The easiest, most secure way to use WireGuard and 2FA.
Go to file
Maisem Ali 4b13e6e087 go.mod: bump golang.org/x/net
Theory is that our long lived http2 connection to control would
get tainted by _something_ (unclear what) and would get closed.

This picks up the fix for golang/go#60818.

Updates tailscale/corp#5761

Signed-off-by: Maisem Ali <maisem@tailscale.com>
2023-08-22 16:25:19 -04:00
.bencher bencher: add config to suppress failures on benchmark regressions. 2021-10-01 16:16:02 -07:00
.github .github: add flakehub-publish-tagged.yml (#9009) 2023-08-22 11:18:29 -04:00
atomicfile various: add golangci-lint, fix issues (#7905) 2023-04-17 18:38:24 -04:00
chirp all: update copyright and license headers 2023-01-27 15:36:29 -08:00
client client/web: fix globbing for file embedding 2023-08-22 12:42:34 -07:00
clientupdate clientupdate: parse /etc/synoinfo.conf to get CPU arch (#8940) 2023-08-17 16:45:50 -07:00
cmd cmd/tailscale/cli, ipn/ipnlocal: [funnel] add stream mode 2023-08-22 10:07:34 -04:00
control types/netmap: remove redundant Netmap.Hostinfo 2023-08-22 09:54:02 -07:00
derp derp: include src IPs in mesh watch messages 2023-08-16 08:46:52 -07:00
disco wgengine,ipn,cmd/tailscale: add size option to ping (#8739) 2023-08-08 13:11:28 +01:00
docs docs/k8s: don't call kubectl directly from Makefile 2023-07-01 11:44:09 -07:00
doctor doctor/permissions: add new check to print process permissions 2023-03-29 11:50:23 -04:00
envknob types/netmap, all: make NetworkMap.SelfNode a tailcfg.NodeView 2023-08-21 13:34:49 -07:00
health cmd/tailscale: warn if node is locked out on bringup 2023-07-19 12:31:21 -05:00
hostinfo tailcfg: Add FirewallMode to NetInfo to record wether host using iptables or nftables 2023-08-15 18:52:51 -04:00
internal/tooldeps various: add golangci-lint, fix issues (#7905) 2023-04-17 18:38:24 -04:00
ipn ipn, ipn/ipnlocal: clean up documentation and use clock instead of time 2023-08-22 19:17:29 +01:00
jsondb all: update copyright and license headers 2023-01-27 15:36:29 -08:00
kube ipn/store: add support for stores to hook into a custom dialer 2023-03-29 16:35:46 -07:00
licenses licenses: update tailscale{,d} licenses 2023-08-21 12:36:37 -07:00
log tailcfg: move LogHeapPprof from Debug to c2n [capver 69] 2023-08-16 20:35:04 -07:00
logpolicy util/testenv: add new package to hold InTest 2023-08-08 19:51:44 -06:00
logtail logtail: use tstime (#8607) 2023-07-21 13:10:39 -04:00
metrics all: use Go 1.21 slices, maps instead of x/exp/{slices,maps} 2023-08-17 08:42:35 -07:00
net net/portmapper: never select port 0 in UPnP 2023-08-21 14:33:26 -04:00
packages/deb go.mod: upgrade nfpm to v2 (#8786) 2023-08-03 13:00:45 -07:00
paths all: adjust some build tags for wasi 2023-06-11 09:45:46 -07:00
portlist all: use Go 1.21 slices, maps instead of x/exp/{slices,maps} 2023-08-17 08:42:35 -07:00
prober prober: fix data race when altering derpmap (#8397) 2023-06-21 10:16:31 -07:00
release release/dist: run yarn build before building CLI 2023-08-22 11:12:47 -07:00
safesocket safesocket: enable test to run on Windows unpriviliged 2023-04-19 19:06:18 -07:00
scripts scripts/installer.sh: set Deepin to a debian version 2023-08-12 07:51:11 -07:00
smallzstd all: update copyright and license headers 2023-01-27 15:36:29 -08:00
ssh/tailssh types/netmap, all: make NetworkMap.SelfNode a tailcfg.NodeView 2023-08-21 13:34:49 -07:00
syncs all: use Go 1.21 slices, maps instead of x/exp/{slices,maps} 2023-08-17 08:42:35 -07:00
tailcfg types/views,cmd/viewer: add ByteSlice[T] to replace mem.RO 2023-08-20 15:30:35 -04:00
tempfork all: use Go 1.21 slices, maps instead of x/exp/{slices,maps} 2023-08-17 08:42:35 -07:00
tka all: implement lock revoke-keys command 2023-08-01 15:37:55 -05:00
tool release/dist: run yarn build before building CLI 2023-08-22 11:12:47 -07:00
tsconst all: update copyright and license headers 2023-01-27 15:36:29 -08:00
tsd tsd: add package with System type to unify subsystem init, discovery 2023-05-04 14:21:59 -07:00
tsnet tsnet: add support for clientmetrics. 2023-08-21 06:26:40 -07:00
tstest tailcfg: remove unused Domain field from Login/User 2023-08-18 20:07:17 -07:00
tstime tstime/mono: remove unsafe 2023-08-11 13:23:16 -07:00
tsweb tsweb: add request ID for errors 2023-08-16 12:55:31 -04:00
types types/netmap: remove redundant Netmap.Hostinfo 2023-08-22 09:54:02 -07:00
util util/linuxfw: fix typo in unexported doc comment 2023-08-21 10:14:28 -07:00
version cmd/tailscale/cli,version/distro: update support for Alpine (#8701) 2023-07-24 16:53:15 -07:00
wf all: update copyright and license headers 2023-01-27 15:36:29 -08:00
wgengine types/netmap: remove redundant Netmap.Hostinfo 2023-08-22 09:54:02 -07:00
words words: ack Miles Prower (#8479) 2023-07-06 11:29:09 -04:00
.gitattributes .: add .gitattributes entry to use Go hunk-header driver 2021-12-03 17:56:02 -08:00
.gitignore client/web: copy existing UI to basic react components 2023-08-15 12:01:36 -07:00
.golangci.yml ci: add more lints (#7909) 2023-04-19 21:54:19 -04:00
ALPINE.txt Docker: add ALPINE.txt to manage alpine versions 2022-06-29 11:47:09 -07:00
api.md api.md: update device authorize API docs to allow for deauth (#8728) 2023-07-27 15:30:14 +01:00
AUTHORS Move Linux client & common packages into a public repo. 2020-02-09 09:32:57 -08:00
build_dist.sh build_dist.sh: use $go consistently. 2023-06-05 10:21:03 -07:00
build_docker.sh Dockerfile: fix docker build 2023-02-14 00:59:09 +00:00
CODE_OF_CONDUCT.md Add a code of conduct. 2020-02-10 22:16:30 -08:00
CODEOWNERS CODEOWNERS: add the start of an owners file 2023-08-16 15:57:29 -07:00
Dockerfile all: require Go 1.21 2023-08-08 21:15:08 -07:00
Dockerfile.base Dockerfile.base: install iputils 2023-06-18 07:54:05 -07:00
flake.lock nix: update nixpkgs flake, override go_1_20 for tailscale_go (#7139) 2023-02-01 12:27:04 -05:00
flake.nix go.mod.sri: update SRI hash for go.mod changes 2023-08-21 12:04:38 -07:00
go.mod go.mod: bump golang.org/x/net 2023-08-22 16:25:19 -04:00
go.mod.sri go.mod.sri: update SRI hash for go.mod changes 2023-08-21 12:04:38 -07:00
go.sum go.mod: bump golang.org/x/net 2023-08-22 16:25:19 -04:00
go.toolchain.branch go.toolchain: switch to tailscale.go1.21 (#8415) 2023-06-23 09:12:19 -04:00
go.toolchain.rev tstime/mono: remove unsafe 2023-08-11 13:23:16 -07:00
LICENSE all: update tools that manage copyright headers 2023-01-27 15:36:29 -08:00
Makefile release/dist/synology: build synology packages with cmd/dist 2023-05-29 14:18:37 -07:00
PATENTS Move Linux client & common packages into a public repo. 2020-02-09 09:32:57 -08:00
pull-toolchain.sh pull-toolchain.sh: don't run update-flake.sh 2023-02-09 15:04:01 -08:00
README.md all: require Go 1.21 2023-08-08 21:15:08 -07:00
SECURITY.md Add a SECURITY.md for vulnerability reports. 2020-02-11 10:26:41 -08:00
shell.nix go.mod.sri: update SRI hash for go.mod changes 2023-08-21 12:04:38 -07:00
staticcheck.conf staticcheck.conf: remove unnecessary warning 2021-06-22 12:26:13 -07:00
update-flake.sh .github/workflows: add workflow to update go.mod Nix SRI hash 2023-02-14 03:28:43 +00:00
version_test.go all: update copyright and license headers 2023-01-27 15:36:29 -08:00
version-embed.go version: return correct Meta.MajorMinorPatch in non-dev builds 2023-02-10 13:00:44 -08:00
VERSION.txt VERSION.txt: this is v1.49.0 (#8907) 2023-08-16 09:37:36 -07:00

Tailscale

https://tailscale.com

Private WireGuard® networks made easy

Overview

This repository contains the majority of Tailscale's open source code. Notably, it includes the tailscaled daemon and the tailscale CLI tool. The tailscaled daemon runs on Linux, Windows, macOS, and to varying degrees on FreeBSD and OpenBSD. The Tailscale iOS and Android apps use this repo's code, but this repo doesn't contain the mobile GUI code.

Other Tailscale repos of note:

For background on which parts of Tailscale are open source and why, see https://tailscale.com/opensource/.

Using

We serve packages for a variety of distros and platforms at https://pkgs.tailscale.com.

Other clients

The macOS, iOS, and Windows clients use the code in this repository but additionally include small GUI wrappers. The GUI wrappers on non-open source platforms are themselves not open source.

Building

We always require the latest Go release, currently Go 1.21. (While we build releases with our Go fork, its use is not required.)

go install tailscale.com/cmd/tailscale{,d}

If you're packaging Tailscale for distribution, use build_dist.sh instead, to burn commit IDs and version info into the binaries:

./build_dist.sh tailscale.com/cmd/tailscale
./build_dist.sh tailscale.com/cmd/tailscaled

If your distro has conventions that preclude the use of build_dist.sh, please do the equivalent of what it does in your distro's way, so that bug reports contain useful version information.

Bugs

Please file any issues about this code or the hosted service on the issue tracker.

Contributing

PRs welcome! But please file bugs. Commit messages should reference bugs.

We require Developer Certificate of Origin Signed-off-by lines in commits.

See git log for our commit message style. It's basically the same as Go's style.

About Us

Tailscale is primarily developed by the people at https://github.com/orgs/tailscale/people. For other contributors, see:

WireGuard is a registered trademark of Jason A. Donenfeld.