Mirror of tailscale/tailscale@github.com
Go to file
Marwan Sulaiman b819f66eb1 tsweb: propagate RequestID via context and entire request
The recent addition of RequestID was only populated if the
HTTP Request had returned an error. This meant that the underlying
handler has no access to this request id and any logs it may have
emitted were impossible to correlate to that request id. Therefore,
this PR adds a middleware to generate request ids and pass them
through the request context. The tsweb.StdHandler automatically
populates this request id if the middleware is being used. Finally,
inner handlers can use the context to retrieve that same request id
and use it so that all logs and events can be correlated.

Updates #2549

Signed-off-by: Marwan Sulaiman <marwan@tailscale.com>
2023-11-30 15:00:29 -05:00
.bencher bencher: add config to suppress failures on benchmark regressions. 2021-10-01 16:16:02 -07:00
.github ci: report test coverage to coveralls.io 2023-11-21 09:08:37 -06:00
appc appc: fix DomainRoutes copy 2023-11-15 12:20:00 -08:00
atomicfile various: add golangci-lint, fix issues (#7905) 2023-04-17 18:38:24 -04:00
chirp all: update copyright and license headers 2023-01-27 15:36:29 -08:00
client client/web: remove ControlAdminURL override 2023-11-29 18:34:12 -05:00
clientupdate clientupdate: implement update for Unraid (#10344) 2023-11-28 13:28:30 -08:00
cmd tsweb: propagate RequestID via context and entire request 2023-11-30 15:00:29 -05:00
control control/controlclient: support incremental packet filter updates [capver 81] 2023-11-17 10:07:12 -08:00
derp derp/derphttp: use a getter method to read server key 2023-11-06 14:58:55 +00:00
disco disco,net/tstun,wgengine/magicsock: probe peer MTU 2023-10-09 01:57:12 -07:00
docs cmd/k8s-operator: use our own container image instead of busybox 2023-10-17 08:11:16 -07:00
doctor doctor/permissions: add new check to print process permissions 2023-03-29 11:50:23 -04:00
envknob tailcfg: define a type for NodeCapability 2023-09-17 13:16:29 -07:00
health health: don't report a warning in DERP homeless mode 2023-11-16 14:08:47 -08:00
hostinfo hostinfo: fix a couple of logic simplification lints 2023-11-01 13:14:25 -07:00
internal/tooldeps various: add golangci-lint, fix issues (#7905) 2023-04-17 18:38:24 -04:00
ipn client/web: hide admin panel links for non-tailscale control servers 2023-11-29 16:51:46 -05:00
jsondb all: update copyright and license headers 2023-01-27 15:36:29 -08:00
kube cmd/k8s-operator,ipn/store/kubestore: patch secrets instead of updating 2023-08-29 13:24:05 -07:00
licenses licenses: update android licenses 2023-11-18 16:39:05 -08:00
log tailcfg: move LogHeapPprof from Debug to c2n [capver 69] 2023-08-16 20:35:04 -07:00
logpolicy winutil: refactor methods to get values from registry to also return (#9536) 2023-09-26 13:15:11 -04:00
logtail logtail: fix Logger.Write return result 2023-11-08 11:57:15 -08:00
metrics metrics: add missing comma in histogram JSON export 2023-09-07 15:28:12 -07:00
net net/dns: fix darwin dns resolver files 2023-11-29 19:25:31 -08:00
packages/deb go.mod: upgrade nfpm to v2 (#8786) 2023-08-03 13:00:45 -07:00
paths safesocket, paths: add Plan 9 support 2023-09-07 08:48:21 -07:00
portlist portlist: populate Pid field on Linux 2023-10-04 13:28:08 -07:00
posture adjust build tags for tamago 2023-11-15 06:33:02 -08:00
prober Add support for custom DERP port in TLS prober 2023-11-07 12:56:13 +00:00
proxymap wgengine, proxymap: split out port mapping from Engine to new type 2023-09-17 20:06:43 +01:00
release release/dist/unixpkgs: revert iptables move to Recommends, make it Depends 2023-10-04 08:56:42 -07:00
safesocket safesocket: make clear which net.Conns are winio types 2023-10-26 10:11:08 -07:00
scripts scripts/check_license_headers: enforce license on ts/tsx files 2023-11-28 13:57:09 -05:00
smallzstd all: update copyright and license headers 2023-01-27 15:36:29 -08:00
ssh/tailssh ssh/tailssh: use control server time instead of local time 2023-11-17 11:10:11 -06:00
syncs Fix potential goroutine leak in syncs/watchdog.go 2023-11-18 10:37:29 -08:00
tailcfg control/controlclient: support incremental packet filter updates [capver 81] 2023-11-17 10:07:12 -08:00
taildrop taildrop: lazily perform full deletion scan after first taildrop use (#10137) 2023-11-13 12:20:28 -06:00
tempfork all: use Go 1.21 slices, maps instead of x/exp/{slices,maps} 2023-08-17 08:42:35 -07:00
tka tka: clarify field comment 2023-11-27 18:35:33 -05:00
tool ci: report test coverage to coveralls.io 2023-11-21 09:08:37 -06:00
tsconst all: update copyright and license headers 2023-01-27 15:36:29 -08:00
tsd cmd/tailscaled,*: add start of configuration file support 2023-10-16 10:40:27 -07:00
tsnet tsnet: add CapturePcap method for debugging 2023-11-27 12:46:28 -08:00
tstest tstest/deptest: fix minor escaping error in regex 2023-11-01 16:22:18 -07:00
tstime tstime: add DefaultClock (#9691) 2023-10-12 16:01:17 -07:00
tsweb tsweb: propagate RequestID via context and entire request 2023-11-30 15:00:29 -05:00
types appc,ipn/local: support wildcard when matching app-connectors 2023-11-22 14:47:44 -08:00
util syspolicy: add exit node related policies (#10172) 2023-11-29 16:48:25 -05:00
version cmd/tailscale/cli: set Sparkle auto-update on macsys (#9952) 2023-10-24 12:17:55 -06:00
wf all: update copyright and license headers 2023-01-27 15:36:29 -08:00
wgengine wgengine/netstack: disable RACK on Windows (#10402) 2023-11-28 12:12:32 -08:00
words words: crikey! what a beauty of a list 2023-11-22 21:17:05 -08:00
.gitattributes .: add .gitattributes entry to use Go hunk-header driver 2021-12-03 17:56:02 -08:00
.gitignore client/web: always use new web client; remove old client 2023-08-28 11:11:16 -07:00
.golangci.yml ci: add more lints (#7909) 2023-04-19 21:54:19 -04:00
ALPINE.txt Docker: add ALPINE.txt to manage alpine versions 2022-06-29 11:47:09 -07:00
AUTHORS Move Linux client & common packages into a public repo. 2020-02-09 09:32:57 -08:00
CODEOWNERS CODEOWNERS: add the start of an owners file 2023-08-16 15:57:29 -07:00
CODE_OF_CONDUCT.md Add a code of conduct. 2020-02-10 22:16:30 -08:00
Dockerfile all: require Go 1.21 2023-08-08 21:15:08 -07:00
Dockerfile.base Dockerfile.base: install iputils 2023-06-18 07:54:05 -07:00
LICENSE all: update tools that manage copyright headers 2023-01-27 15:36:29 -08:00
Makefile Makefile: make it possibe to pass a custom tag when building dev images (#9461) 2023-09-19 17:51:22 +01:00
PATENTS Move Linux client & common packages into a public repo. 2020-02-09 09:32:57 -08:00
README.md client/web: switch to using prebuilt web client assets 2023-09-19 10:09:54 -07:00
SECURITY.md Add a SECURITY.md for vulnerability reports. 2020-02-11 10:26:41 -08:00
VERSION.txt VERSION.txt: this is v1.55.0 2023-11-15 10:15:28 -08:00
api.md api.md: remove clientConnectivity.derp field 2023-10-06 09:29:42 -07:00
build_dist.sh client/web: switch to using prebuilt web client assets 2023-09-19 10:09:54 -07:00
build_docker.sh Dockerfile: fix docker build 2023-02-14 00:59:09 +00:00
flake.lock flake.nix: use Go 1.21 to build tailscale flake 2023-08-26 21:05:25 -07:00
flake.nix flake.nix: use vendorHash instead of vendorSha256 2023-11-23 20:32:54 -08:00
go.mod go.mod: bump wireguard-go (#10352) 2023-11-21 11:21:39 -08:00
go.mod.sri go.mod.sri: update SRI hash for go.mod changes 2023-11-23 20:16:43 -08:00
go.sum go.mod: bump wireguard-go (#10352) 2023-11-21 11:21:39 -08:00
go.toolchain.branch go.toolchain: switch to tailscale.go1.21 (#8415) 2023-06-23 09:12:19 -04:00
go.toolchain.rev go.toolchain.rev: bump to Go 1.21.4 (#10189) 2023-11-09 13:39:56 -08:00
gomod_test.go go.mod: add test that replace directives aren't added in oss 2023-09-29 12:31:52 -07:00
pull-toolchain.sh pull-toolchain.sh: don't run update-flake.sh 2023-02-09 15:04:01 -08:00
shell.nix go.mod.sri: update SRI hash for go.mod changes 2023-11-23 20:16:43 -08:00
staticcheck.conf staticcheck.conf: remove unnecessary warning 2021-06-22 12:26:13 -07:00
update-flake.sh .github/workflows: add workflow to update go.mod Nix SRI hash 2023-02-14 03:28:43 +00:00
version-embed.go version: return correct Meta.MajorMinorPatch in non-dev builds 2023-02-10 13:00:44 -08:00
version_test.go all: update copyright and license headers 2023-01-27 15:36:29 -08:00

README.md

Tailscale

https://tailscale.com

Private WireGuard® networks made easy

Overview

This repository contains the majority of Tailscale's open source code. Notably, it includes the tailscaled daemon and the tailscale CLI tool. The tailscaled daemon runs on Linux, Windows, macOS, and to varying degrees on FreeBSD and OpenBSD. The Tailscale iOS and Android apps use this repo's code, but this repo doesn't contain the mobile GUI code.

Other Tailscale repos of note:

For background on which parts of Tailscale are open source and why, see https://tailscale.com/opensource/.

Using

We serve packages for a variety of distros and platforms at https://pkgs.tailscale.com.

Other clients

The macOS, iOS, and Windows clients use the code in this repository but additionally include small GUI wrappers. The GUI wrappers on non-open source platforms are themselves not open source.

Building

We always require the latest Go release, currently Go 1.21. (While we build releases with our Go fork, its use is not required.)

go install tailscale.com/cmd/tailscale{,d}

If you're packaging Tailscale for distribution, use build_dist.sh instead, to burn commit IDs and version info into the binaries:

./build_dist.sh tailscale.com/cmd/tailscale
./build_dist.sh tailscale.com/cmd/tailscaled

If your distro has conventions that preclude the use of build_dist.sh, please do the equivalent of what it does in your distro's way, so that bug reports contain useful version information.

Bugs

Please file any issues about this code or the hosted service on the issue tracker.

Contributing

PRs welcome! But please file bugs. Commit messages should reference bugs.

We require Developer Certificate of Origin Signed-off-by lines in commits.

See git log for our commit message style. It's basically the same as Go's style.

About Us

Tailscale is primarily developed by the people at https://github.com/orgs/tailscale/people. For other contributors, see:

WireGuard is a registered trademark of Jason A. Donenfeld.