Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Update tailscale to version v1.72.1 #1396

Merged
merged 2 commits into from
Aug 27, 2024
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 1 addition & 1 deletion tailscale/docker-compose.yml
Original file line number Diff line number Diff line change
@@ -1,9 +1,9 @@
version: "3.7"

Check notice on line 1 in tailscale/docker-compose.yml

View workflow job for this annotation

GitHub Actions / Lint apps

Potentially using unsafe user in service "web"

The default container user "root" can lead to security vulnerabilities. If you are using the root user, please try to specify a different user (e.g. "1000:1000") in the compose file or try to set the UID/PUID and GID/PGID environment variables to 1000.

services:
web:
network_mode: "host" # TODO: We can remove this later with some iptables magic

Check notice on line 5 in tailscale/docker-compose.yml

View workflow job for this annotation

GitHub Actions / Lint apps

Service "web" uses host network mode

The host network mode can lead to security vulnerabilities. If possible please use the default bridge network mode and expose the necessary ports.
image: tailscale/tailscale:v1.70.0@sha256:19c66f261912cd19fa5362d36cf6f4770ad6f273b410f940a0eba39b376fe326
image: tailscale/tailscale:v1.72.1@sha256:83a6faec34866f70914a7d241d6ca749e6914f08f4f9059d942e1c3088dc001b
restart: on-failure
stop_grace_period: 1m
command: "sh -c 'tailscale web --listen 0.0.0.0:8240 & exec tailscaled --tun=userspace-networking'"
Expand Down
23 changes: 13 additions & 10 deletions tailscale/umbrel-app.yml
Original file line number Diff line number Diff line change
Expand Up @@ -2,18 +2,18 @@ manifestVersion: 1
id: tailscale
category: networking
name: Tailscale
version: "v1.70.0"
version: "v1.72.1"
tagline: Zero config VPN to access your Umbrel from anywhere
description: >-
Tailscale is zero config VPN that creates a secure network between
your Umbrel and your other devices. Even when separated by firewalls or
subnets, Tailscale just works.


Tailscale will assign your Umbrel a stable IP and an auto-assigned domain that stays consistent, no matter what network your Umbrel is connected to. Its like a local network that works everywhere.
Tailscale will assign your Umbrel a stable IP and an auto-assigned domain that stays consistent, no matter what network your Umbrel is connected to. It's like a local network that works everywhere.


Tailscale builds on top of WireGuard®s Noise protocol encryption, a peer-reviewed and trusted standard.
Tailscale builds on top of WireGuard®'s Noise protocol encryption, a peer-reviewed and trusted standard.
developer: Tailscale Inc.
website: https://tailscale.com
dependencies: []
Expand All @@ -27,13 +27,16 @@ gallery:
path: ""
deterministicPassword: false
torOnly: false
releaseNotes: |
This update includes several bug fixes and improvements:
- Improved NAT traversal for some uncommon scenarios.
- Optimized sending firewall rules to clients more efficiently.
- Fixed DNS leak issue on Windows.
- Fixed Taildrive server no longer starts unnecessarily when no drives are configured.
- Switching from unstable to stable tracks using the "tailscale update" command now works correctly
releaseNotes: >-
This update includes several improvements and bug fixes:

- Captive portal detection is now supported.
- Added --min-validity flag to the tailscale cert command for automating certificate refreshes.
- The tailscale lock command now allows passing keys as files using the file:<path-to-key-file> format.
- A health warning is triggered if DNS queries can’t be forwarded to configured resolvers.
- Increased send and receive buffer sizes in userspace mode TCP, improving throughput on high latency paths.
- Added TCP generic segmentation offload (GSO) support, further improving throughput.
- Resolved DNS over TCP failures when querying the Tailscale-internal resolver.

Full release notes and detailed information is available at https://github.com/tailscale/tailscale/releases
submitter: Umbrel
Expand Down