From 288f6d34dcc32e6da5aa9af30c4eb6a99151f66f Mon Sep 17 00:00:00 2001 From: Brad Fitzpatrick Date: Wed, 23 Feb 2022 13:26:05 -0800 Subject: [PATCH] Updated Tailscale 1.22 (markdown) --- Tailscale-1.22.md | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/Tailscale-1.22.md b/Tailscale-1.22.md index d031b41..9890b46 100644 --- a/Tailscale-1.22.md +++ b/Tailscale-1.22.md @@ -4,9 +4,10 @@ - New: `tailscaled --state=mem:` registers as an ephemeral node and does not store state to disk - New: `tailscale status --json` now shows `Tags` and `PrimaryRoutes` for Peers. `PrimaryRoutes` shows whether a HA subnet router is currently the active one. - New: `tailscale status --json | jq .TailnetName` will show the name of the tailnet +- New: the optional `tailscaled` debug server's Prometheus metrics exporter now also includes Go runtime metrics +- New: tailscaled supports a new `TS_PERMIT_CERT_UID` environment variable containing either a userid or username to allow to fetch Tailscale TLS certificates for the node. This environment variable can be set in `/etc/default/tailscaled` to permit non-root web servers on the local machine to fetch certs from `tailscaled`. - Fixed: send heartbeats less often, saving some battery, matching 1.20 change on mobile platforms. - Changed: `--auth-key` and `--authkey` both work as `tailscale up` arguments -- Changed: `TS_PERMIT_CERT_UID` can contain a uid or username for `tailscale cert` ### Windows - New: MSI installer @@ -16,6 +17,7 @@ - Fixed: More robust detection of systemd-resolved - Fixed: Efficiently parse extremely large `/proc/net/route` files - Fixed: Be more helpful in suggesting `tailscale --operator=USER` to use with Taildrop +- Fixed: some broken host DNS configurations are now detected and reported in `tailscale status` ### Synology - Changed: Add `/var/packages/Tailscale/target/bin/tailscale configure-host` to restore needed permissions. We recommend adding this as a scheduled task at boot.