diff --git a/cmd/tailscale/cli/exitnode.go b/cmd/tailscale/cli/exitnode.go index 558942425..2eb7a28ab 100644 --- a/cmd/tailscale/cli/exitnode.go +++ b/cmd/tailscale/cli/exitnode.go @@ -14,7 +14,7 @@ import ( "text/tabwriter" "github.com/peterbourgon/ff/v3/ffcli" - "golang.org/x/exp/maps" + xmaps "golang.org/x/exp/maps" "tailscale.com/ipn/ipnstate" "tailscale.com/tailcfg" "tailscale.com/util/cmpx" @@ -181,7 +181,7 @@ func filterFormatAndSortExitNodes(peers []*ipnstate.PeerStatus, filterBy string) } filteredExitNodes := filteredExitNodes{ - Countries: maps.Values(countries), + Countries: xmaps.Values(countries), } for _, country := range filteredExitNodes.Countries { diff --git a/cmd/testwrapper/testwrapper.go b/cmd/testwrapper/testwrapper.go index c9790aafc..31909d666 100644 --- a/cmd/testwrapper/testwrapper.go +++ b/cmd/testwrapper/testwrapper.go @@ -22,7 +22,7 @@ import ( "strings" "time" - "golang.org/x/exp/maps" + xmaps "golang.org/x/exp/maps" "tailscale.com/cmd/testwrapper/flakytest" ) @@ -270,7 +270,7 @@ func main() { if len(toRetry) == 0 { continue } - pkgs := maps.Keys(toRetry) + pkgs := xmaps.Keys(toRetry) sort.Strings(pkgs) nextRun := &nextRun{ attempt: thisRun.attempt + 1, diff --git a/util/osdiag/osdiag_windows_test.go b/util/osdiag/osdiag_windows_test.go index 61a76155f..b29b602cc 100644 --- a/util/osdiag/osdiag_windows_test.go +++ b/util/osdiag/osdiag_windows_test.go @@ -6,10 +6,10 @@ package osdiag import ( "errors" "fmt" + "maps" "strings" "testing" - "golang.org/x/exp/maps" "golang.org/x/sys/windows/registry" ) diff --git a/wgengine/filter/filter_test.go b/wgengine/filter/filter_test.go index 91bdb4fbc..c4bc167bb 100644 --- a/wgengine/filter/filter_test.go +++ b/wgengine/filter/filter_test.go @@ -14,7 +14,7 @@ import ( "github.com/google/go-cmp/cmp" "go4.org/netipx" - "golang.org/x/exp/maps" + xmaps "golang.org/x/exp/maps" "tailscale.com/net/packet" "tailscale.com/net/tsaddr" "tailscale.com/tailcfg" @@ -945,7 +945,7 @@ func TestCaps(t *testing.T) { } for _, tt := range tests { t.Run(tt.name, func(t *testing.T) { - got := maps.Keys(filt.CapsWithValues(netip.MustParseAddr(tt.src), netip.MustParseAddr(tt.dst))) + got := xmaps.Keys(filt.CapsWithValues(netip.MustParseAddr(tt.src), netip.MustParseAddr(tt.dst))) slices.Sort(got) slices.Sort(tt.want) if !slices.Equal(got, tt.want) { diff --git a/wgengine/magicsock/endpoint.go b/wgengine/magicsock/endpoint.go index 6c1cc0c39..b5eada402 100644 --- a/wgengine/magicsock/endpoint.go +++ b/wgengine/magicsock/endpoint.go @@ -20,7 +20,7 @@ import ( "time" "golang.org/x/crypto/poly1305" - "golang.org/x/exp/maps" + xmaps "golang.org/x/exp/maps" "tailscale.com/disco" "tailscale.com/ipn/ipnstate" "tailscale.com/net/stun" @@ -313,7 +313,7 @@ func (de *endpoint) addrForWireGuardSendLocked(now mono.Time) (udpAddr netip.Add return udpAddr, false } - candidates := maps.Keys(de.endpointState) + candidates := xmaps.Keys(de.endpointState) if len(candidates) == 0 { de.c.logf("magicsock: addrForSendWireguardLocked: [unexpected] no candidates available for endpoint") return udpAddr, false diff --git a/wgengine/magicsock/magicsock_test.go b/wgengine/magicsock/magicsock_test.go index 4c4153bf3..c1707a218 100644 --- a/wgengine/magicsock/magicsock_test.go +++ b/wgengine/magicsock/magicsock_test.go @@ -31,7 +31,7 @@ import ( "github.com/tailscale/wireguard-go/device" "github.com/tailscale/wireguard-go/tun/tuntest" "go4.org/mem" - "golang.org/x/exp/maps" + xmaps "golang.org/x/exp/maps" "golang.org/x/net/icmp" "golang.org/x/net/ipv4" "golang.org/x/net/ipv6" @@ -1081,7 +1081,7 @@ func testTwoDevicePing(t *testing.T, d *devices) { } } t.Helper() - t.Errorf("missing any connection to %s from %s", wantConns, maps.Keys(stats)) + t.Errorf("missing any connection to %s from %s", wantConns, xmaps.Keys(stats)) } addrPort := netip.MustParseAddrPort