Updated Tailscale 1.22 (markdown)

Brad Fitzpatrick 2022-02-23 13:26:05 -08:00
parent 4278e90d2c
commit 288f6d34dc
1 changed files with 3 additions and 1 deletions

@ -4,9 +4,10 @@
- New: `tailscaled --state=mem:` registers as an ephemeral node and does not store state to disk
- New: `tailscale status --json` now shows `Tags` and `PrimaryRoutes` for Peers. `PrimaryRoutes` shows whether a HA subnet router is currently the active one.
- New: `tailscale status --json | jq .TailnetName` will show the name of the tailnet
- New: the optional `tailscaled` debug server's Prometheus metrics exporter now also includes Go runtime metrics
- New: tailscaled supports a new `TS_PERMIT_CERT_UID` environment variable containing either a userid or username to allow to fetch Tailscale TLS certificates for the node. This environment variable can be set in `/etc/default/tailscaled` to permit non-root web servers on the local machine to fetch certs from `tailscaled`.
- Fixed: send heartbeats less often, saving some battery, matching 1.20 change on mobile platforms.
- Changed: `--auth-key` and `--authkey` both work as `tailscale up` arguments
- Changed: `TS_PERMIT_CERT_UID` can contain a uid or username for `tailscale cert`
### Windows
- New: MSI installer
@ -16,6 +17,7 @@
- Fixed: More robust detection of systemd-resolved
- Fixed: Efficiently parse extremely large `/proc/net/route` files
- Fixed: Be more helpful in suggesting `tailscale --operator=USER` to use with Taildrop
- Fixed: some broken host DNS configurations are now detected and reported in `tailscale status`
### Synology
- Changed: Add `/var/packages/Tailscale/target/bin/tailscale configure-host` to restore needed permissions. We recommend adding this as a scheduled task at boot.