Skip to content

Conversation

@jwhited
Copy link
Member

@jwhited jwhited commented Jul 1, 2025

It was previously suppressed if roaming was disabled for the peer. Tailscale always disables roaming as we explicitly configure conn.Endpoint's per peer.

This also commit modifies PeerAwareEndpoint usage such that wireguard-go never uses/sets it as a Peer Endpoint value. In theory we (Tailscale) always disable roaming, so we should always return early from SetEndpointFromPacket(), but this acts as an extra footgun guard and improves clarity around intended usage.

Updates tailscale/corp#27502
Updates tailscale/corp#30042

@jwhited jwhited requested review from dylan-tailscale and raggi July 1, 2025 21:52
@jwhited jwhited force-pushed the jwhited/peer-aware-endpoint-setter branch from d57f921 to 6d3cbe6 Compare July 1, 2025 21:56
It was previously suppressed if roaming was disabled for the peer.
Tailscale always disables roaming as we explicitly configure
conn.Endpoint's for all peers.

This commit also modifies PeerAwareEndpoint usage such that wireguard-go
never uses/sets it as a Peer Endpoint value. In theory we (Tailscale)
always disable roaming, so we should always return early from
SetEndpointFromPacket(), but this acts as an extra footgun guard and
improves clarity around intended usage.

Updates tailscale/corp#27502
Updates tailscale/corp#29422
Updates tailscale/corp#30042

Signed-off-by: Jordan Whited <jordan@tailscale.com>
@jwhited jwhited force-pushed the jwhited/peer-aware-endpoint-setter branch from 6d3cbe6 to 0cad43e Compare July 1, 2025 21:59
@jwhited jwhited merged commit 24483d7 into tailscale Jul 1, 2025
13 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants