| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124 |
- // Copyright (c) Tailscale Inc & AUTHORS
- // SPDX-License-Identifier: BSD-3-Clause
- // Package paths returns platform and user-specific default paths to
- // Tailscale files and directories.
- package paths
- import (
- "log"
- "os"
- "path/filepath"
- "runtime"
- "tailscale.com/syncs"
- "tailscale.com/version/distro"
- )
- // AppSharedDir is a string set by the iOS or Android app on start
- // containing a directory we can read/write in.
- var AppSharedDir syncs.AtomicValue[string]
- // DefaultTailscaledSocket returns the path to the tailscaled Unix socket
- // or the empty string if there's no reasonable default.
- func DefaultTailscaledSocket() string {
- if runtime.GOOS == "windows" {
- return `\\.\pipe\ProtectedPrefix\Administrators\Tailscale\tailscaled`
- }
- if runtime.GOOS == "darwin" {
- return "/var/run/tailscaled.socket"
- }
- if runtime.GOOS == "plan9" {
- return "/srv/tailscaled.sock"
- }
- switch distro.Get() {
- case distro.Synology:
- if distro.DSMVersion() == 6 {
- return "/var/packages/Tailscale/etc/tailscaled.sock"
- }
- // DSM 7 (and higher? or failure to detect.)
- return "/var/packages/Tailscale/var/tailscaled.sock"
- case distro.Gokrazy:
- return "/perm/tailscaled/tailscaled.sock"
- case distro.QNAP:
- return "/tmp/tailscale/tailscaled.sock"
- }
- if fi, err := os.Stat("/var/run"); err == nil && fi.IsDir() {
- return "/var/run/tailscale/tailscaled.sock"
- }
- return "tailscaled.sock"
- }
- // Overridden in init by OS-specific files.
- var (
- stateFileFunc func() string
- // ensureStateDirPerms applies a restrictive ACL/chmod
- // to the provided directory.
- ensureStateDirPerms = func(string) error { return nil }
- )
- // DefaultTailscaledStateFile returns the default path to the
- // tailscaled state file, or the empty string if there's no reasonable
- // default value.
- func DefaultTailscaledStateFile() string {
- if f := stateFileFunc; f != nil {
- return f()
- }
- if runtime.GOOS == "windows" {
- return filepath.Join(os.Getenv("ProgramData"), "Tailscale", "server-state.conf")
- }
- return ""
- }
- // DefaultTailscaledStateDir returns the default state directory
- // to use for tailscaled, for use when the user provided neither
- // a state directory or state file path to use.
- //
- // It returns the empty string if there's no reasonable default.
- func DefaultTailscaledStateDir() string {
- if runtime.GOOS == "plan9" {
- home, err := os.UserHomeDir()
- if err != nil {
- log.Fatalf("failed to get home directory: %v", err)
- }
- return filepath.Join(home, "tailscale-state")
- }
- return filepath.Dir(DefaultTailscaledStateFile())
- }
- // MakeAutomaticStateDir reports whether the platform
- // automatically creates the state directory for tailscaled
- // when it's absent.
- func MakeAutomaticStateDir() bool {
- switch runtime.GOOS {
- case "plan9":
- return true
- case "linux":
- if distro.Get() == distro.JetKVM {
- return true
- }
- }
- return false
- }
- // MkStateDir ensures that dirPath, the daemon's configuration directory
- // containing machine keys etc, both exists and has the correct permissions.
- // We want it to only be accessible to the user the daemon is running under.
- func MkStateDir(dirPath string) error {
- if err := os.MkdirAll(dirPath, 0700); err != nil {
- return err
- }
- return ensureStateDirPerms(dirPath)
- }
- // LegacyStateFilePath returns the legacy path to the state file when
- // it was stored under the current user's %LocalAppData%.
- //
- // It is only called on Windows.
- func LegacyStateFilePath() string {
- if runtime.GOOS == "windows" {
- return filepath.Join(os.Getenv("LocalAppData"), "Tailscale", "server-state.conf")
- }
- return ""
- }
|