mirror of
https://github.com/juanfont/headscale.git
synced 2026-01-11 20:00:28 +01:00
[Bug] CLI could not connect to a server #971
Closed
opened 2025-12-29 02:26:52 +01:00 by adam
·
9 comments
No Branch/Tag Specified
main
update_flake_lock_action
gh-pages
kradalby/release-v0.27.2
dependabot/go_modules/golang.org/x/crypto-0.45.0
dependabot/go_modules/github.com/opencontainers/runc-1.3.3
copilot/investigate-headscale-issue-2788
copilot/investigate-visibility-issue-2788
copilot/investigate-issue-2833
copilot/debug-issue-2846
copilot/fix-issue-2847
dependabot/go_modules/github.com/go-viper/mapstructure/v2-2.4.0
dependabot/go_modules/github.com/docker/docker-28.3.3incompatible
kradalby/cli-experiement3
doc/0.26.1
doc/0.25.1
doc/0.25.0
doc/0.24.3
doc/0.24.2
doc/0.24.1
doc/0.24.0
kradalby/build-docker-on-pr
topic/docu-versioning
topic/docker-kos
juanfont/fix-crash-node-id
juanfont/better-disclaimer
update-contributors
topic/prettier
revert-1893-add-test-stage-to-docs
add-test-stage-to-docs
remove-node-check-interval
fix-empty-prefix
fix-ephemeral-reusable
bug_report-debuginfo
autogroups
logs-to-stderr
revert-1414-topic/fix_unix_socket
rename-machine-node
port-embedded-derp-tests-v2
port-derp-tests
duplicate-word-linter
update-tailscale-1.36
warn-against-apache
ko-fi-link
more-acl-tests
fix-typo-standalone
parallel-nolint
tparallel-fix
rerouting
ssh-changelog-docs
oidc-cleanup
web-auth-flow-tests
kradalby-gh-runner
fix-proto-lint
remove-funding-links
go-1.19
enable-1.30-in-tests
0.16.x
cosmetic-changes-integration
tmp-fix-integration-docker
fix-integration-docker
configurable-update-interval
show-nodes-online
hs2021
acl-syntax-fixes
ts2021-implementation
fix-spurious-updates
unstable-integration-tests
mandatory-stun
embedded-derp
prtemplate-fix
v0.28.0-beta.1
v0.27.2-rc.1
v0.27.1
v0.27.0
v0.27.0-beta.2
v0.27.0-beta.1
v0.26.1
v0.26.0
v0.26.0-beta.2
v0.26.0-beta.1
v0.25.1
v0.25.0
v0.25.0-beta.2
v0.24.3
v0.25.0-beta.1
v0.24.2
v0.24.1
v0.24.0
v0.24.0-beta.2
v0.24.0-beta.1
v0.23.0
v0.23.0-rc.1
v0.23.0-beta.5
v0.23.0-beta.4
v0.23.0-beta3
v0.23.0-beta2
v0.23.0-beta1
v0.23.0-alpha12
v0.23.0-alpha11
v0.23.0-alpha10
v0.23.0-alpha9
v0.23.0-alpha8
v0.23.0-alpha7
v0.23.0-alpha6
v0.23.0-alpha5
v0.23.0-alpha4
v0.23.0-alpha4-docker-ko-test9
v0.23.0-alpha4-docker-ko-test8
v0.23.0-alpha4-docker-ko-test7
v0.23.0-alpha4-docker-ko-test6
v0.23.0-alpha4-docker-ko-test5
v0.23.0-alpha-docker-release-test-debug2
v0.23.0-alpha-docker-release-test-debug
v0.23.0-alpha4-docker-ko-test4
v0.23.0-alpha4-docker-ko-test3
v0.23.0-alpha4-docker-ko-test2
v0.23.0-alpha4-docker-ko-test
v0.23.0-alpha3
v0.23.0-alpha2
v0.23.0-alpha1
v0.22.3
v0.22.2
v0.23.0-alpha-docker-release-test
v0.22.1
v0.22.0
v0.22.0-alpha3
v0.22.0-alpha2
v0.22.0-alpha1
v0.22.0-nfpmtest
v0.21.0
v0.20.0
v0.19.0
v0.19.0-beta2
v0.19.0-beta1
v0.18.0
v0.18.0-beta4
v0.18.0-beta3
v0.18.0-beta2
v0.18.0-beta1
v0.17.1
v0.17.0
v0.17.0-beta5
v0.17.0-beta4
v0.17.0-beta3
v0.17.0-beta2
v0.17.0-beta1
v0.17.0-alpha4
v0.17.0-alpha3
v0.17.0-alpha2
v0.17.0-alpha1
v0.16.4
v0.16.3
v0.16.2
v0.16.1
v0.16.0
v0.16.0-beta7
v0.16.0-beta6
v0.16.0-beta5
v0.16.0-beta4
v0.16.0-beta3
v0.16.0-beta2
v0.16.0-beta1
v0.15.0
v0.15.0-beta6
v0.15.0-beta5
v0.15.0-beta4
v0.15.0-beta3
v0.15.0-beta2
v0.15.0-beta1
v0.14.0
v0.14.0-beta2
v0.14.0-beta1
v0.13.0
v0.13.0-beta3
v0.13.0-beta2
v0.13.0-beta1
upstream/v0.12.4
v0.12.4
v0.12.3
v0.12.2
v0.12.2-beta1
v0.12.1
v0.12.0-beta2
v0.12.0-beta1
v0.11.0
v0.10.8
v0.10.7
v0.10.6
v0.10.5
v0.10.4
v0.10.3
v0.10.2
v0.10.1
v0.10.0
v0.9.3
v0.9.2
v0.9.1
v0.9.0
v0.8.1
v0.8.0
v0.7.1
v0.7.0
v0.6.1
v0.6.0
v0.5.2
v0.5.1
v0.5.0
v0.4.0
v0.3.6
v0.3.5
v0.3.4
v0.3.3
v0.3.2
v0.3.1
v0.3.0
v0.2.2
v0.2.1
v0.2.0
v0.1.1
v0.1.0
Labels
Clear labels
CLI
DERP
DNS
Nix
OIDC
SSH
bug
database
documentation
duplicate
enhancement
faq
good first issue
grants
help wanted
might-come
needs design doc
needs investigation
no-stale-bot
out of scope
performance
policy 📝
pull-request
question
regression
routes
stale
tags
tailscale-feature-gap
well described ❤️
wontfix
Mirrored from GitHub Pull Request
No Label
bug
Milestone
No items
No Milestone
Projects
Clear projects
No project
Notifications
Due Date
No due date set.
Dependencies
No dependencies set.
Reference: starred/headscale#971
Reference in New Issue
Block a user
Blocking a user prevents them from interacting with repositories, such as opening or commenting on pull requests or issues. Learn more about blocking a user.
Delete Branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @YouSysAdmin on GitHub (Mar 12, 2025).
Is this a support request?
Is there an existing issue for this?
Current Behavior
Expected Behavior
list of nodes
Steps To Reproduce
touch ~/.headscale/config.yamlexecute
headscale nodes listCheck GRPC is working correct
Environment
Runtime environment
Anything else?
Only remote CLI is affected, all other functions work correctly.
Update: I tested older versions and the latest working version is 0.23.0, connects and possible to set policy.
@nblock commented on GitHub (Mar 15, 2025):
I tested the remote-cli with 0.25.1 as described in the docs (without reverse proxy or container) and it works.
local config
testing.yml:Invocation:
./headscale_0.25.1_linux_amd64 -c testing.yml user listPlease note that the address has to be configured without
http://orhttps://. Can you please check your configuration again?@YouSysAdmin commented on GitHub (Mar 15, 2025):
Hi @nblock
The same result if using an
~/.headscale/config.yamlfile.All config variables set are correctly, judding by a trace output and additional debug outputs (inside the utils/newHeadscaleCLIWithConfig function).
I have compiled a conditionally working version via downgrade versions of some packages (haven't tested all the CLI functions)
routes listoutput:@nblock commented on GitHub (Mar 15, 2025):
Please try without a reverse proxy in between.
@YouSysAdmin commented on GitHub (Mar 16, 2025):
@nblock
This headscale instance running inside kubernetes cluster end external connection possible only via traefik.
I used kubectl port-forward for forwarding the port 50433 to my local machine and try again, it not working for any CLI version
(doesn't matter configuration via CLI or file)
GRPCURL work fine
headscale server config
@plittlefield commented on GitHub (May 23, 2025):
Same here, I'm behind Traefik but have Tailscale running on my nodes so CAN use that perfectly.
This is my config ...
I'm getting this error ...
I have tried swapping the URL for a Tailscale IP and port that I can telnet to ...
... and put this in my config ...
... and this time I get a different error ...
Any clue?
FYI I have headscale-admin working fine on Traefik.
Thanks,
Paully
@YouSysAdmin commented on GitHub (May 23, 2025):
Hi @plittlefield
I don't have any solution for it.
I just use v0.23 to set a policy, etc., and it works fine. :)
There may be some dependencies on headers that are not passed through Traefik to headscale, but I haven't had time to conduct this research across the two versions of the GRPC package.
P.S. I haven't tested version 0.26 yet.
@ozhankaraman commented on GitHub (Jun 8, 2025):
I am using docker based letsencrypt + haproxy + headscale(v0.26.1) implementation and macos client works fine for me. I am using normal tailscale pkg from their official web site(Tailscale-1.84.1-macos.pkg). My headscale config on haproxy is simple nothing fancy backend config is like
@YouSysAdmin commented on GitHub (Jul 29, 2025):
@ozhankaraman the question is not about the client, here the question is only about the remote CLI of Headscale (GRPC) :)
I have no idea what the problem is here.
Headscale and CLI v0.26.1 (get/set policy):
Could not connect: context deadline exceeded error="context deadline exceeded"Headscale v0.26.1 + CLI v0.23.0 (get/set policy):
This definitely happened after updating the version of the GRPC library, but I still haven't found the reason and how to fix it.
Interesting is that this problem with GRPC only occurs for Heascale and it's not clear why at all, i have a many tools based on GRPC.
Need to dig changes after
google.golang.org/grpc v1.66.0@YouSysAdmin commented on GitHub (Jul 29, 2025):
Hi @nblock
I found problem, Falling bombs with five hundred kilograms of TNT clear my brain well :D
As a temporary solution, we can use the following:GRPC_ENFORCE_ALPN_ENABLED=false headscale get policy [etc]this is related to enforce ALPN protocol: https://github.com/grpc/grpc-go/issues/434
This is actually a misconfiguration of the AWS Network Load Balancer.
fix:
HTTP2Preferred.If using
HTTP2Preferredis not possible for you, you can use an additional environment variable for the client.GRPC_ENFORCE_ALPN_ENABLED=false headscale get policy [etc]