controlknobs.go 5.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142
  1. // Copyright (c) Tailscale Inc & AUTHORS
  2. // SPDX-License-Identifier: BSD-3-Clause
  3. // Package controlknobs contains client options configurable from control which can be turned on
  4. // or off. The ability to turn options on and off is for incrementally adding features in.
  5. package controlknobs
  6. import (
  7. "slices"
  8. "sync/atomic"
  9. "tailscale.com/syncs"
  10. "tailscale.com/tailcfg"
  11. "tailscale.com/types/opt"
  12. )
  13. // Knobs is the set of knobs that the control plane's coordination server can
  14. // adjust at runtime.
  15. type Knobs struct {
  16. // DisableUPnP indicates whether to attempt UPnP mapping.
  17. DisableUPnP atomic.Bool
  18. // DisableDRPO is whether control says to disable the
  19. // DERP route optimization (Issue 150).
  20. DisableDRPO atomic.Bool
  21. // KeepFullWGConfig is whether we should disable the lazy wireguard
  22. // programming and instead give WireGuard the full netmap always, even for
  23. // idle peers.
  24. KeepFullWGConfig atomic.Bool
  25. // RandomizeClientPort is whether control says we should randomize
  26. // the client port.
  27. RandomizeClientPort atomic.Bool
  28. // OneCGNAT is whether the the node should make one big CGNAT route
  29. // in the OS rather than one /32 per peer.
  30. OneCGNAT syncs.AtomicValue[opt.Bool]
  31. // ForceBackgroundSTUN forces netcheck STUN queries to keep
  32. // running in magicsock, even when idle.
  33. ForceBackgroundSTUN atomic.Bool
  34. // DisableDeltaUpdates is whether the node should not process
  35. // incremental (delta) netmap updates and should treat all netmap
  36. // changes as "full" ones as tailscaled did in 1.48.x and earlier.
  37. DisableDeltaUpdates atomic.Bool
  38. // PeerMTUEnable is whether the node should do peer path MTU discovery.
  39. PeerMTUEnable atomic.Bool
  40. // DisableDNSForwarderTCPRetries is whether the DNS forwarder should
  41. // skip retrying truncated queries over TCP.
  42. DisableDNSForwarderTCPRetries atomic.Bool
  43. // SilentDisco is whether the node should suppress disco heartbeats to its
  44. // peers.
  45. SilentDisco atomic.Bool
  46. // LinuxForceIPTables is whether the node should use iptables for Linux
  47. // netfiltering, unless overridden by the user.
  48. LinuxForceIPTables atomic.Bool
  49. // LinuxForceNfTables is whether the node should use nftables for Linux
  50. // netfiltering, unless overridden by the user.
  51. LinuxForceNfTables atomic.Bool
  52. // SeamlessKeyRenewal is whether to enable the alpha functionality of
  53. // renewing node keys without breaking connections.
  54. // http://go/seamless-key-renewal
  55. SeamlessKeyRenewal atomic.Bool
  56. }
  57. // UpdateFromNodeAttributes updates k (if non-nil) based on the provided self
  58. // node attributes (Node.Capabilities).
  59. func (k *Knobs) UpdateFromNodeAttributes(selfNodeAttrs []tailcfg.NodeCapability, capMap tailcfg.NodeCapMap) {
  60. if k == nil {
  61. return
  62. }
  63. has := func(attr tailcfg.NodeCapability) bool {
  64. _, ok := capMap[attr]
  65. return ok || slices.Contains(selfNodeAttrs, attr)
  66. }
  67. var (
  68. keepFullWG = has(tailcfg.NodeAttrDebugDisableWGTrim)
  69. disableDRPO = has(tailcfg.NodeAttrDebugDisableDRPO)
  70. disableUPnP = has(tailcfg.NodeAttrDisableUPnP)
  71. randomizeClientPort = has(tailcfg.NodeAttrRandomizeClientPort)
  72. disableDeltaUpdates = has(tailcfg.NodeAttrDisableDeltaUpdates)
  73. oneCGNAT opt.Bool
  74. forceBackgroundSTUN = has(tailcfg.NodeAttrDebugForceBackgroundSTUN)
  75. peerMTUEnable = has(tailcfg.NodeAttrPeerMTUEnable)
  76. dnsForwarderDisableTCPRetries = has(tailcfg.NodeAttrDNSForwarderDisableTCPRetries)
  77. silentDisco = has(tailcfg.NodeAttrSilentDisco)
  78. forceIPTables = has(tailcfg.NodeAttrLinuxMustUseIPTables)
  79. forceNfTables = has(tailcfg.NodeAttrLinuxMustUseNfTables)
  80. seamlessKeyRenewal = has(tailcfg.NodeAttrSeamlessKeyRenewal)
  81. )
  82. if has(tailcfg.NodeAttrOneCGNATEnable) {
  83. oneCGNAT.Set(true)
  84. } else if has(tailcfg.NodeAttrOneCGNATDisable) {
  85. oneCGNAT.Set(false)
  86. }
  87. k.KeepFullWGConfig.Store(keepFullWG)
  88. k.DisableDRPO.Store(disableDRPO)
  89. k.DisableUPnP.Store(disableUPnP)
  90. k.RandomizeClientPort.Store(randomizeClientPort)
  91. k.OneCGNAT.Store(oneCGNAT)
  92. k.ForceBackgroundSTUN.Store(forceBackgroundSTUN)
  93. k.DisableDeltaUpdates.Store(disableDeltaUpdates)
  94. k.PeerMTUEnable.Store(peerMTUEnable)
  95. k.DisableDNSForwarderTCPRetries.Store(dnsForwarderDisableTCPRetries)
  96. k.SilentDisco.Store(silentDisco)
  97. k.LinuxForceIPTables.Store(forceIPTables)
  98. k.LinuxForceNfTables.Store(forceNfTables)
  99. k.SeamlessKeyRenewal.Store(seamlessKeyRenewal)
  100. }
  101. // AsDebugJSON returns k as something that can be marshalled with json.Marshal
  102. // for debug.
  103. func (k *Knobs) AsDebugJSON() map[string]any {
  104. if k == nil {
  105. return nil
  106. }
  107. return map[string]any{
  108. "DisableUPnP": k.DisableUPnP.Load(),
  109. "DisableDRPO": k.DisableDRPO.Load(),
  110. "KeepFullWGConfig": k.KeepFullWGConfig.Load(),
  111. "RandomizeClientPort": k.RandomizeClientPort.Load(),
  112. "OneCGNAT": k.OneCGNAT.Load(),
  113. "ForceBackgroundSTUN": k.ForceBackgroundSTUN.Load(),
  114. "DisableDeltaUpdates": k.DisableDeltaUpdates.Load(),
  115. "PeerMTUEnable": k.PeerMTUEnable.Load(),
  116. "DisableDNSForwarderTCPRetries": k.DisableDNSForwarderTCPRetries.Load(),
  117. "SilentDisco": k.SilentDisco.Load(),
  118. "LinuxForceIPTables": k.LinuxForceIPTables.Load(),
  119. "LinuxForceNfTables": k.LinuxForceNfTables.Load(),
  120. "SeamlessKeyRenewal": k.SeamlessKeyRenewal.Load(),
  121. }
  122. }