errors . New ( "The Tailscale SSH server is not supported on " + runtime . GOOS )
return errors . New ( "Unable to enable local Tailscale SSH server; not enabled/configured on Tailnet." )
}
if ! canSSH {
return errors . New ( "The Tailscale SSH server has been administratively disabled." )
}
if envknob . SSHIgnoreTailnetPolicy ( ) || envknob . SSHPolicyFile ( ) != "" {
return nil
}
if b . netMap != nil {
if ! hasCapability ( b . netMap , tailcfg . CapabilitySSH ) {
if b . isDefaultServerLocked ( ) {
return errors . New ( "Unable to enable local Tailscale SSH server; not enabled on Tailnet. See https://tailscale.com/s/ssh" )
}
return errors . New ( "Unable to enable local Tailscale SSH server; not enabled on Tailnet." )
}
}
}
}
return nil
return nil
}
}
func ( b * LocalBackend ) sshOnButUnusableHealthCheckMessageLocked ( ) ( healthMessage string ) {
if b . prefs == nil || ! b . prefs . RunSSH {
return ""
}
if envknob . SSHIgnoreTailnetPolicy ( ) || envknob . SSHPolicyFile ( ) != "" {
return "development SSH policy in use"
}
nm := b . netMap
if nm == nil {
return ""
}
if nm . SSHPolicy != nil && len ( nm . SSHPolicy . Rules ) > 0 {
return ""
}
isDefault := b . isDefaultServerLocked ( )
isAdmin := hasCapability ( nm , tailcfg . CapabilityAdmin )
if ! isAdmin {
return "Tailscale SSH enabled, but access controls don't allow anyone to access this device. Ask your admin to update your tailnet's ACLs to allow access."
}
if ! isDefault {
return "Tailscale SSH enabled, but access controls don't allow anyone to access this device. Update your tailnet's ACLs to allow access."
}
return "Tailscale SSH enabled, but access controls don't allow anyone to access this device. Update your tailnet's ACLs at https://tailscale.com/s/ssh-policy"
}
func ( b * LocalBackend ) isDefaultServerLocked ( ) bool {
if b . prefs == nil {
return true // assume true until set otherwise
}
return b . prefs . ControlURLOrDefault ( ) == ipn . DefaultControlURL
}
func ( b * LocalBackend ) EditPrefs ( mp * ipn . MaskedPrefs ) ( * ipn . Prefs , error ) {
func ( b * LocalBackend ) EditPrefs ( mp * ipn . MaskedPrefs ) ( * ipn . Prefs , error ) {
b . mu . Lock ( )
b . mu . Lock ( )
p0 := b . prefs . Clone ( )
p0 := b . prefs . Clone ( )