You cannot select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
 
 
 
Go to file
Aaron Klotz 90fd04cbde ipn/ipnlocal, util/winutil/policy: modify Windows profile migration to load legacy prefs from within tailscaled
I realized that a lot of the problems that we're seeing around migration and
LocalBackend state can be avoided if we drive Windows pref migration entirely
from within tailscaled. By doing it this way, tailscaled can automatically
perform the migration as soon as the connection with the client frontend is
established.

Since tailscaled is already running as LocalSystem, it already has access to
the user's local AppData directory. The profile manager already knows which
user is connected, so we simply need to resolve the user's prefs file and read
it from there.

Of course, to properly migrate this information we need to also check system
policies. I moved a bunch of policy resolution code out of the GUI and into
a new package in util/winutil/policy.

Updates #7626

Signed-off-by: Aaron Klotz <aaron@tailscale.com>
2 years ago
.bencher
.github .github/workflows: remove tsconnect-pkg-publish.yml 2 years ago
atomicfile atomicfile: reject overwriting irregular files 2 years ago
chirp
client/tailscale client/tailscale: Fix NPE caused by erroneous close in error case 2 years ago
cmd ipn/ipnlocal, util/winutil/policy: modify Windows profile migration to load legacy prefs from within tailscaled 2 years ago
control control/controlclient: fix accidental backoff reset 2 years ago
derp derp, derphttp, magicsock: send new unknown peer frame when destination is unknown (#7552) 2 years ago
disco
docs
doctor doctor/permissions: add new check to print process permissions 2 years ago
envknob envknob,net/tstun,wgengine: use TS_DEBUG_MTU consistently 2 years ago
health
hostinfo tailcfg,hostinfo: add App field to identify tsnet uses 2 years ago
internal/tooldeps
ipn ipn/ipnlocal, util/winutil/policy: modify Windows profile migration to load legacy prefs from within tailscaled 2 years ago
jsondb
kube ipn/store: add support for stores to hook into a custom dialer 2 years ago
licenses licenses: update win/apple licenses 2 years ago
log sockstats: add labels for netlog and sockstatlog packages 2 years ago
logpolicy logpolicy: do not upload logs in tests 2 years ago
logtail log/sockstatlog: add delay before writing logs to disk 2 years ago
metrics metrics: add SetInt64 to ease using LabelMap for gauge metrics 2 years ago
net envknob,net/tstun,wgengine: use TS_DEBUG_MTU consistently 2 years ago
packages/deb
paths
portlist
prober prober: only record latency for successful probes 2 years ago
release release/dist/cli: add --verbose to print subcommand output 2 years ago
safesocket
scripts scripts/installer.sh: check Photon OS version with pkg server. 2 years ago
smallzstd
ssh/tailssh ssh/tailssh: fix race in errors returned when starting recorder 2 years ago
syncs syncs: add WaitGroup wrapper (#7481) 2 years ago
tailcfg funnel: change references from alpha to beta (#7613) 2 years ago
tempfork net/tstun/table: add initial RoutingTable implementation 2 years ago
tka tka: compact TKA storage on startup 2 years ago
tool tool/gocross: use grep -E over egrep to avoid warning 2 years ago
tsconst
tsnet tsnet,wgenegine/netstack: add test and fix resource leaks 2 years ago
tstest tstest/integration: add ping test w/ masquerades 2 years ago
tstime tstime/rate: add Value (#7491) 2 years ago
tsweb all: use tstest.Replace more 2 years ago
types envknob/logknob: add package for configurable logging 2 years ago
util ipn/ipnlocal, util/winutil/policy: modify Windows profile migration to load legacy prefs from within tailscaled 2 years ago
version version/mkversion: don't break on tagged go.mod entries 2 years ago
wf
wgengine util/sysresources, magicsock: scale DERP buffer based on system memory 2 years ago
words words: what?! a llama?! he's supposed to be dead! (#7623) 2 years ago
.gitattributes
.gitignore release: open-source release build logic for unix packages 2 years ago
ALPINE.txt
AUTHORS
CODE_OF_CONDUCT.md
Dockerfile
Dockerfile.base
LICENSE
Makefile
PATENTS
README.md
SECURITY.md
VERSION.txt VERSION.txt: this is 1.39 2 years ago
api.md api.md: refresh of API docs 2 years ago
build_dist.sh build_dist.sh: make cross-compilation friendly 2 years ago
build_docker.sh
flake.lock
flake.nix go.mod.sri: update SRI hash for go.mod changes 2 years ago
go.mod go.mod: bump gvisor to 20230320 for dispatcher locking 2 years ago
go.mod.sri go.mod.sri: update SRI hash for go.mod changes 2 years ago
go.sum go.mod: bump gvisor to 20230320 for dispatcher locking 2 years ago
go.toolchain.branch
go.toolchain.rev go.toolchain.rev: bump Go toolchain 2 years ago
pull-toolchain.sh
shell.nix go.mod.sri: update SRI hash for go.mod changes 2 years ago
staticcheck.conf
update-flake.sh
version-embed.go
version_test.go

README.md

Tailscale

https://tailscale.com

Private WireGuard® networks made easy

Overview

This repository contains the majority of Tailscale's open source code. Notably, it includes the tailscaled daemon and the tailscale CLI tool. The tailscaled daemon runs on Linux, Windows, macOS, and to varying degrees on FreeBSD and OpenBSD. The Tailscale iOS and Android apps use this repo's code, but this repo doesn't contain the mobile GUI code.

Other Tailscale repos of note:

For background on which parts of Tailscale are open source and why, see https://tailscale.com/opensource/.

Using

We serve packages for a variety of distros and platforms at https://pkgs.tailscale.com.

Other clients

The macOS, iOS, and Windows clients use the code in this repository but additionally include small GUI wrappers. The GUI wrappers on non-open source platforms are themselves not open source.

Building

We always require the latest Go release, currently Go 1.20. (While we build releases with our Go fork, its use is not required.)

go install tailscale.com/cmd/tailscale{,d}

If you're packaging Tailscale for distribution, use build_dist.sh instead, to burn commit IDs and version info into the binaries:

./build_dist.sh tailscale.com/cmd/tailscale
./build_dist.sh tailscale.com/cmd/tailscaled

If your distro has conventions that preclude the use of build_dist.sh, please do the equivalent of what it does in your distro's way, so that bug reports contain useful version information.

Bugs

Please file any issues about this code or the hosted service on the issue tracker.

Contributing

PRs welcome! But please file bugs. Commit messages should reference bugs.

We require Developer Certificate of Origin Signed-off-by lines in commits.

See git log for our commit message style. It's basically the same as Go's style.

About Us

Tailscale is primarily developed by the people at https://github.com/orgs/tailscale/people. For other contributors, see:

WireGuard is a registered trademark of Jason A. Donenfeld.