You cannot select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
 
 
 
Go to file
Maisem Ali fbfee6a8c0 cmd/containerboot: use linuxfw.NetfilterRunner
This migrates containerboot to reuse the NetfilterRunner used
by tailscaled instead of manipulating iptables rule itself.
This has the added advantage of now working with nftables and
we can potentially drop the `iptables` command from the container
image in the future.

Updates #9310

Co-authored-by: Irbe Krumina <irbe@tailscale.com>
Signed-off-by: Maisem Ali <maisem@tailscale.com>
12 months ago
.bencher
.github
atomicfile
chirp
client client/web: remove unused context param from NewServer 12 months ago
clientupdate clientupdate/distsign: add new prod root signing key to keychain 12 months ago
cmd cmd/containerboot: use linuxfw.NetfilterRunner 12 months ago
control control/controlclient: fix deadlock in shutdown 12 months ago
derp
disco disco,net/tstun,wgengine/magicsock: probe peer MTU 12 months ago
docs docs/sysv: add a sysv style init script 12 months ago
doctor
envknob tailcfg: define a type for NodeCapability 1 year ago
health
hostinfo hostinfo, ipnlocal: flesh out Wake-on-LAN support, send MACs, add c2n sender 12 months ago
internal/tooldeps
ipn ipn/localapi: make whois take IP or IP:port as documented, fix capmap netstack lookup 12 months ago
jsondb
kube
licenses licenses: update tailscale{,d} licenses 12 months ago
log
logpolicy winutil: refactor methods to get values from registry to also return (#9536) 1 year ago
logtail
metrics
net net/dns: properly detect newer debian resolvconf 12 months ago
packages/deb
paths
portlist portlist: populate Pid field on Linux 12 months ago
posture posture: add get serial support for macOS 12 months ago
prober
proxymap wgengine, proxymap: split out port mapping from Engine to new type 1 year ago
release release/dist/unixpkgs: revert iptables move to Recommends, make it Depends 12 months ago
safesocket
scripts
smallzstd
ssh/tailssh util/httpm, all: add a test to make sure httpm is used consistently 1 year ago
syncs syncs: add Map.LoadOrInit for lazily initialized values 12 months ago
tailcfg tailcfg: add type for web client auth response 12 months ago
taildrop taildrop: document and cleanup the package (#9699) 12 months ago
tempfork
tka
tool tool/gocross: handle VERSION file not found 12 months ago
tsconst
tsd wgengine, proxymap: split out port mapping from Engine to new type 1 year ago
tsnet client/web: remove unused context param from NewServer 12 months ago
tstest tstest: make ResourceCheck panic on parallel tests 12 months ago
tstime
tsweb
types types/ipproto: drop IPProto from IPProtoVersion 12 months ago
util cmd/containerboot: use linuxfw.NetfilterRunner 12 months ago
version
wf
wgengine cmd/containerboot: use linuxfw.NetfilterRunner 12 months ago
words words: i can't help but rave about these additions 1 year ago
.gitattributes
.gitignore
.golangci.yml
ALPINE.txt
AUTHORS
CODEOWNERS
CODE_OF_CONDUCT.md
Dockerfile
Dockerfile.base
LICENSE
Makefile Makefile: make it possibe to pass a custom tag when building dev images (#9461) 1 year ago
PATENTS
README.md client/web: switch to using prebuilt web client assets 1 year ago
SECURITY.md
VERSION.txt VERSION.txt: this is v1.51.0 1 year ago
api.md api.md: remove clientConnectivity.derp field 12 months ago
build_dist.sh client/web: switch to using prebuilt web client assets 1 year ago
build_docker.sh
flake.lock
flake.nix go.mod.sri: update SRI hash for go.mod changes 12 months ago
go.mod go.mod: bump x/net to 0.17 for CVE-2023-39325 12 months ago
go.mod.sri go.mod.sri: update SRI hash for go.mod changes 12 months ago
go.sum go.mod: bump x/net to 0.17 for CVE-2023-39325 12 months ago
go.toolchain.branch
go.toolchain.rev go.toolchain.rev: bump for CVE-2023-39325 12 months ago
gomod_test.go go.mod: add test that replace directives aren't added in oss 1 year ago
pull-toolchain.sh
shell.nix go.mod.sri: update SRI hash for go.mod changes 12 months ago
staticcheck.conf
update-flake.sh .github/workflows: add workflow to update go.mod Nix SRI hash 2 years ago
version-embed.go
version_test.go

README.md

Tailscale

https://tailscale.com

Private WireGuard® networks made easy

Overview

This repository contains the majority of Tailscale's open source code. Notably, it includes the tailscaled daemon and the tailscale CLI tool. The tailscaled daemon runs on Linux, Windows, macOS, and to varying degrees on FreeBSD and OpenBSD. The Tailscale iOS and Android apps use this repo's code, but this repo doesn't contain the mobile GUI code.

Other Tailscale repos of note:

For background on which parts of Tailscale are open source and why, see https://tailscale.com/opensource/.

Using

We serve packages for a variety of distros and platforms at https://pkgs.tailscale.com.

Other clients

The macOS, iOS, and Windows clients use the code in this repository but additionally include small GUI wrappers. The GUI wrappers on non-open source platforms are themselves not open source.

Building

We always require the latest Go release, currently Go 1.21. (While we build releases with our Go fork, its use is not required.)

go install tailscale.com/cmd/tailscale{,d}

If you're packaging Tailscale for distribution, use build_dist.sh instead, to burn commit IDs and version info into the binaries:

./build_dist.sh tailscale.com/cmd/tailscale
./build_dist.sh tailscale.com/cmd/tailscaled

If your distro has conventions that preclude the use of build_dist.sh, please do the equivalent of what it does in your distro's way, so that bug reports contain useful version information.

Bugs

Please file any issues about this code or the hosted service on the issue tracker.

Contributing

PRs welcome! But please file bugs. Commit messages should reference bugs.

We require Developer Certificate of Origin Signed-off-by lines in commits.

See git log for our commit message style. It's basically the same as Go's style.

About Us

Tailscale is primarily developed by the people at https://github.com/orgs/tailscale/people. For other contributors, see:

WireGuard is a registered trademark of Jason A. Donenfeld.