mirror of
https://github.com/juanfont/headscale.git
synced 2026-01-12 04:10:32 +01:00
[Bug] ACL policy not working after update to v23.0 beta1 #747
Closed
opened 2025-12-29 02:23:10 +01:00 by adam
·
26 comments
No Branch/Tag Specified
main
update_flake_lock_action
gh-pages
kradalby/release-v0.27.2
dependabot/go_modules/golang.org/x/crypto-0.45.0
dependabot/go_modules/github.com/opencontainers/runc-1.3.3
copilot/investigate-headscale-issue-2788
copilot/investigate-visibility-issue-2788
copilot/investigate-issue-2833
copilot/debug-issue-2846
copilot/fix-issue-2847
dependabot/go_modules/github.com/go-viper/mapstructure/v2-2.4.0
dependabot/go_modules/github.com/docker/docker-28.3.3incompatible
kradalby/cli-experiement3
doc/0.26.1
doc/0.25.1
doc/0.25.0
doc/0.24.3
doc/0.24.2
doc/0.24.1
doc/0.24.0
kradalby/build-docker-on-pr
topic/docu-versioning
topic/docker-kos
juanfont/fix-crash-node-id
juanfont/better-disclaimer
update-contributors
topic/prettier
revert-1893-add-test-stage-to-docs
add-test-stage-to-docs
remove-node-check-interval
fix-empty-prefix
fix-ephemeral-reusable
bug_report-debuginfo
autogroups
logs-to-stderr
revert-1414-topic/fix_unix_socket
rename-machine-node
port-embedded-derp-tests-v2
port-derp-tests
duplicate-word-linter
update-tailscale-1.36
warn-against-apache
ko-fi-link
more-acl-tests
fix-typo-standalone
parallel-nolint
tparallel-fix
rerouting
ssh-changelog-docs
oidc-cleanup
web-auth-flow-tests
kradalby-gh-runner
fix-proto-lint
remove-funding-links
go-1.19
enable-1.30-in-tests
0.16.x
cosmetic-changes-integration
tmp-fix-integration-docker
fix-integration-docker
configurable-update-interval
show-nodes-online
hs2021
acl-syntax-fixes
ts2021-implementation
fix-spurious-updates
unstable-integration-tests
mandatory-stun
embedded-derp
prtemplate-fix
v0.28.0-beta.1
v0.27.2-rc.1
v0.27.1
v0.27.0
v0.27.0-beta.2
v0.27.0-beta.1
v0.26.1
v0.26.0
v0.26.0-beta.2
v0.26.0-beta.1
v0.25.1
v0.25.0
v0.25.0-beta.2
v0.24.3
v0.25.0-beta.1
v0.24.2
v0.24.1
v0.24.0
v0.24.0-beta.2
v0.24.0-beta.1
v0.23.0
v0.23.0-rc.1
v0.23.0-beta.5
v0.23.0-beta.4
v0.23.0-beta3
v0.23.0-beta2
v0.23.0-beta1
v0.23.0-alpha12
v0.23.0-alpha11
v0.23.0-alpha10
v0.23.0-alpha9
v0.23.0-alpha8
v0.23.0-alpha7
v0.23.0-alpha6
v0.23.0-alpha5
v0.23.0-alpha4
v0.23.0-alpha4-docker-ko-test9
v0.23.0-alpha4-docker-ko-test8
v0.23.0-alpha4-docker-ko-test7
v0.23.0-alpha4-docker-ko-test6
v0.23.0-alpha4-docker-ko-test5
v0.23.0-alpha-docker-release-test-debug2
v0.23.0-alpha-docker-release-test-debug
v0.23.0-alpha4-docker-ko-test4
v0.23.0-alpha4-docker-ko-test3
v0.23.0-alpha4-docker-ko-test2
v0.23.0-alpha4-docker-ko-test
v0.23.0-alpha3
v0.23.0-alpha2
v0.23.0-alpha1
v0.22.3
v0.22.2
v0.23.0-alpha-docker-release-test
v0.22.1
v0.22.0
v0.22.0-alpha3
v0.22.0-alpha2
v0.22.0-alpha1
v0.22.0-nfpmtest
v0.21.0
v0.20.0
v0.19.0
v0.19.0-beta2
v0.19.0-beta1
v0.18.0
v0.18.0-beta4
v0.18.0-beta3
v0.18.0-beta2
v0.18.0-beta1
v0.17.1
v0.17.0
v0.17.0-beta5
v0.17.0-beta4
v0.17.0-beta3
v0.17.0-beta2
v0.17.0-beta1
v0.17.0-alpha4
v0.17.0-alpha3
v0.17.0-alpha2
v0.17.0-alpha1
v0.16.4
v0.16.3
v0.16.2
v0.16.1
v0.16.0
v0.16.0-beta7
v0.16.0-beta6
v0.16.0-beta5
v0.16.0-beta4
v0.16.0-beta3
v0.16.0-beta2
v0.16.0-beta1
v0.15.0
v0.15.0-beta6
v0.15.0-beta5
v0.15.0-beta4
v0.15.0-beta3
v0.15.0-beta2
v0.15.0-beta1
v0.14.0
v0.14.0-beta2
v0.14.0-beta1
v0.13.0
v0.13.0-beta3
v0.13.0-beta2
v0.13.0-beta1
upstream/v0.12.4
v0.12.4
v0.12.3
v0.12.2
v0.12.2-beta1
v0.12.1
v0.12.0-beta2
v0.12.0-beta1
v0.11.0
v0.10.8
v0.10.7
v0.10.6
v0.10.5
v0.10.4
v0.10.3
v0.10.2
v0.10.1
v0.10.0
v0.9.3
v0.9.2
v0.9.1
v0.9.0
v0.8.1
v0.8.0
v0.7.1
v0.7.0
v0.6.1
v0.6.0
v0.5.2
v0.5.1
v0.5.0
v0.4.0
v0.3.6
v0.3.5
v0.3.4
v0.3.3
v0.3.2
v0.3.1
v0.3.0
v0.2.2
v0.2.1
v0.2.0
v0.1.1
v0.1.0
Labels
Clear labels
CLI
DERP
DNS
Nix
OIDC
SSH
bug
database
documentation
duplicate
enhancement
faq
good first issue
grants
help wanted
might-come
needs design doc
needs investigation
no-stale-bot
out of scope
performance
policy 📝
pull-request
question
regression
routes
stale
tags
tailscale-feature-gap
well described ❤️
wontfix
Mirrored from GitHub Pull Request
No Label
bug
Milestone
No items
No Milestone
Projects
Clear projects
No project
Notifications
Due Date
No due date set.
Dependencies
No dependencies set.
Reference: starred/headscale#747
Reference in New Issue
Block a user
Blocking a user prevents them from interacting with repositories, such as opening or commenting on pull requests or issues. Learn more about blocking a user.
Delete Branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @masterwishx on GitHub (Jul 22, 2024).
Is this a support request?
Is there an existing issue for this?
Current Behavior
SSH not working after updated to beta1 and changed config for it:
Expected Behavior
wokring in versions befor
Steps To Reproduce
...
Environment
Runtime environment
Anything else?
No response
@masterwishx commented on GitHub (Jul 23, 2024):
adding text:
@kradalby commented on GitHub (Jul 25, 2024):
@masterwishx could you run
tailscale debug netmapon one of the ssh dst hosts?@masterwishx commented on GitHub (Jul 25, 2024):
Sure, will post here...
@masterwishx commented on GitHub (Jul 25, 2024):
i think like no acl file was located when tryed beta1
@masterwishx commented on GitHub (Jul 25, 2024):
@masterwishx commented on GitHub (Jul 25, 2024):
@masterwishx commented on GitHub (Jul 25, 2024):
When goes back to alpha12 have on same machine:
@seanob86 commented on GitHub (Jul 25, 2024):
I too having issues with acl’s. In alpha12 nodes that don’t have access to other nodes, now can access other nodes in beta1, when using file mode.
Appears file mode does not work. I switched to database mode then
headscale policy set -f [path to acl file]Then
headscale policy get, and can see all acls.Now restricted nodes based on acl can’t communicate to other nodes as configured.
@kradalby commented on GitHub (Jul 26, 2024):
@pallabpain, let me know if you could help have a look at this one, might not be related, but worth a check.
@pallabpain commented on GitHub (Jul 26, 2024):
@kradalby Sure. I'll take a look at this. From what @seanob86 reported, I can probably investigate the part when ACL is loaded from a file and whether I messed it up during the re-write. 😅
@hrtkpf commented on GitHub (Jul 26, 2024):
I also encountered an issue after upgrading to beta1.
My config contains:
Without
acl_policy_path, ACLs do not work at all.headscale policy getreturns no ACLs in that case.When using the deprecated
acl_policy_path, everything works andheadscale policy getreturns the ACLs accordingly.As previously mentioned, it seems ACLs are not loaded correctly when using the new file mode.
@masterwishx commented on GitHub (Jul 26, 2024):
That's what I wrote in discord
@masterwishx commented on GitHub (Jul 26, 2024):
@kradalby @pallabpain
can confirm after added :
acl_policy_path: "/etc/headscale/acls.json"all working fine@stratself commented on GitHub (Jul 31, 2024):
I confirm having this bug too. I suggest removing the "for SSH" part in the title as the issue affects all ACLs.
@kradalby commented on GitHub (Aug 1, 2024):
I know this is 99% certain that it is related to the ACL changes, but could you help test if the DNS breakage had an impact?
I think #2034 addresses DNS issues, would it be possible for you to help me test it? would be great to avoid another bad release like beta1.
Binary is available here: https://github.com/juanfont/headscale/actions/runs/10195837541?pr=2034
@masterwishx commented on GitHub (Aug 1, 2024):
Sure I can check it tomorrow, what is link for docker? :pr2034
@masterwishx commented on GitHub (Aug 2, 2024):
Also I don't have any dns issues for now with beta1, but also installed and using Adguard home as container in host network and using it in config as dns, enabled also tailscale dns on same host becose otherwise magic DNS not working in this machine
@kradalby commented on GitHub (Aug 2, 2024):
We do not build docker containers for prs/branches sadly, so you will have to build it.
@masterwishx commented on GitHub (Aug 2, 2024):
OK, got it. Did you asked from me to check?
@masterwishx commented on GitHub (Aug 2, 2024):
Can you give a hint how to build docker for this pr, I'm not sure
@kradalby commented on GitHub (Aug 2, 2024):
I think I've found the error, Cobra, the framework we use for reading the config file has a lot of sharp edges for aliases from old to new configs, so I will make the
acl_policy_patha hard error and only read the new one.Sorry for the inconvenience!
@masterwishx commented on GitHub (Aug 2, 2024):
It's OK, I'm really sorry for was unable to help becose of docker build...
@pallabpain commented on GitHub (Aug 2, 2024):
@kradalby Yes, that was my hunch as well. Apologies for not being able to take a look at the issue.
Per this comment, the
dbmode works fine and only file mode was unable to get the file path.Thanks for addressing the issue. :)
@asineth0 commented on GitHub (Aug 7, 2024):
also had this issue, why is YAML no longer supported for ACLs? it's so much easier to edit in something like nano/vim
@kradalby commented on GitHub (Aug 7, 2024):
We are reducing the maintenance cost for developers, sorry for the inconvenience, but we will only support one format (hujson) forward.
@asineth0 commented on GitHub (Aug 7, 2024):
Can't you just add like 2-3 lines of code, if the files ends with
.yamlthen convert it over to JSON first? I'm down to submit a patch because yaml genuinely makes this so much easier to manage on a server over SSH, editing JSON over SSH is just painful.