The easiest, most secure way to use WireGuard and 2FA.
Go to file
Josh Bleecher Snyder 63cd581c3f safesocket: add ConnectionStrategy, provide control over fallbacks
fee2d9fad added support for cmd/tailscale to connect to IPNExtension.
It came in two parts: If no socket was provided, dial IPNExtension first,
and also, if dialing the socket failed, fall back to IPNExtension.

The second half of that support caused the integration tests to fail
when run on a machine that was also running IPNExtension.
The integration tests want to wait until the tailscaled instances
that they spun up are listening. They do that by dialing the new
instance. But when that dial failed, it was falling back to IPNExtension,
so it appeared (incorrectly) that tailscaled was running.
Hilarity predictably ensued.

If a user (or a test) explicitly provides a socket to dial,
it is a reasonable assumption that they have a specific tailscaled
in mind and don't want to fall back to IPNExtension.
It is certainly true of the integration tests.

Instead of adding a bool to Connect, split out the notion of a
connection strategy. For now, the implementation remains the same,
but with the details hidden a bit. Later, we can improve that.

Signed-off-by: Josh Bleecher Snyder <josh@tailscale.com>
2021-12-09 15:46:38 -08:00
.bencher bencher: add config to suppress failures on benchmark regressions. 2021-10-01 16:16:02 -07:00
.github .github/dependabot.yml: disable eager updates for Go. 2021-12-08 10:37:03 -08:00
atomicfile atomicfile: don't Chmod on windows 2020-07-15 12:31:40 -07:00
chirp wgengine/userspace: add support to automatically enable/disable the tailscale 2021-08-30 10:18:05 -07:00
client/tailscale safesocket: add ConnectionStrategy, provide control over fallbacks 2021-12-09 15:46:38 -08:00
cmd safesocket: add ConnectionStrategy, provide control over fallbacks 2021-12-09 15:46:38 -08:00
control control/noise: clean up resources in TestNoReuse 2021-12-01 12:50:21 -08:00
derp net/netns: thread logf into control functions 2021-11-18 15:09:51 -08:00
disco types/key: export constants for key size, not a method. 2021-10-29 17:39:04 -07:00
docs fix minor typo 2021-11-16 11:03:43 -08:00
health health: add a health state for net/dns.OSConfigurator. 2021-11-19 11:09:32 -08:00
hostinfo hostinfo: report when running in Docker Desktop. 2021-11-22 13:45:54 -08:00
internal/tooldeps util/deephash: move internal/deephash to util/deephash 2021-07-02 21:33:02 -07:00
ipn safesocket: add ConnectionStrategy, provide control over fallbacks 2021-12-09 15:46:38 -08:00
kube ipn/store: add ability to store data as k8s secrets. 2021-09-01 12:50:59 -07:00
log log/filelogger: make filelogger remove redundant date before adding a date 2021-11-18 10:23:41 -08:00
logpolicy logpolicy: export NewLogtailTransport for Android 2021-11-26 07:45:13 -08:00
logtail util/clientmetric, logtail: log metric changes 2021-11-16 08:06:31 -08:00
metrics all: use testingutil.MinAllocsPerRun 2021-10-28 12:48:37 -07:00
net net/dnscache, net/tsdial: add DNS caching to tsdial UserDial 2021-12-09 11:34:21 -08:00
packages/deb packages/deb: add package to extract metadata from .deb files. 2021-06-07 16:22:23 -07:00
paths paths: add missing js/wasm stub 2021-11-07 12:13:15 -08:00
portlist all: fix some js/wasm compilation issues 2021-10-20 10:06:16 -07:00
safesocket safesocket: add ConnectionStrategy, provide control over fallbacks 2021-12-09 15:46:38 -08:00
scripts scripts/installer.sh: add more Linux variants. 2021-11-23 15:12:29 -08:00
smallzstd smallzstd: new package that constructs zstd small encoders/decoders. 2020-07-02 16:13:06 -07:00
syncs syncs: mark as safe for Go 1.18 2021-10-27 18:10:09 -07:00
tailcfg tailcfg, ipn/ipnlocal: advertise a Service when exit node DNS proxy available 2021-11-29 21:57:06 -08:00
tempfork/pprof tempfork/wireguard-windows: remove the old windows firewall code now that we are no 2021-08-26 15:00:45 -07:00
tsconst net/interfaces/windows: update Tailscale interface detection logic to 2021-11-08 07:44:33 -08:00
tsnet ipn/ipnlocal, net/tsdial: make SOCKS/HTTP dials use ExitDNS 2021-12-03 13:39:37 -08:00
tstest safesocket: add ConnectionStrategy, provide control over fallbacks 2021-12-09 15:46:38 -08:00
tstime all: add (*testing.B).ReportAllocs() to every benchmark 2021-08-30 21:41:04 -07:00
tsweb all: fix spelling mistakes 2021-10-12 21:23:14 -07:00
types types/logger: add Context and related helpers 2021-11-30 15:18:21 -08:00
util util/clientmetric: add tests omitted from earlier commit 2021-11-22 21:49:28 -08:00
version version/distro: report TrueNAS Scale as "truenas" 2021-12-07 21:04:58 -08:00
wf wf: loopback condition should use MatchTypeFlagsAllSet. 2021-06-16 12:57:57 +05:00
wgengine wgengine/netstack: in netstack/hybrid mode, fake ICMP using ping command 2021-12-09 09:30:10 -08:00
words words: remove two plurals, one with a typo 2021-09-08 12:21:22 -07:00
.gitattributes .: add .gitattributes entry to use Go hunk-header driver 2021-12-03 17:56:02 -08:00
.gitignore Revert "cmd/tailscaled: split package main into main shim + package" 2021-03-25 09:06:00 -07:00
api.md api: document new API to authorize a device (#2825) 2021-09-09 10:56:24 -07:00
AUTHORS Move Linux client & common packages into a public repo. 2020-02-09 09:32:57 -08:00
build_dist.sh build_docker.sh: use github.com/tailscale/mkctr instead of docker 2021-11-22 11:39:30 -08:00
build_docker.sh build_docker.sh: prefix version strings with v 2021-12-03 13:55:09 -08:00
CODE_OF_CONDUCT.md Add a code of conduct. 2020-02-10 22:16:30 -08:00
Dockerfile build_docker.sh: use github.com/tailscale/mkctr instead of docker 2021-11-22 11:39:30 -08:00
Dockerfile.base build_docker.sh: use github.com/tailscale/mkctr instead of docker 2021-11-22 11:39:30 -08:00
go.mod net/dnscache, net/tsdial: add DNS caching to tsdial UserDial 2021-12-09 11:34:21 -08:00
go.sum net/dnscache, net/tsdial: add DNS caching to tsdial UserDial 2021-12-09 11:34:21 -08:00
LICENSE LICENSE: Reformat for Github 2021-01-24 16:20:22 -08:00
Makefile Makefile: add spk and pushspk targets for iterative Synology development 2021-12-06 09:52:06 -08:00
PATENTS Move Linux client & common packages into a public repo. 2020-02-09 09:32:57 -08:00
README.md all: bump minimum Go to 1.17 2021-09-02 12:51:11 -07:00
SECURITY.md Add a SECURITY.md for vulnerability reports. 2020-02-11 10:26:41 -08:00
shell.nix add nix-shell boilerplate (#1028) 2020-12-29 12:17:03 -05:00
staticcheck.conf staticcheck.conf: remove unnecessary warning 2021-06-22 12:26:13 -07:00
version-embed.go version: embed VERSION.txt in unstamped version 2021-10-28 09:48:24 -07:00
VERSION.txt VERSION.txt: this is v1.19.0 2021-11-18 12:12:48 -08:00

Tailscale

https://tailscale.com

Private WireGuard® networks made easy

Overview

This repository contains all the open source Tailscale client code and the tailscaled daemon and tailscale CLI tool. The tailscaled daemon runs primarily on Linux; it also works to varying degrees on FreeBSD, OpenBSD, Darwin, and Windows.

The Android app is at https://github.com/tailscale/tailscale-android

Using

We serve packages for a variety of distros at https://pkgs.tailscale.com .

Other clients

The macOS, iOS, and Windows clients use the code in this repository but additionally include small GUI wrappers that are not open source.

Building

go install tailscale.com/cmd/tailscale{,d}

If you're packaging Tailscale for distribution, use build_dist.sh instead, to burn commit IDs and version info into the binaries:

./build_dist.sh tailscale.com/cmd/tailscale
./build_dist.sh tailscale.com/cmd/tailscaled

If your distro has conventions that preclude the use of build_dist.sh, please do the equivalent of what it does in your distro's way, so that bug reports contain useful version information.

We only guarantee to support the latest Go release and any Go beta or release candidate builds (currently Go 1.17) in module mode. It might work in earlier Go versions or in GOPATH mode, but we're making no effort to keep those working.

Bugs

Please file any issues about this code or the hosted service on the issue tracker.

Contributing

PRs welcome! But please file bugs. Commit messages should reference bugs.

We require Developer Certificate of Origin Signed-off-by lines in commits.

About Us

Tailscale is primarily developed by the people at https://github.com/orgs/tailscale/people. For other contributors, see:

WireGuard is a registered trademark of Jason A. Donenfeld.