controlknobs.go 5.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134
  1. // Copyright (c) Tailscale Inc & AUTHORS
  2. // SPDX-License-Identifier: BSD-3-Clause
  3. // Package controlknobs contains client options configurable from control which can be turned on
  4. // or off. The ability to turn options on and off is for incrementally adding features in.
  5. package controlknobs
  6. import (
  7. "slices"
  8. "sync/atomic"
  9. "tailscale.com/syncs"
  10. "tailscale.com/tailcfg"
  11. "tailscale.com/types/opt"
  12. )
  13. // Knobs is the set of knobs that the control plane's coordination server can
  14. // adjust at runtime.
  15. type Knobs struct {
  16. // DisableUPnP indicates whether to attempt UPnP mapping.
  17. DisableUPnP atomic.Bool
  18. // DisableDRPO is whether control says to disable the
  19. // DERP route optimization (Issue 150).
  20. DisableDRPO atomic.Bool
  21. // KeepFullWGConfig is whether we should disable the lazy wireguard
  22. // programming and instead give WireGuard the full netmap always, even for
  23. // idle peers.
  24. KeepFullWGConfig atomic.Bool
  25. // RandomizeClientPort is whether control says we should randomize
  26. // the client port.
  27. RandomizeClientPort atomic.Bool
  28. // OneCGNAT is whether the the node should make one big CGNAT route
  29. // in the OS rather than one /32 per peer.
  30. OneCGNAT syncs.AtomicValue[opt.Bool]
  31. // ForceBackgroundSTUN forces netcheck STUN queries to keep
  32. // running in magicsock, even when idle.
  33. ForceBackgroundSTUN atomic.Bool
  34. // DisableDeltaUpdates is whether the node should not process
  35. // incremental (delta) netmap updates and should treat all netmap
  36. // changes as "full" ones as tailscaled did in 1.48.x and earlier.
  37. DisableDeltaUpdates atomic.Bool
  38. // PeerMTUEnable is whether the node should do peer path MTU discovery.
  39. PeerMTUEnable atomic.Bool
  40. // DisableDNSForwarderTCPRetries is whether the DNS forwarder should
  41. // skip retrying truncated queries over TCP.
  42. DisableDNSForwarderTCPRetries atomic.Bool
  43. // SilentDisco is whether the node should suppress disco heartbeats to its
  44. // peers.
  45. SilentDisco atomic.Bool
  46. // LinuxForceIPTables is whether the node should use iptables for Linux
  47. // netfiltering, unless overridden by the user.
  48. LinuxForceIPTables atomic.Bool
  49. // LinuxForceNfTables is whether the node should use nftables for Linux
  50. // netfiltering, unless overridden by the user.
  51. LinuxForceNfTables atomic.Bool
  52. }
  53. // UpdateFromNodeAttributes updates k (if non-nil) based on the provided self
  54. // node attributes (Node.Capabilities).
  55. func (k *Knobs) UpdateFromNodeAttributes(selfNodeAttrs []tailcfg.NodeCapability, capMap tailcfg.NodeCapMap) {
  56. if k == nil {
  57. return
  58. }
  59. has := func(attr tailcfg.NodeCapability) bool {
  60. _, ok := capMap[attr]
  61. return ok || slices.Contains(selfNodeAttrs, attr)
  62. }
  63. var (
  64. keepFullWG = has(tailcfg.NodeAttrDebugDisableWGTrim)
  65. disableDRPO = has(tailcfg.NodeAttrDebugDisableDRPO)
  66. disableUPnP = has(tailcfg.NodeAttrDisableUPnP)
  67. randomizeClientPort = has(tailcfg.NodeAttrRandomizeClientPort)
  68. disableDeltaUpdates = has(tailcfg.NodeAttrDisableDeltaUpdates)
  69. oneCGNAT opt.Bool
  70. forceBackgroundSTUN = has(tailcfg.NodeAttrDebugForceBackgroundSTUN)
  71. peerMTUEnable = has(tailcfg.NodeAttrPeerMTUEnable)
  72. dnsForwarderDisableTCPRetries = has(tailcfg.NodeAttrDNSForwarderDisableTCPRetries)
  73. silentDisco = has(tailcfg.NodeAttrSilentDisco)
  74. forceIPTables = has(tailcfg.NodeAttrLinuxMustUseIPTables)
  75. forceNfTables = has(tailcfg.NodeAttrLinuxMustUseNfTables)
  76. )
  77. if has(tailcfg.NodeAttrOneCGNATEnable) {
  78. oneCGNAT.Set(true)
  79. } else if has(tailcfg.NodeAttrOneCGNATDisable) {
  80. oneCGNAT.Set(false)
  81. }
  82. k.KeepFullWGConfig.Store(keepFullWG)
  83. k.DisableDRPO.Store(disableDRPO)
  84. k.DisableUPnP.Store(disableUPnP)
  85. k.RandomizeClientPort.Store(randomizeClientPort)
  86. k.OneCGNAT.Store(oneCGNAT)
  87. k.ForceBackgroundSTUN.Store(forceBackgroundSTUN)
  88. k.DisableDeltaUpdates.Store(disableDeltaUpdates)
  89. k.PeerMTUEnable.Store(peerMTUEnable)
  90. k.DisableDNSForwarderTCPRetries.Store(dnsForwarderDisableTCPRetries)
  91. k.SilentDisco.Store(silentDisco)
  92. k.LinuxForceIPTables.Store(forceIPTables)
  93. k.LinuxForceNfTables.Store(forceNfTables)
  94. }
  95. // AsDebugJSON returns k as something that can be marshalled with json.Marshal
  96. // for debug.
  97. func (k *Knobs) AsDebugJSON() map[string]any {
  98. if k == nil {
  99. return nil
  100. }
  101. return map[string]any{
  102. "DisableUPnP": k.DisableUPnP.Load(),
  103. "DisableDRPO": k.DisableDRPO.Load(),
  104. "KeepFullWGConfig": k.KeepFullWGConfig.Load(),
  105. "RandomizeClientPort": k.RandomizeClientPort.Load(),
  106. "OneCGNAT": k.OneCGNAT.Load(),
  107. "ForceBackgroundSTUN": k.ForceBackgroundSTUN.Load(),
  108. "DisableDeltaUpdates": k.DisableDeltaUpdates.Load(),
  109. "PeerMTUEnable": k.PeerMTUEnable.Load(),
  110. "DisableDNSForwarderTCPRetries": k.DisableDNSForwarderTCPRetries.Load(),
  111. "SilentDisco": k.SilentDisco.Load(),
  112. "LinuxForceIPTables": k.LinuxForceIPTables.Load(),
  113. "LinuxForceNfTables": k.LinuxForceNfTables.Load(),
  114. }
  115. }