Mirror of tailscale/tailscale@github.com
Go to file
Brad Fitzpatrick 515866d7c6 ipn, ipnserver, cmd/tailscale: add "server mode" support on Windows
This partially (but not yet fully) migrates Windows to tailscaled's
StateStore storage system.

This adds a new bool Pref, ForceDaemon, defined as:

// ForceDaemon specifies whether a platform that normally
// operates in "client mode" (that is, requires an active user
// logged in with the GUI app running) should keep running after the
// GUI ends and/or the user logs out.
//
// The only current applicable platform is Windows. This
// forced Windows to go into "server mode" where Tailscale is
// running even with no users logged in. This might also be
// used for macOS in the future. This setting has no effect
// for Linux/etc, which always operate in daemon mode.

Then, when ForceDaemon becomes true, we now write use the StateStore
to track which user started it in server mode, and store their prefs
under that key.

The ipnserver validates the connections/identities and informs that
LocalBackend which userid is currently in charge.

The GUI can then enable/disable server mode at runtime, without using
the CLI.

But the "tailscale up" CLI was also fixed, so Windows users can use
authkeys or ACL tags, etc.

Updates #275
2020-10-12 14:28:21 -07:00
.github Add depaware.txt files and GitHub checks. (#745) 2020-09-09 12:11:46 -07:00
atomicfile atomicfile: don't Chmod on windows 2020-07-15 12:31:40 -07:00
cmd ipn, ipnserver, cmd/tailscale: add "server mode" support on Windows 2020-10-12 14:28:21 -07:00
control/controlclient controlclient: print http errors if result code != 200. 2020-10-08 01:01:47 -04:00
derp tshttp, derphttp: send Proxy-Authorization, not Authorization, to proxies 2020-08-28 21:01:00 -07:00
disco wgengine/magicsock: run test DERP in mode where only disco packets allowed 2020-07-16 12:58:35 -07:00
internal Add tooldeps package to keep depaware pinned in go.mod. 2020-09-09 12:13:30 -07:00
ipn ipn, ipnserver, cmd/tailscale: add "server mode" support on Windows 2020-10-12 14:28:21 -07:00
log/logheap log/logheap: properly document LogHeap as performing HTTP upload (#741) 2020-09-07 19:17:53 -07:00
logpolicy all: use IsZero methods 2020-09-30 17:13:41 -07:00
logtail all: use testing.T.TempDir 2020-10-02 20:31:31 -07:00
metrics metrics: add LabelMap.GetFloat 2020-07-19 12:31:12 -07:00
net ipn, wgengine, magicsock, tsdns: be quieter and less aggressive when offline 2020-10-06 15:26:53 -07:00
paths paths, cmd/tailscaled: on Windows, don't try to migrate from legacy relay.conf 2020-07-13 08:59:54 -07:00
portlist portlist: reduce log spam on macOS 2020-09-02 15:44:55 -07:00
safesocket safesocket: gofmt 2020-07-20 14:40:19 -07:00
scripts scripts: don't descend into .git for license header check 2020-09-10 09:23:33 -07:00
smallzstd smallzstd: new package that constructs zstd small encoders/decoders. 2020-07-02 16:13:06 -07:00
syncs syncs: add Watch, for monitoring mutex contention 2020-09-11 11:36:07 -07:00
tailcfg tailcfg: restore Roles field to UserProfile 2020-10-09 15:56:39 -07:00
tempfork all: use testing.T.TempDir 2020-10-02 20:31:31 -07:00
tsconst net/netns: add windows support. 2020-09-14 16:28:49 -07:00
tstest tstest: skip resource check when test has failed 2020-10-01 11:27:22 -07:00
tstime tstime: hand-implement parseInt for specific needs of rfc3339 parsing. 2020-04-14 12:36:55 -07:00
tsweb tsweb: when unwrapping HTTPError, record the user-facing message also in the log 2020-09-17 10:12:48 -04:00
types cmd/tailscaled: use the standard flag page instead of getopt 2020-09-25 13:12:10 -07:00
util util/uniq: add new package 2020-10-02 11:00:56 -07:00
version version: add Windows MAJOR,MINOR,BUILD,REVISON value 2020-09-22 20:34:57 -07:00
wgengine wgengine/monitor: fix copy/paste-o to actually monitor route changes 2020-10-09 09:04:26 -07:00
.gitattributes .gitattributes: add a smudge filter for go.mod. 2020-02-19 20:02:02 -05:00
.gitignore cmd/relaynode: drop local --acl-file in favour of central packet filter. 2020-02-20 00:15:43 -05:00
AUTHORS Move Linux client & common packages into a public repo. 2020-02-09 09:32:57 -08:00
CODE_OF_CONDUCT.md Add a code of conduct. 2020-02-10 22:16:30 -08:00
Dockerfile Dockerfile: install iproute2 in the container image. 2020-05-10 17:12:17 -07:00
LICENSE Move Linux client & common packages into a public repo. 2020-02-09 09:32:57 -08:00
Makefile Makefile: remove tsshd from depaware 2020-09-11 11:09:32 -07:00
PATENTS Move Linux client & common packages into a public repo. 2020-02-09 09:32:57 -08:00
README.md Switch to Go 1.15. 2020-08-18 15:48:30 -07:00
SECURITY.md Add a SECURITY.md for vulnerability reports. 2020-02-11 10:26:41 -08:00
go.mod go.mod: bump wireguard-go for x/sys/unix symbol loss 2020-10-08 09:47:58 -07:00
go.sum controlclient: print http errors if result code != 200. 2020-10-08 01:01:47 -04:00

README.md

Tailscale

https://tailscale.com

Private WireGuard® networks made easy

Overview

This repository contains all the open source Tailscale client code and the tailscaled daemon and tailscale CLI tool. The tailscaled daemon runs primarily on Linux; it also works to varying degrees on FreeBSD, OpenBSD, Darwin, and Windows.

The Android app is at https://github.com/tailscale/tailscale-android

Using

We serve packages for a variety of distros at https://pkgs.tailscale.com .

Other clients

The macOS, iOS, and Windows clients use the code in this repository but additionally include small GUI wrappers that are not open source.

Building

go install tailscale.com/cmd/tailscale{,d}

We only guarantee to support the latest Go release and any Go beta or release candidate builds (currently Go 1.15) in module mode. It might work in earlier Go versions or in GOPATH mode, but we're making no effort to keep those working.

Bugs

Please file any issues about this code or the hosted service on the issue tracker.

Contributing

PRs welcome! But please file bugs. Commit messages should reference bugs.

We require Developer Certificate of Origin Signed-off-by lines in commits.

About Us

We are apenwarr, bradfitz, crawshaw, danderson, dfcarney, josharian from Tailscale Inc. You can learn more about us from our website.

WireGuard is a registered trademark of Jason A. Donenfeld.