Update dependencies
This commit is contained in:
92
vendor/tailscale.com/paths/paths.go
generated
vendored
Normal file
92
vendor/tailscale.com/paths/paths.go
generated
vendored
Normal file
@@ -0,0 +1,92 @@
|
||||
// Copyright (c) Tailscale Inc & AUTHORS
|
||||
// SPDX-License-Identifier: BSD-3-Clause
|
||||
|
||||
// Package paths returns platform and user-specific default paths to
|
||||
// Tailscale files and directories.
|
||||
package paths
|
||||
|
||||
import (
|
||||
"os"
|
||||
"path/filepath"
|
||||
"runtime"
|
||||
|
||||
"tailscale.com/syncs"
|
||||
"tailscale.com/version/distro"
|
||||
)
|
||||
|
||||
// AppSharedDir is a string set by the iOS or Android app on start
|
||||
// containing a directory we can read/write in.
|
||||
var AppSharedDir syncs.AtomicValue[string]
|
||||
|
||||
// DefaultTailscaledSocket returns the path to the tailscaled Unix socket
|
||||
// or the empty string if there's no reasonable default.
|
||||
func DefaultTailscaledSocket() string {
|
||||
if runtime.GOOS == "windows" {
|
||||
return `\\.\pipe\ProtectedPrefix\Administrators\Tailscale\tailscaled`
|
||||
}
|
||||
if runtime.GOOS == "darwin" {
|
||||
return "/var/run/tailscaled.socket"
|
||||
}
|
||||
if runtime.GOOS == "plan9" {
|
||||
return "/srv/tailscaled.sock"
|
||||
}
|
||||
switch distro.Get() {
|
||||
case distro.Synology:
|
||||
if distro.DSMVersion() == 6 {
|
||||
return "/var/packages/Tailscale/etc/tailscaled.sock"
|
||||
}
|
||||
// DSM 7 (and higher? or failure to detect.)
|
||||
return "/var/packages/Tailscale/var/tailscaled.sock"
|
||||
case distro.Gokrazy:
|
||||
return "/perm/tailscaled/tailscaled.sock"
|
||||
case distro.QNAP:
|
||||
return "/tmp/tailscale/tailscaled.sock"
|
||||
}
|
||||
if fi, err := os.Stat("/var/run"); err == nil && fi.IsDir() {
|
||||
return "/var/run/tailscale/tailscaled.sock"
|
||||
}
|
||||
return "tailscaled.sock"
|
||||
}
|
||||
|
||||
// Overridden in init by OS-specific files.
|
||||
var (
|
||||
stateFileFunc func() string
|
||||
|
||||
// ensureStateDirPerms applies a restrictive ACL/chmod
|
||||
// to the provided directory.
|
||||
ensureStateDirPerms = func(string) error { return nil }
|
||||
)
|
||||
|
||||
// DefaultTailscaledStateFile returns the default path to the
|
||||
// tailscaled state file, or the empty string if there's no reasonable
|
||||
// default value.
|
||||
func DefaultTailscaledStateFile() string {
|
||||
if f := stateFileFunc; f != nil {
|
||||
return f()
|
||||
}
|
||||
if runtime.GOOS == "windows" {
|
||||
return filepath.Join(os.Getenv("ProgramData"), "Tailscale", "server-state.conf")
|
||||
}
|
||||
return ""
|
||||
}
|
||||
|
||||
// MkStateDir ensures that dirPath, the daemon's configuration directory
|
||||
// containing machine keys etc, both exists and has the correct permissions.
|
||||
// We want it to only be accessible to the user the daemon is running under.
|
||||
func MkStateDir(dirPath string) error {
|
||||
if err := os.MkdirAll(dirPath, 0700); err != nil {
|
||||
return err
|
||||
}
|
||||
return ensureStateDirPerms(dirPath)
|
||||
}
|
||||
|
||||
// LegacyStateFilePath returns the legacy path to the state file when
|
||||
// it was stored under the current user's %LocalAppData%.
|
||||
//
|
||||
// It is only called on Windows.
|
||||
func LegacyStateFilePath() string {
|
||||
if runtime.GOOS == "windows" {
|
||||
return filepath.Join(os.Getenv("LocalAppData"), "Tailscale", "server-state.conf")
|
||||
}
|
||||
return ""
|
||||
}
|
||||
Reference in New Issue
Block a user