David Crawshaw
ea714c6054
cmd/tailscale/cli: split out web.css file
...
CSS formatted with:
npx prettier --use-tabs --write cmd/tailscale/cli/web.css
Signed-off-by: David Crawshaw <crawshaw@tailscale.com >
2021-03-31 10:48:05 -07:00
Ross Zurowski
8d57bce5ef
cmd/tailscale: add initial web UI ( #1621 )
...
Signed-off-by: Ross Zurowski <ross@rosszurowski.com >
2021-03-31 11:32:33 -04:00
Brad Fitzpatrick
6d1a9017c9
ipn/{ipnlocal,localapi}, client/tailscale: add file get/delete APIs
...
Signed-off-by: Brad Fitzpatrick <bradfitz@tailscale.com >
2021-03-30 12:56:51 -07:00
Brad Fitzpatrick
0301ccd275
cmd/tailscale/cli: add debug --ipn mode
...
To watch the IPN message bus.
Signed-off-by: Brad Fitzpatrick <bradfitz@tailscale.com >
2021-03-30 10:43:36 -07:00
David Crawshaw
e67f1b5da0
client/tailscale, cmd/tailscale/cli: plumb --socket through
...
Without this, `tailscale status` ignores the --socket flag on macOS and
always talks to the IPNExtension, even if you wanted it to inspect a
userspace tailscaled.
Signed-off-by: David Crawshaw <crawshaw@tailscale.com >
2021-03-30 10:09:14 -07:00
Brad Fitzpatrick
3a1eae5b6b
cmd/tailscale/cli: factor out filename selection
...
Signed-off-by: Brad Fitzpatrick <bradfitz@tailscale.com >
2021-03-29 22:19:42 -07:00
Brad Fitzpatrick
1e26d4ae19
cmd/tailscale/cli: add push subcommand
...
Signed-off-by: Brad Fitzpatrick <bradfitz@tailscale.com >
2021-03-29 22:06:57 -07:00
Brad Fitzpatrick
eeacf84dae
cmd/tailscale/cli: factor out tailscaleIPFromArg from ping command
...
Signed-off-by: Brad Fitzpatrick <bradfitz@tailscale.com >
2021-03-29 21:29:27 -07:00
Brad Fitzpatrick
41e4e02e57
net/{packet,tstun}: send peerapi port in TSMP pongs
...
For discovery when an explicit hostname/IP is known. We'll still
also send it via control for finding peers by a list.
Signed-off-by: Brad Fitzpatrick <bradfitz@tailscale.com >
2021-03-29 15:18:23 -07:00
David Crawshaw
f0863346c2
cmd/tailscale: add web subcommand
...
Used as an app frontend UI on Synology.
Signed-off-by: David Crawshaw <crawshaw@tailscale.com >
2021-03-29 12:13:19 -07:00
David Anderson
0fb738760f
wgengine: make Tun optional again, default to fake.
...
This makes setup more explicit in prod codepaths, without
requiring a bunch of arguments or helpers for tests and
userspace mode.
Signed-off-by: David Anderson <danderson@tailscale.com >
2021-03-28 21:45:02 -07:00
David Anderson
93a4aa697c
wgengine: default Router to a no-op router.
...
Signed-off-by: David Anderson <danderson@tailscale.com >
2021-03-28 18:59:48 -07:00
David Anderson
440effb21a
wgengine: remove Config.TUN argument.
2021-03-28 18:45:17 -07:00
David Anderson
2df8adef9d
wgengine: make the tun.Device required at construction.
...
Signed-off-by: David Anderson <danderson@tailscale.com >
2021-03-27 00:33:09 -07:00
David Anderson
82ab7972f4
net/tstun: rename NewFakeTUN to NewFake.
...
Signed-off-by: David Anderson <danderson@tailscale.com >
2021-03-26 22:46:47 -07:00
David Anderson
588b70f468
net/tstun: merge in wgengine/tstun.
...
Signed-off-by: David Anderson <danderson@tailscale.com >
2021-03-26 22:31:54 -07:00
David Anderson
018200aeba
net/tstun: rename from net/tun.
...
We depend on wireguard-go/tun, identical leaf packages can be
confusing in code.
Signed-off-by: David Anderson <danderson@tailscale.com >
2021-03-26 22:31:54 -07:00
David Anderson
2b4bfeda1a
wgengine: pass in an explicit router.Router, rather than a generator.
...
Signed-off-by: David Anderson <danderson@tailscale.com >
2021-03-26 22:01:55 -07:00
David Anderson
9ea5cbf81f
cmd/tailscaled: readd tun.Diagnose call, mistakenly lost during refactor.
...
Signed-off-by: David Anderson <danderson@tailscale.com >
2021-03-26 22:01:55 -07:00
David Anderson
44d9929208
wgengine: remove Config.TUNName, require caller to create device.
...
Also factors out device creation and associated OS workarounds to
net/tun.
Signed-off-by: David Anderson <danderson@tailscale.com >
2021-03-26 21:08:11 -07:00
Adrian Dewhurst
04dd6d1dae
control/controlclient: sign RegisterRequest ( #1549 )
...
control/controlclient: sign RegisterRequest
Some customers wish to verify eligibility for devices to join their
tailnets using machine identity certificates. TLS client certs could
potentially fulfill this role but the initial customer for this feature
has technical requirements that prevent their use. Instead, the
certificate is loaded from the Windows local machine certificate store
and uses its RSA public key to sign the RegisterRequest message.
There is room to improve the flexibility of this feature in future and
it is currently only tested on Windows (although Darwin theoretically
works too), but this offers a reasonable starting place for now.
Updates tailscale/coral#6
Signed-off-by: Adrian Dewhurst <adrian@tailscale.com >
2021-03-26 10:01:08 -04:00
David Anderson
9f7f2af008
wgengine/router/dns: move to net/dns.
...
Preparation for merging the APIs and whatnot.
Signed-off-by: David Anderson <danderson@tailscale.com >
2021-03-25 16:25:30 -07:00
Brad Fitzpatrick
dad10fee9c
Revert "cmd/tailscaled: split package main into main shim + package"
...
This reverts commit b81bd8025b
.
Not needed. See:
https://github.com/golang/go/wiki/Modules#how-can-i-track-tool-dependencies-for-a-module
2021-03-25 09:06:00 -07:00
Brad Fitzpatrick
82c4cb765c
cmd/tailscaled: split package main into main shim + package
...
So we can empty import the guts of cmd/tailscaled from another
module for go mod tidy reasons.
Signed-off-by: Brad Fitzpatrick <bradfitz@tailscale.com >
2021-03-24 21:23:00 -07:00
Brad Fitzpatrick
b7f0e39bf2
cmd/tailscale: add "tailscale ip [-4] [-6]" command
...
This adds an easy and portable way for us to document how to get
your Tailscale IP address.
$ tailscale ip
100.74.70.3
fd7a:115c:a1e0:ab12:4843:cd96:624a:4603
$ tailscale ip -4
100.74.70.3
$ tailscale ip -6
fd7a:115c:a1e0:ab12:4843:cd96:624a:4603
Signed-off-by: Brad Fitzpatrick <bradfitz@tailscale.com >
2021-03-24 09:54:32 -07:00
Brad Fitzpatrick
2384c112c9
net/packet, wgengine/{filter,tstun}: add TSMP ping
...
Fixes #1467
Signed-off-by: Brad Fitzpatrick <bradfitz@tailscale.com >
2021-03-24 09:50:01 -07:00
Brad Fitzpatrick
01b90df2fa
net/packet, wgengine/filter: support SCTP
...
Add proto to flowtrack.Tuple.
Add types/ipproto leaf package to break a cycle.
Server-side ACL work remains.
Updates #1516
Signed-off-by: Brad Fitzpatrick <bradfitz@tailscale.com >
2021-03-20 21:34:13 -07:00
Brad Fitzpatrick
0406a7436a
cmd/tailscale/cli: use double hypens, make default usage func more clear
...
Mash up some code from ffcli and std's flag package to make a default
usage func that's super explicit for those not familiar with the Go
style flags. Only show double hyphens in usage text (but still accept both),
and show default values, and only show the proper usage of boolean flags.
Fixes #1353
Fixes #1529
Signed-off-by: Brad Fitzpatrick <bradfitz@tailscale.com >
2021-03-19 13:11:55 -07:00
Brad Fitzpatrick
0a02aaf813
control, ipn, tailcfg: remove golang.org/x/oauth2 dep, add tailcfg.Oauth2Token
...
golang.org/x/oauth2 pulls in App Engine and grpc module dependencies,
screwing up builds that depend on this module.
Some background on the problem:
https://go.googlesource.com/proposal/+/master/design/36460-lazy-module-loading.md
Fixes tailscale/corp#1471
Signed-off-by: Brad Fitzpatrick <bradfitz@tailscale.com >
2021-03-19 10:40:48 -07:00
Aleksandar Pesic
7b57310966
net/interfaces: use windows API to get the default route instead of parsing route print
output
...
Fixes : #1470
Signed-off-by: Aleksandar Pesic <peske.nis@gmail.com >
2021-03-19 14:07:36 +01:00
Brad Fitzpatrick
439d70dce2
cmd/tailscale, ipn/localapi: get daemon version from localapi status
...
Signed-off-by: Brad Fitzpatrick <bradfitz@tailscale.com >
2021-03-18 21:14:10 -07:00
Brad Fitzpatrick
d0dffe33c0
cmd/tailscale, ipn/localapi: use localapi for status, not IPN acrobatics
...
Yay simpler code.
Tested on Linux, macOS and Windows.
Signed-off-by: Brad Fitzpatrick <bradfitz@tailscale.com >
2021-03-18 19:51:02 -07:00
Brad Fitzpatrick
0c3e9722cc
cmd/tailscale/cli: fix typo in comment
...
Signed-off-by: Brad Fitzpatrick <bradfitz@tailscale.com >
2021-03-18 15:43:04 -07:00
Christine Dodrill
a480b1baa5
logpolicy: set log target on windows based on a registry key ( #1542 )
...
Signed-off-by: Christine Dodrill <xe@tailscale.com >
2021-03-18 13:23:56 -04:00
Brad Fitzpatrick
aa79a57f63
wgengine/netstack: use inet.af/netstack, remove 64-bit only limitation
...
This reverts the revert commit 84aba349d9
.
And changes us to use inet.af/netstack.
Updates #1518
Signed-off-by: Brad Fitzpatrick <bradfitz@tailscale.com >
2021-03-17 22:46:09 -07:00
David Anderson
84aba349d9
Revert "wgengine/netstack: update gvisor to remove 64-bit only limitation"
...
Breaks our corp repo due to gRPC dependency hell.
This reverts commit d42f8b7f9a
.
2021-03-16 15:36:06 -07:00
Brad Fitzpatrick
27c4dd9a97
Revert "cmd/tailscaled, ipn/{ipnlocal,ipnserver}: let netstack get access to LocalBackend"
...
This reverts commit 2bc518dcb2
.
@namansood didn't end up needing it in his 770aa71ffb
.
2021-03-16 12:33:13 -07:00
Brad Fitzpatrick
d42f8b7f9a
wgengine/netstack: update gvisor to remove 64-bit only limitation
...
gVisor fixed their google/gvisor#1446 so we can include gVisor mode
on 32-bit machines.
A few minor upstream API changes, as normal.
Signed-off-by: Brad Fitzpatrick <bradfitz@tailscale.com >
2021-03-15 21:02:51 -07:00
Brad Fitzpatrick
98ab533324
cmd/tailscale/cli: include GOOS in BSD warning message
...
instead of just lowercase "bsd"
Updates #1475
Signed-off-by: Brad Fitzpatrick <bradfitz@tailscale.com >
2021-03-15 21:02:16 -07:00
David Anderson
380a3526f6
cmd/tailscale/cli: warn if using subnet routing on BSD
...
Fixes #1475 .
Signed-off-by: David Anderson <danderson@tailscale.com >
2021-03-15 17:25:59 -07:00
Naman Sood
770aa71ffb
client, cmd/hello, ipn, wgengine: fix whois for netstack-forwarded connections
...
Updates #504
Updates #707
Signed-off-by: Naman Sood <mail@nsood.in >
2021-03-15 18:14:09 -04:00
Brad Fitzpatrick
44ab0acbdb
net/portmapper, wgengine/monitor: cache gateway IP info until link changes
...
Cuts down allocs & CPU in steady state (on regular STUN probes) when network
is unchanging.
Signed-off-by: Brad Fitzpatrick <bradfitz@tailscale.com >
2021-03-15 14:27:39 -07:00
Christine Dodrill
deff20edc6
cmd/tailscale/cli: don't permit setting self IP as exit node ( #1491 )
...
This change makes it impossible to set your own IP address as the exit node for this system.
Fixes #1489
Signed-off-by: Christine Dodrill <xe@tailscale.com >
2021-03-15 15:44:56 -04:00
Brad Fitzpatrick
2bc518dcb2
cmd/tailscaled, ipn/{ipnlocal,ipnserver}: let netstack get access to LocalBackend
...
Signed-off-by: Brad Fitzpatrick <bradfitz@tailscale.com >
2021-03-15 09:31:25 -07:00
Brad Fitzpatrick
d491adbf09
cmd/tailscaled: on Synology, fall back to netstack if needed
...
Updates tailscale/tailscale-synology#35
Signed-off-by: Brad Fitzpatrick <bradfitz@tailscale.com >
2021-03-12 15:04:13 -08:00
Brad Fitzpatrick
cc99059fc2
Revert "--advertise-routes option enabled in Mac tailscale CLI; it checks for IP forwarding enabled"
...
This reverts commit 08949d4ef1
.
I think this code was aspirational. There's no code that sets up the
appropriate NAT code using pfctl/etc. See #911 and #1475 .
Updates #1475
Updates #911
2021-03-09 19:30:26 -08:00
Brad Fitzpatrick
66480755c2
cmd/tailscale/cli: document how to see subcommand usage
...
From user feedback.
Signed-off-by: Brad Fitzpatrick <bradfitz@tailscale.com >
2021-03-09 12:52:25 -08:00
Brad Fitzpatrick
d3e56aa979
cmd/tailscaled: fix monitor debug tool's output
...
Logic was backwards, introduced in earlier monitor refactoring last
week in e3df29d488
.
Signed-off-by: Brad Fitzpatrick <bradfitz@tailscale.com >
2021-03-08 20:34:18 -08:00
Aleksandar Pesic
258d0e8d9a
wgengine/monitor: simplify the Windows monitor to make it more reliable
...
Updates tailscale/tailscale#1414
Signed-off-by: Aleksandar Pesic <peske.nis@gmail.com >
2021-03-08 14:54:57 -08:00
Brad Fitzpatrick
bc159dc689
cmd/tailscale: fix depaware.txt
...
git fail.
Signed-off-by: Brad Fitzpatrick <bradfitz@tailscale.com >
2021-03-05 13:32:00 -08:00