An open source, self-hosted implementation of the Tailscale control server
Find a file
2021-02-20 22:43:07 +01:00
cmd/headscale Embedding frontend via Pkger 2020-07-04 13:38:58 +02:00
docker added dockerfile 2020-07-27 22:07:23 +10:00
.air.conf Added .air.conf for hot-reload support 2020-07-04 13:40:13 +02:00
.gitignore Added missing cmd 2020-06-21 12:33:43 +02:00
app.go Bumped dependencies 2021-02-20 22:43:07 +01:00
config.json.example Initial commit 2020-06-21 12:32:08 +02:00
db.go Initial commit 2020-06-21 12:32:08 +02:00
go.mod Bumped dependencies 2021-02-20 22:43:07 +01:00
go.sum Bumped dependencies 2021-02-20 22:43:07 +01:00
handlers.go Bumped dependencies 2021-02-20 22:43:07 +01:00
LICENSE Initial commit 2020-06-21 11:21:07 +02:00
machine.go Bumped dependencies 2021-02-20 22:43:07 +01:00
README.md minor readme typo 2020-12-15 20:57:06 +05:30
utils.go Bumped dependencies 2021-02-20 22:43:07 +01:00

headscale

An open source implementation of the Tailscale coordination server.

Disclaimer

  1. I have nothing to do with Tailscale, or Tailscale Inc. Just a fan of their tech.
  2. The purpose of writing this was to learn a bit how Tailscale works. Hence the emojis in the log messages and other terrible code.
  3. I don't use Headscale myself (their Solo plan + DERP infra is way more convenient).
  4. Headscale adds all the machines under the same user. Be careful!

Running it

  1. Compile the headscale binary
go build cmd/headscale/headscale.go 
  1. Get youself a PostgreSQL DB running.
docker run --name headscale -e POSTGRES_DB=headscale -e \
  POSTGRES_USER=foo -e POSTGRES_PASSWORD=bar -p 5432:5432 -d postgres
  1. Sort some stuff up (headscale Wireguard keys & the config.json file)
wg genkey > private.key
wg pubkey < private.key > public.key
cp config.json.example config.json
  1. Run it
./headscale
  1. Add your first machine
tailscale up -login-server YOUR_HEADSCALE_URL