You cannot select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
 
 
 
Go to file
Brad Fitzpatrick 5db529a655 logpolicy: upload early logpolicy output, log where we decide to write logs
Signed-off-by: Brad Fitzpatrick <bradfitz@tailscale.com>
4 years ago
.github github/workflows: add go vet ./... step 4 years ago
atomicfile atomicfile: don't Chmod on windows 4 years ago
cmd --advertise-routes option enabled in Mac tailscale CLI; it checks for IP forwarding enabled 4 years ago
control/controlclient control/controlclient: print disco keys NetworkMap diffs (debug change only) 4 years ago
derp derp: remove OnlyDisco option. 4 years ago
disco wgengine/magicsock: run test DERP in mode where only disco packets allowed 4 years ago
internal/deepprint all: dns refactor, add Proxied and PerDomain flags from control (#615) 4 years ago
ipn ipn: put Magic DNS domains first 4 years ago
log/logheap log/logheap: appease staticcheck 5 years ago
logpolicy logpolicy: upload early logpolicy output, log where we decide to write logs 4 years ago
logtail logtail: return correct write size from logger.Write 4 years ago
metrics metrics: add LabelMap.GetFloat 4 years ago
net net/interfaces: use syscalls to find private gateway IP address 4 years ago
paths paths, cmd/tailscaled: on Windows, don't try to migrate from legacy relay.conf 4 years ago
portlist portlist: avoid syscall audit violation logspam on Android 4 years ago
safesocket safesocket: gofmt 4 years ago
scripts wgengine/router: split out from wgengine. 5 years ago
smallzstd smallzstd: new package that constructs zstd small encoders/decoders. 4 years ago
syncs syncs: add AtomicBool 5 years ago
tailcfg all: dns refactor, add Proxied and PerDomain flags from control (#615) 4 years ago
tempfork tempfork: add lite fork of net/http/pprof w/o html/template or reflect 4 years ago
tstest wgengine/magicsock: explicitly check path discovery, add a firewall test. 4 years ago
tstime tstime: hand-implement parseInt for specific needs of rfc3339 parsing. 5 years ago
tsweb tsweb: jsonhandler: fix content type 4 years ago
types types/logger: fix go test vet error 4 years ago
util/lineread util/lineread: add little package to read lines from files/Readers 4 years ago
version version: adjust to a pure semver version number, per bradfitz's proposal. 4 years ago
wgengine wgengine/magicsock: don't deadlock on pre-disco Endpoints w/ lazy wireguard configs 4 years ago
.gitattributes .gitattributes: add a smudge filter for go.mod. 5 years ago
.gitignore cmd/relaynode: drop local --acl-file in favour of central packet filter. 5 years ago
AUTHORS Move Linux client & common packages into a public repo. 5 years ago
CODE_OF_CONDUCT.md Add a code of conduct. 5 years ago
Dockerfile Dockerfile: install iproute2 in the container image. 5 years ago
LICENSE Move Linux client & common packages into a public repo. 5 years ago
Makefile Fix staticcheck warning, add Makefile with staticcheck targets, lock in staticcheck version in go.mod 5 years ago
PATENTS Move Linux client & common packages into a public repo. 5 years ago
README.md Dockerfile: add some usage docs, bump to Go 1.14 5 years ago
SECURITY.md Add a SECURITY.md for vulnerability reports. 5 years ago
go.mod go mod tidy 4 years ago
go.sum go.sum: update 4 years ago

README.md

Tailscale

https://tailscale.com

Private WireGuard® networks made easy

Overview

This repository contains all the open source Tailscale code. It currently includes the Linux client.

The Linux client is currently cmd/relaynode, but will soon be replaced by cmd/tailscaled.

Using

We serve packages for a variety of distros at https://pkgs.tailscale.com .

Building

go install tailscale.com/cmd/tailscale{,d}

We only guarantee to support the latest Go release and any Go beta or release candidate builds (currently Go 1.14) in module mode. It might work in earlier Go versions or in GOPATH mode, but we're making no effort to keep those working.

Bugs

Please file any issues about this code or the hosted service on the issue tracker.

Contributing

under_construction.gif

PRs welcome, but we are still working out our contribution process and tooling.

We require Developer Certificate of Origin Signed-off-by lines in commits.

About Us

We are apenwarr, bradfitz, crawshaw, danderson, dfcarney, from Tailscale Inc. You can learn more about us from our website.

WireGuard is a registered trademark of Jason A. Donenfeld.