Kristoffer Dalby
5109af94a3
login to docker registries ( #1744 )
...
Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com>
2024-02-12 16:01:56 +01:00
Kristoffer Dalby
905fdaa409
remove quotes from command ( #1742 )
...
Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com>
2024-02-12 15:09:19 +01:00
Kristoffer Dalby
0333e97630
Build docker images with ko (goreleaser) ( #1716 )
...
* make dockerfiles testing only note
Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com>
* setup ko image builder for goreleaser
Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com>
* remove release-docker
Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com>
* remove non-debug Dockerfile
Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com>
* Comments and lint
Signed-off-by: Kristoffer Dalby <kristoffer@dalby.cc>
* build debug images based on debian
Signed-off-by: Kristoffer Dalby <kristoffer@dalby.cc>
* remove debug flag for goreleaser
Signed-off-by: Kristoffer Dalby <kristoffer@dalby.cc>
---------
Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com>
Signed-off-by: Kristoffer Dalby <kristoffer@dalby.cc>
2024-02-12 14:53:07 +01:00
DeveloperDragon
e3553aae50
Allow when user has only a subnet route ( #1734 )
...
* Add test because of issue 1604
* Add peer for routes
* Revert previous change to try different way to add peer
* Add traces
* Remove traces
* Make sure tests have IPPrefix comparator
* Get allowedIps before loop
* Remove comment
* Add composite literals :)
2024-02-12 11:44:37 +01:00
Pallab Pain
47405931c6
✨ feat(apikey): adds command to delete api keys ( #1702 )
...
We currently do not have a way to clean up api keys. There may be cases
where users of headscale may generate a lot of api keys and these may
end up accumulating in the database. This commit adds the command to
delete an api key given a prefix.
2024-02-12 11:31:21 +01:00
foosinn
c4beb0b8af
document setting oidc client secret cia env ( #1649 )
2024-02-12 09:20:31 +01:00
Kristoffer Dalby
3f2b238a46
Upgrade to Go 1.22 and update deps ( #1728 )
...
* go 1.22
Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com>
* upgrade tailscale
Signed-off-by: Kristoffer Dalby <kristoffer@dalby.cc>
* add script for getting nix sri for go
Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com>
* update deps and only build headscale
Signed-off-by: Kristoffer Dalby <kristoffer@dalby.cc>
* add script to update all deps
Signed-off-by: Kristoffer Dalby <kristoffer@dalby.cc>
* get golines and golangci from upstream nix
Signed-off-by: Kristoffer Dalby <kristoffer@dalby.cc>
---------
Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com>
Signed-off-by: Kristoffer Dalby <kristoffer@dalby.cc>
2024-02-12 09:11:33 +01:00
Kristoffer Dalby
68a8ecee7a
Prepare notify channel before sending first update ( #1730 )
...
* create channel before sending first update
Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com>
* do not notify on register, wait for connect
Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com>
---------
Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com>
2024-02-12 09:11:17 +01:00
lööps
c3257e2146
docs(windows-client): add Windows registry command ( #1658 )
...
Add Windows registry command to create the `Tailscale IPN` path before setting properties.
2024-02-09 19:16:17 +01:00
Pallab Pain
9047c09871
✨ feat: add pqsql configs for open and idle connections ( #1583 )
...
When Postgres is used as the backing database for headscale,
it does not set a limit on maximum open and idle connections
which leads to hundreds of open connections to the Postgres
server.
This commit introduces the configuration variables to set those
values and also sets default while opening a new postgres connection.
2024-02-09 17:34:28 +01:00
Kristoffer Dalby
91bb85e7d2
Update bug_report.md ( #1672 )
2024-02-09 07:27:13 +01:00
Kristoffer Dalby
94b30abf56
Restructure database config ( #1700 )
2024-02-09 07:27:00 +01:00
Kristoffer Dalby
00e7550e76
Add assert func for verifying status, netmap and netcheck ( #1723 )
2024-02-09 07:26:41 +01:00
Kristoffer Dalby
83769ba715
Replace database locks with transactions ( #1701 )
...
This commits removes the locks used to guard data integrity for the
database and replaces them with Transactions, turns out that SQL had
a way to deal with this all along.
This reduces the complexity we had with multiple locks that might stack
or recurse (database, nofitifer, mapper). All notifications and state
updates are now triggered _after_ a database change.
Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com>
2024-02-08 17:28:19 +01:00
DeveloperDragon
cbf57e27a7
Login with OIDC after having been logged out ( #1719 )
2024-02-05 10:45:35 +01:00
derelm
4ea12f472a
Fix failover to disabled route #1706 ( #1707 )
...
* fix #1706 - failover should disregard disabled routes during failover
* fixe tests for failover; all current tests assume routes to be enabled
* add testcase for #1706 - failover to disabled route
2024-02-03 15:30:15 +01:00
danielalvsaaker
b4210e2c90
Trim client secret after reading from file ( #1697 )
...
Reading from file will include a line break, which results in a mismatching client secret
compared to reading directly from the config.
2024-01-25 09:53:34 +01:00
dyz
a369d57a17
fix node expire error due to type in gorm model Update ( #1692 )
...
Fixes #1674
Signed-off-by: fortitude.zhang <fortitude.zhang@gmail.com>
2024-01-21 17:38:24 +01:00
Kristoffer Dalby
1e22f17f36
node selfupdate and fix subnet router when ACL is enabled ( #1673 )
...
Fixes #1604
Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com>
v0.23.0-alpha3
2024-01-18 17:30:25 +01:00
Kristoffer Dalby
65376e2842
ensure renabled auto-approve routes works ( #1670 )
2024-01-18 16:36:47 +01:00
Alexander Halbarth
7e8bf4bfe5
Add Customization Options to DERP Map entry of integrated DERP server ( #1565 )
...
Co-authored-by: Alexander Halbarth <alexander.halbarth@alite.at>
Co-authored-by: Bela Lemle <bela.lemle@alite.at>
Co-authored-by: Kristoffer Dalby <kristoffer@dalby.cc>
2024-01-16 16:04:03 +01:00
Kristoffer Dalby
3b103280ef
implement selfupdate and pass expiry ( #1647 )
2024-01-05 10:41:56 +01:00
Kristoffer Dalby
a592ae56b4
fix issue where advertise tags causes hang ( #1669 )
...
Fixes #1665
Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com>
2024-01-04 21:26:49 +01:00
Kristoffer Dalby
054b06d45d
add 1.54 and 1.56 to integration tests ( #1652 )
...
* add 1.54 and 1.56 to integration tests
Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com>
* fix bug where we tested random versions, now sorted
Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com>
---------
Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com>
2024-01-02 10:41:40 +01:00
Kristoffer Dalby
55ca078f22
embed (hidden) tailsql for debugging ( #1663 )
...
Signed-off-by: Kristoffer Dalby <kristoffer@dalby.cc>
2023-12-20 21:47:48 +01:00
Kristoffer Dalby
6049ec758c
add versioned migrations ( #1644 )
v0.23.0-alpha2
2023-12-10 15:46:14 +01:00
Kristoffer Dalby
ac910fd44c
make stale shorter ( #1646 )
2023-12-10 15:30:30 +01:00
Kristoffer Dalby
9982ae5f09
add breaking entry of derp priv key ( #1641 )
2023-12-10 15:23:23 +01:00
Kristoffer Dalby
cf8ffea154
turn off grpc communication logging ( #1640 )
2023-12-10 15:22:59 +01:00
Kristoffer Dalby
790bbe5e8d
fix hostinfo db column spelling ( #1642 )
2023-12-10 15:22:26 +01:00
github-actions[bot]
2c8fc9b061
Update flake.lock ( #1632 )
...
Co-authored-by: github-actions[bot] <github-actions[bot]@users.noreply.github.com>
2023-12-10 09:50:39 +01:00
github-actions[bot]
b359939812
docs(README): update contributors ( #1639 )
...
Co-authored-by: github-actions[bot] <41898282+github-actions[bot]@users.noreply.github.com>
2023-12-10 08:56:01 +01:00
Kristoffer Dalby
f65f4eca35
ensure online status and route changes are propagated ( #1564 )
2023-12-09 18:09:24 +01:00
Kristoffer Dalby
0153e26392
upgrade go dependencies ( #1628 )
2023-11-30 14:41:31 +01:00
Andrei Pechkurov
6c9c55774b
Update xsync to v3.0.2 ( #1597 )
...
Co-authored-by: Kristoffer Dalby <kristoffer@tailscale.com>
2023-11-29 15:47:14 +01:00
github-actions[bot]
2f558bee80
Update flake.lock ( #1598 )
...
Co-authored-by: github-actions[bot] <github-actions[bot]@users.noreply.github.com>
2023-11-29 15:11:28 +01:00
Azamat H. Hackimov
4c608a4b58
Fix Github Actions docs pipeline ( #1622 )
2023-11-29 15:11:00 +01:00
JesseBot
f13cf64578
Docs: Update running-headscale-container.md - fix link to example config ( #1618 )
2023-11-29 15:10:21 +01:00
MichaelKo
85e92db505
Enhance pipeline stability and automatically retry unstable tests ( #1566 )
...
* add test retry to action
* add test retry to action
2023-11-27 18:32:52 +01:00
Kristoffer Dalby
a59aab2081
Remove support for non-noise clients (pre-1.32) ( #1611 )
2023-11-23 08:31:33 +01:00
Kristoffer Dalby
b918aa03fc
move to use tailscfg types over strings/custom types ( #1612 )
...
* rename database only fields
Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com>
* use correct endpoint type over string list
Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com>
* remove HostInfo wrapper
Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com>
* wrap errors in database hooks
Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com>
---------
Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com>
2023-11-21 18:20:06 +01:00
Kristoffer Dalby
ed4e19996b
Use tailscale key types instead of strings ( #1609 )
...
* upgrade tailscale
Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com>
* make Node object use actualy tailscale key types
This commit changes the Node struct to have both a field for strings
to store the keys in the database and a dedicated Key for each type
of key.
The keys are populated and stored with Gorm hooks to ensure the data
is stored in the db.
Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com>
* use key types throughout the code
Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com>
* make sure machinekey is concistently used
Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com>
* use machine key in auth url
Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com>
* fix web register
Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com>
* use key type in notifier
Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com>
* fix relogin with webauth
Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com>
---------
Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com>
2023-11-19 22:37:04 +01:00
Kristoffer Dalby
c0fd06e3f5
remove the use key stripping and store the proper keys ( #1603 )
2023-11-16 17:55:29 +01:00
github-actions[bot]
2af71c9e31
docs(README): update contributors ( #1592 )
...
Co-authored-by: github-actions[bot] <41898282+github-actions[bot]@users.noreply.github.com>
2023-11-06 14:07:35 +01:00
Lucalux
42b7f8f65a
redundant line removed from systemd.service ( #1587 )
2023-11-06 13:45:34 +01:00
github-actions[bot]
48c7d763d5
Update flake.lock ( #1589 )
...
Flake lock file updates:
• Updated input 'nixpkgs':
'github:NixOS/nixpkgs/e12483116b3b51a185a33a272bf351e357ba9a99' (2023-09-21)
→ 'github:NixOS/nixpkgs/a0b3b06b7a82c965ae0bb1d59f6e386fe755001d' (2023-11-05)
Co-authored-by: github-actions[bot] <github-actions[bot]@users.noreply.github.com>
2023-11-06 12:57:06 +01:00
Kristoffer Dalby
d0d6438337
Add workflow to autoupdate flake.lock deps ( #1588 )
...
Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com>
2023-11-06 12:48:52 +01:00
Kristoffer Dalby
fb4ed95ff6
Upgrade Go 1.21, Tailscale 1.50 and add Capability version support ( #1563 )
2023-09-28 12:33:53 -07:00
Kristoffer Dalby
01b85e5232
remove readonly case for mapresponse, dont think it is used ( #1556 )
v0.23.0-alpha1
2023-09-25 14:27:24 -07:00
Kristoffer Dalby
64c0a6523f
Set online status in lite requests ( #1555 )
2023-09-25 14:27:14 -07:00