npx skills add https://github.com/el-feo/ai-context --skill tailscale# 安装 (Linux)
curl -fsSL https://tailscale.com/install.sh | sh
# 安装 (macOS)
brew install tailscale
# 连接并认证
sudo tailscale up
# 检查状态
tailscale status
# 获取您的 Tailscale IP
tailscale ip -4
tailscale up # 连接
tailscale down # 断开连接 (守护进程保持运行)
tailscale status # 查看对等节点
tailscale status --json | jq # 详细的网络拓扑图
tailscale ping machine-name # 测试连通性 (忽略 ACL)
tailscale ping --icmp machine-name # 使用 ACL 进行测试
tailscale set --exit-node=name # 使用出口节点
tailscale set --exit-node= # 停止使用出口节点
使用 tailscale set 可在不重新连接的情况下更改设置。使用 tailscale up 进行初始设置。
运行 scripts/setup_subnet_router.sh <subnet_cidr> [auth_key] 进行自动化设置。
广告位招租
在这里展示您的产品或服务
触达数万 AI 开发者,精准高效
手动步骤:
sudo tailscale up --advertise-routes=192.168.1.0/24sudo tailscale up --accept-routes运行 scripts/setup_exit_node.sh [auth_key] 进行自动化设置。
手动步骤:
sudo tailscale up --advertise-exit-nodetailscale set --exit-node=node-name --exit-node-allow-lan-access# 在服务器上启用
sudo tailscale set --ssh
# 从客户端连接 (无需特殊设置)
ssh machine-name
需要同时授予网络访问权限和 SSH ACL 规则。有关 SSH ACL 模式,请参阅 acl-examples.md。
# 在本地为 tailnet 提供服务
tailscale serve 3000
# 暴露到公共互联网 (仅限端口 443、8443 或 10000)
tailscale funnel 3000
# 带有 TLS 终止的 TCP 转发
tailscale serve --tls-terminated-tcp=5432 localhost:5432
# 检查状态 / 关闭
tailscale serve status
tailscale serve off
使用 Grants (现代,推荐) 而非 ACLs (旧版)。两者都有效,但 Grants 支持应用层能力。
{
"groups": {
"group:engineering": ["alice@example.com"]
},
"tagOwners": {
"tag:server": ["group:engineering"]
},
"grants": [
{
"src": ["group:engineering"],
"dst": ["tag:server"],
"ip": ["22", "443"]
}
]
}
关键模式: 使用组管理人员,使用标签管理机器。对于 SSH 访问,务必同时包含网络授权和 SSH 规则。
有关详细的 ACL 场景、SSH 访问模式、状态检查、自动批准器、GitOps 集成和常见错误,请参阅 acl-examples.md。
scripts/setup_subnet_router.sh<subnet_cidr> [auth_key] - 自动化子网路由器设置 (安装 Tailscale,启用 IP 转发,配置路由)scripts/setup_exit_node.sh [auth_key] - 自动化出口节点设置 (安装 Tailscale,启用 IP 转发,宣告为出口节点)每周安装次数
117
代码仓库
GitHub 星标数
5
首次出现
2026 年 1 月 24 日
安全审计
已安装于
opencode105
codex105
gemini-cli103
github-copilot97
cursor91
kimi-cli84
# Install (Linux)
curl -fsSL https://tailscale.com/install.sh | sh
# Install (macOS)
brew install tailscale
# Connect and authenticate
sudo tailscale up
# Check status
tailscale status
# Get your Tailscale IP
tailscale ip -4
tailscale up # Connect
tailscale down # Disconnect (daemon stays running)
tailscale status # View peers
tailscale status --json | jq # Detailed network map
tailscale ping machine-name # Test connectivity (ignores ACLs)
tailscale ping --icmp machine-name # Test with ACLs
tailscale set --exit-node=name # Use exit node
tailscale set --exit-node= # Stop using exit node
Use tailscale set to change settings without reconnecting. Use tailscale up for initial setup.
Run scripts/setup_subnet_router.sh <subnet_cidr> [auth_key] for automated setup.
Manual steps:
sudo tailscale up --advertise-routes=192.168.1.0/24sudo tailscale up --accept-routesRun scripts/setup_exit_node.sh [auth_key] for automated setup.
Manual steps:
sudo tailscale up --advertise-exit-nodetailscale set --exit-node=node-name --exit-node-allow-lan-access# Enable on server
sudo tailscale set --ssh
# Connect from client (no special setup needed)
ssh machine-name
Requires both network access grant and SSH ACL rule. See acl-examples.md for SSH ACL patterns.
# Serve locally to tailnet
tailscale serve 3000
# Expose to public internet (ports 443, 8443, or 10000 only)
tailscale funnel 3000
# TCP forwarding with TLS termination
tailscale serve --tls-terminated-tcp=5432 localhost:5432
# Check status / turn off
tailscale serve status
tailscale serve off
Use Grants (modern, recommended) over ACLs (legacy). Both work, but Grants support application-layer capabilities.
{
"groups": {
"group:engineering": ["alice@example.com"]
},
"tagOwners": {
"tag:server": ["group:engineering"]
},
"grants": [
{
"src": ["group:engineering"],
"dst": ["tag:server"],
"ip": ["22", "443"]
}
]
}
Key patterns: Use groups for people, tags for machines. Always include both network grants and SSH rules for SSH access.
For detailed ACL scenarios, SSH access patterns, posture checks, auto-approvers, GitOps integration, and common mistakes, see acl-examples.md.
scripts/setup_subnet_router.sh<subnet_cidr> [auth_key] - Automated subnet router setup (installs Tailscale, enables IP forwarding, configures routes)scripts/setup_exit_node.sh [auth_key] - Automated exit node setup (installs Tailscale, enables IP forwarding, advertises as exit node)Weekly Installs
117
Repository
GitHub Stars
5
First Seen
Jan 24, 2026
Security Audits
Gen Agent Trust HubPassSocketPassSnykFail
Installed on
opencode105
codex105
gemini-cli103
github-copilot97
cursor91
kimi-cli84
SolidJS 最佳实践与模式指南:解决状态耦合与UI卡顿问题
304 周安装
Avalonia UI布局优化指南:使用Zafiro.Avalonia实现现代简洁布局
304 周安装
死代码检测工具 - 使用TLDR静态分析快速查找未使用函数和死代码
300 周安装
TypeScript 终端 UI 开发指南:Ink 与 Clack 最佳实践,提升 CLI 开发者体验
302 周安装
App Store Connect 崩溃问题排查与性能诊断工具 - 自动化分析TestFlight报告
310 周安装
GrepAI工作空间使用指南:统一索引管理多项目代码库与微服务架构
306 周安装