The Tailscale plugin for Caddy brings Tailscale integration to the Caddy web server. It's really a collection of plugins, providing:
- the ability for a Caddy server to directly join your Tailscale network without needing a separate Tailscale client
- a Caddy network listener, to serve sites privately on your tailnet
- a Caddy proxy transport, to proxy requests to another device on your tailnet
- a Caddy authentication provider, to pass a user's Tailscale identity to an application
- a Caddy subcommand, to quickly setup a reverse-proxy using either or both of the network listener or authentication provider
This plugin is still very experimental.
Use xcaddy to build Caddy with the Tailscale plugin included.
xcaddy build v2.7.6 --with github.com/tailscale/caddy-tailscale
In a Caddyfile, use the tailscale
global option to configure your Tailscale nodes.
Most options can be set at the top-level, in which case they will apply to all nodes.
They can also be set for a specific named node, which override the top-level options.
Named node configurations can be referenced elsewhere in the caddy configuration.
The tailscale
global option only defines configuration values for Tailscale nodes.
Nodes are not actually registered and connected to your tailnet until they are used,
such as listening on the node's interface or using it as a proxy transport.
String options support the use of placeholders to populate values dynamically, such as from an environment variable.
Supported options are:
{
tailscale {
# Tailscale auth key used to register nodes.
auth_key <auth_key>
# Alternate control server URL. Leave empty to use the default server.
control_url <control_url>
# If true, register ephemeral nodes that are removed after disconnect.
# Default: false
ephemeral true|false
# Directory to store Tailscale state in. A subdirectory will be created for each node.
# The default is to store state in the user's config dir (see os.UserConfDir).
state_dir <filepath>
# If true, run the Tailscale web UI for remotely managing the node. (https://tailscale.com/kb/1325)
# Default: false
webui true|false
# Any number of named node configs can be specified to override global options.
<node_name> {
# Tailscale auth key used to register this node.
auth_key <auth_key>
# Alternate control server URL.
control_url <control_url>
# If true, remove this node after disconnect.
ephemeral true|false
# Hostname to request when registering this node.
# Default: <node_name> used for this node configuration
hostname <hostname>
# Directory to store Tailscale state in for this node. No subdirectory is created.
state_dir <filepath>
# If true, run the Tailscale web UI for remotely managing this node.
webui true|false
}
}
}
All configuration values are optional, though an auth key is strongly recommended.
If no auth key is present, one will be loaded from the default $TS_AUTHKEY
environment variable.
Failing that, it will log an auth URL to the Caddy log that can be used to register the node.
After the node had been added to your network, you can restart Caddy without the debug logging.
Unless the node is registered as ephemeral
, the auth key is only needed on first run.
Node state is stored in state_dir
and reused when Caddy restarts.
For Caddy JSON config, add the tailscale
app with fields from tscaddy.App:
{
"apps": {
"tailscale": {
...
}
}
}
The provided network listener allows privately serving sites on your tailnet. Configure a site block as usual, and use the bind directive to specify a tailscale network address:
:80 {
bind tailscale/
}
You can also specify a named node configuration to use for the Tailscale node:
:80 {
bind tailscale/myapp
}
If no node configuration is specified, a default configuration will be used,
which names the node based on the name of the running binary (typically, caddy
).
If using the Caddy JSON configuration, specify a "tailscale/" network in your listen address:
{
"apps": {
"http": {
"servers": {
"srv0": {
"listen": ["tailscale/myhost:80"]
}
}
}
}
}
Caddy will join your Tailscale network and listen only on that network interface. Multiple addresses can be specified if you want to listen on different Tailscale nodes as well as a local address:
:80 {
bind tailscale/myhost tailscale/my-other-host localhost
}
Different sites can be configured to join the network as different nodes:
:80 {
bind tailscale/myhost
}
:80 {
bind tailscale/my-other-host
}
Or they can be served on different ports of the same Tailscale node:
:80 {
bind tailscale/myhost
}
:8080 {
bind tailscale/myhost
}
At this time, the Tailscale plugin for Caddy doesn't support using Caddy's native HTTPS resolvers.
You will need to use the tailscale+tls
bind protocol with a configuration like this:
{
auto_https off
}
:443 {
bind tailscale+tls/myhost
}
Please note that because you currently need to turn auto_https
support off,
you may want to run a separate Caddy instance for sites that do need auto_https
.
Setup the Tailscale authentication provider with tailscale_auth
directive.
The provider will enforce that all requests are coming from a Tailscale user,
as well as set various fields on the Caddy user object that can be passed to applications.
For sites listening only on the Tailscale network interface,
user access will already be enforced by the tailnet access controls.
Set the order directive in your global options to instruct Caddy when to process tailscale_auth
.
For example, in a Caddyfile:
{
order tailscale_auth after basicauth
}
:80 {
tailscale_auth
}
The following fields are set on the Caddy user object:
user.id
: the Tailscale email-ish user IDuser.tailscale_login
: the username portion of the Tailscale user IDuser.tailscale_user
: same asuser.id
user.tailscale_name
: the display name of the Tailscale useruser.tailscale_profile_picture
: the URL of the Tailscale user's profile pictureuser.tailscale_tailnet
: the name of the Tailscale network the user is a member of
These values can be mapped to HTTP headers that are then passed to an application that supports proxy authentication such as Gitea or Grafana. You might have something like the following in your Caddyfile:
:80 {
bind tailscale/gitea
tailscale_auth
reverse_proxy http://localhost:3000 {
header_up X-Webauth-User {http.auth.user.tailscale_login}
header_up X-Webauth-Email {http.auth.user.tailscale_user}
header_up X-Webauth-Name {http.auth.user.tailscale_name}
}
}
When used with a Tailscale listener (described above), that Tailscale node is used to identify the remote user. Otherwise, the authentication provider will attempt to connect to the Tailscale daemon running on the local machine.
The tailscale
proxy transport allows using a Tailscale node to connect to a reverse proxy upstream.
This might be useful proxy non-Tailscale traffic to node on your tailnet, similar to Funnel.
You can specify a named node configuration, or a default caddy-proxy
node will be used.
:8080 {
reverse_proxy http://my-other-node:10000 {
transport tailscale myhost
}
}
The Tailscale Caddy plugin also includes a tailscale-proxy
subcommand that
sets up a simple reverse proxy that can optionally join your Tailscale network,
and will enforce Tailscale authentication and map user values to HTTP headers.
For example:
xcaddy tailscale-proxy --from "tailscale/myhost:80" --to localhost:8000
(The tailscale-proxy
subcommand does not yet work with the tailscale proxy transport.)