You cannot select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
 
 
 
Go to file
Andrew Lytvynov b743b85dad
ipn/ipnlocal,ssh/tailssh: reject c2n /update if SSH conns are active (#11820)
Since we already track active SSH connections, it's not hard to
proactively reject updates until those finish. We attempt to do the same
on the control side, but the detection latency for new connections is in
the minutes, which is not fast enough for common short sessions.

Handle a `force=true` query parameter to override this behavior, so that
control can still trigger an update on a server where some long-running
abandoned SSH session is open.

Updates https://github.com/tailscale/corp/issues/18556

Signed-off-by: Andrew Lytvynov <awly@tailscale.com>
7 months ago
.bencher
.github Revert "licenses: add gliderlabs/ssh license" 7 months ago
appc
atomicfile
chirp
client build(deps-dev): bump vite from 5.1.4 to 5.1.7 in /client/web 7 months ago
clientupdate ipn/ipnlocal,clientupdate: disallow auto-updates in containers (#11814) 7 months ago
cmd cmd/k8s-operator: correctly determine cluster domain (#11512) 7 months ago
control types/persist: remove unused field Persist.Provider 7 months ago
derp all: use Go 1.22 range-over-int 7 months ago
disco disco: correct noun for nacl box type in disco docs 11 months ago
docs docs/windows/policy: add missing key expiration warning interval 7 months ago
doctor
drive drive: rewrite Location headers 7 months ago
envknob
health all: use Go 1.22 range-over-int 7 months ago
hostinfo hostinfo: use Distro field for distinguishing Windows Server builds 7 months ago
internal/tooldeps
ipn ipn/ipnlocal,ssh/tailssh: reject c2n /update if SSH conns are active (#11820) 7 months ago
jsondb
k8s-operator cmd/k8s-operator,k8s-operator: document tailscale.com Custom Resource Definitions better. (#11665) 7 months ago
kube
licenses licenses: update license notices 7 months ago
log all: use zstdframe where sensible (#11491) 8 months ago
logpolicy all: use zstdframe where sensible (#11491) 8 months ago
logtail all: use Go 1.22 range-over-int 7 months ago
metrics all: use Go 1.22 range-over-int 7 months ago
net net/tsdial: assume all connections are affected if no default route is present 7 months ago
packages/deb
paths all: use Go 1.22 range-over-int 7 months ago
portlist all: use Go 1.22 range-over-int 7 months ago
posture cmd/tailscaled, net/tstun: build for aix/ppc64 7 months ago
prober all: use Go 1.22 range-over-int 7 months ago
proxymap
release version/mkversion: enforce synology versions within int32 range 8 months ago
safesocket all: use Go 1.22 range-over-int 7 months ago
safeweb safeweb: allow object-src: self in CSP (#11782) 7 months ago
scripts scripts/installer.sh: add rpm GPG key import (#11686) 7 months ago
smallzstd all: use Go 1.22 range-over-int 7 months ago
ssh/tailssh ipn/ipnlocal,ssh/tailssh: reject c2n /update if SSH conns are active (#11820) 7 months ago
syncs all: use Go 1.22 range-over-int 7 months ago
tailcfg tailcfg: remove some unused fields from RegisterResponseAuth 7 months ago
taildrop
tempfork cmd/tailscale: add shell tab-completion 7 months ago
tka all: use Go 1.22 range-over-int 7 months ago
tool
tsconst
tsd tailscale: update tailfs functions and vars to use drive naming (#11597) 7 months ago
tsnet all: use Go 1.22 range-over-int 7 months ago
tstest tailcfg: pointerify RegisterRequest.Auth, omitemptify RegisterResponseAuth 7 months ago
tstime all: use Go 1.22 range-over-int 7 months ago
tsweb all: use Go 1.22 range-over-int 7 months ago
types types/persist: remove unused field Persist.Provider 7 months ago
util all: use Go 1.22 range-over-int 7 months ago
version all: use Go 1.22 range-over-int 7 months ago
wf
wgengine wgengine\router: fix the Tailscale-In firewall rule to work on domain networks 7 months ago
words
.gitattributes
.gitignore
.golangci.yml
ALPINE.txt
AUTHORS
CODEOWNERS
CODE_OF_CONDUCT.md
Dockerfile
Dockerfile.base
LICENSE
Makefile Makefile: fix default SYNO_ARCH in Makefile 7 months ago
PATENTS
README.md
SECURITY.md
VERSION.txt VERSION.txt: this is v1.65.0 7 months ago
api.md
build_dist.sh cmd/tailscale: add shell tab-completion 7 months ago
build_docker.sh ipn/store: omit AWS & Kubernetes support on 'small' Linux GOARCHes 7 months ago
flake.lock
flake.nix go.mod.sri: update SRI hash for go.mod changes 7 months ago
go.mod go.mod: bump golang.org/x/net (#11775) 7 months ago
go.mod.sri go.mod.sri: update SRI hash for go.mod changes 7 months ago
go.sum go.mod: bump golang.org/x/net (#11775) 7 months ago
go.toolchain.branch
go.toolchain.rev go.toolchain.rev: bump to Go 1.22.2 7 months ago
gomod_test.go
header.txt
pull-toolchain.sh
shell.nix go.mod.sri: update SRI hash for go.mod changes 7 months ago
staticcheck.conf
update-flake.sh
version-embed.go
version_test.go

README.md

Tailscale

https://tailscale.com

Private WireGuard® networks made easy

Overview

This repository contains the majority of Tailscale's open source code. Notably, it includes the tailscaled daemon and the tailscale CLI tool. The tailscaled daemon runs on Linux, Windows, macOS, and to varying degrees on FreeBSD and OpenBSD. The Tailscale iOS and Android apps use this repo's code, but this repo doesn't contain the mobile GUI code.

Other Tailscale repos of note:

For background on which parts of Tailscale are open source and why, see https://tailscale.com/opensource/.

Using

We serve packages for a variety of distros and platforms at https://pkgs.tailscale.com.

Other clients

The macOS, iOS, and Windows clients use the code in this repository but additionally include small GUI wrappers. The GUI wrappers on non-open source platforms are themselves not open source.

Building

We always require the latest Go release, currently Go 1.22. (While we build releases with our Go fork, its use is not required.)

go install tailscale.com/cmd/tailscale{,d}

If you're packaging Tailscale for distribution, use build_dist.sh instead, to burn commit IDs and version info into the binaries:

./build_dist.sh tailscale.com/cmd/tailscale
./build_dist.sh tailscale.com/cmd/tailscaled

If your distro has conventions that preclude the use of build_dist.sh, please do the equivalent of what it does in your distro's way, so that bug reports contain useful version information.

Bugs

Please file any issues about this code or the hosted service on the issue tracker.

Contributing

PRs welcome! But please file bugs. Commit messages should reference bugs.

We require Developer Certificate of Origin Signed-off-by lines in commits.

See git log for our commit message style. It's basically the same as Go's style.

About Us

Tailscale is primarily developed by the people at https://github.com/orgs/tailscale/people. For other contributors, see:

WireGuard is a registered trademark of Jason A. Donenfeld.