You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This feature aims to inject the Access-Control-Allow-Origin response header directly through the configuration file (config.yaml). The primary purpose of this feature is to simplify the setup process for those using Headscale with a Web Tailscale Client.
Tailscale uses a browser client to set up an SSH console.
My company Leaning Technologies uses a Tailscale web client to establish peer-to-peer connections between two browsers.
We use Headscale for companies that prefer not to use the Tailscale Control Plane
Eliminating the Proxy Layer:
Before: Users needed to deploy and configure an additional proxy server behind the Headscale server to manage Cross-Origin Resource Sharing (CORS).
After: This feature allows users to directly configure CORS support through the config.yaml file, eliminating the need for an extra proxy layer.
Following the Same Principle:
Headscale also supports integrated TLS, This is also to eliminate the use of a proxy server. This feature extends that Idea to also let you enable CORS
Quality of Life Improvement:
The ability to enable CORS through the configuration file simplifies deployment and configuration, making it more user-friendly and reducing setup complexity.
Configuration Details
The Access-Control-Allow-Origin header can be configured by adding the following to the config.yaml file:
# Examples:# "*" - Allow access from any origin (use with caution).# "http://example.com" - Allow access only from the specified origin.# "" - Disable CORS, no cross-origin requests allowed.Access-Control-Allow-Origin: "*"# Allows all origins
This feature allows the injection of the Access-Control-Allow-Origin response header directly through the config.yaml file. The primary purpose is to simplify the setup process for users of Headscale with a Web Tailscale Client, making it easier to handle Cross-Origin Resource Sharing (CORS) without needing to set up a proxy server.
Configuration Details
The Access-Control-Allow-Origin header can be configured by adding the following to the config.yaml file:
Contribution
I can write the design doc for this feature
I can contribute this feature
How can it be implemented?
Add an new option to the config.yaml file.
Check if the Option has been set.
Add a new header in all response messages
The text was updated successfully, but these errors were encountered:
Use case
Feature Overview: Injecting
Access-Control-Allow-Origin
Response HeaderThis feature aims to inject the
Access-Control-Allow-Origin
response header directly through the configuration file (config.yaml
). The primary purpose of this feature is to simplify the setup process for those using Headscale with a Web Tailscale Client.Learn more about the Tailscale SSH Console
Justification
Simplified Setup for Tailscale Web Client:
Eliminating the Proxy Layer:
config.yaml
file, eliminating the need for an extra proxy layer.Following the Same Principle:
Quality of Life Improvement:
Configuration Details
The
Access-Control-Allow-Origin
header can be configured by adding the following to theconfig.yaml
file:Description
Feature Overview: Injecting
Access-Control-Allow-Origin
Response HeaderThis feature allows the injection of the
Access-Control-Allow-Origin
response header directly through theconfig.yaml
file. The primary purpose is to simplify the setup process for users of Headscale with a Web Tailscale Client, making it easier to handle Cross-Origin Resource Sharing (CORS) without needing to set up a proxy server.Configuration Details
The
Access-Control-Allow-Origin
header can be configured by adding the following to theconfig.yaml
file:Contribution
How can it be implemented?
The text was updated successfully, but these errors were encountered: