You cannot select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
 
 
 
Go to file
Josh Bleecher Snyder 63cd581c3f safesocket: add ConnectionStrategy, provide control over fallbacks
fee2d9fad added support for cmd/tailscale to connect to IPNExtension.
It came in two parts: If no socket was provided, dial IPNExtension first,
and also, if dialing the socket failed, fall back to IPNExtension.

The second half of that support caused the integration tests to fail
when run on a machine that was also running IPNExtension.
The integration tests want to wait until the tailscaled instances
that they spun up are listening. They do that by dialing the new
instance. But when that dial failed, it was falling back to IPNExtension,
so it appeared (incorrectly) that tailscaled was running.
Hilarity predictably ensued.

If a user (or a test) explicitly provides a socket to dial,
it is a reasonable assumption that they have a specific tailscaled
in mind and don't want to fall back to IPNExtension.
It is certainly true of the integration tests.

Instead of adding a bool to Connect, split out the notion of a
connection strategy. For now, the implementation remains the same,
but with the details hidden a bit. Later, we can improve that.

Signed-off-by: Josh Bleecher Snyder <josh@tailscale.com>
3 years ago
.bencher
.github .github/dependabot.yml: disable eager updates for Go. 3 years ago
atomicfile
chirp
client/tailscale safesocket: add ConnectionStrategy, provide control over fallbacks 3 years ago
cmd safesocket: add ConnectionStrategy, provide control over fallbacks 3 years ago
control control/noise: clean up resources in TestNoReuse 3 years ago
derp
disco
docs
health
hostinfo
internal/tooldeps
ipn safesocket: add ConnectionStrategy, provide control over fallbacks 3 years ago
kube
log
logpolicy
logtail
metrics
net net/dnscache, net/tsdial: add DNS caching to tsdial UserDial 3 years ago
packages/deb
paths
portlist
safesocket safesocket: add ConnectionStrategy, provide control over fallbacks 3 years ago
scripts
smallzstd
syncs
tailcfg
tempfork/pprof
tsconst
tsnet ipn/ipnlocal, net/tsdial: make SOCKS/HTTP dials use ExitDNS 3 years ago
tstest safesocket: add ConnectionStrategy, provide control over fallbacks 3 years ago
tstime
tsweb
types
util
version version/distro: report TrueNAS Scale as "truenas" 3 years ago
wf
wgengine wgengine/netstack: in netstack/hybrid mode, fake ICMP using ping command 3 years ago
words
.gitattributes .: add .gitattributes entry to use Go hunk-header driver 3 years ago
.gitignore
AUTHORS
CODE_OF_CONDUCT.md
Dockerfile
Dockerfile.base
LICENSE
Makefile Makefile: add spk and pushspk targets for iterative Synology development 3 years ago
PATENTS
README.md
SECURITY.md
VERSION.txt
api.md
build_dist.sh
build_docker.sh build_docker.sh: prefix version strings with `v` 3 years ago
go.mod net/dnscache, net/tsdial: add DNS caching to tsdial UserDial 3 years ago
go.sum net/dnscache, net/tsdial: add DNS caching to tsdial UserDial 3 years ago
shell.nix
staticcheck.conf
version-embed.go

README.md

Tailscale

https://tailscale.com

Private WireGuard® networks made easy

Overview

This repository contains all the open source Tailscale client code and the tailscaled daemon and tailscale CLI tool. The tailscaled daemon runs primarily on Linux; it also works to varying degrees on FreeBSD, OpenBSD, Darwin, and Windows.

The Android app is at https://github.com/tailscale/tailscale-android

Using

We serve packages for a variety of distros at https://pkgs.tailscale.com .

Other clients

The macOS, iOS, and Windows clients use the code in this repository but additionally include small GUI wrappers that are not open source.

Building

go install tailscale.com/cmd/tailscale{,d}

If you're packaging Tailscale for distribution, use build_dist.sh instead, to burn commit IDs and version info into the binaries:

./build_dist.sh tailscale.com/cmd/tailscale
./build_dist.sh tailscale.com/cmd/tailscaled

If your distro has conventions that preclude the use of build_dist.sh, please do the equivalent of what it does in your distro's way, so that bug reports contain useful version information.

We only guarantee to support the latest Go release and any Go beta or release candidate builds (currently Go 1.17) in module mode. It might work in earlier Go versions or in GOPATH mode, but we're making no effort to keep those working.

Bugs

Please file any issues about this code or the hosted service on the issue tracker.

Contributing

PRs welcome! But please file bugs. Commit messages should reference bugs.

We require Developer Certificate of Origin Signed-off-by lines in commits.

About Us

Tailscale is primarily developed by the people at https://github.com/orgs/tailscale/people. For other contributors, see:

WireGuard is a registered trademark of Jason A. Donenfeld.