Files
tailscale/disable-auto-update.patch
Richard Rahl 2b8a3a8246 Accepting request 1181176 from home:rrahl0:upgrades
- update to 1.68.1:
  * Fixed: 4via6 subnet router advertisement works as expected.
  * Fixed: Tailscale SSH access to Security-Enhanced Linux (SELinux) machines works as expected.
- update to 1.68.0:
  * New: Auto-updates are allowed in containers, but ignore the tailnet-wide default
  * New: Apply auto-updates even if the node is down or disconnected from the coordination server.
  * New: tailscale lock status now prints the node's signature.

OBS-URL: https://build.opensuse.org/request/show/1181176
OBS-URL: https://build.opensuse.org/package/show/network:vpn/tailscale?expand=0&rev=28
2024-06-16 14:02:30 +00:00

26 lines
1.3 KiB
Diff

diff -rub tailscale/clientupdate/clientupdate.go tailscale-patched/clientupdate/clientupdate.go
--- tailscale/clientupdate/clientupdate.go 2024-06-16 15:26:31.323022871 +0200
+++ tailscale-patched/clientupdate/clientupdate.go 2024-06-16 15:57:08.732315446 +0200
@@ -205,6 +205,8 @@
// The distro.Debian switch case above should catch most apt-based
// systems, but add this fallback just in case.
return up.updateDebLike, true
+ case haveExecutable("zypper"):
+ return up.updateSUSE, false
case haveExecutable("dnf"):
return up.updateFedoraLike("dnf"), true
case haveExecutable("yum"):
@@ -526,6 +528,12 @@
you can use "pacman --sync --refresh --sysupgrade" or "pacman -Syu" to upgrade the system, including Tailscale.`)
}
+func (up *Updater) updateSUSE() error {
+ // SUSE-based distros should update manually.
+ // The package can come from official Tailscale repos or not and the system can be transactional or not.
+ return errors.New(`Use Zypper or transactional-update (on applicable systems) to update Tailscale on openSUSE or SUSE Linux Enterprise installations.`)
+}
+
func (up *Updater) updateNixos() error {
// NixOS package updates are managed on a system level and not individually.
// Direct users to update their nix channel or nixpkgs flake input to