You cannot select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
 
 
 
Go to file
Nick Khyl 80b2b45d60 ipn/ipnlocal: refactor and cleanup profileManager
In preparation for multi-user and unattended mode improvements, we are
refactoring and cleaning up `ipn/ipnlocal.profileManager`. The concept of the
"current user", which is only relevant on Windows, is being deprecated and will
soon be removed to allow more than one Windows user to connect and utilize
`LocalBackend` according to that user's access rights to the device and specific
Tailscale profiles.

We plan to pass the user's identity down to the `profileManager`, where it can
be used to determine the user's access rights to a given `LoginProfile`. While
the new permission model in `ipnauth` requires more work and is currently
blocked pending PR reviews, we are updating the `profileManager` to reduce its
reliance on the concept of a single OS user being connected to the backend at
the same time.

We extract the switching to the default Tailscale profile, which may also
trigger legacy profile migration, from `profileManager.SetCurrentUserID`. This
introduces `profileManager.DefaultUserProfileID`, which returns the default
profile ID for the current user, and `profileManager.SwitchToDefaultProfile`,
which is essentially a shorthand for `pm.SwitchProfile(pm.DefaultUserProfileID())`.
Both methods will eventually be updated to accept the user's identity and
utilize that user's default profile.

We make access checks more explicit by introducing the `profileManager.checkProfileAccess`
method. The current implementation continues to use `profileManager.currentUserID`
and `LoginProfile.LocalUserID` to determine whether access to a given profile
should be granted. This will be updated to utilize the `ipnauth` package and the
new permissions model once it's ready. We also expand access checks to be used
more widely in the `profileManager`, not just when switching or listing
profiles. This includes access checks in methods like `SetPrefs` and, most notably,
`DeleteProfile` and `DeleteAllProfiles`, preventing unprivileged Windows users
from deleting Tailscale profiles owned by other users on the same device,
including profiles owned by local admins.

We extract `profileManager.ProfilePrefs` and `profileManager.SetProfilePrefs`
methods that can be used to get and set preferences of a given `LoginProfile` if
`profileManager.checkProfileAccess` permits access to it.

We also update `profileManager.setUnattendedModeAsConfigured` to always enable
unattended mode on Windows if `Prefs.ForceDaemon` is true in the current
`LoginProfile`, even if `profileManager.currentUserID` is `""`. This facilitates
enabling unattended mode via `tailscale up --unattended` even if
`tailscale-ipn.exe` is not running, such as when a Group Policy or MDM-deployed
script runs at boot time, or when Tailscale is used on a Server Code or otherwise
headless Windows environments. See #12239, #2137, #3186 and
https://github.com/tailscale/tailscale/pull/6255#issuecomment-2016623838 for
details.

Fixes #12239
Updates tailscale/corp#18342
Updates #3186
Updates #2137

Signed-off-by: Nick Khyl <nickk@tailscale.com>
3 months ago
.bencher bencher: add config to suppress failures on benchmark regressions. 3 years ago
.github all: switch to and require Go 1.23 3 months ago
appc appc: track metrics for route info storing 5 months ago
atomicfile various: add golangci-lint, fix issues (#7905) 2 years ago
chirp all: update copyright and license headers 2 years ago
client usermetric: add initial user-facing metrics 3 months ago
clientupdate clientupdate: return true for CanAutoUpdate for macsys (#12746) 5 months ago
cmd ipn/{ipnauth,ipnlocal,ipnserver,localapi}: start baby step toward moving access checks from the localapi.Handler to the LocalBackend 3 months ago
control go.{mod,sum}: migrate from nhooyr.io/websocket to github.com/coder/websocket 3 months ago
derp go.{mod,sum}: migrate from nhooyr.io/websocket to github.com/coder/websocket 3 months ago
disco disco: correct noun for nacl box type in disco docs 12 months ago
docs docs/k8s: fix subnet router manifests (#12305) 6 months ago
doctor net/{interfaces,netmon}, all: merge net/interfaces package into net/netmon 7 months ago
drive safesocket: add ConnectContext 6 months ago
envknob ci: enable checklocks workflow for specific packages 5 months ago
gokrazy cmd/tta, tstest/natlab/vnet: remove unneeded port 124 log hack, add log buffer 3 months ago
health usermetric: add initial user-facing metrics 3 months ago
hostinfo hostinfo: add hostinfo.IsNATLabGuestVM 4 months ago
internal all: add test for package comments, fix, add comments as needed 5 months ago
ipn ipn/ipnlocal: refactor and cleanup profileManager 3 months ago
jsondb all: update copyright and license headers 2 years ago
k8s-operator cmd/k8s-operator,k8s-operator/sessionrecording: support recording kubectl exec sessions over WebSockets (#12947) 3 months ago
kube all: add test for package comments, fix, add comments as needed 5 months ago
licenses licenses: update license notices 3 months ago
log log/sockstatlog: don't block for more than 5s on shutdown 5 months ago
logpolicy logpolicy: extend the gokrazy/natlab wait-for-network delay for IPv6 3 months ago
logtail logtail: close idle HTTP connections on shutdown 5 months ago
metrics usermetric: add initial user-facing metrics 3 months ago
net net/tstun: fix gvisor inbound GSO packet injection (#13283) 3 months ago
omit cmd/tailscaled, ipn/conffile: support ec2 user-data config file 6 months ago
packages/deb go.mod: upgrade nfpm to v2 (#8786) 1 year ago
paths all: use Go 1.22 range-over-int 7 months ago
portlist all: use Go 1.22 range-over-int 7 months ago
posture posture: deduplicate MAC addresses before returning them 3 months ago
prober prober: make status page more clear 4 months ago
proxymap ci: enable checklocks workflow for specific packages 5 months ago
publicapi publicapi: add note that API docs have moved to existing docs files (#12770) 5 months ago
release release/dist/qnap: omit .qpkg.codesigning files 7 months ago
safesocket all: fix new lint warnings from bumping staticcheck 3 months ago
safeweb safeweb: add Server.Close method (#13160) 3 months ago
scripts scripts: don't refresh the pacman repository on Arch (#12194) 5 months ago
sessionrecording cmd/k8s-operator,k8s-operator/sessionrecording,sessionrecording,ssh/tailssh: refactor session recording functionality (#12945) 4 months ago
smallzstd all: use Go 1.22 range-over-int 7 months ago
ssh/tailssh all: fix new lint warnings from bumping staticcheck 3 months ago
syncs syncs: add Map.WithLock to allow mutations to the underlying map (#8101) 5 months ago
tailcfg ssh/tailssh: fix SSH on busybox systems 3 months ago
taildrop all: use new AppendEncode methods available in Go 1.22 (#11079) 10 months ago
tempfork cmd/tailscale: add shell tab-completion 7 months ago
tka cmd/tl-longchain: tool to re-sign nodes with long rotation signatures 3 months ago
tool {tool,client}: bump node version (#12840) 4 months ago
tsconst cmd/tailscale/cli: support passing network lock keys via files 3 months ago
tsd health, all: remove health.Global, finish plumbing health.Tracker 7 months ago
tsnet usermetric: add initial user-facing metrics 3 months ago
tstest tstest/natlab/vnet: add IPv6 all-nodes support 3 months ago
tstime all: use math/rand/v2 more 6 months ago
tsweb usermetric: add initial user-facing metrics 3 months ago
types types/opt: add BoolFlag for setting Bool value as a flag 3 months ago
util usermetric: add initial user-facing metrics 3 months ago
version version/mkversion: allow env config of oss git cache dir 5 months ago
wf all: add test for package comments, fix, add comments as needed 5 months ago
wgengine net/tstun: fix gvisor inbound GSO packet injection (#13283) 3 months ago
words words: raccoon dog, dog with the raccoon in 'im 4 months ago
.gitattributes .: add .gitattributes entry to use Go hunk-header driver 3 years ago
.gitignore tstest/tailmac: add customized macOS virtualization tooling (#13146) 3 months ago
.golangci.yml ci: run 'go vet' in golangci-lint; fix errors in tests 12 months ago
ALPINE.txt ALPINE.txt,Dockerfile{.base},build_docker.sh: bump alpine (#10543) 12 months ago
AUTHORS Move Linux client & common packages into a public repo. 5 years ago
CODEOWNERS CODEOWNERS: add the start of an owners file 1 year ago
CODE_OF_CONDUCT.md Add a code of conduct. 5 years ago
Dockerfile all: switch to and require Go 1.23 3 months ago
Dockerfile.base ALPINE.txt,Dockerfile{.base},build_docker.sh: bump alpine (#10543) 12 months ago
LICENSE all: update tools that manage copyright headers 2 years ago
Makefile ssh/tailssh: fix SSH on busybox systems 3 months ago
PATENTS Move Linux client & common packages into a public repo. 5 years ago
README.md all: switch to and require Go 1.23 3 months ago
SECURITY.md Add a SECURITY.md for vulnerability reports. 5 years ago
VERSION.txt VERSION.txt: this is v1.73.0 (#13181) 3 months ago
api.md publicapi: add note that API docs have moved to existing docs files (#12770) 5 months ago
build_dist.sh cmd/tailscale: add shell tab-completion 7 months ago
build_docker.sh build_docker.sh: update script comment (#12970) 4 months ago
flake.lock flake.nix: build tailscale with go 1.22 10 months ago
flake.nix go.mod.sri: update SRI hash for go.mod changes 3 months ago
go.mod cmd/systray: add a basic linux systray app 3 months ago
go.mod.sri go.mod.sri: update SRI hash for go.mod changes 3 months ago
go.sum cmd/systray: add a basic linux systray app 3 months ago
go.toolchain.branch all: switch to and require Go 1.23 3 months ago
go.toolchain.rev all: switch to and require Go 1.23 3 months ago
gomod_test.go go.mod: add test that replace directives aren't added in oss 1 year ago
header.txt cmd/k8s-operator: operator can create subnetrouter (#9505) 12 months ago
pkgdoc_test.go all: add test for package comments, fix, add comments as needed 5 months ago
pull-toolchain.sh pull-toolchain.sh: don't run update-flake.sh 2 years ago
shell.nix go.mod.sri: update SRI hash for go.mod changes 3 months ago
staticcheck.conf all: cleanup unused code, part 2 (#10670) 11 months ago
update-flake.sh Code Improvements (#11311) 9 months ago
version-embed.go version: return correct Meta.MajorMinorPatch in non-dev builds 2 years ago
version_test.go go.mod,wgengine/netstack: bump gvisor 10 months ago

README.md

Tailscale

https://tailscale.com

Private WireGuard® networks made easy

Overview

This repository contains the majority of Tailscale's open source code. Notably, it includes the tailscaled daemon and the tailscale CLI tool. The tailscaled daemon runs on Linux, Windows, macOS, and to varying degrees on FreeBSD and OpenBSD. The Tailscale iOS and Android apps use this repo's code, but this repo doesn't contain the mobile GUI code.

Other Tailscale repos of note:

For background on which parts of Tailscale are open source and why, see https://tailscale.com/opensource/.

Using

We serve packages for a variety of distros and platforms at https://pkgs.tailscale.com.

Other clients

The macOS, iOS, and Windows clients use the code in this repository but additionally include small GUI wrappers. The GUI wrappers on non-open source platforms are themselves not open source.

Building

We always require the latest Go release, currently Go 1.23. (While we build releases with our Go fork, its use is not required.)

go install tailscale.com/cmd/tailscale{,d}

If you're packaging Tailscale for distribution, use build_dist.sh instead, to burn commit IDs and version info into the binaries:

./build_dist.sh tailscale.com/cmd/tailscale
./build_dist.sh tailscale.com/cmd/tailscaled

If your distro has conventions that preclude the use of build_dist.sh, please do the equivalent of what it does in your distro's way, so that bug reports contain useful version information.

Bugs

Please file any issues about this code or the hosted service on the issue tracker.

Contributing

PRs welcome! But please file bugs. Commit messages should reference bugs.

We require Developer Certificate of Origin Signed-off-by lines in commits.

See git log for our commit message style. It's basically the same as Go's style.

About Us

Tailscale is primarily developed by the people at https://github.com/orgs/tailscale/people. For other contributors, see:

WireGuard is a registered trademark of Jason A. Donenfeld.