Jay Taylor's notes

back to listing index

tailscale/tailscale: The easiest, most secure way to use WireGuard and 2FA.

[web search]
Original source (github.com)
Tags: user-interface wireguard two-factor-authentication
Clipped on: 2020-04-12

Skip to content
Image (Asset 1/3) alt= You have unread notifications
The easiest, most secure way to use WireGuard and 2FA. https://tailscale.com/
Go Other
Branch: master
New pull request
Clone or download

Latest commit

Latest commit 780deb9 21 hours ago

Files

Type Name Latest commit message Commit time
.github github: add license check to CI. 26 days ago
atomicfile scripts: add a license header checker. 26 days ago
cmd all: remove unnecessary trailing newlines in format patterns for cons… yesterday
control/controlclient control/controlclient: add opt-in netmap verbose debugging env var yesterday
derp derp/derphttp: avoid endless reconnect race on failure 21 hours ago
ipn all: remove unnecessary trailing newlines in format patterns for cons… yesterday
logpolicy logpolicy: include Go version in version log 3 days ago
logtail logtail: don't send a User-Agent 7 days ago
metrics metrics: add a LabelMap type for variables with 1 label dimension. last month
net net/interfaces: add IsExpensive and up state to State 2 days ago
netcheck netcheck: aggregate spammy logging onto one concise line 3 days ago
paths paths: use /var/db for state on BSDs, and /var/run for sockets. last month
portlist portlist: don't depend on osexec package on ios, even if it's unused 5 days ago
ratelimit Move Linux client & common packages into a public repo. 2 months ago
safesocket safesocket: gofmt 13 days ago
scripts scripts: add a license header checker. 26 days ago
stun stun, stunner: clarify an error log message more 28 days ago
stunner stunner: fix data race. 18 days ago
syncs syncs: add new package for extra sync types last month
tailcfg tailcfg: add auth key to RegisterRequest 3 days ago
tempfork/osexec Move Linux client & common packages into a public repo. 2 months ago
testy testy: make safe for concurrent use. 16 days ago
tstime tstime: change an Errorf+return to Fatalf in subtest 6 days ago
tsweb tsweb: add some Benchmarks 7 days ago
types all: remove unnecessary trailing newlines in format patterns for cons… yesterday
version version: bump date 2 days ago
wgengine all: remove unnecessary trailing newlines in format patterns for cons… yesterday
.gitattributes .gitattributes: add a smudge filter for go.mod. 2 months ago
.gitignore cmd/relaynode: drop local --acl-file in favour of central packet filter. 2 months ago
AUTHORS Move Linux client & common packages into a public repo. 2 months ago
CODE_OF_CONDUCT.md Add a code of conduct. 2 months ago
Dockerfile Dockerfile: add some usage docs, bump to Go 1.14 6 days ago
LICENSE Move Linux client & common packages into a public repo. 2 months ago
PATENTS Move Linux client & common packages into a public repo. 2 months ago
README.md Dockerfile: add some usage docs, bump to Go 1.14 6 days ago
SECURITY.md Add a SECURITY.md for vulnerability reports. 2 months ago
go.mod go.mod, go.sum: update go4.org/mem to its new home in its own module 21 hours ago
go.sum go.mod, go.sum: update go4.org/mem to its new home in its own module 21 hours ago

README.md

Tailscale

https://tailscale.com

Private WireGuard® networks made easy

Overview

This repository contains all the open source Tailscale code. It currently includes the Linux client.

The Linux client is currently cmd/relaynode, but will soon be replaced by cmd/tailscaled.

Using

We serve packages for a variety of distros at https://pkgs.tailscale.com .

Building

go install tailscale.com/cmd/tailscale{,d}

We only guarantee to support the latest Go release and any Go beta or release candidate builds (currently Go 1.14) in module mode. It might work in earlier Go versions or in GOPATH mode, but we're making no effort to keep those working.

Bugs

Please file any issues about this code or the hosted service on the issue tracker.

Contributing

under_construction.gif

PRs welcome, but we are still working out our contribution process and tooling.

We require Developer Certificate of Origin Signed-off-by lines in commits.

About Us

We are apenwarr, bradfitz, crawshaw, danderson, dfcarney, from Tailscale Inc. You can learn more about us from our website.

WireGuard is a registered trademark of Jason A. Donenfeld.