|
|
@@ -42,6 +42,7 @@ import (
|
|
|
"tailscale.com/types/netmap"
|
|
|
"tailscale.com/util/clientmetric"
|
|
|
"tailscale.com/util/mak"
|
|
|
+ "tailscale.com/version/distro"
|
|
|
)
|
|
|
|
|
|
var (
|
|
|
@@ -388,6 +389,15 @@ func (c *conn) doPolicyAuth(ctx ssh.Context, pubKey ssh.PublicKey) error {
|
|
|
if a.Accept {
|
|
|
c.finalAction = a
|
|
|
}
|
|
|
+ if runtime.GOOS == "linux" && distro.Get() == distro.Gokrazy {
|
|
|
+ // Gokrazy is a single-user appliance with ~no userspace.
|
|
|
+ // There aren't users to look up (no /etc/passwd, etc)
|
|
|
+ // so rather than fail below, just hardcode root.
|
|
|
+ // TODO(bradfitz): fix os/user upstream instead?
|
|
|
+ c.userGroupIDs = []string{"0"}
|
|
|
+ c.localUser = &user.User{Uid: "0", Gid: "0", Username: "root"}
|
|
|
+ return nil
|
|
|
+ }
|
|
|
lu, err := user.Lookup(localUser)
|
|
|
if err != nil {
|
|
|
c.logf("failed to look up %v: %v", localUser, err)
|
|
|
@@ -396,6 +406,7 @@ func (c *conn) doPolicyAuth(ctx ssh.Context, pubKey ssh.PublicKey) error {
|
|
|
}
|
|
|
gids, err := lu.GroupIds()
|
|
|
if err != nil {
|
|
|
+ c.logf("failed to look up local user's group IDs: %v", err)
|
|
|
return err
|
|
|
}
|
|
|
c.userGroupIDs = gids
|