All Versions
11
Latest Version
Avg Release Cycle
30 days
Latest Release
585 days ago

Changelog History
Page 1

  • v0.16.4 Changes

    August 21, 2022

    ๐Ÿ”„ Changes

    • โž• Add ability to connect to PostgreSQL over TLS/SSL #745
    • ๐Ÿ›  Fix CLI registration of expired machines #754
  • v0.16.3 Changes

    August 17, 2022

    ๐Ÿ”„ Changes

    • ๐Ÿ›  Fix issue with OIDC authentication #747
  • v0.16.2 Changes

    August 14, 2022

    ๐Ÿ”„ Changes

    • ๐Ÿ›  Fixed bugs in the client registration process after migration to NodeKey #735
  • v0.16.1 Changes

    August 12, 2022

    ๐Ÿ”„ Changes

    • โšก๏ธ Updated dependencies (including the library that lacked armhf support) #722
    • ๐Ÿ›  Fix missing group expansion in function excludeCorretlyTaggedNodes #563
    • ๐Ÿ‘Œ Improve registration protocol implementation and switch to NodeKey as main identifier #725
    • โž• Add ability to connect to PostgreSQL via unix socket #734
  • v0.16.0 Changes

    July 25, 2022

    Note: Take a backup of your database before upgrading.

    ๐Ÿ’ฅ BREAKING

    • ๐Ÿ‘ Old ACL syntax is no longer supported ("users" & "ports" -> "src" & "dst"). Please check the new syntax.

    ๐Ÿ”„ Changes

    • โฌ‡๏ธ Drop armhf (32-bit ARM) support. #609
    • ๐Ÿ“œ Headscale fails to serve if the ACL policy file cannot be parsed #537
    • ๐Ÿ›  Fix labels cardinality error when registering unknown pre-auth key #519
    • ๐Ÿ›  Fix send on closed channel crash in polling #542
    • ๐Ÿ›  Fixed spurious calls to setLastStateChangeToNow from ephemeral nodes #566
    • โž• Add command for moving nodes between namespaces #362
    • โž• Added more configuration parameters for OpenID Connect (scopes, free-form paramters, domain and user allowlist)
    • โž• Add command to set tags on a node #525
    • โž• Add command to view tags of nodes #356
    • โž• Add --all (-a) flag to enable routes command #360
    • ๐Ÿ›  Fix issue where nodes was not updated across namespaces #560
    • โž• Add the ability to rename a nodes name #560
      • Node DNS names are now unique, a random suffix will be added when a node joins
      • This change contains database changes, remember to backup your database before upgrading
    • โž• Add option to enable/disable logtail (Tailscale's logging infrastructure) #596
      • This change disables the logs by default
    • ๐Ÿ“œ Use [Prometheus]'s duration parser, supporting days (d), weeks (w) and years (y) #598
    • โž• Add support for reloading ACLs with SIGHUP #601
    • ๐Ÿ‘‰ Use new ACL syntax #618
    • โž• Add -c option to specify config file from command line #285 #612
    • โž• Add configuration option to allow Tailscale clients to use a random WireGuard port. kb/1181/firewalls #624
    • Improve obtuse UX regarding missing configuration (ephemeral_node_inactivity_timeout not set) #639
    • ๐Ÿ›  Fix nodes being shown as 'offline' in tailscale status #648
    • ๐Ÿ‘Œ Improve shutdown behaviour #651
    • โฌ‡๏ธ Drop Gin as web framework in Headscale 648 677
    • โšก๏ธ Make tailnet node updates check interval configurable #675
    • ๐Ÿ›  Fix regression with HTTP API #684
    • ๐Ÿ–จ nodes ls now print both Hostname and Name(Issue #647 PR #687)
  • v0.15.0 Changes

    March 20, 2022

    Note: Take a backup of your database before upgrading.

    ๐Ÿ’ฅ BREAKING

    • ๐Ÿšš Boundaries between Namespaces has been removed and all nodes can communicate by default #357
      • To limit access between nodes, use [ACLs](./docs/acls.md).
    • โšก๏ธ /metrics is now a configurable host:port endpoint: #344. You must update your config.yaml file to include: yaml metrics_listen_addr: 127.0.0.1:9090

    ๐Ÿ”‹ Features

    • โž• Add support for writing ACL files with YAML #359
    • ๐Ÿ‘‰ Users can now use emails in ACL's groups #372
    • โž• Add shorthand aliases for commands and subcommands #376
    • โž• Add /windows endpoint for Windows configuration instructions + registry file download #392
    • โž• Added embedded DERP (and STUN) server into Headscale #388

    ๐Ÿ”„ Changes

    • ๐Ÿ›  Fix a bug were the same IP could be assigned to multiple hosts if joined in quick succession #346
    • Simplify the code behind registration of machines #366
      • Nodes are now only written to database if they are registrated successfully
    • ๐Ÿ›  Fix a limitation in the ACLs that prevented users to write rules with * as source #374
    • โฌ‡๏ธ Reduce the overhead of marshal/unmarshal for Hostinfo, routes and endpoints by using specific types in Machine #371
    • Apply normalization function to FQDN on hostnames when hosts registers and retrieve informations #363
    • ๐Ÿ›  Fix a bug that prevented the use of tailscale logout with OIDC #508
    • โž• Added Tailscale repo HEAD and unstable releases channel to the integration tests targets #513
  • v0.14.0 Changes

    February 24, 2022

    **UPCOMING ### BREAKING From the **next** version (0.15.0), all machines will be able to communicate regardless of if they are in the same namespace. This means that the behaviour currently limited to ACLs 0๏ธโƒฃ will become default. From version 0.15.0, all limitation of communications must be done with ACLs.

    This is a part of aligning headscale's behaviour with Tailscale's upstream behaviour.

    ๐Ÿ’ฅ BREAKING

    • ACLs have been rewritten to align with the bevaviour Tailscale Control Panel provides. NOTE: This is only active if you use ACLs
      • Namespaces are now treated as Users
      • All machines can communicate with all machines by default
      • Tags should now work correctly and adding a host to Headscale should now reload the rules.
      • The documentation have a [fictional example](docs/acls.md) that should cover some use cases of the ACLs features

    ๐Ÿ”‹ Features

    • โž• Add support for configurable mTLS [docs](docs/tls.md#configuring-mutual-tls-authentication-mtls) #297

    ๐Ÿ”„ Changes

    • โœ‚ Remove dependency on CGO (switch from CGO SQLite to pure Go) #346

    0.13.0 (2022-02-18):

    ๐Ÿ”‹ Features

    • โž• Add IPv6 support to the prefix assigned to namespaces
    • โž• Add API Key support
      • Enable remote control of headscale via CLI [docs](docs/remote-cli.md)
      • Enable HTTP API (beta, subject to change)
    • OpenID Connect users will be mapped per namespaces
      • Each user will get its own namespace, created if it does not exist
      • oidc.domain_map option has been removed
      • strip_email_domain option has been added (see [config-example.yaml](./config_example.yaml))

    ๐Ÿ”„ Changes

    • ip_prefix is now superseded by ip_prefixes in the configuration #208
    • โฌ†๏ธ Upgrade tailscale (1.20.4) and other dependencies to latest #314
    • ๐Ÿ›  fix swapped machine<->namespace labels in /metrics #312
    • โœ‚ remove key-value based update mechanism for namespace changes #316

    0.12.4 (2022-01-29):

    ๐Ÿ”„ Changes

    • ๐Ÿ”ง Make gRPC Unix Socket permissions configurable #292
    • Trim whitespace before reading Private Key from file #289
    • โž• Add new command to generate a private key for headscale #290
    • ๐Ÿ›  Fixed issue where hosts deleted from control server may be written back to the database, as long as they are connected to the control server #278
  • v0.12.3 Changes

    January 13, 2022

    ๐Ÿ”„ Changes

    • โž• Added Alpine container #270
    • โšก๏ธ Minor updates in dependencies #271
  • v0.12.2 Changes

    January 11, 2022

    Happy New Year!

    ๐Ÿ”„ Changes

    • ๐Ÿ›  Fix Docker release #258
    • ๐Ÿ“„ Rewrite main docs #262
    • ๐Ÿ‘Œ Improve Docker docs #263
  • v0.12.1 Changes

    December 24, 2021

    (We are skipping 0.12.0 to correct a mishap done weeks ago with the version tagging)

    ๐Ÿ’ฅ BREAKING

    • โฌ†๏ธ Upgrade to Tailscale 1.18 #229
      • This change requires a new format for private key, private keys are now generated automatically:
      • Delete your current key
      • Restart headscale, a new key will be generated.
      • Restart all Tailscale clients to fetch the new key

    ๐Ÿ”„ Changes

    • ๐Ÿ”ง Unify configuration example #197
    • โž• Add stricter linting and formatting #223

    ๐Ÿ”‹ Features

    • โž• Add gRPC and HTTP API (HTTP API is currently disabled) #204
    • ๐Ÿ‘‰ Use gRPC between the CLI and the server #206, #212
    • ๐Ÿ‘ Beta OpenID Connect support #126, #227