* Hostname system policy is added for overriding the device hostname configured by the operating system, using an MDM solution. * Web interface displays a Login button instead of the Reauthenticate button when adding a new device to your tailnet. * Tailscale Funnel configuration on devices displays errors when incoming connections are not permitted and connections are disallowed. * Connections to a custom coordination server that does not support HTTPS will no longer fail when a custom port number is specified. * TLS certificate requests from Let’s Encrypt include the device's DNS name in the CSR’s SAN extension and set the Common Name field. * Tailscale Funnel disabled on a device no longer displays enabled in the admin console. * GitHub username change automatically updates tailnet name * 4via6 subnet routers GA * Auto approvers GA * Node attributes GA * Download invoices GA * Fast user switching GA * Configuration log streaming integration with S3 buckets GA * Network flow log streaming integration with S3 buckets GA * NextDNS profiles per device GA * GitHub secret scanning - remove fix-CVE-2024-45337.patch, as it's now included OBS-URL: https://build.opensuse.org/package/show/network:vpn/tailscale?expand=0&rev=63
26 lines
1.3 KiB
Diff
26 lines
1.3 KiB
Diff
diff -rub tailscale/clientupdate/clientupdate.go tailscale-patched/clientupdate/clientupdate.go
|
|
--- tailscale/clientupdate/clientupdate.go 2024-06-16 15:26:31.323022871 +0200
|
|
+++ tailscale-patched/clientupdate/clientupdate.go 2024-06-16 15:57:08.732315446 +0200
|
|
@@ -205,6 +205,8 @@
|
|
// The distro.Debian switch case above should catch most apt-based
|
|
// systems, but add this fallback just in case.
|
|
return up.updateDebLike, true
|
|
+ case haveExecutable("zypper"):
|
|
+ return up.updateSUSE, false
|
|
case haveExecutable("dnf"):
|
|
return up.updateFedoraLike("dnf"), true
|
|
case haveExecutable("yum"):
|
|
@@ -526,6 +528,12 @@
|
|
you can use "pacman --sync --refresh --sysupgrade" or "pacman -Syu" to upgrade the system, including Tailscale.`)
|
|
}
|
|
|
|
+func (up *Updater) updateSUSE() error {
|
|
+ // SUSE-based distros should update manually.
|
|
+ // The package can come from official Tailscale repos or not and the system can be transactional or not.
|
|
+ return errors.New(`Use Zypper or transactional-update (on applicable systems) to update Tailscale on openSUSE or SUSE Linux Enterprise installations.`)
|
|
+}
|
|
+
|
|
func (up *Updater) updateNixos() error {
|
|
// NixOS package updates are managed on a system level and not individually.
|
|
// Direct users to update their nix channel or nixpkgs flake input to
|