tailscale/client/tailscale
Tom DNetto 767e839db5 all: implement lock revoke-keys command
The revoke-keys command allows nodes with tailnet lock keys
to collaborate to erase the use of a compromised key, and remove trust
in it.

Signed-off-by: Tom DNetto <tom@tailscale.com>
Updates ENG-1848
2023-08-01 15:37:55 -05:00
..
apitype client/tailscale/apitype: document never-nil property of WhoIsResponse 2023-07-31 10:15:44 -07:00
example/servetls all: update copyright and license headers 2023-01-27 15:36:29 -08:00
acl.go client/tailscale: add warnings slice to ACLTestFailureSummary 2023-07-19 14:44:45 -04:00
devices.go client/tailscale: support deauthorizing a device 2023-06-01 12:46:28 +01:00
dns.go various: add golangci-lint, fix issues (#7905) 2023-04-17 18:38:24 -04:00
keys.go client/tailscale: revert CreateKey API change, add Client.CreateKeyWithExpiry 2023-05-12 21:05:12 -07:00
localclient.go all: implement lock revoke-keys command 2023-08-01 15:37:55 -05:00
localclient_test.go all: update copyright and license headers 2023-01-27 15:36:29 -08:00
required_version.go all: update to Go 1.20, use strings.CutPrefix/Suffix instead of our fork 2023-02-01 15:23:54 -08:00
routes.go all: update copyright and license headers 2023-01-27 15:36:29 -08:00
tailnet.go all: update copyright and license headers 2023-01-27 15:36:29 -08:00
tailscale.go all: update copyright and license headers 2023-01-27 15:36:29 -08:00