Christian Heusel
1f4efbcd3b
add changelog entry
2023-01-01 22:45:16 +01:00
Christian Heusel
711fe1d806
enumerate the config
2023-01-01 22:45:16 +01:00
Christian Heusel
e2c62a7b0c
document how to add new DNS records via extra_records
2023-01-01 22:45:16 +01:00
Christian Heusel
ab6565723e
add the possibility for custom DNS records
...
related to https://github.com/juanfont/headscale/issues/762
Co-Authored-By: Jamie Greeff <jamie@greeff.me>
Signed-off-by: Christian Heusel <christian@heusel.eu>
2023-01-01 22:45:16 +01:00
John Axel Eriksson
7bb6f1a7eb
domains/restricted_nameservers: check dnsConfig.Resolvers instead of dnsConfig.Nameservers
2022-12-31 19:06:32 +01:00
Avirut Mehta
549b82df11
Add Caddy instructions to reverse_proxy.md
2022-12-27 23:08:34 +01:00
Marc
036cdf922f
templates: fix typo "custm" -> "custom"
2022-12-27 12:02:33 +01:00
jimyag
b4ff22935c
update macos check
2022-12-25 15:45:45 +01:00
ma6174
5feadbf3fc
fix goroutine leak
2022-12-25 14:11:16 +01:00
Juan Font
3e9ee816f9
Add integration tests for logout with authkey
2022-12-22 20:02:18 +01:00
Juan Font
2494e27a73
Make WaitForTailscaleLogout a Scenario method
2022-12-22 20:02:18 +01:00
Juan Font
8e8b65bb84
Add ko-fi sponsor button
2022-12-22 17:25:49 +01:00
Juan Font
b7d7fc57c4
Add logout method to tsic
2022-12-22 00:09:21 +01:00
Juan Font
b54c0e3d22
Add integration tests that check logout and relogin
2022-12-21 20:52:08 +01:00
Juan Font
593040b73d
Run the Noise handlers under a new struct so we can access the noiseConn from the handlers
...
In TS2021 the MachineKey can be obtained from noiseConn.Peer() - contrary to what I thought before,
where I assumed MachineKey was dropped in TS2021.
By having a ts2021App and hanging from there the TS2021 handlers, we can fetch again the MachineKey.
2022-12-21 20:52:08 +01:00
Juan Font
6e890afc5f
Minor linting fixes
2022-12-21 08:28:53 +01:00
Fatih Acar
2afba0233b
fix(routes): ensure routes are correctly propagated
...
When using Tailscale v1.34.1, enabling or disabling a route does not
effectively add or remove the route from the node's routing table.
We must restart tailscale on the node to have a netmap update.
Fix this by refreshing last state change so that a netmap diff is sent.
Also do not include secondary routes in allowedIPs, otherwise secondary
routes might be used by nodes instead of the primary route.
Signed-off-by: Fatih Acar <facar@scaleway.com>
2022-12-20 15:39:59 +01:00
Anoop Sundaresh
91900b7310
Update remote-cli.md
...
Fixing the local binary path
2022-12-19 19:16:48 +01:00
Juan Font
55b198a16a
Clients are offline when expired
2022-12-19 15:56:12 +01:00
Juan Font
ca37dc6268
Update changelog
2022-12-15 00:13:53 -08:00
Juan Font
000c02dad9
Show online in CLI & API when isOnline() reports so
2022-12-15 00:13:53 -08:00
Juan Font
4532915be1
Refresh autogenerated grpc stuff
2022-12-15 00:13:53 -08:00
Juan Font
4b8d6e7c64
Include online field in proto for machine
2022-12-15 00:13:53 -08:00
Kristoffer Dalby
579c5827b3
regenerate proto with new plugin
...
Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com>
2022-12-14 00:05:29 -08:00
Kristoffer Dalby
01628f76ff
upgrade grpc-gateway plugin
...
Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com>
2022-12-14 00:05:29 -08:00
Kristoffer Dalby
53858a32f1
dont fail docker if nothing to delete
...
Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com>
2022-12-13 23:13:23 -08:00
Juan Font Alonso
2bf576ea8a
Disable Tailscale 1.16 in integration tests
2022-12-09 19:11:24 +01:00
github-actions[bot]
1faac0b3d7
docs(README): update contributors
2022-12-07 15:18:37 +01:00
Kristoffer Dalby
134c72f4fb
Set db_ssl to false by default, fixes #1043
...
Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com>
2022-12-07 14:58:47 +01:00
Zachary Newell
70f2f5d750
Added an OIDC AllowGroups option for authorization.
2022-12-07 08:53:16 +01:00
Kristoffer Dalby
4453728614
Murder docker container and network before run
...
Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com>
2022-12-06 08:52:21 +01:00
Juan Font
34107f9a0f
Updated changelog
2022-12-06 08:17:14 +01:00
Juan Font
52862b8a22
Port integration tests routes CLI to v2
...
Fix options signature
2022-12-06 08:17:14 +01:00
Juan Font
946d38e5d7
Minor linting fixes
...
Remove magic number (base10...)
2022-12-06 08:17:14 +01:00
Juan Font
78819be03c
Use the new routes API from the CLI
2022-12-06 08:17:14 +01:00
Juan Font
34631dfcf5
Refactored route grpc glue code
2022-12-06 08:17:14 +01:00
Juan Font
8fa9755b55
Updated generated pb code
...
Update swagger
2022-12-06 08:17:14 +01:00
Juan Font
1b557ac1ea
Update protobuf definitions + support methods for the API
...
Add more logging
Updated protos with new routes API
2022-12-06 08:17:14 +01:00
Juan Font
8170f5e693
Removed unused code and linting fixes
...
Another bunch of gosec/golint related fixes
Remove method no longer used
2022-12-06 08:17:14 +01:00
Juan Font
a506d0fcc8
Run handlePrimarySubnetFailover() with a ticker when Serve
2022-12-06 08:17:14 +01:00
Juan Font
6718ff71d3
Added helper methods for subnet failover + unit tests
...
Added method to perform subnet failover
Added tests for subnet failover
2022-12-06 08:17:14 +01:00
Juan Font
b62acff2e3
Refactor machine.go, and move functionality to routes.go + unit tests
...
Port routes tests to new model
Mark as primary the first instance of subnet + tests
In preparation for subnet failover, mark the initial occurrence of a subnet as the primary one.
2022-12-06 08:17:14 +01:00
Juan Font
ac8bff716d
Call processMachineRoutes when a new Map is received
2022-12-06 08:17:14 +01:00
Juan Font
fba77de4eb
Add Route DB model and migration from existing field
...
Add migration from Machine.EnabledRoutes to the new Route table
Cleanup route.go and add helper methods to process HostInfo
2022-12-06 08:17:14 +01:00
github-actions[bot]
d1bca105ef
docs(README): update contributors
2022-12-05 22:05:25 +01:00
Juan Font
6c2d6fa302
Do not explicitly set the protocols when ommited in ACL
2022-12-05 21:45:18 +01:00
Kristoffer Dalby
1015bc3e02
Upgrade to Tailscale 1.34.0
...
Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com>
2022-12-05 20:41:15 +01:00
Kristoffer Dalby
68c72d03b5
Prep changelog for new release
...
Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com>
2022-12-05 20:41:15 +01:00
Kristoffer Dalby
bd4b2da06e
Add changelog entry to correct version
...
Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com>
2022-12-05 20:41:15 +01:00
Kristoffer Dalby
7b8cf5ef1a
Add 1.34.0 to integration tests
...
Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com>
2022-12-05 20:41:15 +01:00