An open source, self-hosted implementation of the Tailscale control server
Find a file
2020-07-04 13:39:52 +02:00
cmd/headscale Embedding frontend via Pkger 2020-07-04 13:38:58 +02:00
frontend Added React base app 2020-07-04 13:39:52 +02:00
.gitignore Added missing cmd 2020-06-21 12:33:43 +02:00
app.go Embedding frontend via Pkger 2020-07-04 13:38:58 +02:00
config.json.example Initial commit 2020-06-21 12:32:08 +02:00
db.go Initial commit 2020-06-21 12:32:08 +02:00
go.mod Embedding frontend via Pkger 2020-07-04 13:38:58 +02:00
go.sum Embedding frontend via Pkger 2020-07-04 13:38:58 +02:00
handlers.go Initial commit 2020-06-21 12:32:08 +02:00
LICENSE Initial commit 2020-06-21 11:21:07 +02:00
machine.go Initial commit 2020-06-21 12:32:08 +02:00
pkged.go Embedding frontend via Pkger 2020-07-04 13:38:58 +02:00
README.md Initial commit 2020-06-21 12:32:08 +02:00
utils.go Initial commit 2020-06-21 12:32:08 +02:00

headscale

An open source implementation of the Tailscale coordination server.

Disclaimer

  1. I have nothing to do with Tailscale, or Tailscale Inc. Just a fan of their tech.
  2. The purpose of writing this was to learn a bit how Tailscale works. Hence the emojis in the log messages and other terrible code.
  3. I don't use Headscale myself (their Solo plan + DERP infra is way more convenient).
  4. Headscale adds all the machines under the same user. Be careful!

Running it

  1. Compile the headscale binary
go build cmd/headscale/headscale.go 
  1. Get youself a PostgreSQL DB running.
docker run --name headscale -e POSTGRES_DB=headscale -e \
  POSTGRES_USER=foo -e POSTGRES_PASSWORD=bar -p 5432:5432 -d postgres
  1. Sort some stuff up (headscale Wireguard keys & the config.json file)
wg genkey > private.key
wg pubkey < private.key > public.key
cp config.json.example config.json
  1. Run it
./headcale
  1. Add your first machine
tailscale up -login-server YOUR_HEADSCALE_URL