You cannot select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
 
 
 
Go to file
Brad Fitzpatrick 91c9c33036 cmd/tailscaled: don't block ipnserver startup behind engine init on Windows
With this change, the ipnserver's safesocket.Listen (the localhost
tcp.Listen) happens right away, before any synchronous
TUN/DNS/Engine/etc setup work, which might be slow, especially on
early boot on Windows.

Because the safesocket.Listen starts up early, that means localhost
TCP dials (the safesocket.Connect from the GUI) complete successfully
and thus the GUI avoids the MessageBox error. (I verified that
pacifies it, even without a Listener.Accept; I'd feared that Windows
localhost was maybe special and avoided the normal listener backlog).

Once the GUI can then connect immediately without errors, the various
timeouts then matter less, because the backend is no longer trying to
race against the GUI's timeout. So keep retrying on errors for a
minute, or 10 minutes if the system just booted in the past 10
minutes.

This should fix the problem with Windows 10 desktops auto-logging in
and starting the Tailscale frontend which was then showing a
MessageBox error about failing to connect to tailscaled, which was
slow coming up because the Windows networking stack wasn't up
yet. Fingers crossed.

Fixes #1313 (previously #1187, etc)

Signed-off-by: Brad Fitzpatrick <bradfitz@tailscale.com>
3 years ago
.github .github/workflows: add --race tests on Linux and Windows 3 years ago
atomicfile atomicfile: don't Chmod on windows 4 years ago
client/tailscale ipn/ipnlocal, etc: require file sharing capability to send/recv files 4 years ago
cmd cmd/tailscaled: don't block ipnserver startup behind engine init on Windows 3 years ago
control/controlclient tailcfg, control/controlclient: accept nil MapResponse.Node (mapver 18) 4 years ago
derp derp: handle net.ErrClosed in TestSendFreeze 4 years ago
disco Added 2 fuzzers 4 years ago
health health: add DNS subsystem and plumb errors in. 4 years ago
internal wgengine: move DNS configuration out of wgengine/router. 4 years ago
ipn cmd/tailscaled: don't block ipnserver startup behind engine init on Windows 3 years ago
log log/filelogger: move our Windows disk file writing+rotation package here 4 years ago
logpolicy logpolicy: set log target on windows based on a registry key (#1542) 4 years ago
logtail logtail: reduce PublicID.UnmarshalText from 2 allocs to 0 4 years ago
metrics metrics: add LabelMap.GetFloat 4 years ago
net net/dns: fix resolved match domains when no nameservers are provided. 3 years ago
paths ipn, paths, cmd/tailscaled: remove LegacyConfigPath, relaynode migration 4 years ago
portlist portlist: de-dup services on same (proto, port) on both IPv4/IPv6 4 years ago
safesocket safesocket: remove/update some old TODOs 4 years ago
scripts Allow 2021 in LICENSE header. 4 years ago
smallzstd smallzstd: new package that constructs zstd small encoders/decoders. 4 years ago
syncs syncs: disable TestWatchMultipleValues on Windows CI builds 4 years ago
tailcfg ipn/ipnlocal: plumb fallback DNS in as a workaround for split DNS issues. 4 years ago
tempfork tempfork/wireguard-windows/firewall: add. 4 years ago
tsconst net/netns: add windows support. 4 years ago
tstest tstest/natlab: use net.ErrClosed 4 years ago
tstime tstime: add RandomDurationBetween helper 4 years ago
tsweb tsweb: add num_goroutines expvar 4 years ago
types types/netmap: remove some old TODOs 4 years ago
util control/controlclient: only use a single DNS label as the hostname. 4 years ago
version version: simplify iOS detection now that we require Go 1.16 4 years ago
wgengine wgengine/magicsock: remove named return 4 years ago
.gitattributes .gitattributes: add a smudge filter for go.mod. 5 years ago
.gitignore Revert "cmd/tailscaled: split package main into main shim + package" 4 years ago
AUTHORS Move Linux client & common packages into a public repo. 5 years ago
CODE_OF_CONDUCT.md Add a code of conduct. 5 years ago
Dockerfile build_docker.sh, Dockerfile: fix bug with shell quoting 4 years ago
LICENSE LICENSE: Reformat for Github 4 years ago
Makefile wgengine/netstack: fix 32-bit build broken from prior commit 4 years ago
PATENTS Move Linux client & common packages into a public repo. 5 years ago
README.md Switch to Go 1.16. 4 years ago
SECURITY.md Add a SECURITY.md for vulnerability reports. 5 years ago
VERSION.txt VERSION.txt: this is 1.7.0. 4 years ago
api.md api.md: clarify response behaviour for ACL POST endpoint 4 years ago
build_dist.sh build_dist: fix after version refactor. 4 years ago
build_docker.sh build_docker.sh, Dockerfile: fix bug with shell quoting 4 years ago
go.mod go.mod: upgrade to latest wireguard-go 4 years ago
go.sum go.mod: upgrade to latest wireguard-go 4 years ago
shell.nix add nix-shell boilerplate (#1028) 4 years ago

README.md

Tailscale

https://tailscale.com

Private WireGuard® networks made easy

Overview

This repository contains all the open source Tailscale client code and the tailscaled daemon and tailscale CLI tool. The tailscaled daemon runs primarily on Linux; it also works to varying degrees on FreeBSD, OpenBSD, Darwin, and Windows.

The Android app is at https://github.com/tailscale/tailscale-android

Using

We serve packages for a variety of distros at https://pkgs.tailscale.com .

Other clients

The macOS, iOS, and Windows clients use the code in this repository but additionally include small GUI wrappers that are not open source.

Building

go install tailscale.com/cmd/tailscale{,d}

If you're packaging Tailscale for distribution, use build_dist.sh instead, to burn commit IDs and version info into the binaries:

./build_dist.sh tailscale.com/cmd/tailscale
./build_dist.sh tailscale.com/cmd/tailscaled

If your distro has conventions that preclude the use of build_dist.sh, please do the equivalent of what it does in your distro's way, so that bug reports contain useful version information.

We only guarantee to support the latest Go release and any Go beta or release candidate builds (currently Go 1.16) in module mode. It might work in earlier Go versions or in GOPATH mode, but we're making no effort to keep those working.

Bugs

Please file any issues about this code or the hosted service on the issue tracker.

Contributing

PRs welcome! But please file bugs. Commit messages should reference bugs.

We require Developer Certificate of Origin Signed-off-by lines in commits.

About Us

Tailscale is primarily developed by the people at https://github.com/orgs/tailscale/people. For other contributors, see:

WireGuard is a registered trademark of Jason A. Donenfeld.