[Feature] Plea: keep "use_username_in_magic_dns" even after tags are fixed #841

Closed
opened 2025-12-29 02:24:43 +01:00 by adam · 6 comments
Owner

Originally created by @noseshimself on GitHub (Oct 25, 2024).

Use case

We do have a sufficient number of identical host names that have been personalized based on user names as intermediate components in DNS names. This has become necessary after deciding that we will be giving up centralized offices AND a number of centralized IT services during the Covid lockdown phase. One of the tools enabling us to do so was being able to use unqualified host names and having magicDNS do the job. Now you're pulling the rug under our lazy asses away.

Description

Keep "use_username_in_magic_dns" if it is possible at all.

Contribution

  • I can write the design doc for this feature
  • I can contribute this feature

How can it be implemented?

Just don't delete what is necessary. The flag "use_username_in_magic_dns" can be used to turn it off as default setting and those who really need it can continue using it.

Originally created by @noseshimself on GitHub (Oct 25, 2024). ### Use case We do have a sufficient number of identical host names that have been personalized based on user names as intermediate components in DNS names. This has become necessary after deciding that we will be giving up centralized offices AND a number of centralized IT services during the Covid lockdown phase. One of the tools enabling us to do so was being able to use unqualified host names and having magicDNS do the job. Now you're pulling the rug under our lazy asses away. ### Description Keep "use_username_in_magic_dns" if it is possible at all. ### Contribution - [ ] I can write the design doc for this feature - [ ] I can contribute this feature ### How can it be implemented? Just don't delete what is necessary. The flag "use_username_in_magic_dns" can be used to turn it off as default setting and those who really need it can continue using it.
adam added the enhancement label 2025-12-29 02:24:43 +01:00
adam closed this issue 2025-12-29 02:24:44 +01:00
Author
Owner

@celevra commented on GitHub (Nov 13, 2024):

we use them also to organize "group" of hosts.
it is a great feature! So please keep it

@celevra commented on GitHub (Nov 13, 2024): we use them also to organize "group" of hosts. it is a great feature! So please keep it
Author
Owner

@juanfont commented on GitHub (Nov 15, 2024):

Sorry, this was my bad.

It was never ment to be added in the first place and it will not be added back, the goal of this project is to align with Tailscale.

@juanfont commented on GitHub (Nov 15, 2024): Sorry, this was my bad. It was never ment to be added in the first place and it will not be added back, the goal of this project is to align with Tailscale.
Author
Owner

@celevra commented on GitHub (Nov 19, 2024):

this could be a optional feature
So in the default configuration you are fully compatible to tailscale
but for us it is a killer feature.
All our logic is based on it, so that we need a way to build it, if you really remove it (why remove a working feature?).
than we need a webhook for new devices and create custom dns entries...

@celevra commented on GitHub (Nov 19, 2024): this could be a optional feature So in the default configuration you are fully compatible to tailscale but for us it is a killer feature. All our logic is based on it, so that we need a way to build it, if you really remove it (why remove a working feature?). than we need a webhook for new devices and create custom dns entries...
Author
Owner

@noseshimself commented on GitHub (Nov 20, 2024):

we need a webhook for new devices and create custom dns entries...

I don't think that will be sufficient unless you can override Magic DNS with another source based on that source's answer (if it is providing a CNAME or A/AAAA, fine but if there is a negative answer coming back it has to try Magic-ing. On receiving a CNAME it you need to add even more checks. It's a nightmare.

@noseshimself commented on GitHub (Nov 20, 2024): > we need a webhook for new devices and create custom dns entries... I don't think that will be sufficient unless you can override Magic DNS with another source based on that source's answer (if it is providing a CNAME or A/AAAA, fine but if there is a negative answer coming back it has to try Magic-ing. On receiving a CNAME it you need to add even more checks. It's a nightmare.
Author
Owner

@kradalby commented on GitHub (Nov 29, 2024):

I will add a way for you to programatically provide the DNS server with new entries, see https://github.com/juanfont/headscale/issues/2262.

We will not reintroduce the feature, it is not a fully working feature and it is not safe.

@kradalby commented on GitHub (Nov 29, 2024): I will add a way for you to programatically provide the DNS server with new entries, see https://github.com/juanfont/headscale/issues/2262. We will not reintroduce the feature, it is not a fully working feature and it is not safe.
Author
Owner

@celevra commented on GitHub (Nov 29, 2024):

Awesome!
Thank you

@celevra commented on GitHub (Nov 29, 2024): Awesome! Thank you
Sign in to join this conversation.
1 Participants
Notifications
Due Date
No due date set.
Dependencies

No dependencies set.

Reference: starred/headscale#841