The easiest, most secure way to use WireGuard and 2FA.
Go to file
Denton Gentry 0f1273ea69
CI: use BuildJet & large Windows runners
1. Use buildjet for the longer Linux CI workflows.
2. Continue with `ubuntu-latest` for shorter Linux CI workflows.
3. Use a large GitHub-hosted Windows runner.
   https://docs.github.com/en/actions/using-github-hosted-runners/using-larger-runners
4. Make CIFuzz run on merge to main or release branch, not
   in the pull request

Two runs each of the original workflow files and the updated
workflows in this PR. One run of the GitHub Large Ubuntu runners
is included; these are clearly between the regular GitHub and BuildJet
runners in performance.
                              GitHub  GitHub  BuildJet BuildJet  GHLarge
codeql-analysis.yml           4m 30s  cached   2m 56s   2m 59s   4m  0s
cross-darwin.yml              3m 10s  3m 19s   1m 33s   1m 30s   2m 43s
cross-freebsd.yml             3m 33s  3m 10s   1m 28s   1m 22s   2m 15s
cross-openbsd.yml             3m  4s  2m 36s   1m 29s   1m 22s   2m  3s
cross-wasm.yml                1m 59s  2m  2s   1m 12s   1m 16s   1m 46s
cross-windows.yml             2m 45s  3m  0s   1m 44s   1m 25s   2m  6s
linux32.yml                   4m 27s  4m  0s   1m 55s   2m  8s   2m 51s
linux-race.yml                3m 54s  4m  7s   2m 22s   2m 12s   3m 14s
linux.yml                     4m 23s  4m 39s   2m 37s   2m 15s   3m 38s
static-analysis.yml
 /vet                         1m 41s  2m 22s      52s      56s   1m 12s
 /staticcheck(linux, amd64)   2m 47s  2m 38s   1m  7s   1m 10s   1m 52s
 /staticcheck(windows, amd64) 2m  5s  2m  4s   1m  6s   1m  8s   1m 33s
 /staticcheck(darwin, amd64)  2m 14s  2m 20s   1m 10s   1m 10s   1m 50s
 /staticcheck(windows, 386)   2m 36s  1m 58s   1m 23s   1m  8s   1m 39s
vm.yml                        1m 30s  1m 32s   2m 31s   2m 23s   N/A

A few very short workflows are being left on GitHub-hosted runners, like
licenses and gofmt. These benefit from the quicker dispatch to GitHub
hosted runners.

--------

For Windows and the windows.yml test run:
- the regular `windows-latest` runner takes about 6 minutes 20 seconds
- there is enough variability run to run that we get the same ~4 minute
  run with:
    - a GitHub-hosted large runner
    - a self-hosted Windows Server 2022 in an AWS t3.xlarge
    - a self-hosted Windows Server 2022 in an AWS c6i.xlarge
Since there is not a gain from operating our own runner, we'll pay
GitHub to operate a Windows large runner.

Signed-off-by: Denton Gentry <dgentry@tailscale.com>
2022-09-24 17:22:04 -07:00
.bencher bencher: add config to suppress failures on benchmark regressions. 2021-10-01 16:16:02 -07:00
.github CI: use BuildJet & large Windows runners 2022-09-24 17:22:04 -07:00
atomicfile refactor: move from io/ioutil to io and os packages 2022-09-15 21:45:53 -07:00
chirp chirp: add a 10s timeout when communicating with BIRD (#5444) 2022-08-27 20:49:31 -04:00
client/tailscale refactor: move from io/ioutil to io and os packages 2022-09-15 21:45:53 -07:00
cmd net/speedtest: retune to meet iperf on localhost in a VM 2022-09-23 10:46:04 -07:00
control control/controlclient: stop restarting map polls on health change 2022-09-24 08:51:34 -07:00
derp refactor: move from io/ioutil to io and os packages 2022-09-15 21:45:53 -07:00
disco all: migrate more code code to net/netip directly 2022-08-02 13:59:57 -07:00
docs docker: add ability to use a custom control socket 2022-09-22 08:48:26 -07:00
envknob envknob, health: support Synology, show parse errors in status 2022-09-17 08:42:41 -07:00
health envknob, health: support Synology, show parse errors in status 2022-09-17 08:42:41 -07:00
hostinfo refactor: move from io/ioutil to io and os packages 2022-09-15 21:45:53 -07:00
internal/tooldeps .github/workflows: add gofmt (goimports) check 2022-07-26 09:46:06 -07:00
ipn tailcfg, control/controlhttp, control/controlclient: add ControlDialPlan field (#5648) 2022-09-23 13:06:55 -04:00
jsondb jsondb: small package to load/save JSON DBs. 2022-07-12 11:56:38 -07:00
kube all: use any instead of interface{} 2022-03-17 11:35:09 -07:00
licenses licenses: remove win.md file 2022-09-23 11:21:25 -07:00
log refactor: move from io/ioutil to io and os packages 2022-09-15 21:45:53 -07:00
logpolicy refactor: move from io/ioutil to io and os packages 2022-09-15 21:45:53 -07:00
logtail refactor: move from io/ioutil to io and os packages 2022-09-15 21:45:53 -07:00
metrics all: use testingutil.MinAllocsPerRun 2021-10-28 12:48:37 -07:00
net net/speedtest: retune to meet iperf on localhost in a VM 2022-09-23 10:46:04 -07:00
packages/deb refactor: move from io/ioutil to io and os packages 2022-09-15 21:45:53 -07:00
paths all: use syncs.AtomicValue 2022-08-04 11:52:16 -07:00
portlist refactor: move from io/ioutil to io and os packages 2022-09-15 21:45:53 -07:00
prober syncs, all: move to using Go's new atomic types instead of ours 2022-08-04 07:47:59 -07:00
safesocket refactor: move from io/ioutil to io and os packages 2022-09-15 21:45:53 -07:00
scripts scripts/installer.sh: add -y for unattended install 2022-08-15 10:28:55 -07:00
smallzstd refactor: move from io/ioutil to io and os packages 2022-09-15 21:45:53 -07:00
ssh/tailssh refactor: move from io/ioutil to io and os packages 2022-09-15 21:45:53 -07:00
syncs syncs: add generic AtomicValue 2022-08-04 11:52:16 -07:00
tailcfg control/controlclient: stop restarting map polls on health change 2022-09-24 08:51:34 -07:00
tempfork refactor: move from io/ioutil to io and os packages 2022-09-15 21:45:53 -07:00
tka control/controlclient,ipn/ipnlocal: wire tka enable/disable 2022-09-21 12:57:59 -07:00
tool .github/workflows: add tsconnect static build to wasm GitHub action 2022-07-25 18:02:22 -07:00
tsconst net/interfaces/windows: update Tailscale interface detection logic to 2021-11-08 07:44:33 -08:00
tsnet refactor: move from io/ioutil to io and os packages 2022-09-15 21:45:53 -07:00
tstest net/netcheck: add check for captive portal (#5593) 2022-09-20 15:31:49 -04:00
tstime tstime/mono: fix Before function comment 2022-03-05 15:05:57 -08:00
tsweb tsweb: consider 304s as successful for quiet logging 2022-09-23 10:40:32 -07:00
types control/controlclient,ipn/ipnlocal: wire tka enable/disable 2022-09-21 12:57:59 -07:00
util tailcfg, util/deephash: add DataPlaneAuditLogID to Node and DomainDataPlaneAuditLogID to MapResponse 2022-09-22 17:18:28 -06:00
version ipn/localapi: send Tailscale version in ACME User-Agent (#5499) 2022-08-30 16:48:59 -04:00
wf all: convert more code to use net/netip directly 2022-07-25 21:53:49 -07:00
wgengine wgengine/magicsock: move firstDerp check after nil derpMap check 2022-09-22 11:54:56 -07:00
words words: this title should have been a pun, but I chickened out (#5506) 2022-08-31 07:02:49 -07:00
.gitattributes .: add .gitattributes entry to use Go hunk-header driver 2021-12-03 17:56:02 -08:00
.gitignore Makefile: update make spk target to use the new go spk builder 2022-01-21 12:27:00 -08:00
ALPINE.txt Docker: add ALPINE.txt to manage alpine versions 2022-06-29 11:47:09 -07:00
api.md api.md: added missing quote to POST DNS Searchpaths request body example 2022-07-21 17:44:51 -07:00
AUTHORS Move Linux client & common packages into a public repo. 2020-02-09 09:32:57 -08:00
build_dist.sh build_dist.sh: add --box and --extra-small flag to produce smaller and boxed binaries 2022-07-27 16:08:52 -07:00
build_docker.sh Dockerfile: bump alpine to 3.16 2022-06-29 10:29:37 -07:00
CODE_OF_CONDUCT.md Add a code of conduct. 2020-02-10 22:16:30 -08:00
Dockerfile Update Dockerfile to use golang:1.19-alpine 2022-09-16 11:40:31 -07:00
Dockerfile.base Dockerfile: bump alpine to 3.16 2022-06-29 10:29:37 -07:00
go.mod go.mod, wgengine/wgint: bump wireguard-go 2022-09-06 11:34:30 -07:00
go.sum go.mod, wgengine/wgint: bump wireguard-go 2022-09-06 11:34:30 -07:00
go.toolchain.branch go.toolchain.rev: switch to Go 1.19rc2+ 2022-07-28 11:28:21 -07:00
go.toolchain.rev go.toolchain.rev: bump to Go 1.19.1 2022-09-07 22:13:01 -07:00
LICENSE LICENSE: Reformat for Github 2021-01-24 16:20:22 -08:00
Makefile Makefile: add target for wasm and make it part of check 2022-08-15 09:43:35 -07:00
PATENTS Move Linux client & common packages into a public repo. 2020-02-09 09:32:57 -08:00
pull-toolchain.sh go.toolchain.rev: add update script 2022-01-10 14:55:04 -08:00
README.md all: require Go 1.19 2022-08-02 11:49:01 -07:00
SECURITY.md Add a SECURITY.md for vulnerability reports. 2020-02-11 10:26:41 -08:00
shell.nix shell.nix: update Go toolchain to 1.19 2022-07-29 11:25:47 -07:00
staticcheck.conf staticcheck.conf: remove unnecessary warning 2021-06-22 12:26:13 -07:00
version_test.go Dockerfile: add test that build-env Alpine version matches go.mod 2022-09-16 12:19:09 -07:00
version-embed.go Docker: add ALPINE.txt to manage alpine versions 2022-06-29 11:47:09 -07:00
VERSION.txt VERSION.txt: this is 1.31 2022-08-31 06:48:24 -07:00

Tailscale

https://tailscale.com

Private WireGuard® networks made easy

Overview

This repository contains all the open source Tailscale client code and the tailscaled daemon and tailscale CLI tool. The tailscaled daemon runs on Linux, Windows and macOS, and to varying degrees on FreeBSD, OpenBSD, and Darwin. (The Tailscale iOS and Android apps use this repo's code, but this repo doesn't contain the mobile GUI code.)

The Android app is at https://github.com/tailscale/tailscale-android

The Synology package is at https://github.com/tailscale/tailscale-synology

Using

We serve packages for a variety of distros at https://pkgs.tailscale.com .

Other clients

The macOS, iOS, and Windows clients use the code in this repository but additionally include small GUI wrappers that are not open source.

Building

go install tailscale.com/cmd/tailscale{,d}

If you're packaging Tailscale for distribution, use build_dist.sh instead, to burn commit IDs and version info into the binaries:

./build_dist.sh tailscale.com/cmd/tailscale
./build_dist.sh tailscale.com/cmd/tailscaled

If your distro has conventions that preclude the use of build_dist.sh, please do the equivalent of what it does in your distro's way, so that bug reports contain useful version information.

We require the latest Go release, currently Go 1.19.

Bugs

Please file any issues about this code or the hosted service on the issue tracker.

Contributing

PRs welcome! But please file bugs. Commit messages should reference bugs.

We require Developer Certificate of Origin Signed-off-by lines in commits.

About Us

Tailscale is primarily developed by the people at https://github.com/orgs/tailscale/people. For other contributors, see:

WireGuard is a registered trademark of Jason A. Donenfeld.