-
Notifications
You must be signed in to change notification settings - Fork 36
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Network listener changes #13
Conversation
Thanks, this is definitely interesting. So you've made this into a reverse proxy transport -- can you elaborate on your changes a bit so we know what to expect during a review? |
Hey Matt! Sure, I'd be happy to add more details around the changes!
Using this Caddyfile should result in requests to http://localhost:8080 returning a 200 OK with "Hello, world!" from the static server that is defined next and bound to the Tailscale network. |
(Sorry, was delayed by some things last week.) That's very cool! I think overall these changes are good, and I will try to do a more formal review soon. I'd love for a member of the TS team to review this if it's something they're willing to accept! (@Xe ? @willnorris ?) |
No worries, thanks! |
Yeah, these changes look great, and I'm excited to try them out (hopefully tomorrow?). The approach looks good, and I suspect most of my comments will just end up being stylistic (looks like the second commit needs goimports?), and some additional documentation. We also need to think about how you juggle the auth keys if you have multiple of these, or mixed with listeners. I think all this predates OAuth support for Tailscale as well, so there's probably more work to do there anyway independent of this change. |
Caddy introduced a breaking change so |
Ah, yeah -- that's actually an API surface that I think is referenced only by this project outside our official Caddy repo. (The typical API surface is the JSON field name.) Generally, external code doesn't access that but I guess this is a special case I didn't realize. (Sorry!) But yeah that should be an easy fix 😅 |
Signed-off-by: Trea Hauet <trea@treahauet.com>
…network addresses, caddy.UsagePool instead of tsnet.Server map and sync.RWMutex Signed-off-by: Trea Hauet <trea@treahauet.com>
Signed-off-by: Trea Hauet <trea@treahauet.com>
tested and this works great... this is really cool! Thanks for the contribution, and for the patience in me getting around to reviewing it! :) I've got a few minor formatting changes I'll push to your fork and then merge. |
Signed-off-by: Will Norris <will@tailscale.com>
Oh no worries, I'm glad it all worked out and stoked I was able to contribute! Until next time! 🎉 |
Hi folks, I hope contribution is welcome. I have been tinkering around with this module. Feel free to accept as-is or remix at will. I'd also be happy to address any feedback or questions.