You cannot select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
 
 
 
Go to file
David Anderson 21ac65d3da wgengine/router: explicitly detect and complain about busybox's `ip`.
Defensive programming against #368 in environments other than Docker,
e.g. if you try using Tailscale in Alpine Linux directly, sans
container.

Signed-off-by: David Anderson <danderson@tailscale.com>
5 years ago
.github Disable staticcheck for tempfork packages. 5 years ago
atomicfile scripts: add a license header checker. 5 years ago
cmd ipn: add AllowVersionSkew bool to Notify & Message 5 years ago
control/controlclient control/controlclient: revert extreneous synchronization. 5 years ago
derp derp/derpmap: add World.ForeachServer, check STUN server validity earlier 5 years ago
ipn ipn: add AllowVersionSkew bool to Notify & Message 5 years ago
logpolicy logpolicy: report the correct error 5 years ago
logtail backoff: add a LogLongerThan configuration. 5 years ago
metrics metrics: add a LabelMap type for variables with 1 label dimension. 5 years ago
net net/dnscache: remove unnecessary lint warning. 5 years ago
netcheck netcheck: STUN less aggressively to known distant servers 5 years ago
paths paths: use /var/db for state on BSDs, and /var/run for sockets. 5 years ago
portlist Fix macOS build 5 years ago
safesocket safesocket: gofmt 5 years ago
scripts wgengine/router: split out from wgengine. 5 years ago
stun stun, stunner: clarify an error log message more 5 years ago
stunner stunner: add Stunner.MaxTries option 5 years ago
syncs syncs: add new package for extra sync types 5 years ago
tailcfg types/structs: add structs.Incomparable annotation, use it where applicable 5 years ago
tempfork tempfork/x509: moved to tailscale/go's crypto/x509 instead 5 years ago
tstest tstest: rename from testy. 5 years ago
tstime tstime: hand-implement parseInt for specific needs of rfc3339 parsing. 5 years ago
tsweb tstest: rename from testy. 5 years ago
types types/logger: fix deadlock in the burst case. 5 years ago
version version: bump date 5 years ago
wgengine wgengine/router: explicitly detect and complain about busybox's `ip`. 5 years ago
.gitattributes .gitattributes: add a smudge filter for go.mod. 5 years ago
.gitignore cmd/relaynode: drop local --acl-file in favour of central packet filter. 5 years ago
AUTHORS Move Linux client & common packages into a public repo. 5 years ago
CODE_OF_CONDUCT.md Add a code of conduct. 5 years ago
Dockerfile Dockerfile: install iproute2 in the container image. 5 years ago
LICENSE Move Linux client & common packages into a public repo. 5 years ago
PATENTS Move Linux client & common packages into a public repo. 5 years ago
README.md Dockerfile: add some usage docs, bump to Go 1.14 5 years ago
SECURITY.md Add a SECURITY.md for vulnerability reports. 5 years ago
go.mod wgengine/router: use inet.af/netaddr, not wgcfg.CIDR. 5 years ago
go.sum wgengine/router: use inet.af/netaddr, not wgcfg.CIDR. 5 years ago

README.md

Tailscale

https://tailscale.com

Private WireGuard® networks made easy

Overview

This repository contains all the open source Tailscale code. It currently includes the Linux client.

The Linux client is currently cmd/relaynode, but will soon be replaced by cmd/tailscaled.

Using

We serve packages for a variety of distros at https://pkgs.tailscale.com .

Building

go install tailscale.com/cmd/tailscale{,d}

We only guarantee to support the latest Go release and any Go beta or release candidate builds (currently Go 1.14) in module mode. It might work in earlier Go versions or in GOPATH mode, but we're making no effort to keep those working.

Bugs

Please file any issues about this code or the hosted service on the issue tracker.

Contributing

under_construction.gif

PRs welcome, but we are still working out our contribution process and tooling.

We require Developer Certificate of Origin Signed-off-by lines in commits.

About Us

We are apenwarr, bradfitz, crawshaw, danderson, dfcarney, from Tailscale Inc. You can learn more about us from our website.

WireGuard is a registered trademark of Jason A. Donenfeld.