tailscale/net
Mihai Parparita 62f4df3257 net/interfaces, net/netns: add node attributes to control default interface getting and binding
With #6566 we started to more aggressively bind to the default interface
on Darwin. We are seeing some reports of the wrong cellular interface
being chosen on iOS. To help with the investigation, this adds to knobs
to control the behavior changes:
- CapabilityDebugDisableAlternateDefaultRouteInterface disables the
  alternate function that we use to get the default interface on macOS
  and iOS (implemented in tailscale/corp#8201). We still log what it
  would have returned so we can see if it gets things wrong.
- CapabilityDebugDisableBindConnToInterface is a bigger hammer that
  disables binding of connections to the default interface altogether.

Updates #7184
Updates #7188

Signed-off-by: Mihai Parparita <mihai@tailscale.com>
2023-02-08 13:15:10 -08:00
..
connstats all: update copyright and license headers 2023-01-27 15:36:29 -08:00
dns net/dns/resolver: remove maxDoHInFlight 2023-02-03 17:07:12 -08:00
dnscache all: update copyright and license headers 2023-01-27 15:36:29 -08:00
dnsfallback all: update copyright and license headers 2023-01-27 15:36:29 -08:00
flowtrack all: update copyright and license headers 2023-01-27 15:36:29 -08:00
interfaces net/interfaces, net/netns: add node attributes to control default interface getting and binding 2023-02-08 13:15:10 -08:00
memnet net/memnet: rename from net/nettest 2023-01-30 13:03:32 -08:00
netaddr all: update copyright and license headers 2023-01-27 15:36:29 -08:00
netcheck all: update to Go 1.20, use strings.CutPrefix/Suffix instead of our fork 2023-02-01 15:23:54 -08:00
neterror all: update copyright and license headers 2023-01-27 15:36:29 -08:00
netknob all: update copyright and license headers 2023-01-27 15:36:29 -08:00
netns net/interfaces, net/netns: add node attributes to control default interface getting and binding 2023-02-08 13:15:10 -08:00
netstat net/{netns,netstat}: use new x/sys/cpu.IsBigEndian 2023-02-02 07:41:49 -08:00
netutil net/netutil: only check Linux sysctls w/ procfs, assume absent means false 2023-02-08 12:23:36 -08:00
packet all: update copyright and license headers 2023-01-27 15:36:29 -08:00
ping all: update copyright and license headers 2023-01-27 15:36:29 -08:00
portmapper all: update tools that manage copyright headers 2023-01-27 15:36:29 -08:00
proxymux all: update copyright and license headers 2023-01-27 15:36:29 -08:00
routetable all: update copyright and license headers 2023-01-27 15:36:29 -08:00
socks5 all: update copyright and license headers 2023-01-27 15:36:29 -08:00
speedtest all: update copyright and license headers 2023-01-27 15:36:29 -08:00
stun all: use Go 1.20's bytes.Clone 2023-02-01 17:39:18 -08:00
tlsdial health, net/tlsdial: add healthcheck for self-signed cert 2023-02-01 23:17:41 -05:00
tsaddr all: update copyright and license headers 2023-01-27 15:36:29 -08:00
tsdial all: update copyright and license headers 2023-01-27 15:36:29 -08:00
tshttpproxy net/tshttpproxy: more directly use Transport proxy CONNECT hooks 2023-02-03 16:51:50 -08:00
tstun all: implement pcap streaming for datapath debugging 2023-02-04 15:54:20 -10:00
wsconn all: update copyright and license headers 2023-01-27 15:36:29 -08:00