File tailscale.changes of Package tailscale

-------------------------------------------------------------------
Sun Jun 16 13:30:20 UTC 2024 - Richard Rahl <rrahl0@disroot.org>

- update to 1.68.1:
  * Fixed: 4via6 subnet router advertisement works as expected.
  * Fixed: Tailscale SSH access to Security-Enhanced Linux (SELinux) machines works as expected.
- update to 1.68.0:
  * New: Auto-updates are allowed in containers, but ignore the tailnet-wide default
  * New: Apply auto-updates even if the node is down or disconnected from the coordination server.
  * New: tailscale lock status now prints the node's signature.

-------------------------------------------------------------------
Wed May 22 08:36:37 UTC 2024 - Richard Rahl <rrahl0@disroot.org>

- update to 1.66.4:
  * Fixed: Restored UDP connectivity through Mullvad exit nodes
  * Stateful filtering is now off by default

- update to 1.66.3:
  * Login URLs did not always appear in the console when running tailscale up
  * Starting with v1.66, the Kubernetes operator must always run the same or later version
    as the proxies it manages.
  * Expose cloud services on cluster network to the tailnet, using Kubernetes ExternalName Services
  * Expose tailnet services that use Tailscale HTTPS to cluster workloads
  * Cluster workloads can now refer to Tailscale Ingress resources by their MagicDNS names
  * Configure environment variables for Tailscale Kubernetes operator proxies using ProxyClass CRD
  * Expose tailscaled metrics endpoint for Tailscale Kubernetes operator proxies through ProxyClass CRD
  * Configure labels for the Kubernetes operator Pods with Helm chart values
  * Configure affinity rules for Kubernetes operator proxy Pods with ProxyClass
  * Kubernetes operator proxy init container no longer attempts to enable IPv6 forwarding on systems
    that don't have IPv6 module loaded
  * Tailscale containers running on Kubernetes no longer error if an empty Kubernetes Secret is
    pre-created for the tailscaled state
  * Improved the ambiguous error messages when Tailscale running on Kubernetes does not have the right
    permissions to perform actions against the tailscaled state Secret

-------------------------------------------------------------------
Fri May 10 15:16:33 UTC 2024 - Richard Rahl <rrahl0@disroot.org>

- update to 1.66.1:
  * Resolved issues with nftables rules for stateful filtering,
    introduced in v1.66.0.
  * tailscale set command flags --netfilter-mode, --snat-subnet-routes,
     and --stateful-filtering are added.

- update to 1.66.0:
  * Implemented client-side quarantining for shared-in exit nodes,
    as a mitigation for a security vulnerability described in TS-2024-005.
  * Use the --stateful-filtering flag for the tailscale up to enable stateful filtering for
    subnet routers and exit nodes, as a mitigation for a security vulnerability described
    in TS-2024-005. 
  * Added tab completions
  * Use the tailscale exit-node suggest command to automatically pick an available exit node
    that is likely to perform best.
  * Site-to-site networking now also requires --stateful-filtering=false in addition to
    --snat-subnet-routes=false on new subnet routers. Existing subnet routers with --snat-subnet-routes=false
    will default to --stateful-filtering=false.

- update to 1.64.2:
  * nothing relevant for linux

- update to 1.64.1:
  * nothing relevant for linux

- update to 1.64.0:
  * New: tailscale configure kubeconfig now respects KUBECONFIG environment variable.
  * Fixed: tailscale configure kubeconfig now works with partially empty kubeconfig.
  * Fixed: MSS clamping for Kubernetes operator proxies using nftables.
  * Fixed: Containers on hosts with partial support for ip6tables no longer crash.

- turn of changelog generation
- add completions for bash

-------------------------------------------------------------------
Sat Mar 30 08:28:56 UTC 2024 - Richard Rahl <rrahl0@proton.me>

- update to 1.62.1:
  * Send load balancing hint HTTP request header
  * Fixed: Kubernetes operator proxies should not accept subnet routes

-------------------------------------------------------------------
Thu Mar 14 03:13:54 UTC 2024 - rrahl0@proton.me

- update to 1.62.0:
  * IPv6 support detection in a container environment is improved
  * New: Web interface now uses ACL grants to manage access on tagged devices
  * Tailscale SSH connections now disable unnecessary hostname canonicalization
  * tailscale bugreport command for generating diagnostic logs now contain ethtool information
  * Mullvad's family-friendly server is added to the list of well known DNS over HTTPS (DoH) servers
  * DNS over HTTP requests now contain a timeout
  * TCP forwarding attempts in userspace mode now have a per-client limit
  * Endpoints with link-local IPv6 addresses is preferred over private addresses
  * WireGuard logs are less verbose
  * Go min. version 1.22.1
  * DERP server region no longer changes if connectivity to the new DERP region is degraded

- update to 1.60.1:
  * Exposing port 8080 to other devices on your tailnet works as expected

-------------------------------------------------------------------
Tue Feb 20 22:10:41 UTC 2024 - Alexandre Vicenzi <alexandre.vicenzi@suse.com>

- Add disable-auto-update.patch to prevent auto updates and instead
  ask users to use Zypper to update manually

-------------------------------------------------------------------
Tue Feb 20 14:52:46 UTC 2024 - Richard Rahl <rrahl0@proton.me>

- change to the non deprecated manualrun

-------------------------------------------------------------------
Fri Feb 16 14:38:14 UTC 2024 - alexandre.vicenzi@suse.com

- Spec cleanup
  * Use tar_scm to avoid commit hashes in the spec
  * Use tailscale build scripts
  * Drop ProtectClock fix for Leap, DeviceAllow fixes it
- Add build-verbose.patch to get go flags into build log
- Enable PrivateDevices but allow access to /dev/net/tun in tailscaled.service

-------------------------------------------------------------------
Fri Feb 16 00:50:26 UTC 2024 - Richard Rahl <rrahl0@proton.me>

- update to 1.60.0:
  * minimum go version 1.22
  * authentication: present users with a valid login page when
    attempting to login even after leaving device unattended for several days
  * networking: mute noisy peer mtu discovery errors
  * networking: expose gVisor metrics in debug mode
  * port mapper: support legacy "urn:dslforum-org" port mapping services
  * port mapper: fix crash when no support mapping services found
  * ssh: log warning when unable to find SSH host keys
  * serve: improve error message when running as non-root
  * Detect when Tailscale is running on Digital Ocean and automatically
    use Digital Ocean's DNS resolvers
  * enable app connectors to install routes for domains that resolve to CNAME
    records
  * support pre-configured routes from control server
  * add new read-only mode
  * tailscale status command: fix output formatting Tailnet
    includes location-based exit nodes
  * a new ProxyClass custom resource that allows to provide custom
    configuration for cluster resources that the operator creates
  * ACL tags for the operator can now be configured via Helm chart values
  * routing to Ingress backends that require an exact path without a slash

-------------------------------------------------------------------
Wed Feb  7 14:52:53 UTC 2024 - Richard Rahl <rrahl0@proton.me>

- make rpm not overwrite /etc/default/taiscaled
- defattr everything to root

-------------------------------------------------------------------
Sat Feb  3 11:18:05 UTC 2024 - Richard Rahl <rrahl0@proton.me>

- no stripping of binaries
- add commitID to binaries for upstream
- add directory for saved configs

-------------------------------------------------------------------
Tue Jan 23 23:54:36 UTC 2024 - Richard Rahl <rrahl0@proton.me>

- switch services to manual
- update to version 1.58.2:
  * Fixed: [App connectors][app-connectors] have improved scheduling 
    and merging of route changes under some conditions
  * Fixed: Crash when performing UPnP portmapping on older routers
    with no supported portmapping services

-------------------------------------------------------------------
Fri Jan 19 08:06:27 UTC 2024 - Richard Rahl <rrahl0@proton.me>

- update to version 1.58.0:
  * portmap: check the epoch from NAT-PMP & PCP, establish new portmapping if it changes
  * portmap: better handle multiple interfaces
  * portmap: handle multiple UPnP discovery responses
  * increase the number of 4via6 site IDs from 256 to 65,536
  * taildrop: allow category Z unicode characters
  * increased binary size with 1.56 is resolved in 1.58
  * Reduce home DERP flapping when there's still an active connection
  * device web ui: fixed issue when accessing shared devices
  * device web ui: fixed login issue when accessed over https

-------------------------------------------------------------------
Wed Jan 10 02:17:57 UTC 2024 - Richard Rahl <rrahl0@proton.me>

- fix an issue with Leap, where ProtectClock prevents to connect to
  /dev/net/tun

-------------------------------------------------------------------
Fri Dec 15 21:22:39 UTC 2023 - Richard Rahl <rrahl0@proton.me>

- update to version 1.56.1:
  * Fixed: Web interface redirects to the correct self IP known by source peer
  * Fixed: Usage of slices.Compact from app connector domains list

-------------------------------------------------------------------
Fri Dec 15 13:48:28 UTC 2023 - Richard Rahl <rrahl0@proton.me>

- fix version output to what upstream expects

-------------------------------------------------------------------
Wed Dec 13 22:08:30 UTC 2023 - rrahl0@proton.me

- Update to version 1.56.0:
  * improve responsiveness under load, especially with bidirectional traffic
  * improve UPnP portmapping
  * add tailscale whois subcommand to observe metadata associated with a Tailscale IP
  * include tailnet name and profile ID in tailscale switch --list to disambiguate
    profiles with common login names
  * improve tailscale web interface for configuring some device settings such as exit nodes,
    subnet routers, and Tailscale SSH
  * improve containerboot to symlink its socket file if possible,
    making the tailscale CLI work without --socket=/tmp/tailscale.sock
  * add support in Kubernetes operator cluster egress for referring to a tailnet service
    by its MagicDNS name


- Update to version 1.54.1:
  * no relevant updates to the linux version

-------------------------------------------------------------------
Fri Nov 24 21:59:11 UTC 2023 - Richard Rahl <rrahl0@proton.me>

- tailscale couldn't connect to /dev/net/tun

-------------------------------------------------------------------
Thu Nov 23 06:51:24 UTC 2023 - rrahl0@proton.me

- Update to version 1.54.0:
  * improve throughput substantially for UDP packets over TUN device with recent Linux kernels


- Update to version 1.52.1:
  * no linux improvements

- Update to version 1.52.0:
  * tailscale set command flag --auto-update is added to opt in to automatic client updates
  * tailscale serve and tailscale funnel commands are updated for improved usability
  * tailscale update command for manual updates is now in beta
  * Taildrop file transfer displays a progress meter
  * nftables auto-detection is improved when TS_DEBUG_FIREWALL_MODE=auto is used
  * DNS detection of NetworkManager with configured but absent systemd-resolved
  * Taildrop now resumes file transfers after partial transfers are interrupted
  * tailscale up command displays a message about client updates when newer versions are available
  * tailscale status command displays a message about client updates when newer versions are available
  * tailscale cert command renews in the background. The current certificate only displays if it has expired.

-------------------------------------------------------------------
Mon Oct 02 23:51:03 UTC 2023 - rrahl0@proton.me

- Update to version 1.50.1:
  * fix bug where serve config could get wiped
  * Funnel support for tsnet apps
  * fix potential crash with UPnP

-------------------------------------------------------------------
Sat Sep 30 19:38:50 UTC 2023 - rrahl0@proton.me

- Update to version 1.50.0:
  * Update tailscale{,d} licenses
  * Update Quad9 addresses and references
  * Adds support for Wikimedia DNS using DNS-over-HTTPS

- Update to version 1.48.1:
  * no relevant updates

- Update to version 1.48.2:
  * Improvements to Mullvad exit nodes

-------------------------------------------------------------------
Fri Aug 18 15:56:24 UTC 2023 - Richard Rahl <rrahl0@proton.me>

- Initial revision
openSUSE Build Service is sponsored by