-
-
Notifications
You must be signed in to change notification settings - Fork 192
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
fix: tailscale state issue #2380
Conversation
Sorry, but just out of your description I can't follow why removing the state argument would solve any problem. In fact putting the state variable to |
@jens-maus thanks for checkin and feedback.
The main issue is if you just point to the state, tailscale has an issue with the statedir, maybe it points somewhere that is only readonly or don't have it. If you want to test it for your self, just run: tailscale serve https / http://127.0.0.1:80 and after that you have even perfect access via a nice valid SSL cert to your CCU from your tailnet. |
Thanks for your revised PR. However, I do have some more questions before I can consider accepting it.
So IMHO it seems to look like that using Or would it be even better/wiser to use TAILSCALED_ARGS="-state /etc/config/${DAEMON}.state -statedir /etc/config/tailscale -socket /var/run/tailscale/${DAEMON}.sock" That would make sure that the location of the state file is still the same like before, but the |
@jens-maus I will change it in 5min to /etc/config/tailscaled/ As you can see in the statedir are multiple files and I think they should not pollute the /etc/config directory The second thing is the service automatically creates the statedir if it does not exists with the following access rights: |
Thx. In addition, I still think it would be good to also keep |
@jens-maus I will try that topic out and give you feedback. From "cleanless", I would more prefer to move the state file into that folder, because if you don't define the --state flag all files are always together in a folder. I will share my outcome if that works with both later. |
Backward compatibility is IMHO more important here than "cleanliness". Especially since we are talking about just a single state file that will also be located in the |
Thx, this was quick and I will merge this PR now. Thanks for your contribution! |
@jens-maus I double checked it and it works fine. |
Description
If you with the current setup try to fetch a SSL cert with tailscale cert you get an error message around TailscaleVarRoot.
If you don't apply that state, it just perfectly works. It still even use the same directory.
Because of that issue also tailscale server https:8443 / HTTP://127.0.0.1:80 is also not working
Types of changes
Verification Process
try to fetch a cert with tailscale cert before and after that change.
You need to be in a directory that is writeable so for example /tmp/
Same apply to the tailscale serve
Release Notes
Contributing checklist