The easiest, most secure way to use WireGuard and 2FA.
Go to file
Josh Bleecher Snyder bb8ce48a6b logtail: allow changing log level concurrently
When tailscaled starts up, these lines run:

func run() error {
	// ...
	pol := logpolicy.New("tailnode.log.tailscale.io")
	pol.SetVerbosityLevel(args.verbose)
	// ...
}

If there are old log entries present, they immediate start getting uploaded. This races with the call to pol.SetVerbosityLevel.

This manifested itself as a test failure in tailscale.com/tstest/integration
when run with -race:

WARNING: DATA RACE
Read at 0x00c0001bc970 by goroutine 24:
  tailscale.com/logtail.(*Logger).Write()
      /Users/josh/t/corp/oss/logtail/logtail.go:517 +0x27c
  log.(*Logger).Output()
      /Users/josh/go/ts/src/log/log.go:184 +0x2b8
  log.Printf()
      /Users/josh/go/ts/src/log/log.go:323 +0x94
  tailscale.com/logpolicy.newLogtailTransport.func1()
      /Users/josh/t/corp/oss/logpolicy/logpolicy.go:509 +0x36c
  net/http.(*Transport).dial()
      /Users/josh/go/ts/src/net/http/transport.go:1168 +0x238
  net/http.(*Transport).dialConn()
      /Users/josh/go/ts/src/net/http/transport.go:1606 +0x21d0
  net/http.(*Transport).dialConnFor()
      /Users/josh/go/ts/src/net/http/transport.go:1448 +0xe4

Previous write at 0x00c0001bc970 by main goroutine:
  tailscale.com/logtail.(*Logger).SetVerbosityLevel()
      /Users/josh/t/corp/oss/logtail/logtail.go:131 +0x98
  tailscale.com/logpolicy.(*Policy).SetVerbosityLevel()
      /Users/josh/t/corp/oss/logpolicy/logpolicy.go:463 +0x60
  main.run()
      /Users/josh/t/corp/oss/cmd/tailscaled/tailscaled.go:178 +0x50
  main.main()
      /Users/josh/t/corp/oss/cmd/tailscaled/tailscaled.go:163 +0x71c

Goroutine 24 (running) created at:
  net/http.(*Transport).queueForDial()
      /Users/josh/go/ts/src/net/http/transport.go:1417 +0x4d8
  net/http.(*Transport).getConn()
      /Users/josh/go/ts/src/net/http/transport.go:1371 +0x5b8
  net/http.(*Transport).roundTrip()
      /Users/josh/go/ts/src/net/http/transport.go:585 +0x7f4
  net/http.(*Transport).RoundTrip()
      /Users/josh/go/ts/src/net/http/roundtrip.go:17 +0x30
  net/http.send()
      /Users/josh/go/ts/src/net/http/client.go:251 +0x4f0
  net/http.(*Client).send()
      /Users/josh/go/ts/src/net/http/client.go:175 +0x148
  net/http.(*Client).do()
      /Users/josh/go/ts/src/net/http/client.go:717 +0x1d0
  net/http.(*Client).Do()
      /Users/josh/go/ts/src/net/http/client.go:585 +0x358
  tailscale.com/logtail.(*Logger).upload()
      /Users/josh/t/corp/oss/logtail/logtail.go:367 +0x334
  tailscale.com/logtail.(*Logger).uploading()
      /Users/josh/t/corp/oss/logtail/logtail.go:289 +0xec


Rather than complicate the logpolicy API,
allow the verbosity to be adjusted concurrently.

Signed-off-by: Josh Bleecher Snyder <josh@tailscale.com>
2021-05-25 15:29:21 -07:00
.github .github: remove verbose issue templates, add triage label. 2021-05-06 19:14:19 -07:00
atomicfile atomicfile: don't Chmod on windows 2020-07-15 12:31:40 -07:00
client/tailscale ipn/ipnlocal, etc: require file sharing capability to send/recv files 2021-04-16 10:58:19 -07:00
cmd go.mod: upgrade wireguard-windows, de-fork wireguard-go 2021-05-25 13:18:21 -07:00
control/controlclient all: adapt to opaque netaddr types 2021-05-16 14:52:00 -07:00
derp derp/derpmap: add São Paulo (derp11) 2021-04-21 11:04:47 -07:00
disco all: adapt to opaque netaddr types 2021-05-16 14:52:00 -07:00
health wgengine/magicsock: always run ReceiveIPv6 2021-04-28 11:07:14 -07:00
internal internal/deephash: remove remaining type special cases 2021-05-24 15:22:44 -07:00
ipn paths: generalize IOSSharedDir to cover Android 2021-05-24 13:52:48 -07:00
log log/filelogger: move our Windows disk file writing+rotation package here 2020-10-29 14:59:44 -07:00
logpolicy logpolicy: set log target on windows based on a registry key (#1542) 2021-03-18 13:23:56 -04:00
logtail logtail: allow changing log level concurrently 2021-05-25 15:29:21 -07:00
metrics metrics: add LabelMap.GetFloat 2020-07-19 12:31:12 -07:00
net go.mod: upgrade wireguard-windows, de-fork wireguard-go 2021-05-25 13:18:21 -07:00
paths paths: generalize IOSSharedDir to cover Android 2021-05-24 13:52:48 -07:00
portlist portlist: suppress staticcheck error 2021-05-04 08:54:50 -07:00
safesocket safesocket: delete unused function 2021-05-04 08:54:50 -07:00
scripts scripts: fix up installer script comments. 2021-05-14 14:13:31 -07:00
smallzstd smallzstd: new package that constructs zstd small encoders/decoders. 2020-07-02 16:13:06 -07:00
syncs syncs: stop running TestWatchMultipleValues on CI 2021-05-04 10:21:21 -07:00
tailcfg tailcfg, types/wgkey: add AppendTo methods on some types 2021-05-24 15:09:57 -07:00
tempfork tempfork/wireguard-windows/firewall: add. 2021-03-01 19:37:22 -08:00
tsconst net/netns: add windows support. 2020-09-14 16:28:49 -07:00
tsnet all: adapt to opaque netaddr types 2021-05-16 14:52:00 -07:00
tstest Added new Addresses / AllowedIPs fields to testcontrol when creating tailcfg.Node (#1948) 2021-05-18 16:20:29 -04:00
tstime tstime: add RandomDurationBetween helper 2021-01-21 07:54:14 -08:00
tsweb tsweb: add num_goroutines expvar 2021-02-01 14:38:59 -08:00
types tailcfg, types/wgkey: add AppendTo methods on some types 2021-05-24 15:09:57 -07:00
util util/dnsname: normalize leading dots in ToFQDN. 2021-05-10 13:07:03 -07:00
version version: add func IsRace to report whether race detector enabled 2021-05-12 13:12:41 -07:00
wf all: adapt to opaque netaddr types 2021-05-16 14:52:00 -07:00
wgengine go.mod: upgrade wireguard-windows, de-fork wireguard-go 2021-05-25 13:18:21 -07:00
.gitattributes .gitattributes: add a smudge filter for go.mod. 2020-02-19 20:02:02 -05:00
.gitignore Revert "cmd/tailscaled: split package main into main shim + package" 2021-03-25 09:06:00 -07:00
api.md api.md: clarify response behaviour for ACL POST endpoint 2021-04-10 11:38:12 -07:00
AUTHORS Move Linux client & common packages into a public repo. 2020-02-09 09:32:57 -08:00
build_dist.sh build_dist: fix after version refactor. 2020-11-03 14:40:09 -08:00
build_docker.sh build_docker.sh, Dockerfile: fix bug with shell quoting 2021-03-05 10:38:32 -08:00
CODE_OF_CONDUCT.md Add a code of conduct. 2020-02-10 22:16:30 -08:00
Dockerfile build_docker.sh, Dockerfile: fix bug with shell quoting 2021-03-05 10:38:32 -08:00
go.mod go.mod: upgrade wireguard-windows, de-fork wireguard-go 2021-05-25 13:18:21 -07:00
go.sum go.mod: upgrade wireguard-windows, de-fork wireguard-go 2021-05-25 13:18:21 -07:00
LICENSE LICENSE: Reformat for Github 2021-01-24 16:20:22 -08:00
Makefile wgengine/netstack: fix 32-bit build broken from prior commit 2021-03-01 11:19:31 -08:00
PATENTS Move Linux client & common packages into a public repo. 2020-02-09 09:32:57 -08:00
README.md Switch to Go 1.16. 2021-02-19 13:18:31 -08:00
SECURITY.md Add a SECURITY.md for vulnerability reports. 2020-02-11 10:26:41 -08:00
shell.nix add nix-shell boilerplate (#1028) 2020-12-29 12:17:03 -05:00
VERSION.txt VERSION.txt: the 1.9.x dev cycle hath begun 2021-05-06 10:35:05 -07:00

Tailscale

https://tailscale.com

Private WireGuard® networks made easy

Overview

This repository contains all the open source Tailscale client code and the tailscaled daemon and tailscale CLI tool. The tailscaled daemon runs primarily on Linux; it also works to varying degrees on FreeBSD, OpenBSD, Darwin, and Windows.

The Android app is at https://github.com/tailscale/tailscale-android

Using

We serve packages for a variety of distros at https://pkgs.tailscale.com .

Other clients

The macOS, iOS, and Windows clients use the code in this repository but additionally include small GUI wrappers that are not open source.

Building

go install tailscale.com/cmd/tailscale{,d}

If you're packaging Tailscale for distribution, use build_dist.sh instead, to burn commit IDs and version info into the binaries:

./build_dist.sh tailscale.com/cmd/tailscale
./build_dist.sh tailscale.com/cmd/tailscaled

If your distro has conventions that preclude the use of build_dist.sh, please do the equivalent of what it does in your distro's way, so that bug reports contain useful version information.

We only guarantee to support the latest Go release and any Go beta or release candidate builds (currently Go 1.16) in module mode. It might work in earlier Go versions or in GOPATH mode, but we're making no effort to keep those working.

Bugs

Please file any issues about this code or the hosted service on the issue tracker.

Contributing

PRs welcome! But please file bugs. Commit messages should reference bugs.

We require Developer Certificate of Origin Signed-off-by lines in commits.

About Us

Tailscale is primarily developed by the people at https://github.com/orgs/tailscale/people. For other contributors, see:

WireGuard is a registered trademark of Jason A. Donenfeld.