2021-02-24 21:23:36 +00:00
|
|
|
# Headscale
|
2020-06-21 09:58:25 +00:00
|
|
|
An open source implementation of the Tailscale coordination server.
|
|
|
|
|
|
|
|
|
2021-02-24 21:23:36 +00:00
|
|
|
## Status
|
|
|
|
|
|
|
|
- [x] Basic functionality (nodes can communicate with each other)
|
|
|
|
- [x] Node registration through the web flow
|
|
|
|
- [x] Network changes are relied to the nodes
|
2021-02-28 19:29:31 +00:00
|
|
|
- [x] ~~Multiuser~~ Namespace support
|
2021-03-14 10:38:42 +00:00
|
|
|
- [x] Basic routing (advertise & accept)
|
2021-02-28 19:29:31 +00:00
|
|
|
- [ ] Share nodes between ~~users~~ namespaces
|
2021-02-24 21:23:36 +00:00
|
|
|
- [ ] Node registration via pre-auth keys
|
|
|
|
- [ ] ACLs
|
|
|
|
- [ ] DNS
|
|
|
|
|
|
|
|
... and probably lots of stuff missing
|
|
|
|
|
|
|
|
## Roadmap 🤷
|
|
|
|
|
2021-02-28 19:29:31 +00:00
|
|
|
Basic multiuser support (multinamespace, actually) is now implemented. No node sharing or ACLs between namespaces yet though...
|
2021-02-24 21:23:36 +00:00
|
|
|
|
|
|
|
Pre-auth keys should also be feasible.
|
|
|
|
|
|
|
|
Suggestions/PRs welcomed!
|
2020-06-21 09:58:25 +00:00
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
## Running it
|
|
|
|
|
|
|
|
1. Compile the headscale binary
|
2021-02-21 19:42:32 +00:00
|
|
|
```shell
|
2020-06-21 09:58:25 +00:00
|
|
|
go build cmd/headscale/headscale.go
|
|
|
|
```
|
|
|
|
|
2021-02-24 21:23:36 +00:00
|
|
|
2. Get youself a PostgreSQL DB running (yes, [I know](https://tailscale.com/blog/an-unlikely-database-migration/))
|
2020-06-21 09:58:25 +00:00
|
|
|
|
2021-02-21 19:42:32 +00:00
|
|
|
```shell
|
2020-06-21 09:58:25 +00:00
|
|
|
docker run --name headscale -e POSTGRES_DB=headscale -e \
|
|
|
|
POSTGRES_USER=foo -e POSTGRES_PASSWORD=bar -p 5432:5432 -d postgres
|
|
|
|
```
|
|
|
|
|
2020-06-21 10:32:08 +00:00
|
|
|
3. Sort some stuff up (headscale Wireguard keys & the config.json file)
|
2021-02-21 19:42:32 +00:00
|
|
|
```shell
|
2020-06-21 10:32:08 +00:00
|
|
|
wg genkey > private.key
|
2021-02-24 21:23:36 +00:00
|
|
|
wg pubkey < private.key > public.key # not needed
|
2020-06-21 10:32:08 +00:00
|
|
|
cp config.json.example config.json
|
|
|
|
```
|
|
|
|
|
2021-02-28 00:04:01 +00:00
|
|
|
4. Create a namespace (equivalent to a user in tailscale.com)
|
|
|
|
```shell
|
|
|
|
./headscale namespace create myfirstnamespace
|
|
|
|
```
|
|
|
|
|
|
|
|
5. Run the server
|
2021-02-21 19:42:32 +00:00
|
|
|
```shell
|
2021-02-21 00:34:16 +00:00
|
|
|
./headscale serve
|
2020-06-21 09:58:25 +00:00
|
|
|
```
|
|
|
|
|
2021-02-28 00:04:01 +00:00
|
|
|
6. Add your first machine
|
2021-02-21 19:42:32 +00:00
|
|
|
```shell
|
2020-06-21 09:58:25 +00:00
|
|
|
tailscale up -login-server YOUR_HEADSCALE_URL
|
|
|
|
```
|
2021-02-21 00:34:16 +00:00
|
|
|
|
2021-02-28 00:04:01 +00:00
|
|
|
7. Navigate to the URL you will get with `tailscale up`, where you'll find your machine key.
|
2021-02-21 00:34:16 +00:00
|
|
|
|
2021-02-28 00:04:01 +00:00
|
|
|
8. In the server, register your machine to a namespace with the CLI
|
2021-02-21 19:42:32 +00:00
|
|
|
```shell
|
2021-02-28 00:04:01 +00:00
|
|
|
./headscale register YOURMACHINEKEY myfirstnamespace
|
2021-02-21 00:34:16 +00:00
|
|
|
```
|
2021-02-24 21:23:36 +00:00
|
|
|
|
|
|
|
|
|
|
|
## Disclaimer
|
|
|
|
|
|
|
|
1. I have nothing to do with Tailscale, or Tailscale Inc.
|
|
|
|
2. The purpose of writing this was to learn how Tailscale works.
|
|
|
|
3. I don't use Headscale myself.
|
|
|
|
|