Index | index by Group | index by Distribution | index by Vendor | index by creation date | index by Name | Mirrors | Help | Search |
Name: headscale | Distribution: openSUSE Tumbleweed |
Version: 0.26.1 | Vendor: openSUSE |
Release: 1.1 | Build date: Fri Jun 6 18:05:38 2025 |
Group: Unspecified | Build host: reproducible |
Size: 52672113 | Source RPM: headscale-0.26.1-1.1.src.rpm |
Packager: http://bugs.opensuse.org | |
Url: https://headscale.net | |
Summary: An open source, self-hosted implementation of the Tailscale control server |
Headscale aims to implement a self-hosted, open source alternative to the Tailscale control server. Headscale's goal is to provide self-hosters and hobbyists with an open-source server they can use for their projects and labs. It implements a narrow scope, a single Tailnet, suitable for a personal use, or a small open-source organisation.
BSD-3-Clause
* Fri Jun 06 2025 Richard Rahl <rrahl0@opensuse.org> - update to 0.26.1: * Ensure nodes are matching both node key and machine key when connecting * Fix /machine/map endpoint vulnerability * Sun Jun 01 2025 Marcus Rueckert <mrueckert@suse.de> - Sync default configurations * Sun Jun 01 2025 Marcus Rueckert <mrueckert@suse.de> - Fix the ldflags to set version and commit hash again * Tue May 20 2025 Richard Rahl <rrahl0@opensuse.org> - update to 0.26.0: * make version info in bug template more explicit * add git hash to binary, print on startup * remove oidc migration * use helper function for constructing state updates * use tsweb debugger * set 0.25.0 changelog date * activate json logs * use tailscale version in all unsupported errs * handle register auth errors * fix routes not being saved when new nodes registers * fix double login URL with OIDC * Redo route code * Experimental implementation of Policy v2 * Drop routes table * Add usage example to routes flag * Remove leftover printf * remove policy handling for old capver * Container images are also available on GHCR * add faq section on scaling/performance * Add a FAQ entry about two nodes seeing each other * update bug template with debug * Set content-type to JSON for some debug endpoints * Remove coderabbit * add third-party tool headscale-pf * Explicitly handle /headscale/{config,lib,run} in container docs * Mention that private keys generated if needed * Multi network integration tests * OIDC: Fetch UserInfo to get EmailVerified if necessary * populate serving from primary routes * allow users to be defined with @ in v1 * fix auto approver on register and new policy * Add unraid-headscale-admin web UI to docs * Only read relevant nodes from database in PeerChangedResponse * ensure final dot on node name * Restore support for "Override local DNS" * some clarifications for tags * Update oidc.md * flake: add golang-lint lsp * policy/v2: fix host validation, consistent pattern * integration: clean up unreferenced hs- networks * Mention "Network flow logs" as a missing feature * Fix goroutine leak in EphemeralGC on node cancel * Fix panic on fast reconnection of node * add casbin user test * config: disallow same server url and base_domain * policy/v2: make default * integration: remove failing resolvconf tests * fix webauth + autoapprove routes * types/authkey: include user object in response * oidc: try to get username from userinfo * notify nodes after owner change * auth: ensure that routes are autoapproved when the node is stored * Make matchers part of the Policy interface * cli/nodes: filter nodes without any routes * error on undefined host in policy * Update source.md * policy/v2: validate autogroup:interet only in dst * cmd: add policy check command * policy/matcher: fix bug using contains instead of overlap * update capmap and deps for release * Add documentation for routes * Fix deprecation warnings * feat: Create headscale user and group as system user/groups * Update container.md * go.mod: update rest of deps * Make more granular SSH tests for both Policies * policy: reduce routes sent to peers based on packetfilter * Misc doc fixes * app: throw away not found body * Remove subnet router visibility workaround from docs * policy/v2: validate that no undefined group or tag is used * cli: policy check, dont require config or log * policy/v2: separate exit node and 0.0.0.0/0 routes * Add migration steps when policy is stored in the database * Simplify policy migration * bring back last_seen in database * Remove map_legacy_users from example configuration * fix: change FormatUint base from 64 to 10 in preauthkeys list command * users: harden, test, and add cleaner of identifier - remove patches fix-CVE-2025-30204.patch and fix-CVEs.patch, as upstream updated their dependencies * Thu Apr 24 2025 Richard Rahl <rrahl0@opensuse.org> - update fix-CVEs.patch for fixing bsc#1241801 * Wed Apr 16 2025 Richard Rahl <rrahl0@opensuse.org> - add patch fix-CVEs.patch to fix bsc#1241235, bsc#1237674 * Tue Apr 01 2025 Richard Rahl <rrahl0@opensuse.org> - add patch fix-CVE-2025-30204.patch, for fixing bsc#1240506 * Tue Feb 25 2025 Richard Rahl <rrahl0@opensuse.org> - update to 0.25.1: * Fix issue where registration errors are sent correctly * Fix issue where routes are passed on registration were not saved * Fix issue where registration page was displayed twice * fix double login URL with OIDC * fix routes not being saved when new nodes registers * hand register auth rerrors * Thu Feb 13 2025 Richard Rahl <rrahl0@opensuse.org> - update to 0.25.0: BREAKING: * Authentication flow has been rewritten * Remove support for Tailscale clients older than 1.62 (Capability version 87) CHANGES: * oidc.map_legacy_users is now false by default * Print Tailscale version instead of capability versions for outdated nodes * Do not allow renaming of users from OIDC * Change minimum hostname length to 2 * Fix migration error caused by nodes having invalid auth keys * Pre auth keys belonging to a user are no longer deleted with the user * Pre auth keys that are used by a node can no longer be deleted * Rehaul HTTP errors, return better status code and errors to users * Fri Feb 07 2025 Richard Rahl <rrahl0@opensuse.org> - update 0.24.3: * Fix migration error caused by nodes having invalid auth keys * Pre auth keys belonging to a user are no longer deleted with the user * Pre auth keys that are used by a node can no longer be deleted - update to 0.24.2: * Fix issue where email and username being equal fails to match in Policy * Delete invalid routes before adding a NOT NULL constraint on node_id - update to 0.24.1: * Fix migration issue with user table for PostgreSQL * Relax username validation to allow emails * Remove invalid routes and add stronger constraints for routes to avoid API panic * Fix panic when derp.update_frequency is 0 - update to 0.24.0: BREAKING: * Remove dns.use_username_in_magic_dns configuration option * Having usernames in magic DNS is no longer possible. * Remove versions older than 1.56 * Clean up old code required by old versions * If you depend on a Headscale Web UI, you should wait with this update until the UI have been updated to match the new API. * GET /api/v1/user/{name} and GetUser have been removed in favour of ListUsers with an ID parameter * RenameUser and DeleteUser now require an ID instead of a name. CHANGES: * Improved compatibility of built-in DERP server with clients connecting over WebSocket * Allow nodes to use SSH agent forwarding * Fixed processing of fields in post request in MoveNode rpc * Added conversion of 'Hostname' to 'givenName' in a node with FQDN rules applied * Fixed updating of hostname and givenName when it is updated in HostInfo * Fixed missing stable-debug container tag * Loosened up server_url and base_domain check. It was overly strict in some cases * CLI for managing users now accepts --identifier in addition to --name, usage of --identifier is recommended * Add dns.extra_records_path configuration option * Support client verify for DERP * Add PKCE Verifier for OIDC * Thu Jan 02 2025 Marcus Rueckert <mrueckert@suse.de> - Fix the system integration - actually build and use the sysuser pre snippet so that the user is created before tmpfiles.d tries to create files - no longer break debugsymbols for the binary (remove -s -w) - use systemd macros for paths - ensure proper requires/ordering for sysuser/systemd * Wed Sep 18 2024 Richard Rahl <rrahl0@opensuse.org> - update to 0.23.0: * Code reorganisation, a lot of code has moved * Change the structure of database configuration, see config-example.yaml - Old structure has been remove and the configuration must be converted - Adds additional configuration for PostgreSQL for setting max open, idle connection and idle connection lifetime * API: Machine is now Node * Remove support for older Tailscale clients (supported >=1.42) * Headscale checks that at least one DERP is defined at start * Embedded DERP server requires a private key * Prefixes are now defined per v4 and v6 range * MagicDNS domains no longer contain usernames * YAML files are no longer supported for headscale policy (use HuJSON) * DNS configuration has been restructured * Use versioned migrations * Make the OIDC callback page better * SSH support * State management has been improved * Use error group handling to ensure tests actually pass * Fix hang on SIGTERM * Send logs to stderr by default * Fix TS-2023-006 security UPnP issue * Turn off gRPC logging * Added the possibility to manually create a DERP-map entry * Add support for deleting api keys * Add command to backfill IP addresses for nodes missing IPs from configured prefixes * Log available update as warning * Add autogroup:internet to Policy * Restore foreign keys and add constraints * Make registration page easier to use on mobile devices * Make write-ahead-log default on and configurable for SQLite * Add APIs for managing headscale policy * Fix for registering nodes using preauthkeys when running on a postgres database in a non-UTC timezone * Make sure integration tests cover postgres for all scenarios * CLI commands (all except serve) only requires minimal configuration * CLI results are now concistently sent to stdout and errors to stderr * Fix issue where shutting down headscale would hang * add shutdown that asserts if headscale had panics * Thu Apr 18 2024 Richard Rahl <rrahl0@disroot.org> - remove CAP_CHOWN from systemd unit file, as it's unneeded * Wed Dec 20 2023 Richard Rahl <rrahl0@proton.me> - initial packaging
/etc/headscale /usr/bin/headscale /usr/etc/headscale /usr/etc/headscale/config-example.yaml /usr/etc/headscale/derp-example.yaml /usr/lib/systemd/system/headscale.service /usr/lib/sysusers.d/headscale.conf /usr/lib/tmpfiles.d/headscale.conf /usr/share/doc/packages/headscale /usr/share/doc/packages/headscale/CHANGELOG.md /usr/share/doc/packages/headscale/README.md /usr/share/licenses/headscale /usr/share/licenses/headscale/LICENSE /var/lib/headscale
Generated by rpm2html 1.8.1
Fabrice Bellet, Tue Jun 24 23:52:23 2025