The easiest, most secure way to use WireGuard and 2FA.
Go to file
David Crawshaw f5e0407e97 ipn: exercise logout in e2e test
Signed-off-by: David Crawshaw <crawshaw@tailscale.com>
2020-03-08 09:03:27 -04:00
.github Revert "update CI and everything to Go 1.14." 2020-03-06 13:45:54 -08:00
atomicfile Move Linux client & common packages into a public repo. 2020-02-09 09:32:57 -08:00
cmd wgengine: define default tunname for each platform 2020-03-07 21:40:01 -08:00
control/controlclient controlclient: set default TimeNow function 2020-03-08 09:03:27 -04:00
derp derp: add some varz tests for active/home conns 2020-03-05 20:29:07 -08:00
interfaces magicsock, interfaces: move some code from magicsock to interfaces 2020-03-02 10:38:44 -08:00
ipn ipn: exercise logout in e2e test 2020-03-08 09:03:27 -04:00
logpolicy logpolicy: automatically figure out paths and filenames. 2020-02-19 18:52:41 -08:00
logtail logtail/filch: use x/sys/unix instead of syscall. 2020-02-13 23:56:39 -08:00
metrics metrics: add a LabelMap type for variables with 1 label dimension. 2020-03-04 13:22:50 -08:00
net/dnscache net/dnscache: add overly simplistic DNS cache package for selective use 2020-03-05 12:23:37 -08:00
netcheck net/dnscache: add overly simplistic DNS cache package for selective use 2020-03-05 12:23:37 -08:00
paths paths: use /var/db for state on BSDs, and /var/run for sockets. 2020-03-03 17:49:31 -08:00
portlist portlist: add a lint ignore for unused function. 2020-02-10 23:50:06 -08:00
ratelimit Move Linux client & common packages into a public repo. 2020-02-09 09:32:57 -08:00
safesocket safesocket: make some effort to create parent directory of sock 2020-03-03 11:47:21 -08:00
stun stun: add server support 2020-02-26 15:19:32 -08:00
stunner net/dnscache: add overly simplistic DNS cache package for selective use 2020-03-05 12:23:37 -08:00
tailcfg magicsock, wgengine, ipn, controlclient: plumb regular netchecks to map poll 2020-03-04 08:19:45 -08:00
tempfork/osexec Move Linux client & common packages into a public repo. 2020-02-09 09:32:57 -08:00
testy Move Linux client & common packages into a public repo. 2020-02-09 09:32:57 -08:00
tsweb tsweb: don't double import expvar; appease staticcheck 2020-03-06 13:08:32 -08:00
types types/logger: add adapters for Logf to std Logger/Writer 2020-03-06 12:00:24 -08:00
version version: bump 2020-03-06 14:57:27 -08:00
wgengine wgengine: shut down wireguard on Close 2020-03-08 09:03:27 -04:00
.gitattributes .gitattributes: add a smudge filter for go.mod. 2020-02-19 20:02:02 -05:00
.gitignore cmd/relaynode: drop local --acl-file in favour of central packet filter. 2020-02-20 00:15:43 -05:00
AUTHORS Move Linux client & common packages into a public repo. 2020-02-09 09:32:57 -08:00
CODE_OF_CONDUCT.md Add a code of conduct. 2020-02-10 22:16:30 -08:00
Dockerfile Revert "update CI and everything to Go 1.14." 2020-03-06 13:45:54 -08:00
go.mod go.mod: bump wireguard-go. 2020-03-06 23:38:02 -08:00
go.sum go.mod: pull in deadlock fix from tailscale/wireguard-go. 2020-03-06 20:43:38 -08:00
LICENSE Move Linux client & common packages into a public repo. 2020-02-09 09:32:57 -08:00
PATENTS Move Linux client & common packages into a public repo. 2020-02-09 09:32:57 -08:00
README.md Revert "update CI and everything to Go 1.14." 2020-03-06 13:45:54 -08:00
SECURITY.md Add a SECURITY.md for vulnerability reports. 2020-02-11 10:26:41 -08:00

Tailscale

https://tailscale.com

Private WireGuard® networks made easy

Overview

This repository contains all the open source Tailscale code. It currently includes the Linux client.

The Linux client is currently cmd/relaynode, but will soon be replaced by cmd/tailscaled.

Using

We serve packages for a variety of distros at https://pkgs.tailscale.com .

Building

go install tailscale.com/cmd/tailscale{,d}

We only support the latest Go release and any Go beta or release candidate builds (currently Go 1.13.x or Go 1.14) in module mode. It might work in earlier Go versions or in GOPATH mode, but we're making no effort to keep those working.

Bugs

Please file any issues about this code or the hosted service on the issue tracker.

Contributing

under_construction.gif

PRs welcome, but we are still working out our contribution process and tooling.

We require Developer Certificate of Origin Signed-off-by lines in commits.

About Us

We are apenwarr, bradfitz, crawshaw, danderson, dfcarney, from Tailscale Inc. You can learn more about us from our website.

WireGuard is a registered trademark of Jason A. Donenfeld.