tailscale/net
Brad Fitzpatrick f49d218cfe net/dnscache: don't fall back to an IPv6 dial if we don't have IPv6
I noticed while debugging a test failure elsewhere that our failure
logs (when verbosity is cranked up) were uselessly attributing dial
failures to failure to dial an invalid IP address (this IPv6 address
we didn't have), rather than showing me the actual IPv4 connection
failure.

Updates #13597 (tangentially)

Change-Id: I45ffbefbc7e25ebfb15768006413a705b941dae5
Signed-off-by: Brad Fitzpatrick <bradfitz@tailscale.com>
2024-10-02 10:41:08 -05:00
..
art
captivedetection net/captivedetection: set Timeout on net.Dialer (#13613) 2024-10-02 15:29:46 +00:00
connstats
dns cli: add `tailscale dns query` (#13368) 2024-09-24 20:18:45 +00:00
dnscache net/dnscache: don't fall back to an IPv6 dial if we don't have IPv6 2024-10-02 10:41:08 -05:00
dnsfallback
flowtrack
ipset
ktimeout
memnet
netaddr
netcheck net/netcheck,wgengine/magicsock: plumb OnlyTCP443 controlknob through netcheck (#13491) 2024-09-17 12:24:42 -07:00
neterror
netkernelconf
netknob
netmon
netns
netstat
netutil {ipn,net,tsnet}: use tsaddr helpers 2024-09-26 12:17:31 +02:00
packet
ping
portmapper net/portmapper: don't treat 0.0.0.0 as a valid IP 2024-10-01 16:11:47 -05:00
proxymux
routetable
socks5
sockstats
speedtest
stun
stunserver
tcpinfo
tlsdial
tsaddr net/tsaddr: add WithoutExitRoutes and IsExitRoute 2024-09-26 12:17:31 +02:00
tsdial
tshttpproxy
tstun util/usermetrics: make usermetrics non-global 2024-09-25 15:57:00 +02:00
wsconn