TUN-6595: Enable datagramv2 and icmp proxy by default
This commit is contained in:
parent
b1995b4dd1
commit
3d345d3748
|
@ -44,7 +44,7 @@ var (
|
||||||
LogFieldHostname = "hostname"
|
LogFieldHostname = "hostname"
|
||||||
|
|
||||||
secretFlags = [2]*altsrc.StringFlag{credentialsContentsFlag, tunnelTokenFlag}
|
secretFlags = [2]*altsrc.StringFlag{credentialsContentsFlag, tunnelTokenFlag}
|
||||||
defaultFeatures = []string{supervisor.FeatureAllowRemoteConfig, supervisor.FeatureSerializedHeaders}
|
defaultFeatures = []string{supervisor.FeatureAllowRemoteConfig, supervisor.FeatureSerializedHeaders, supervisor.FeatureDatagramV2}
|
||||||
|
|
||||||
configFlags = []string{"autoupdate-freq", "no-autoupdate", "retries", "protocol", "loglevel", "transport-loglevel", "origincert", "metrics", "metrics-update-freq", "edge-ip-version"}
|
configFlags = []string{"autoupdate-freq", "no-autoupdate", "retries", "protocol", "loglevel", "transport-loglevel", "origincert", "metrics", "metrics-update-freq", "edge-ip-version"}
|
||||||
)
|
)
|
||||||
|
|
|
@ -116,15 +116,13 @@ func NewSupervisor(config *TunnelConfig, orchestrator *orchestration.Orchestrato
|
||||||
gracefulShutdownC: gracefulShutdownC,
|
gracefulShutdownC: gracefulShutdownC,
|
||||||
connAwareLogger: log,
|
connAwareLogger: log,
|
||||||
}
|
}
|
||||||
if useDatagramV2(config) {
|
|
||||||
// TODO: TUN-6701: Decouple upgrade of datagram v2 and using icmp proxy
|
|
||||||
icmpRouter, err := ingress.NewICMPRouter(config.Log)
|
icmpRouter, err := ingress.NewICMPRouter(config.Log)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
log.Logger().Warn().Err(err).Msg("Failed to create icmp router, will continue to use datagram v1")
|
log.Logger().Warn().Err(err).Msg("Failed to create icmp router, ICMP proxy feature is disabled")
|
||||||
} else {
|
} else {
|
||||||
edgeTunnelServer.icmpRouter = icmpRouter
|
edgeTunnelServer.icmpRouter = icmpRouter
|
||||||
}
|
}
|
||||||
}
|
|
||||||
|
|
||||||
useReconnectToken := false
|
useReconnectToken := false
|
||||||
if config.ClassicTunnel != nil {
|
if config.ClassicTunnel != nil {
|
||||||
|
@ -435,15 +433,3 @@ func (s *Supervisor) authenticate(ctx context.Context, numPreviousAttempts int)
|
||||||
registrationOptions.NumPreviousAttempts = uint8(numPreviousAttempts)
|
registrationOptions.NumPreviousAttempts = uint8(numPreviousAttempts)
|
||||||
return rpcClient.Authenticate(ctx, s.config.ClassicTunnel, registrationOptions)
|
return rpcClient.Authenticate(ctx, s.config.ClassicTunnel, registrationOptions)
|
||||||
}
|
}
|
||||||
|
|
||||||
func useDatagramV2(config *TunnelConfig) bool {
|
|
||||||
if config.NamedTunnel == nil {
|
|
||||||
return false
|
|
||||||
}
|
|
||||||
for _, feature := range config.NamedTunnel.Client.Features {
|
|
||||||
if feature == FeatureDatagramV2 {
|
|
||||||
return true
|
|
||||||
}
|
|
||||||
}
|
|
||||||
return false
|
|
||||||
}
|
|
||||||
|
|
Loading…
Reference in New Issue