diff --git a/net/tailscale/Makefile b/net/tailscale/Makefile deleted file mode 100644 index 8e1c57e51f6f6e..00000000000000 --- a/net/tailscale/Makefile +++ /dev/null @@ -1,64 +0,0 @@ -# -# Copyright (C) 2021 CZ.NIC, z. s. p. o. (https://www.nic.cz/) -# -# This is free software, licensed under the GNU General Public License v2. -# See /LICENSE for more information. -# - -include $(TOPDIR)/rules.mk - -PKG_NAME:=tailscale -PKG_VERSION:=1.72.1 -PKG_RELEASE:=1 - -PKG_SOURCE:=$(PKG_NAME)-$(PKG_VERSION).tar.gz -PKG_SOURCE_URL:=https://codeload.github.com/tailscale/tailscale/tar.gz/v$(PKG_VERSION)? -PKG_HASH:=21b529e85144f526b61e0998c8b7885d53f17cba21252e5c7252c4014f5f507b - -PKG_MAINTAINER:=Jan Pavlinec -PKG_LICENSE:=BSD-3-Clause -PKG_LICENSE_FILES:=LICENSE - -PKG_BUILD_DIR:=$(BUILD_DIR)/tailscale-$(PKG_VERSION) -PKG_BUILD_DEPENDS:=golang/host -PKG_BUILD_PARALLEL:=1 -PKG_BUILD_FLAGS:=no-mips16 - -GO_PKG:=\ - tailscale.com/cmd/tailscaled -GO_PKG_LDFLAGS:=-X 'tailscale.com/version.longStamp=$(PKG_VERSION)-$(PKG_RELEASE) (OpenWrt)' -GO_PKG_LDFLAGS_X:=tailscale.com/version.shortStamp=$(PKG_VERSION) -GO_PKG_TAGS:=ts_include_cli - -include $(INCLUDE_DIR)/package.mk -include ../../lang/golang/golang-package.mk - -define Package/tailscale - SECTION:=net - CATEGORY:=Network - SUBMENU:=VPN - TITLE:=Zero config VPN - URL:=https://tailscale.com - DEPENDS:=$(GO_ARCH_DEPENDS) +ca-bundle +kmod-tun - PROVIDES:=tailscaled -endef - -define Package/tailscale/description - It creates a secure network between your servers, computers, - and cloud instances. Even when separated by firewalls or subnets. -endef - -define Package/tailscale/conffiles -/etc/config/tailscale -/etc/tailscale/ -endef - -define Package/tailscale/install - $(INSTALL_DIR) $(1)/usr/sbin $(1)/etc/init.d $(1)/etc/config - $(INSTALL_BIN) $(GO_PKG_BUILD_BIN_DIR)/tailscaled $(1)/usr/sbin - $(LN) tailscaled $(1)/usr/sbin/tailscale - $(INSTALL_BIN) ./files//tailscale.init $(1)/etc/init.d/tailscale - $(INSTALL_DATA) ./files//tailscale.conf $(1)/etc/config/tailscale -endef - -$(eval $(call BuildPackage,tailscale)) diff --git a/net/tailscale/README.md b/net/tailscale/README.md deleted file mode 100644 index e53dfb77e026d6..00000000000000 --- a/net/tailscale/README.md +++ /dev/null @@ -1,23 +0,0 @@ -# Tailscale -This readme should help you with tailscale client setup. - -> [!NOTE] -> By default this package will use nftables. If you wish to use iptables, the config file `/etc/config/tailscale` can be modfied, changing the line `fw_mode 'nftables'` to `fw_mode 'iptables'`. You can then run `/etc/init.d/tailscale restart` to restart tailscale using your chosen method - -## First setup - -First, enable and run daemon - -``` -/etc/init.d/tailscale enable -/etc/init.d/tailscale start -``` - -Then you should use tailscale utility to get a login link for your device. - -Run command and finish device registration with the given URL. -``` -tailscale up -``` - -See the [OpenWrt wiki](https://openwrt.org/docs/guide-user/services/vpn/tailscale/start) for more detailed setup instructions diff --git a/net/tailscale/files/tailscale.conf b/net/tailscale/files/tailscale.conf deleted file mode 100644 index 0261582ac0bc74..00000000000000 --- a/net/tailscale/files/tailscale.conf +++ /dev/null @@ -1,7 +0,0 @@ -config settings 'settings' - option log_stderr '1' - option log_stdout '1' - option port '41641' - option state_file '/etc/tailscale/tailscaled.state' - # default to using nftables - change below to 'iptables' if still using iptables - option fw_mode 'nftables' \ No newline at end of file diff --git a/net/tailscale/files/tailscale.init b/net/tailscale/files/tailscale.init deleted file mode 100644 index 5100c7ceed9630..00000000000000 --- a/net/tailscale/files/tailscale.init +++ /dev/null @@ -1,47 +0,0 @@ -#!/bin/sh /etc/rc.common - -# Copyright 2020 Google LLC. -# Copyright (C) 2021 CZ.NIC z.s.p.o. (https://www.nic.cz/) -# SPDX-License-Identifier: Apache-2.0 - -USE_PROCD=1 -START=80 - -start_service() { - local state_file - local port - local std_err std_out - - config_load tailscale - config_get_bool std_out "settings" log_stdout 1 - config_get_bool std_err "settings" log_stderr 1 - config_get port "settings" port 41641 - config_get state_file "settings" state_file /etc/tailscale/tailscaled.state - config_get fw_mode "settings" fw_mode nftables - - /usr/sbin/tailscaled --cleanup - - procd_open_instance - procd_set_param command /usr/sbin/tailscaled - - # Starting with v1.48.1 ENV variable is required to enable use of iptables / nftables. - # Use nftables by default - can be changed to 'iptables' in tailscale config - procd_set_param env TS_DEBUG_FIREWALL_MODE="$fw_mode" - - # Set the port to listen on for incoming VPN packets. - # Remote nodes will automatically be informed about the new port number, - # but you might want to configure this in order to set external firewall - # settings. - procd_append_param command --port "$port" - procd_append_param command --state "$state_file" - - procd_set_param respawn - procd_set_param stdout "$std_out" - procd_set_param stderr "$std_err" - - procd_close_instance -} - -stop_service() { - /usr/sbin/tailscaled --cleanup -} diff --git a/net/tailscale/test.sh b/net/tailscale/test.sh deleted file mode 100755 index 0130d492908182..00000000000000 --- a/net/tailscale/test.sh +++ /dev/null @@ -1,10 +0,0 @@ -#!/bin/sh - -case "$1" in - tailscale) - tailscale version | grep "$2" - ;; - tailscaled) - tailscaled -version | grep "$2" - ;; -esac