derp.go 36 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178
  1. // Copyright (c) Tailscale Inc & AUTHORS
  2. // SPDX-License-Identifier: BSD-3-Clause
  3. package prober
  4. import (
  5. "bytes"
  6. "cmp"
  7. "context"
  8. crand "crypto/rand"
  9. "encoding/binary"
  10. "encoding/json"
  11. "errors"
  12. "expvar"
  13. "fmt"
  14. "io"
  15. "log"
  16. "maps"
  17. "net"
  18. "net/http"
  19. "net/netip"
  20. "slices"
  21. "strconv"
  22. "strings"
  23. "sync"
  24. "time"
  25. "github.com/prometheus/client_golang/prometheus"
  26. wgconn "github.com/tailscale/wireguard-go/conn"
  27. "github.com/tailscale/wireguard-go/device"
  28. "github.com/tailscale/wireguard-go/tun"
  29. "go4.org/netipx"
  30. "tailscale.com/client/tailscale"
  31. "tailscale.com/derp"
  32. "tailscale.com/derp/derphttp"
  33. "tailscale.com/net/netmon"
  34. "tailscale.com/net/stun"
  35. "tailscale.com/net/tstun"
  36. "tailscale.com/syncs"
  37. "tailscale.com/tailcfg"
  38. "tailscale.com/types/key"
  39. "tailscale.com/types/logger"
  40. )
  41. // derpProber dynamically manages several probes for each DERP server
  42. // based on the current DERPMap.
  43. type derpProber struct {
  44. p *Prober
  45. derpMapURL string // or "local"
  46. udpInterval time.Duration
  47. meshInterval time.Duration
  48. tlsInterval time.Duration
  49. // Optional bandwidth probing.
  50. bwInterval time.Duration
  51. bwProbeSize int64
  52. bwTUNIPv4Prefix *netip.Prefix // or nil to not use TUN
  53. // Optional queuing delay probing.
  54. qdPacketsPerSecond int // in packets per second
  55. qdPacketTimeout time.Duration
  56. // Optionally restrict probes to a single regionCodeOrID.
  57. regionCodeOrID string
  58. // Probe class for fetching & updating the DERP map.
  59. ProbeMap ProbeClass
  60. // Probe classes for probing individual derpers.
  61. tlsProbeFn func(string) ProbeClass
  62. udpProbeFn func(string, int) ProbeClass
  63. meshProbeFn func(string, string) ProbeClass
  64. bwProbeFn func(string, string, int64) ProbeClass
  65. qdProbeFn func(string, string, int, time.Duration) ProbeClass
  66. sync.Mutex
  67. lastDERPMap *tailcfg.DERPMap
  68. lastDERPMapAt time.Time
  69. nodes map[string]*tailcfg.DERPNode
  70. probes map[string]*Probe
  71. }
  72. type DERPOpt func(*derpProber)
  73. // WithBandwidthProbing enables bandwidth probing. When enabled, a payload of
  74. // `size` bytes will be regularly transferred through each DERP server, and each
  75. // pair of DERP servers in every region. If tunAddress is specified, probes will
  76. // use a TCP connection over a TUN device at this address in order to exercise
  77. // TCP-in-TCP in similar fashion to TCP over Tailscale via DERP.
  78. func WithBandwidthProbing(interval time.Duration, size int64, tunAddress string) DERPOpt {
  79. return func(d *derpProber) {
  80. d.bwInterval = interval
  81. d.bwProbeSize = size
  82. if tunAddress != "" {
  83. prefix, err := netip.ParsePrefix(fmt.Sprintf("%s/30", tunAddress))
  84. if err != nil {
  85. log.Fatalf("failed to parse IP prefix from bw-tun-ipv4-addr: %v", err)
  86. }
  87. d.bwTUNIPv4Prefix = &prefix
  88. }
  89. }
  90. }
  91. // WithQueuingDelayProbing enables/disables queuing delay probing. qdSendRate
  92. // is the number of packets sent per second. qdTimeout is the amount of time
  93. // after which a sent packet is considered to have timed out.
  94. func WithQueuingDelayProbing(qdPacketsPerSecond int, qdPacketTimeout time.Duration) DERPOpt {
  95. return func(d *derpProber) {
  96. d.qdPacketsPerSecond = qdPacketsPerSecond
  97. d.qdPacketTimeout = qdPacketTimeout
  98. }
  99. }
  100. // WithMeshProbing enables mesh probing. When enabled, a small message will be
  101. // transferred through each DERP server and each pair of DERP servers.
  102. func WithMeshProbing(interval time.Duration) DERPOpt {
  103. return func(d *derpProber) {
  104. d.meshInterval = interval
  105. }
  106. }
  107. // WithSTUNProbing enables STUN/UDP probing, with a STUN request being sent
  108. // to each DERP server every `interval`.
  109. func WithSTUNProbing(interval time.Duration) DERPOpt {
  110. return func(d *derpProber) {
  111. d.udpInterval = interval
  112. }
  113. }
  114. // WithTLSProbing enables TLS probing that will check TLS certificate on port
  115. // 443 of each DERP server every `interval`.
  116. func WithTLSProbing(interval time.Duration) DERPOpt {
  117. return func(d *derpProber) {
  118. d.tlsInterval = interval
  119. }
  120. }
  121. // WithRegionCodeOrID restricts probing to the specified region identified by its code
  122. // (e.g. "lax") or its id (e.g. "17"). This is case sensitive.
  123. func WithRegionCodeOrID(regionCode string) DERPOpt {
  124. return func(d *derpProber) {
  125. d.regionCodeOrID = regionCode
  126. }
  127. }
  128. // DERP creates a new derpProber.
  129. //
  130. // If derpMapURL is "local", the DERPMap is fetched via
  131. // the local machine's tailscaled.
  132. func DERP(p *Prober, derpMapURL string, opts ...DERPOpt) (*derpProber, error) {
  133. d := &derpProber{
  134. p: p,
  135. derpMapURL: derpMapURL,
  136. tlsProbeFn: TLS,
  137. nodes: make(map[string]*tailcfg.DERPNode),
  138. probes: make(map[string]*Probe),
  139. }
  140. d.ProbeMap = ProbeClass{
  141. Probe: d.probeMapFn,
  142. Class: "derp_map",
  143. }
  144. for _, o := range opts {
  145. o(d)
  146. }
  147. d.udpProbeFn = d.ProbeUDP
  148. d.meshProbeFn = d.probeMesh
  149. d.bwProbeFn = d.probeBandwidth
  150. d.qdProbeFn = d.probeQueuingDelay
  151. return d, nil
  152. }
  153. // probeMapFn fetches the DERPMap and creates/destroys probes for each
  154. // DERP server as necessary. It should get regularly executed as a
  155. // probe function itself.
  156. func (d *derpProber) probeMapFn(ctx context.Context) error {
  157. if err := d.updateMap(ctx); err != nil {
  158. return err
  159. }
  160. wantProbes := map[string]bool{}
  161. d.Lock()
  162. defer d.Unlock()
  163. for _, region := range d.lastDERPMap.Regions {
  164. if d.skipRegion(region) {
  165. continue
  166. }
  167. for _, server := range region.Nodes {
  168. labels := Labels{
  169. "region": region.RegionCode,
  170. "region_id": strconv.Itoa(region.RegionID),
  171. "hostname": server.HostName,
  172. }
  173. if d.tlsInterval > 0 {
  174. n := fmt.Sprintf("derp/%s/%s/tls", region.RegionCode, server.Name)
  175. wantProbes[n] = true
  176. if d.probes[n] == nil {
  177. log.Printf("adding DERP TLS probe for %s (%s) every %v", server.Name, region.RegionName, d.tlsInterval)
  178. derpPort := cmp.Or(server.DERPPort, 443)
  179. d.probes[n] = d.p.Run(n, d.tlsInterval, labels, d.tlsProbeFn(fmt.Sprintf("%s:%d", server.HostName, derpPort)))
  180. }
  181. }
  182. if d.udpInterval > 0 {
  183. for idx, ipStr := range []string{server.IPv6, server.IPv4} {
  184. n := fmt.Sprintf("derp/%s/%s/udp", region.RegionCode, server.Name)
  185. if idx == 0 {
  186. n += "6"
  187. }
  188. if ipStr == "" || server.STUNPort == -1 {
  189. continue
  190. }
  191. wantProbes[n] = true
  192. if d.probes[n] == nil {
  193. log.Printf("adding DERP UDP probe for %s (%s) every %v", server.Name, n, d.udpInterval)
  194. d.probes[n] = d.p.Run(n, d.udpInterval, labels, d.udpProbeFn(ipStr, server.STUNPort))
  195. }
  196. }
  197. }
  198. for _, to := range region.Nodes {
  199. if d.meshInterval > 0 {
  200. n := fmt.Sprintf("derp/%s/%s/%s/mesh", region.RegionCode, server.Name, to.Name)
  201. wantProbes[n] = true
  202. if d.probes[n] == nil {
  203. log.Printf("adding DERP mesh probe for %s->%s (%s) every %v", server.Name, to.Name, region.RegionName, d.meshInterval)
  204. d.probes[n] = d.p.Run(n, d.meshInterval, labels, d.meshProbeFn(server.Name, to.Name))
  205. }
  206. }
  207. if d.bwInterval != 0 && d.bwProbeSize > 0 {
  208. n := fmt.Sprintf("derp/%s/%s/%s/bw", region.RegionCode, server.Name, to.Name)
  209. wantProbes[n] = true
  210. if d.probes[n] == nil {
  211. tunString := ""
  212. if d.bwTUNIPv4Prefix != nil {
  213. tunString = " (TUN)"
  214. }
  215. log.Printf("adding%s DERP bandwidth probe for %s->%s (%s) %v bytes every %v", tunString, server.Name, to.Name, region.RegionName, d.bwProbeSize, d.bwInterval)
  216. d.probes[n] = d.p.Run(n, d.bwInterval, labels, d.bwProbeFn(server.Name, to.Name, d.bwProbeSize))
  217. }
  218. }
  219. if d.qdPacketsPerSecond > 0 {
  220. n := fmt.Sprintf("derp/%s/%s/%s/qd", region.RegionCode, server.Name, to.Name)
  221. wantProbes[n] = true
  222. if d.probes[n] == nil {
  223. log.Printf("adding DERP queuing delay probe for %s->%s (%s)", server.Name, to.Name, region.RegionName)
  224. d.probes[n] = d.p.Run(n, -10*time.Second, labels, d.qdProbeFn(server.Name, to.Name, d.qdPacketsPerSecond, d.qdPacketTimeout))
  225. }
  226. }
  227. }
  228. }
  229. }
  230. for n, probe := range d.probes {
  231. if !wantProbes[n] {
  232. log.Printf("removing DERP probe %s", n)
  233. probe.Close()
  234. delete(d.probes, n)
  235. }
  236. }
  237. return nil
  238. }
  239. // probeMesh returns a probe class that sends a test packet through a pair of DERP
  240. // servers (or just one server, if 'from' and 'to' are the same). 'from' and 'to'
  241. // are expected to be names (DERPNode.Name) of two DERP servers in the same region.
  242. func (d *derpProber) probeMesh(from, to string) ProbeClass {
  243. derpPath := "mesh"
  244. if from == to {
  245. derpPath = "single"
  246. }
  247. return ProbeClass{
  248. Probe: func(ctx context.Context) error {
  249. fromN, toN, err := d.getNodePair(from, to)
  250. if err != nil {
  251. return err
  252. }
  253. dm := d.lastDERPMap
  254. return derpProbeNodePair(ctx, dm, fromN, toN)
  255. },
  256. Class: "derp_mesh",
  257. Labels: Labels{"derp_path": derpPath},
  258. }
  259. }
  260. // probeBandwidth returns a probe class that sends a payload of a given size
  261. // through a pair of DERP servers (or just one server, if 'from' and 'to' are
  262. // the same). 'from' and 'to' are expected to be names (DERPNode.Name) of two
  263. // DERP servers in the same region.
  264. func (d *derpProber) probeBandwidth(from, to string, size int64) ProbeClass {
  265. derpPath := "mesh"
  266. if from == to {
  267. derpPath = "single"
  268. }
  269. var transferTimeSeconds expvar.Float
  270. var totalBytesTransferred expvar.Float
  271. return ProbeClass{
  272. Probe: func(ctx context.Context) error {
  273. fromN, toN, err := d.getNodePair(from, to)
  274. if err != nil {
  275. return err
  276. }
  277. return derpProbeBandwidth(ctx, d.lastDERPMap, fromN, toN, size, &transferTimeSeconds, &totalBytesTransferred, d.bwTUNIPv4Prefix)
  278. },
  279. Class: "derp_bw",
  280. Labels: Labels{
  281. "derp_path": derpPath,
  282. "tcp_in_tcp": strconv.FormatBool(d.bwTUNIPv4Prefix != nil),
  283. },
  284. Metrics: func(l prometheus.Labels) []prometheus.Metric {
  285. metrics := []prometheus.Metric{
  286. prometheus.MustNewConstMetric(prometheus.NewDesc("derp_bw_probe_size_bytes", "Payload size of the bandwidth prober", nil, l), prometheus.GaugeValue, float64(size)),
  287. prometheus.MustNewConstMetric(prometheus.NewDesc("derp_bw_transfer_time_seconds_total", "Time it took to transfer data", nil, l), prometheus.CounterValue, transferTimeSeconds.Value()),
  288. }
  289. if d.bwTUNIPv4Prefix != nil {
  290. // For TCP-in-TCP probes, also record cumulative bytes transferred.
  291. metrics = append(metrics, prometheus.MustNewConstMetric(prometheus.NewDesc("derp_bw_bytes_total", "Amount of data transferred", nil, l), prometheus.CounterValue, totalBytesTransferred.Value()))
  292. }
  293. return metrics
  294. },
  295. }
  296. }
  297. // probeQueuingDelay returns a probe class that continuously sends packets
  298. // through a pair of DERP servers (or just one server, if 'from' and 'to' are
  299. // the same) at a rate of `packetsPerSecond` packets per second in order to
  300. // measure queuing delays. Packets arriving after `packetTimeout` don't contribute
  301. // to the queuing delay measurement and are recorded as dropped. 'from' and 'to' are
  302. // expected to be names (DERPNode.Name) of two DERP servers in the same region,
  303. // and may refer to the same server.
  304. func (d *derpProber) probeQueuingDelay(from, to string, packetsPerSecond int, packetTimeout time.Duration) ProbeClass {
  305. derpPath := "mesh"
  306. if from == to {
  307. derpPath = "single"
  308. }
  309. var packetsDropped expvar.Float
  310. qdh := newHistogram([]float64{.005, .01, .025, .05, .1, .25, .5, 1})
  311. return ProbeClass{
  312. Probe: func(ctx context.Context) error {
  313. fromN, toN, err := d.getNodePair(from, to)
  314. if err != nil {
  315. return err
  316. }
  317. return derpProbeQueuingDelay(ctx, d.lastDERPMap, fromN, toN, packetsPerSecond, packetTimeout, &packetsDropped, qdh)
  318. },
  319. Class: "derp_qd",
  320. Labels: Labels{"derp_path": derpPath},
  321. Metrics: func(l prometheus.Labels) []prometheus.Metric {
  322. qdh.mx.Lock()
  323. result := []prometheus.Metric{
  324. prometheus.MustNewConstMetric(prometheus.NewDesc("derp_qd_probe_dropped_packets", "Total packets dropped", nil, l), prometheus.CounterValue, float64(packetsDropped.Value())),
  325. prometheus.MustNewConstHistogram(prometheus.NewDesc("derp_qd_probe_delays_seconds", "Distribution of queuing delays", nil, l), qdh.count, qdh.sum, maps.Clone(qdh.bucketedCounts)),
  326. }
  327. qdh.mx.Unlock()
  328. return result
  329. },
  330. }
  331. }
  332. // derpProbeQueuingDelay continuously sends data between two local DERP clients
  333. // connected to two DERP servers in order to measure queuing delays. From and to
  334. // can be the same server.
  335. func derpProbeQueuingDelay(ctx context.Context, dm *tailcfg.DERPMap, from, to *tailcfg.DERPNode, packetsPerSecond int, packetTimeout time.Duration, packetsDropped *expvar.Float, qdh *histogram) (err error) {
  336. // This probe uses clients with isProber=false to avoid spamming the derper
  337. // logs with every packet sent by the queuing delay probe.
  338. fromc, err := newConn(ctx, dm, from, false)
  339. if err != nil {
  340. return err
  341. }
  342. defer fromc.Close()
  343. toc, err := newConn(ctx, dm, to, false)
  344. if err != nil {
  345. return err
  346. }
  347. defer toc.Close()
  348. // Wait a bit for from's node to hear about to existing on the
  349. // other node in the region, in the case where the two nodes
  350. // are different.
  351. if from.Name != to.Name {
  352. time.Sleep(100 * time.Millisecond) // pretty arbitrary
  353. }
  354. if err := runDerpProbeQueuingDelayContinously(ctx, from, to, fromc, toc, packetsPerSecond, packetTimeout, packetsDropped, qdh); err != nil {
  355. // Record pubkeys on failed probes to aid investigation.
  356. return fmt.Errorf("%s -> %s: %w",
  357. fromc.SelfPublicKey().ShortString(),
  358. toc.SelfPublicKey().ShortString(), err)
  359. }
  360. return nil
  361. }
  362. func runDerpProbeQueuingDelayContinously(ctx context.Context, from, to *tailcfg.DERPNode, fromc, toc *derphttp.Client, packetsPerSecond int, packetTimeout time.Duration, packetsDropped *expvar.Float, qdh *histogram) error {
  363. // Make sure all goroutines have finished.
  364. var wg sync.WaitGroup
  365. defer wg.Wait()
  366. // Close the clients to make sure goroutines that are reading/writing from them terminate.
  367. defer fromc.Close()
  368. defer toc.Close()
  369. type txRecord struct {
  370. at time.Time
  371. seq uint64
  372. }
  373. // txRecords is sized to hold enough transmission records to keep timings
  374. // for packets up to their timeout. As records age out of the front of this
  375. // list, if the associated packet arrives, we won't have a txRecord for it
  376. // and will consider it to have timed out.
  377. txRecords := make([]txRecord, 0, packetsPerSecond*int(packetTimeout.Seconds()))
  378. var txRecordsMu sync.Mutex
  379. // Send the packets.
  380. sendErrC := make(chan error, 1)
  381. // TODO: construct a disco CallMeMaybe in the same fashion as magicsock, e.g. magic bytes, src pub, seal payload.
  382. // DERP server handling of disco may vary from non-disco, and we may want to measure queue delay of both.
  383. pkt := make([]byte, 260) // the same size as a CallMeMaybe packet observed on a Tailscale client.
  384. crand.Read(pkt)
  385. wg.Add(1)
  386. go func() {
  387. defer wg.Done()
  388. t := time.NewTicker(time.Second / time.Duration(packetsPerSecond))
  389. defer t.Stop()
  390. toDERPPubKey := toc.SelfPublicKey()
  391. seq := uint64(0)
  392. for {
  393. select {
  394. case <-ctx.Done():
  395. return
  396. case <-t.C:
  397. txRecordsMu.Lock()
  398. if len(txRecords) == cap(txRecords) {
  399. txRecords = slices.Delete(txRecords, 0, 1)
  400. packetsDropped.Add(1)
  401. }
  402. txRecords = append(txRecords, txRecord{time.Now(), seq})
  403. txRecordsMu.Unlock()
  404. binary.BigEndian.PutUint64(pkt, seq)
  405. seq++
  406. if err := fromc.Send(toDERPPubKey, pkt); err != nil {
  407. sendErrC <- fmt.Errorf("sending packet %w", err)
  408. return
  409. }
  410. }
  411. }
  412. }()
  413. // Receive the packets.
  414. recvFinishedC := make(chan error, 1)
  415. wg.Add(1)
  416. go func() {
  417. defer wg.Done()
  418. defer close(recvFinishedC) // to break out of 'select' below.
  419. fromDERPPubKey := fromc.SelfPublicKey()
  420. for {
  421. m, err := toc.Recv()
  422. if err != nil {
  423. recvFinishedC <- err
  424. return
  425. }
  426. switch v := m.(type) {
  427. case derp.ReceivedPacket:
  428. now := time.Now()
  429. if v.Source != fromDERPPubKey {
  430. recvFinishedC <- fmt.Errorf("got data packet from unexpected source, %v", v.Source)
  431. return
  432. }
  433. seq := binary.BigEndian.Uint64(v.Data)
  434. txRecordsMu.Lock()
  435. findTxRecord:
  436. for i, record := range txRecords {
  437. switch {
  438. case record.seq == seq:
  439. rtt := now.Sub(record.at)
  440. qdh.add(rtt.Seconds())
  441. txRecords = slices.Delete(txRecords, i, i+1)
  442. break findTxRecord
  443. case record.seq > seq:
  444. // No sent time found, probably a late arrival already
  445. // recorded as drop by sender when deleted.
  446. break findTxRecord
  447. case record.seq < seq:
  448. continue
  449. }
  450. }
  451. txRecordsMu.Unlock()
  452. case derp.KeepAliveMessage:
  453. // Silently ignore.
  454. default:
  455. log.Printf("%v: ignoring Recv frame type %T", to.Name, v)
  456. // Loop.
  457. }
  458. }
  459. }()
  460. select {
  461. case <-ctx.Done():
  462. return fmt.Errorf("timeout: %w", ctx.Err())
  463. case err := <-sendErrC:
  464. return fmt.Errorf("error sending via %q: %w", from.Name, err)
  465. case err := <-recvFinishedC:
  466. if err != nil {
  467. return fmt.Errorf("error receiving from %q: %w", to.Name, err)
  468. }
  469. }
  470. return nil
  471. }
  472. // getNodePair returns DERPNode objects for two DERP servers based on their
  473. // short names.
  474. func (d *derpProber) getNodePair(n1, n2 string) (ret1, ret2 *tailcfg.DERPNode, _ error) {
  475. d.Lock()
  476. defer d.Unlock()
  477. ret1, ok := d.nodes[n1]
  478. if !ok {
  479. return nil, nil, fmt.Errorf("could not find derp node %s", n1)
  480. }
  481. ret2, ok = d.nodes[n2]
  482. if !ok {
  483. return nil, nil, fmt.Errorf("could not find derp node %s", n2)
  484. }
  485. return ret1, ret2, nil
  486. }
  487. var tsLocalClient tailscale.LocalClient
  488. // updateMap refreshes the locally-cached DERP map.
  489. func (d *derpProber) updateMap(ctx context.Context) error {
  490. var dm *tailcfg.DERPMap
  491. if d.derpMapURL == "local" {
  492. var err error
  493. dm, err = tsLocalClient.CurrentDERPMap(ctx)
  494. if err != nil {
  495. return err
  496. }
  497. } else {
  498. req, err := http.NewRequestWithContext(ctx, "GET", d.derpMapURL, nil)
  499. if err != nil {
  500. return err
  501. }
  502. res, err := httpOrFileClient.Do(req)
  503. if err != nil {
  504. d.Lock()
  505. defer d.Unlock()
  506. if d.lastDERPMap != nil && time.Since(d.lastDERPMapAt) < 10*time.Minute {
  507. log.Printf("Error while fetching DERP map, using cached one: %s", err)
  508. // Assume that control is restarting and use
  509. // the same one for a bit.
  510. return nil
  511. }
  512. return err
  513. }
  514. defer res.Body.Close()
  515. if res.StatusCode != 200 {
  516. return fmt.Errorf("fetching %s: %s", d.derpMapURL, res.Status)
  517. }
  518. dm = new(tailcfg.DERPMap)
  519. if err := json.NewDecoder(res.Body).Decode(dm); err != nil {
  520. return fmt.Errorf("decoding %s JSON: %v", d.derpMapURL, err)
  521. }
  522. }
  523. d.Lock()
  524. defer d.Unlock()
  525. d.lastDERPMap = dm
  526. d.lastDERPMapAt = time.Now()
  527. d.nodes = make(map[string]*tailcfg.DERPNode)
  528. for _, reg := range d.lastDERPMap.Regions {
  529. if d.skipRegion(reg) {
  530. continue
  531. }
  532. for _, n := range reg.Nodes {
  533. if existing, ok := d.nodes[n.Name]; ok {
  534. return fmt.Errorf("derpmap has duplicate nodes: %+v and %+v", existing, n)
  535. }
  536. // Allow the prober to monitor nodes marked as
  537. // STUN only in the default map
  538. n.STUNOnly = false
  539. d.nodes[n.Name] = n
  540. }
  541. }
  542. return nil
  543. }
  544. func (d *derpProber) ProbeUDP(ipaddr string, port int) ProbeClass {
  545. return ProbeClass{
  546. Probe: func(ctx context.Context) error {
  547. return derpProbeUDP(ctx, ipaddr, port)
  548. },
  549. Class: "derp_udp",
  550. }
  551. }
  552. func (d *derpProber) skipRegion(region *tailcfg.DERPRegion) bool {
  553. return d.regionCodeOrID != "" && region.RegionCode != d.regionCodeOrID && strconv.Itoa(region.RegionID) != d.regionCodeOrID
  554. }
  555. func derpProbeUDP(ctx context.Context, ipStr string, port int) error {
  556. pc, err := net.ListenPacket("udp", ":0")
  557. if err != nil {
  558. return err
  559. }
  560. defer pc.Close()
  561. uc := pc.(*net.UDPConn)
  562. tx := stun.NewTxID()
  563. req := stun.Request(tx)
  564. if port == 0 {
  565. port = 3478
  566. }
  567. for {
  568. ip := net.ParseIP(ipStr)
  569. _, err := uc.WriteToUDP(req, &net.UDPAddr{IP: ip, Port: port})
  570. if err != nil {
  571. return err
  572. }
  573. // Binding requests and responses are fairly small (~40 bytes),
  574. // but in practice a STUN response can be up to the size of the
  575. // path MTU, so we use a jumbo frame size buffer here.
  576. buf := make([]byte, 9000)
  577. uc.SetReadDeadline(time.Now().Add(2 * time.Second))
  578. t0 := time.Now()
  579. n, _, err := uc.ReadFromUDP(buf)
  580. d := time.Since(t0)
  581. if err != nil {
  582. if ctx.Err() != nil {
  583. return fmt.Errorf("timeout reading from %v: %v", ip, err)
  584. }
  585. if d < time.Second {
  586. return fmt.Errorf("error reading from %v: %v", ip, err)
  587. }
  588. time.Sleep(100 * time.Millisecond)
  589. continue
  590. }
  591. txBack, _, err := stun.ParseResponse(buf[:n])
  592. if err != nil {
  593. return fmt.Errorf("parsing STUN response from %v: %v", ip, err)
  594. }
  595. if txBack != tx {
  596. return fmt.Errorf("read wrong tx back from %v", ip)
  597. }
  598. break
  599. }
  600. return nil
  601. }
  602. // derpProbeBandwidth sends a payload of a given size between two local
  603. // DERP clients connected to two DERP servers.If tunIPv4Address is specified,
  604. // probes will use a TCP connection over a TUN device at this address in order
  605. // to exercise TCP-in-TCP in similar fashion to TCP over Tailscale via DERP.
  606. func derpProbeBandwidth(ctx context.Context, dm *tailcfg.DERPMap, from, to *tailcfg.DERPNode, size int64, transferTimeSeconds, totalBytesTransferred *expvar.Float, tunIPv4Prefix *netip.Prefix) (err error) {
  607. // This probe uses clients with isProber=false to avoid spamming the derper logs with every packet
  608. // sent by the bandwidth probe.
  609. fromc, err := newConn(ctx, dm, from, false)
  610. if err != nil {
  611. return err
  612. }
  613. defer fromc.Close()
  614. toc, err := newConn(ctx, dm, to, false)
  615. if err != nil {
  616. return err
  617. }
  618. defer toc.Close()
  619. // Wait a bit for from's node to hear about to existing on the
  620. // other node in the region, in the case where the two nodes
  621. // are different.
  622. if from.Name != to.Name {
  623. time.Sleep(100 * time.Millisecond) // pretty arbitrary
  624. }
  625. if tunIPv4Prefix != nil {
  626. err = derpProbeBandwidthTUN(ctx, transferTimeSeconds, totalBytesTransferred, from, to, fromc, toc, size, tunIPv4Prefix)
  627. } else {
  628. err = derpProbeBandwidthDirect(ctx, transferTimeSeconds, from, to, fromc, toc, size)
  629. }
  630. if err != nil {
  631. // Record pubkeys on failed probes to aid investigation.
  632. return fmt.Errorf("%s -> %s: %w",
  633. fromc.SelfPublicKey().ShortString(),
  634. toc.SelfPublicKey().ShortString(), err)
  635. }
  636. return nil
  637. }
  638. // derpProbeNodePair sends a small packet between two local DERP clients
  639. // connected to two DERP servers.
  640. func derpProbeNodePair(ctx context.Context, dm *tailcfg.DERPMap, from, to *tailcfg.DERPNode) (err error) {
  641. fromc, err := newConn(ctx, dm, from, true)
  642. if err != nil {
  643. return err
  644. }
  645. defer fromc.Close()
  646. toc, err := newConn(ctx, dm, to, true)
  647. if err != nil {
  648. return err
  649. }
  650. defer toc.Close()
  651. // Wait a bit for from's node to hear about to existing on the
  652. // other node in the region, in the case where the two nodes
  653. // are different.
  654. if from.Name != to.Name {
  655. time.Sleep(100 * time.Millisecond) // pretty arbitrary
  656. }
  657. const meshProbePacketSize = 8
  658. if err := runDerpProbeNodePair(ctx, from, to, fromc, toc, meshProbePacketSize); err != nil {
  659. // Record pubkeys on failed probes to aid investigation.
  660. return fmt.Errorf("%s -> %s: %w",
  661. fromc.SelfPublicKey().ShortString(),
  662. toc.SelfPublicKey().ShortString(), err)
  663. }
  664. return nil
  665. }
  666. // probePackets stores a pregenerated slice of probe packets keyed by their total size.
  667. var probePackets syncs.Map[int64, [][]byte]
  668. // packetsForSize returns a slice of packet payloads with a given total size.
  669. func packetsForSize(size int64) [][]byte {
  670. // For a small payload, create a unique random packet.
  671. if size <= derp.MaxPacketSize {
  672. pkt := make([]byte, size)
  673. crand.Read(pkt)
  674. return [][]byte{pkt}
  675. }
  676. // For a large payload, create a bunch of packets once and re-use them
  677. // across probes.
  678. pkts, _ := probePackets.LoadOrInit(size, func() [][]byte {
  679. const packetSize = derp.MaxPacketSize
  680. var pkts [][]byte
  681. for remaining := size; remaining > 0; remaining -= packetSize {
  682. pkt := make([]byte, min(remaining, packetSize))
  683. crand.Read(pkt)
  684. pkts = append(pkts, pkt)
  685. }
  686. return pkts
  687. })
  688. return pkts
  689. }
  690. // runDerpProbeNodePair takes two DERP clients (fromc and toc) connected to two
  691. // DERP servers (from and to) and sends a test payload of a given size from one
  692. // to another.
  693. func runDerpProbeNodePair(ctx context.Context, from, to *tailcfg.DERPNode, fromc, toc *derphttp.Client, size int64) error {
  694. // To avoid derper dropping enqueued packets, limit the number of packets in flight.
  695. // The value here is slightly smaller than perClientSendQueueDepth in derp_server.go
  696. inFlight := syncs.NewSemaphore(30)
  697. pkts := packetsForSize(size)
  698. // Send the packets.
  699. sendc := make(chan error, 1)
  700. go func() {
  701. toDERPPubKey := toc.SelfPublicKey()
  702. for idx, pkt := range pkts {
  703. inFlight.AcquireContext(ctx)
  704. if err := fromc.Send(toDERPPubKey, pkt); err != nil {
  705. sendc <- fmt.Errorf("sending packet %d: %w", idx, err)
  706. return
  707. }
  708. }
  709. }()
  710. // Receive the packets.
  711. recvc := make(chan error, 1)
  712. go func() {
  713. defer close(recvc) // to break out of 'select' below.
  714. idx := 0
  715. fromDERPPubKey := fromc.SelfPublicKey()
  716. for {
  717. m, err := toc.Recv()
  718. if err != nil {
  719. recvc <- fmt.Errorf("after %d data packets: %w", idx, err)
  720. return
  721. }
  722. switch v := m.(type) {
  723. case derp.ReceivedPacket:
  724. inFlight.Release()
  725. if v.Source != fromDERPPubKey {
  726. recvc <- fmt.Errorf("got data packet %d from unexpected source, %v", idx, v.Source)
  727. return
  728. }
  729. // This assumes that the packets are received reliably and in order.
  730. // The DERP protocol does not guarantee this, but this probe assumes it.
  731. if got, want := v.Data, pkts[idx]; !bytes.Equal(got, want) {
  732. recvc <- fmt.Errorf("unexpected data packet %d (out of %d)", idx, len(pkts))
  733. return
  734. }
  735. idx += 1
  736. if idx == len(pkts) {
  737. return
  738. }
  739. case derp.KeepAliveMessage:
  740. // Silently ignore.
  741. default:
  742. log.Printf("%v: ignoring Recv frame type %T", to.Name, v)
  743. // Loop.
  744. }
  745. }
  746. }()
  747. select {
  748. case <-ctx.Done():
  749. return fmt.Errorf("timeout: %w", ctx.Err())
  750. case err := <-sendc:
  751. if err != nil {
  752. return fmt.Errorf("error sending via %q: %w", from.Name, err)
  753. }
  754. case err := <-recvc:
  755. if err != nil {
  756. return fmt.Errorf("error receiving from %q: %w", to.Name, err)
  757. }
  758. }
  759. return nil
  760. }
  761. // derpProbeBandwidthDirect takes two DERP clients (fromc and toc) connected to two
  762. // DERP servers (from and to) and sends a test payload of a given size from one
  763. // to another using runDerpProbeNodePair. The time taken to finish the transfer is
  764. // recorded in `transferTimeSeconds`.
  765. func derpProbeBandwidthDirect(ctx context.Context, transferTimeSeconds *expvar.Float, from, to *tailcfg.DERPNode, fromc, toc *derphttp.Client, size int64) error {
  766. start := time.Now()
  767. defer func() { transferTimeSeconds.Add(time.Since(start).Seconds()) }()
  768. return runDerpProbeNodePair(ctx, from, to, fromc, toc, size)
  769. }
  770. // derpProbeBandwidthTUNMu ensures that TUN bandwidth probes don't run concurrently.
  771. // This is necessary to avoid conflicts trying to create the TUN device, and
  772. // it also has the nice benefit of preventing concurrent bandwidth probes from
  773. // influencing each other's results.
  774. //
  775. // This guards derpProbeBandwidthTUN.
  776. var derpProbeBandwidthTUNMu sync.Mutex
  777. // derpProbeBandwidthTUN takes two DERP clients (fromc and toc) connected to two
  778. // DERP servers (from and to) and sends a test payload of a given size from one
  779. // to another over a TUN device at an address at the start of the usable host IP
  780. // range that the given tunAddress lives in. The time taken to finish the transfer
  781. // is recorded in `transferTimeSeconds`.
  782. func derpProbeBandwidthTUN(ctx context.Context, transferTimeSeconds, totalBytesTransferred *expvar.Float, from, to *tailcfg.DERPNode, fromc, toc *derphttp.Client, size int64, prefix *netip.Prefix) error {
  783. // Make sure all goroutines have finished.
  784. var wg sync.WaitGroup
  785. defer wg.Wait()
  786. // Close the clients to make sure goroutines that are reading/writing from them terminate.
  787. defer fromc.Close()
  788. defer toc.Close()
  789. ipRange := netipx.RangeOfPrefix(*prefix)
  790. // Start of the usable host IP range from the address we have been passed in.
  791. ifAddr := ipRange.From().Next()
  792. // Destination address to dial. This is the next address in the range from
  793. // our ifAddr to ensure that the underlying networking stack is actually being
  794. // utilized instead of being optimized away and treated as a loopback. Packets
  795. // sent to this address will be routed over the TUN.
  796. destinationAddr := ifAddr.Next()
  797. derpProbeBandwidthTUNMu.Lock()
  798. defer derpProbeBandwidthTUNMu.Unlock()
  799. // Temporarily set up a TUN device with which to simulate a real client TCP connection
  800. // tunneling over DERP. Use `tstun.DefaultTUNMTU()` (e.g., 1280) as our MTU as this is
  801. // the minimum safe MTU used by Tailscale.
  802. dev, err := tun.CreateTUN(tunName, int(tstun.DefaultTUNMTU()))
  803. if err != nil {
  804. return fmt.Errorf("failed to create TUN device: %w", err)
  805. }
  806. defer func() {
  807. if err := dev.Close(); err != nil {
  808. log.Printf("failed to close TUN device: %s", err)
  809. }
  810. }()
  811. mtu, err := dev.MTU()
  812. if err != nil {
  813. return fmt.Errorf("failed to get TUN MTU: %w", err)
  814. }
  815. name, err := dev.Name()
  816. if err != nil {
  817. return fmt.Errorf("failed to get device name: %w", err)
  818. }
  819. // Perform platform specific configuration of the TUN device.
  820. err = configureTUN(*prefix, name)
  821. if err != nil {
  822. return fmt.Errorf("failed to configure tun: %w", err)
  823. }
  824. // Depending on platform, we need some space for headers at the front
  825. // of TUN I/O op buffers. The below constant is more than enough space
  826. // for any platform that this might run on.
  827. tunStartOffset := device.MessageTransportHeaderSize
  828. // This goroutine reads packets from the TUN device and evaluates if they
  829. // are IPv4 packets destined for loopback via DERP. If so, it performs L3 NAT
  830. // (swap src/dst) and writes them towards DERP in order to loopback via the
  831. // `toc` DERP client. It only reports errors to `tunReadErrC`.
  832. wg.Add(1)
  833. tunReadErrC := make(chan error, 1)
  834. go func() {
  835. defer wg.Done()
  836. numBufs := wgconn.IdealBatchSize
  837. bufs := make([][]byte, 0, numBufs)
  838. sizes := make([]int, numBufs)
  839. for range numBufs {
  840. bufs = append(bufs, make([]byte, mtu+tunStartOffset))
  841. }
  842. destinationAddrBytes := destinationAddr.AsSlice()
  843. scratch := make([]byte, 4)
  844. toDERPPubKey := toc.SelfPublicKey()
  845. for {
  846. n, err := dev.Read(bufs, sizes, tunStartOffset)
  847. if err != nil {
  848. tunReadErrC <- err
  849. return
  850. }
  851. for i := range n {
  852. pkt := bufs[i][tunStartOffset : sizes[i]+tunStartOffset]
  853. // Skip everything except valid IPv4 packets
  854. if len(pkt) < 20 {
  855. // Doesn't even have a full IPv4 header
  856. continue
  857. }
  858. if pkt[0]>>4 != 4 {
  859. // Not IPv4
  860. continue
  861. }
  862. if !bytes.Equal(pkt[16:20], destinationAddrBytes) {
  863. // Unexpected dst address
  864. continue
  865. }
  866. copy(scratch, pkt[12:16])
  867. copy(pkt[12:16], pkt[16:20])
  868. copy(pkt[16:20], scratch)
  869. if err := fromc.Send(toDERPPubKey, pkt); err != nil {
  870. tunReadErrC <- err
  871. return
  872. }
  873. }
  874. }
  875. }()
  876. // This goroutine reads packets from the `toc` DERP client and writes them towards the TUN.
  877. // It only reports errors to `recvErrC` channel.
  878. wg.Add(1)
  879. recvErrC := make(chan error, 1)
  880. go func() {
  881. defer wg.Done()
  882. buf := make([]byte, mtu+tunStartOffset)
  883. bufs := make([][]byte, 1)
  884. fromDERPPubKey := fromc.SelfPublicKey()
  885. for {
  886. m, err := toc.Recv()
  887. if err != nil {
  888. recvErrC <- fmt.Errorf("failed to receive: %w", err)
  889. return
  890. }
  891. switch v := m.(type) {
  892. case derp.ReceivedPacket:
  893. if v.Source != fromDERPPubKey {
  894. recvErrC <- fmt.Errorf("got data packet from unexpected source, %v", v.Source)
  895. return
  896. }
  897. pkt := v.Data
  898. copy(buf[tunStartOffset:], pkt)
  899. bufs[0] = buf[:len(pkt)+tunStartOffset]
  900. if _, err := dev.Write(bufs, tunStartOffset); err != nil {
  901. recvErrC <- fmt.Errorf("failed to write to TUN device: %w", err)
  902. return
  903. }
  904. case derp.KeepAliveMessage:
  905. // Silently ignore.
  906. default:
  907. log.Printf("%v: ignoring Recv frame type %T", to.Name, v)
  908. // Loop.
  909. }
  910. }
  911. }()
  912. // Start a listener to receive the data
  913. l, err := net.Listen("tcp", net.JoinHostPort(ifAddr.String(), "0"))
  914. if err != nil {
  915. return fmt.Errorf("failed to listen: %s", err)
  916. }
  917. defer l.Close()
  918. // 128KB by default
  919. const writeChunkSize = 128 << 10
  920. randData := make([]byte, writeChunkSize)
  921. _, err = crand.Read(randData)
  922. if err != nil {
  923. return fmt.Errorf("failed to initialize random data: %w", err)
  924. }
  925. // Dial ourselves
  926. _, port, err := net.SplitHostPort(l.Addr().String())
  927. if err != nil {
  928. return fmt.Errorf("failed to split address %q: %w", l.Addr().String(), err)
  929. }
  930. connAddr := net.JoinHostPort(destinationAddr.String(), port)
  931. conn, err := net.Dial("tcp", connAddr)
  932. if err != nil {
  933. return fmt.Errorf("failed to dial address %q: %w", connAddr, err)
  934. }
  935. defer conn.Close()
  936. // Timing only includes the actual sending and receiving of data.
  937. start := time.Now()
  938. // This goroutine reads data from the TCP stream being looped back via DERP.
  939. // It reports to `readFinishedC` when `size` bytes have been read, or if an
  940. // error occurs.
  941. wg.Add(1)
  942. readFinishedC := make(chan error, 1)
  943. go func() {
  944. defer wg.Done()
  945. readConn, err := l.Accept()
  946. if err != nil {
  947. readFinishedC <- err
  948. return
  949. }
  950. defer readConn.Close()
  951. deadline, ok := ctx.Deadline()
  952. if ok {
  953. // Don't try reading past our context's deadline.
  954. if err := readConn.SetReadDeadline(deadline); err != nil {
  955. readFinishedC <- fmt.Errorf("unable to set read deadline: %w", err)
  956. return
  957. }
  958. }
  959. n, err := io.CopyN(io.Discard, readConn, size)
  960. // Measure transfer time and bytes transferred irrespective of whether it succeeded or failed.
  961. transferTimeSeconds.Add(time.Since(start).Seconds())
  962. totalBytesTransferred.Add(float64(n))
  963. readFinishedC <- err
  964. }()
  965. // This goroutine sends data to the TCP stream being looped back via DERP.
  966. // It only reports errors to `sendErrC`.
  967. wg.Add(1)
  968. sendErrC := make(chan error, 1)
  969. go func() {
  970. defer wg.Done()
  971. for wrote := 0; wrote < int(size); wrote += len(randData) {
  972. b := randData
  973. if wrote+len(randData) > int(size) {
  974. // This is the last chunk and we don't need the whole thing
  975. b = b[0 : int(size)-wrote]
  976. }
  977. if _, err := conn.Write(b); err != nil {
  978. sendErrC <- fmt.Errorf("failed to write to conn: %w", err)
  979. return
  980. }
  981. }
  982. }()
  983. select {
  984. case <-ctx.Done():
  985. return fmt.Errorf("timeout: %w", ctx.Err())
  986. case err := <-tunReadErrC:
  987. return fmt.Errorf("error reading from TUN via %q: %w", from.Name, err)
  988. case err := <-sendErrC:
  989. return fmt.Errorf("error sending via %q: %w", from.Name, err)
  990. case err := <-recvErrC:
  991. return fmt.Errorf("error receiving from %q: %w", to.Name, err)
  992. case err := <-readFinishedC:
  993. if err != nil {
  994. return fmt.Errorf("error reading from %q to TUN: %w", to.Name, err)
  995. }
  996. }
  997. return nil
  998. }
  999. func newConn(ctx context.Context, dm *tailcfg.DERPMap, n *tailcfg.DERPNode, isProber bool) (*derphttp.Client, error) {
  1000. // To avoid spamming the log with regular connection messages.
  1001. l := logger.Filtered(log.Printf, func(s string) bool {
  1002. return !strings.Contains(s, "derphttp.Client.Connect: connecting to")
  1003. })
  1004. priv := key.NewNode()
  1005. dc := derphttp.NewRegionClient(priv, l, netmon.NewStatic(), func() *tailcfg.DERPRegion {
  1006. rid := n.RegionID
  1007. return &tailcfg.DERPRegion{
  1008. RegionID: rid,
  1009. RegionCode: fmt.Sprintf("%s-%s", dm.Regions[rid].RegionCode, n.Name),
  1010. RegionName: dm.Regions[rid].RegionName,
  1011. Nodes: []*tailcfg.DERPNode{n},
  1012. }
  1013. })
  1014. dc.IsProber = isProber
  1015. err := dc.Connect(ctx)
  1016. if err != nil {
  1017. return nil, err
  1018. }
  1019. // Only verify TLS state if this is a prober.
  1020. if isProber {
  1021. cs, ok := dc.TLSConnectionState()
  1022. if !ok {
  1023. dc.Close()
  1024. return nil, errors.New("no TLS state")
  1025. }
  1026. if len(cs.PeerCertificates) == 0 {
  1027. dc.Close()
  1028. return nil, errors.New("no peer certificates")
  1029. }
  1030. if cs.ServerName != n.HostName {
  1031. dc.Close()
  1032. return nil, fmt.Errorf("TLS server name %q != derp hostname %q", cs.ServerName, n.HostName)
  1033. }
  1034. }
  1035. errc := make(chan error, 1)
  1036. go func() {
  1037. m, err := dc.Recv()
  1038. if err != nil {
  1039. errc <- err
  1040. return
  1041. }
  1042. switch m.(type) {
  1043. case derp.ServerInfoMessage:
  1044. errc <- nil
  1045. default:
  1046. errc <- fmt.Errorf("unexpected first message type %T", errc)
  1047. }
  1048. }()
  1049. select {
  1050. case err := <-errc:
  1051. if err != nil {
  1052. go dc.Close()
  1053. return nil, err
  1054. }
  1055. case <-ctx.Done():
  1056. go dc.Close()
  1057. return nil, fmt.Errorf("timeout waiting for ServerInfoMessage: %w", ctx.Err())
  1058. }
  1059. return dc, nil
  1060. }
  1061. var httpOrFileClient = &http.Client{Transport: httpOrFileTransport()}
  1062. func httpOrFileTransport() http.RoundTripper {
  1063. tr := http.DefaultTransport.(*http.Transport).Clone()
  1064. tr.RegisterProtocol("file", http.NewFileTransport(http.Dir("/")))
  1065. return tr
  1066. }