The easiest, most secure way to use WireGuard and 2FA.
Go to file
Brad Fitzpatrick c87d58063a control/controlclient: move lastPrintMap field from Direct to mapSession
It was a really a mutable field owned by mapSession that we didn't move
in earlier commits.

Once moved, it's then possible to de-func-ify the code and turn it into
a regular method rather than an installed optional hook.

Noticed while working to move map session lifetimes out of
Direct.sendMapRequest's single-HTTP-connection scope.

Updates #7175
Updates #cleanup

Change-Id: I6446b15793953d88d1cabf94b5943bb3ccac3ad9
Signed-off-by: Brad Fitzpatrick <bradfitz@tailscale.com>
2023-11-05 08:53:47 -08:00
.bencher
.github .github: Bump actions/checkout from 3 to 4 2023-11-01 13:26:33 -07:00
appc appc,cmd/sniproxy,ipn/ipnlocal: split sniproxy configuration code out of appc 2023-11-02 12:51:40 -07:00
atomicfile
chirp
client client/tailscale: remove redundant error check 2023-11-05 07:40:23 -08:00
clientupdate clientupdate: do not recursively delete dirs in cleanupOldDownloads (#10093) 2023-11-02 13:29:52 -07:00
cmd cmd/tailscale: respect existing web client pref 2023-11-03 17:26:52 -07:00
control control/controlclient: move lastPrintMap field from Direct to mapSession 2023-11-05 08:53:47 -08:00
derp derp/derphttp: fix derptrack fix 2023-11-04 11:48:40 -07:00
disco disco,net/tstun,wgengine/magicsock: probe peer MTU 2023-10-09 01:57:12 -07:00
docs cmd/k8s-operator: use our own container image instead of busybox 2023-10-17 08:11:16 -07:00
doctor
envknob tailcfg: define a type for NodeCapability 2023-09-17 13:16:29 -07:00
health all: use set.Set consistently instead of map[T]struct{} 2023-09-09 10:59:19 -07:00
hostinfo hostinfo: fix a couple of logic simplification lints 2023-11-01 13:14:25 -07:00
internal/tooldeps
ipn client/web: add some security checks for full client 2023-11-03 14:15:59 -07:00
jsondb
kube cmd/k8s-operator,ipn/store/kubestore: patch secrets instead of updating 2023-08-29 13:24:05 -07:00
licenses licenses: update android licenses 2023-10-26 15:21:33 -07:00
log tailcfg: move LogHeapPprof from Debug to c2n [capver 69] 2023-08-16 20:35:04 -07:00
logpolicy winutil: refactor methods to get values from registry to also return (#9536) 2023-09-26 13:15:11 -04:00
logtail adjust build tags for tamago 2023-09-06 05:50:18 -07:00
metrics metrics: add missing comma in histogram JSON export 2023-09-07 15:28:12 -07:00
net appc,ipn/ipnlocal,net/dns/resolver: add App Connector wiring when enabled in prefs 2023-11-01 16:09:08 -07:00
packages/deb
paths safesocket, paths: add Plan 9 support 2023-09-07 08:48:21 -07:00
portlist portlist: populate Pid field on Linux 2023-10-04 13:28:08 -07:00
posture posture: add get serial support for macOS 2023-10-09 14:46:59 +02:00
prober
proxymap wgengine, proxymap: split out port mapping from Engine to new type 2023-09-17 20:06:43 +01:00
release release/dist/unixpkgs: revert iptables move to Recommends, make it Depends 2023-10-04 08:56:42 -07:00
safesocket safesocket: make clear which net.Conns are winio types 2023-10-26 10:11:08 -07:00
scripts scripts/installer: add Kaisen, Garuda, Fedora-Asahi. 2023-08-25 08:40:14 -07:00
smallzstd
ssh/tailssh util/httpm, all: add a test to make sure httpm is used consistently 2023-10-03 09:26:13 -07:00
syncs syncs: add Map.LoadFunc (#9869) 2023-10-18 15:02:45 -07:00
tailcfg ipn/ipnlocal,tailcfg: add AppConnector service to HostInfo when configured 2023-11-01 16:37:24 -07:00
taildrop taildrop: fix theoretical race condition in fileDeleter.Init (#9876) 2023-10-19 13:26:55 -07:00
tempfork all: use Go 1.21 slices, maps instead of x/exp/{slices,maps} 2023-08-17 08:42:35 -07:00
tka all: use set.Set consistently instead of map[T]struct{} 2023-09-09 10:59:19 -07:00
tool tool: download helm CLI (#9981) 2023-10-30 18:20:33 +00:00
tsconst
tsd cmd/tailscaled,*: add start of configuration file support 2023-10-16 10:40:27 -07:00
tsnet client/web: fill devMode from an env var 2023-11-02 21:51:33 -04:00
tstest tstest/deptest: fix minor escaping error in regex 2023-11-01 16:22:18 -07:00
tstime tstime: add DefaultClock (#9691) 2023-10-12 16:01:17 -07:00
tsweb tsweb/varz: fix exporting histograms 2023-09-07 14:52:59 -07:00
types types/dnstype: update the usage documentation on dnstype.Resolver 2023-11-03 09:01:11 -07:00
util syspolicy: add Allow LAN Access visibility key (#10113) 2023-11-04 15:51:20 -04:00
version cmd/tailscale/cli: set Sparkle auto-update on macsys (#9952) 2023-10-24 12:17:55 -06:00
wf
wgengine wgengine/netstack: standardize var names in UpdateNetstackIPs 2023-11-01 08:29:32 -07:00
words words: flappy birds, but real life 2023-10-11 22:39:30 -07:00
.gitattributes
.gitignore client/web: always use new web client; remove old client 2023-08-28 11:11:16 -07:00
.golangci.yml
ALPINE.txt
api.md api.md: remove clientConnectivity.derp field 2023-10-06 09:29:42 -07:00
AUTHORS
build_dist.sh client/web: switch to using prebuilt web client assets 2023-09-19 10:09:54 -07:00
build_docker.sh
CODE_OF_CONDUCT.md
CODEOWNERS CODEOWNERS: add the start of an owners file 2023-08-16 15:57:29 -07:00
Dockerfile all: require Go 1.21 2023-08-08 21:15:08 -07:00
Dockerfile.base
flake.lock flake.nix: use Go 1.21 to build tailscale flake 2023-08-26 21:05:25 -07:00
flake.nix go.mod.sri: update SRI hash for go.mod changes 2023-11-03 19:28:46 -07:00
go.mod go.mod: update web-client-prebuilt 2023-11-03 15:00:41 -07:00
go.mod.sri go.mod.sri: update SRI hash for go.mod changes 2023-11-03 19:28:46 -07:00
go.sum go.mod: update web-client-prebuilt 2023-11-03 15:00:41 -07:00
go.toolchain.branch
go.toolchain.rev go.toolchain.rev: bump Tailscale Go toolchain 2023-10-22 16:20:41 -07:00
gomod_test.go go.mod: add test that replace directives aren't added in oss 2023-09-29 12:31:52 -07:00
LICENSE
Makefile Makefile: make it possibe to pass a custom tag when building dev images (#9461) 2023-09-19 17:51:22 +01:00
PATENTS
pull-toolchain.sh
README.md client/web: switch to using prebuilt web client assets 2023-09-19 10:09:54 -07:00
SECURITY.md
shell.nix go.mod.sri: update SRI hash for go.mod changes 2023-11-03 19:28:46 -07:00
staticcheck.conf
update-flake.sh
version_test.go
version-embed.go
VERSION.txt VERSION.txt: this is v1.53.0 (#10018) 2023-10-30 10:45:14 -07:00

Tailscale

https://tailscale.com

Private WireGuard® networks made easy

Overview

This repository contains the majority of Tailscale's open source code. Notably, it includes the tailscaled daemon and the tailscale CLI tool. The tailscaled daemon runs on Linux, Windows, macOS, and to varying degrees on FreeBSD and OpenBSD. The Tailscale iOS and Android apps use this repo's code, but this repo doesn't contain the mobile GUI code.

Other Tailscale repos of note:

For background on which parts of Tailscale are open source and why, see https://tailscale.com/opensource/.

Using

We serve packages for a variety of distros and platforms at https://pkgs.tailscale.com.

Other clients

The macOS, iOS, and Windows clients use the code in this repository but additionally include small GUI wrappers. The GUI wrappers on non-open source platforms are themselves not open source.

Building

We always require the latest Go release, currently Go 1.21. (While we build releases with our Go fork, its use is not required.)

go install tailscale.com/cmd/tailscale{,d}

If you're packaging Tailscale for distribution, use build_dist.sh instead, to burn commit IDs and version info into the binaries:

./build_dist.sh tailscale.com/cmd/tailscale
./build_dist.sh tailscale.com/cmd/tailscaled

If your distro has conventions that preclude the use of build_dist.sh, please do the equivalent of what it does in your distro's way, so that bug reports contain useful version information.

Bugs

Please file any issues about this code or the hosted service on the issue tracker.

Contributing

PRs welcome! But please file bugs. Commit messages should reference bugs.

We require Developer Certificate of Origin Signed-off-by lines in commits.

See git log for our commit message style. It's basically the same as Go's style.

About Us

Tailscale is primarily developed by the people at https://github.com/orgs/tailscale/people. For other contributors, see:

WireGuard is a registered trademark of Jason A. Donenfeld.