The easiest, most secure way to use WireGuard and 2FA.
Go to file
Nick Khyl cab0e1a6f7 uti/syspolicy: user policy support, auto-refresh and initial preparation for policy structs
This updates the syspolicy package to support multiple policy sources in the
three policy scopes: user, profile, and device, and provides a merged resultant
policy. A policy source is a syspolicy/source.Store that has a name and provides
access to policy settings for a given scope. It can be registered with
syspolicy/rsop.RegisterStore. Policy sources and policy stores can be either
platform-specific or platform-agnostic. On Windows, we have the Registry-based,
platform-specific policy store implemented as
syspolicy/source.PlatformPolicyStore. This store provides access to the Group
Policy and MDM policy settings stored in the Registry. On other platforms, we
currently provide a wrapper that converts a syspolicy.Handler into a
syspolicy/source.Store. However, we should update them in follow-up PRs. An
example of a platform-agnostic policy store would be a policy deployed from the
control, a local policy config file, or even environment variables.

We maintain the current, most recent version of the resultant policy for each
scope in an rsop.Policy. This is done by reading and merging the policy settings
from the registered stores the first time the resultant policy is requested,
then re-reading and re-merging them if a store implements the source.Changeable
interface and reports a policy change. Policy change notifications are debounced
to avoid re-reading policy settings multiple times if there are several changes
within a short period. The rsop.Policy can notify clients if the resultant
policy has changed. However, we do not currently expose this via the syspolicy
package and plan to do so differently along with a struct-based policy hierarchy
in the next PR.

To facilitate this, all policy settings should be registered with the
setting.Register function. The syspolicy package does this automatically for all
policy settings defined in policy_keys.go.

The new functionality is available through the existing syspolicy.Read* set of
functions. However, we plan to expose it via a struct-based policy hierarchy,
along with policy change notifications that other subsystems can use, in the
next PR. We also plan to send the resultant policy back from tailscaled to the
clients via the LocalAPI.

This is primarily a foundational PR to facilitate future changes, but the
immediate observable changes on Windows include:
- The service will use the current policy setting values instead of those read
  at OS boot time.
- The GUI has access to policy settings configured on a per-user basis.
On Android:
- We now report policy setting usage via clientmetrics.

Updates #12687

Signed-off-by: Nick Khyl <nickk@tailscale.com>
2024-08-02 20:01:13 -05:00
.bencher bencher: add config to suppress failures on benchmark regressions. 2021-10-01 16:16:02 -07:00
.github scripts: don't refresh the pacman repository on Arch (#12194) 2024-07-03 09:58:01 -07:00
appc appc: track metrics for route info storing 2024-07-12 10:39:48 -07:00
atomicfile various: add golangci-lint, fix issues (#7905) 2023-04-17 18:38:24 -04:00
chirp all: update copyright and license headers 2023-01-27 15:36:29 -08:00
client cmd/tailscale: add --min-validity flag to the cert command (#12822) 2024-07-19 09:35:22 -07:00
clientupdate clientupdate: return true for CanAutoUpdate for macsys (#12746) 2024-07-08 15:54:50 -07:00
cmd uti/syspolicy: user policy support, auto-refresh and initial preparation for policy structs 2024-08-02 20:01:13 -05:00
control health: introduce captive-portal-detected Warnable (#12707) 2024-07-26 11:25:55 -07:00
derp derp/derphttp: determine whether a region connect was to non-ideal node 2024-07-17 14:59:45 -07:00
disco disco: correct noun for nacl box type in disco docs 2023-12-14 16:41:53 -08:00
docs docs/k8s: fix subnet router manifests (#12305) 2024-05-31 19:15:02 +01:00
doctor net/{interfaces,netmon}, all: merge net/interfaces package into net/netmon 2024-04-28 07:34:52 -07:00
drive safesocket: add ConnectContext 2024-06-10 20:00:52 -07:00
envknob ci: enable checklocks workflow for specific packages 2024-06-26 13:55:07 -04:00
gokrazy gokrazy/tsapp: add go.mod replacing two tailscale.com binaries with parent module 2024-07-29 19:07:25 -07:00
health net/dns, health: raise health warning for failing forwarded DNS queries (#12888) 2024-07-29 13:48:46 -04:00
hostinfo hostinfo: set Hostinfo.PackageType for mkctr container builds 2024-07-17 11:26:16 -07:00
internal all: add test for package comments, fix, add comments as needed 2024-07-10 09:57:00 -07:00
ipn uti/syspolicy: user policy support, auto-refresh and initial preparation for policy structs 2024-08-02 20:01:13 -05:00
jsondb all: update copyright and license headers 2023-01-27 15:36:29 -08:00
k8s-operator cmd/k8s-operator,k8s-operator/sessionrecording,sessionrecording,ssh/tailssh: refactor session recording functionality (#12945) 2024-07-29 13:57:11 +01:00
kube all: add test for package comments, fix, add comments as needed 2024-07-10 09:57:00 -07:00
licenses licenses: update license notices 2024-07-22 14:50:50 -07:00
log log/sockstatlog: don't block for more than 5s on shutdown 2024-07-12 17:50:11 +01:00
logpolicy safesocket: add ConnectContext 2024-06-10 20:00:52 -07:00
logtail logtail: close idle HTTP connections on shutdown 2024-07-12 17:47:30 +01:00
metrics all: use Go 1.22 range-over-int 2024-04-16 15:32:38 -07:00
net net/netns: remove some logspam by avoiding logging parse errors due to unspecified addresses 2024-07-31 12:34:16 -06:00
omit cmd/tailscaled, ipn/conffile: support ec2 user-data config file 2024-05-30 09:49:18 -07:00
packages/deb go.mod: upgrade nfpm to v2 (#8786) 2023-08-03 13:00:45 -07:00
paths all: use Go 1.22 range-over-int 2024-04-16 15:32:38 -07:00
portlist all: use Go 1.22 range-over-int 2024-04-16 15:32:38 -07:00
posture posture: add network hardware addresses to posture identity 2024-07-10 18:28:30 +01:00
prober prober: propagate DERPMap request creation errors 2024-07-09 13:43:51 +01:00
proxymap ci: enable checklocks workflow for specific packages 2024-06-26 13:55:07 -04:00
publicapi publicapi: add note that API docs have moved to existing docs files (#12770) 2024-07-10 12:42:34 -06:00
release release/dist/qnap: omit .qpkg.codesigning files 2024-04-25 11:20:40 -04:00
safesocket safesocket: add ConnectContext 2024-06-10 20:00:52 -07:00
safeweb safeweb: handle mux pattern collisions more generally (#11801) 2024-04-25 16:08:30 -07:00
scripts scripts: don't refresh the pacman repository on Arch (#12194) 2024-07-03 09:58:01 -07:00
sessionrecording cmd/k8s-operator,k8s-operator/sessionrecording,sessionrecording,ssh/tailssh: refactor session recording functionality (#12945) 2024-07-29 13:57:11 +01:00
smallzstd all: use Go 1.22 range-over-int 2024-04-16 15:32:38 -07:00
ssh/tailssh cmd/k8s-operator,k8s-operator/sessionrecording,sessionrecording,ssh/tailssh: refactor session recording functionality (#12945) 2024-07-29 13:57:11 +01:00
syncs syncs: add Map.WithLock to allow mutations to the underlying map (#8101) 2024-07-11 16:16:30 -07:00
tailcfg health: introduce captive-portal-detected Warnable (#12707) 2024-07-26 11:25:55 -07:00
taildrop all: use new AppendEncode methods available in Go 1.22 (#11079) 2024-02-08 17:55:03 -08:00
tempfork cmd/tailscale: add shell tab-completion 2024-04-17 18:54:10 +01:00
tka ipn/ipnlocal: allow multiple signature chains from the same SigCredential 2024-06-27 19:28:57 +01:00
tool {tool,client}: bump node version (#12840) 2024-07-18 13:12:42 -06:00
tsconst all: update copyright and license headers 2023-01-27 15:36:29 -08:00
tsd health, all: remove health.Global, finish plumbing health.Tracker 2024-04-26 12:03:11 -07:00
tsnet tsnet: do not log an error on shutdown 2024-06-27 13:28:19 +01:00
tstest go.{mod,sum},tstest/tools,k8s-operator,cmd/k8s-operator: autogenerate CRD API docs (#12884) 2024-07-29 11:50:27 +01:00
tstime all: use math/rand/v2 more 2024-06-05 15:24:04 -07:00
tsweb tsweb: add QuietLogging option (#12838) 2024-07-29 13:53:01 +01:00
types types/lazy: re-init SyncValue during test cleanup if it wasn't set before SetForTest 2024-07-24 11:47:58 -05:00
util uti/syspolicy: user policy support, auto-refresh and initial preparation for policy structs 2024-08-02 20:01:13 -05:00
version version/mkversion: allow env config of oss git cache dir 2024-07-01 16:22:55 -07:00
wf all: add test for package comments, fix, add comments as needed 2024-07-10 09:57:00 -07:00
wgengine go.mod,net/tstun,wgengine/netstack: implement gVisor TCP GSO for Linux (#12869) 2024-07-31 09:42:11 -07:00
words words: add some associated with scales 2024-07-29 15:18:08 -07:00
.gitattributes .: add .gitattributes entry to use Go hunk-header driver 2021-12-03 17:56:02 -08:00
.gitignore ssh/tailssh: add integration test 2024-05-01 11:19:36 -05:00
.golangci.yml ci: run 'go vet' in golangci-lint; fix errors in tests 2023-12-07 15:08:28 -05:00
ALPINE.txt ALPINE.txt,Dockerfile{.base},build_docker.sh: bump alpine (#10543) 2023-12-11 07:03:18 +00:00
api.md publicapi: add note that API docs have moved to existing docs files (#12770) 2024-07-10 12:42:34 -06:00
AUTHORS Move Linux client & common packages into a public repo. 2020-02-09 09:32:57 -08:00
build_dist.sh cmd/tailscale: add shell tab-completion 2024-04-17 18:54:10 +01:00
build_docker.sh build_docker.sh: update script comment (#12970) 2024-07-30 15:12:43 +01:00
CODE_OF_CONDUCT.md Add a code of conduct. 2020-02-10 22:16:30 -08:00
CODEOWNERS CODEOWNERS: add the start of an owners file 2023-08-16 15:57:29 -07:00
Dockerfile Dockerfile: add a warning that this is not used to build our published images (#12955) 2024-07-30 12:22:53 +01:00
Dockerfile.base ALPINE.txt,Dockerfile{.base},build_docker.sh: bump alpine (#10543) 2023-12-11 07:03:18 +00:00
flake.lock flake.nix: build tailscale with go 1.22 2024-02-11 20:43:40 -08:00
flake.nix go.mod.sri: update SRI hash for go.mod changes 2024-07-29 19:40:24 -07:00
go.mod go.mod,net/tstun,wgengine/netstack: implement gVisor TCP GSO for Linux (#12869) 2024-07-31 09:42:11 -07:00
go.mod.sri go.mod.sri: update SRI hash for go.mod changes 2024-07-29 19:40:24 -07:00
go.sum go.mod,net/tstun,wgengine/netstack: implement gVisor TCP GSO for Linux (#12869) 2024-07-31 09:42:11 -07:00
go.toolchain.branch go.toolchain.rev: bump to Go 1.22.0 (#11055) 2024-02-07 14:57:57 -07:00
go.toolchain.rev go.toolchain.rev: update to Go 1.22.5 (#12690) 2024-07-02 14:39:30 -07:00
gomod_test.go go.mod: add test that replace directives aren't added in oss 2023-09-29 12:31:52 -07:00
header.txt cmd/k8s-operator: operator can create subnetrouter (#9505) 2023-12-14 13:51:59 +00:00
LICENSE all: update tools that manage copyright headers 2023-01-27 15:36:29 -08:00
Makefile cmd/k8s-operator: add depaware.txt 2024-07-08 12:43:10 -07:00
PATENTS Move Linux client & common packages into a public repo. 2020-02-09 09:32:57 -08:00
pkgdoc_test.go all: add test for package comments, fix, add comments as needed 2024-07-10 09:57:00 -07:00
pull-toolchain.sh pull-toolchain.sh: don't run update-flake.sh 2023-02-09 15:04:01 -08:00
README.md go.mod, README.md: use Go 1.22 2024-02-07 18:10:15 -08:00
SECURITY.md Add a SECURITY.md for vulnerability reports. 2020-02-11 10:26:41 -08:00
shell.nix go.mod.sri: update SRI hash for go.mod changes 2024-07-29 19:40:24 -07:00
staticcheck.conf all: cleanup unused code, part 2 (#10670) 2023-12-21 17:40:03 -08:00
update-flake.sh Code Improvements (#11311) 2024-03-08 15:24:36 -08:00
version_test.go go.mod,wgengine/netstack: bump gvisor 2024-01-19 18:23:53 -08:00
version-embed.go version: return correct Meta.MajorMinorPatch in non-dev builds 2023-02-10 13:00:44 -08:00
VERSION.txt VERSION.txt: this is v1.71.0 2024-07-17 11:27:05 -06:00

Tailscale

https://tailscale.com

Private WireGuard® networks made easy

Overview

This repository contains the majority of Tailscale's open source code. Notably, it includes the tailscaled daemon and the tailscale CLI tool. The tailscaled daemon runs on Linux, Windows, macOS, and to varying degrees on FreeBSD and OpenBSD. The Tailscale iOS and Android apps use this repo's code, but this repo doesn't contain the mobile GUI code.

Other Tailscale repos of note:

For background on which parts of Tailscale are open source and why, see https://tailscale.com/opensource/.

Using

We serve packages for a variety of distros and platforms at https://pkgs.tailscale.com.

Other clients

The macOS, iOS, and Windows clients use the code in this repository but additionally include small GUI wrappers. The GUI wrappers on non-open source platforms are themselves not open source.

Building

We always require the latest Go release, currently Go 1.22. (While we build releases with our Go fork, its use is not required.)

go install tailscale.com/cmd/tailscale{,d}

If you're packaging Tailscale for distribution, use build_dist.sh instead, to burn commit IDs and version info into the binaries:

./build_dist.sh tailscale.com/cmd/tailscale
./build_dist.sh tailscale.com/cmd/tailscaled

If your distro has conventions that preclude the use of build_dist.sh, please do the equivalent of what it does in your distro's way, so that bug reports contain useful version information.

Bugs

Please file any issues about this code or the hosted service on the issue tracker.

Contributing

PRs welcome! But please file bugs. Commit messages should reference bugs.

We require Developer Certificate of Origin Signed-off-by lines in commits.

See git log for our commit message style. It's basically the same as Go's style.

About Us

Tailscale is primarily developed by the people at https://github.com/orgs/tailscale/people. For other contributors, see:

WireGuard is a registered trademark of Jason A. Donenfeld.