From 5e8a80b8453f1c88740f42eae06bed17ce7f469d Mon Sep 17 00:00:00 2001 From: Maisem Ali Date: Mon, 13 Mar 2023 12:33:16 -0700 Subject: [PATCH] all: replace /kb/ links with /s/ equivalents Signed-off-by: Maisem Ali --- client/tailscale/acl.go | 2 +- cmd/get-authkey/main.go | 2 +- cmd/tailscale/cli/configure-synology.go | 2 +- cmd/tailscale/cli/update.go | 4 ++-- ipn/serve.go | 6 +++--- net/netutil/ip_forward.go | 2 +- net/tsaddr/tsaddr.go | 2 +- tsnet/tsnet.go | 4 ++-- 8 files changed, 12 insertions(+), 12 deletions(-) diff --git a/client/tailscale/acl.go b/client/tailscale/acl.go index 4266febac..5b6f5b1bc 100644 --- a/client/tailscale/acl.go +++ b/client/tailscale/acl.go @@ -103,7 +103,7 @@ func (c *Client) ACL(ctx context.Context) (acl *ACL, err error) { // it as a string. // HuJSON is JSON with a few modifications to make it more human-friendly. The primary // changes are allowing comments and trailing comments. See the following links for more info: -// https://tailscale.com/kb/1018/acls?q=acl#tailscale-acl-policy-format +// https://tailscale.com/s/acl-format // https://github.com/tailscale/hujson func (c *Client) ACLHuJSON(ctx context.Context) (acl *ACLHuJSON, err error) { // Format return errors to be descriptive. diff --git a/cmd/get-authkey/main.go b/cmd/get-authkey/main.go index f638847bf..fb8f6abe7 100644 --- a/cmd/get-authkey/main.go +++ b/cmd/get-authkey/main.go @@ -2,7 +2,7 @@ // SPDX-License-Identifier: BSD-3-Clause // get-authkey allocates an authkey using an OAuth API client -// https://tailscale.com/kb/1215/oauth-clients/ and prints it +// https://tailscale.com/s/oauth-clients and prints it // to stdout for scripts to capture and use. package main diff --git a/cmd/tailscale/cli/configure-synology.go b/cmd/tailscale/cli/configure-synology.go index 717d63161..b44828d01 100644 --- a/cmd/tailscale/cli/configure-synology.go +++ b/cmd/tailscale/cli/configure-synology.go @@ -41,7 +41,7 @@ This command is intended to run at boot as root on a Synology device to create the /dev/net/tun device and give the tailscaled binary permission to use it. -See: https://tailscale.com/kb/1152/synology-outbound/ +See: https://tailscale.com/s/synology-outbound `), FlagSet: (func() *flag.FlagSet { fs := newFlagSet("synology") diff --git a/cmd/tailscale/cli/update.go b/cmd/tailscale/cli/update.go index 0ebd33ae5..e295314d7 100644 --- a/cmd/tailscale/cli/update.go +++ b/cmd/tailscale/cli/update.go @@ -145,11 +145,11 @@ func newUpdater() (*updater, error) { case strings.HasSuffix(os.Getenv("HOME"), "/io.tailscale.ipn.macsys/Data"): up.update = up.updateMacSys default: - return nil, errors.New("This is the macOS App Store version of Tailscale; update in the App Store, or see https://tailscale.com/kb/1083/install-unstable/ to use TestFlight or to install the non-App Store version") + return nil, errors.New("This is the macOS App Store version of Tailscale; update in the App Store, or see https://tailscale.com/s/unstable-clients to use TestFlight or to install the non-App Store version") } } if up.update == nil { - return nil, errors.New("The 'update' command is not supported on this platform; see https://tailscale.com/kb/1067/update/") + return nil, errors.New("The 'update' command is not supported on this platform; see https://tailscale.com/s/client-updates") } return up, nil } diff --git a/ipn/serve.go b/ipn/serve.go index 466a4f1f7..c0ba3b669 100644 --- a/ipn/serve.go +++ b/ipn/serve.go @@ -190,13 +190,13 @@ func (sc *ServeConfig) IsFunnelOn() bool { // Funnel. func CheckFunnelAccess(port uint16, nodeAttrs []string) error { if slices.Contains(nodeAttrs, tailcfg.CapabilityWarnFunnelNoInvite) { - return errors.New("Funnel not available; an invite is required to join the alpha. See https://tailscale.com/kb/1223/tailscale-funnel/.") + return errors.New("Funnel not available; an invite is required to join the alpha. See https://tailscale.com/s/no-funnel.") } if slices.Contains(nodeAttrs, tailcfg.CapabilityWarnFunnelNoHTTPS) { - return errors.New("Funnel not available; HTTPS must be enabled. See https://tailscale.com/kb/1153/enabling-https/.") + return errors.New("Funnel not available; HTTPS must be enabled. See https://tailscale.com/s/https.") } if !slices.Contains(nodeAttrs, tailcfg.NodeAttrFunnel) { - return errors.New("Funnel not available; \"funnel\" node attribute not set. See https://tailscale.com/kb/1223/tailscale-funnel/.") + return errors.New("Funnel not available; \"funnel\" node attribute not set. See https://tailscale.com/s/no-funnel.") } return checkFunnelPort(port, nodeAttrs) } diff --git a/net/netutil/ip_forward.go b/net/netutil/ip_forward.go index fe0fd5aa1..f8c6a90fc 100644 --- a/net/netutil/ip_forward.go +++ b/net/netutil/ip_forward.go @@ -65,7 +65,7 @@ func CheckIPForwarding(routes []netip.Prefix, state *interfaces.State) (warn, er } return nil, nil } - const kbLink = "\nSee https://tailscale.com/kb/1104/enable-ip-forwarding/" + const kbLink = "\nSee https://tailscale.com/s/ip-forwarding" if state == nil { var err error state, err = interfaces.GetState() diff --git a/net/tsaddr/tsaddr.go b/net/tsaddr/tsaddr.go index 6b8d11f9d..34259b690 100644 --- a/net/tsaddr/tsaddr.go +++ b/net/tsaddr/tsaddr.go @@ -26,7 +26,7 @@ var chromeOSRange oncePrefix // CGNATRange returns the Carrier Grade NAT address range that // is the superset range that Tailscale assigns out of. -// See https://tailscale.com/kb/1015/100.x-addresses. +// See https://tailscale.com/s/cgnat // Note that Tailscale does not assign out of the ChromeOSVMRange. func CGNATRange() netip.Prefix { cgnatRange.Do(func() { mustPrefix(&cgnatRange.v, "100.64.0.0/10") }) diff --git a/tsnet/tsnet.go b/tsnet/tsnet.go index 5bd9150d4..792c60bae 100644 --- a/tsnet/tsnet.go +++ b/tsnet/tsnet.go @@ -83,7 +83,7 @@ type Server struct { Logf logger.Logf // Ephemeral, if true, specifies that the instance should register - // as an Ephemeral node (https://tailscale.com/kb/1111/ephemeral-nodes/). + // as an Ephemeral node (https://tailscale.com/s/ephemeral-nodes). Ephemeral bool // AuthKey, if non-empty, is the auth key to create the node @@ -822,7 +822,7 @@ func (s *Server) ListenTLS(network, addr string) (net.Listener, error) { return nil, err } if len(st.CertDomains) == 0 { - return nil, errors.New("tsnet: you must enable HTTPS in the admin panel to proceed. See https://tailscale.com/kb/1153/enabling-https/") + return nil, errors.New("tsnet: you must enable HTTPS in the admin panel to proceed. See https://tailscale.com/s/https") } lc, err := s.LocalClient() // do local client first before listening.