forked from tailscale/tailscale
-
Notifications
You must be signed in to change notification settings - Fork 0
feat(ci): Bump to upstream 1.90.8 #29
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Merged
Merged
Conversation
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Temporarily back out the TPM-based hw attestation code while we debug Windows exceptions. Updates tailscale/corp#31269 Signed-off-by: Patrick O'Doherty <[email protected]> (cherry picked from commit a760cbe)
…#17666) Updates tailscale#9192 Change-Id: I35c88df8a0242ecc19a23265d392ef78ac176b9d Signed-off-by: mcoulombe <[email protected]> (cherry picked from commit 34e992f)
…tence (tailscale#17610) Updates tailscale#16524 Updates jetkvm/rv1106-system#34 Signed-off-by: srwareham <[email protected]> (cherry picked from commit f4e2720)
… portmapper Thanks for the report, @Need-an-AwP! Fixes tailscale#17681 Updates tailscale#9394 Change-Id: I2e0b722ef9b460bd7e79499192d1a315504ca84c Signed-off-by: Brad Fitzpatrick <[email protected]> (cherry picked from commit edb11e0)
…ailscale#17639)" (tailscale#17684) This reverts commit 4346615. We averted the shutdown race, but will need to service the subscriber even when we are not waiting for a change so that we do not delay the bus as a whole. Updates tailscale#17638 Change-Id: I5488466ed83f5ad1141c95267f5ae54878a24657 Signed-off-by: M. J. Fromberger <[email protected]> (cherry picked from commit db5815f)
Signed-off-by: Nick Khyl <[email protected]>
In 3f5c560 I changed to use std net/http's HTTP/2 support, instead of pulling in x/net/http2. But I forgot to update DialTLSContext to DialContext, which meant it was falling back to using the std net.Dialer for its dials, instead of the passed-in one. The tests only passed because they were using localhost addresses, so the std net.Dialer worked. But in prod, where a tsnet Dialer would be needed, it didn't work, and would time out for 10 seconds before resorting to the old protocol. So this fixes the tests to use an isolated in-memory network to prevent that class of problem in the future. With the test change, the old code fails and the new code passes. Thanks to @jasonodonnell for debugging! Updates tailscale#17304 Updates 3f5c560 Change-Id: I3602bafd07dc6548e2c62985af9ac0afb3a0e967 Signed-off-by: Brad Fitzpatrick <[email protected]> (cherry picked from commit 8996254)
Updates helm/helm#31434 Change-Id: I5eb20e97ff543f883d5646c9324f50f54180851d Signed-off-by: Brad Fitzpatrick <[email protected]> (cherry picked from commit d5a40c0)
Signed-off-by: Nick Khyl <[email protected]>
Updates tailscale/corp#31017 Signed-off-by: Alex Chan <[email protected]> (cherry picked from commit 3944809)
…ailscale#17663) A follow-up to tailscale#17411. Put AppConnector events into a task queue, as they may take some time to process. Ensure that the queue is stopped at shutdown so that cleanup will remain orderly. Because events are delivered on a separate goroutine, slow processing of an event does not cause an immediate problem; however, a subscriber that blocks for a long time will push back on the bus as a whole. See https://godoc.org/tailscale.com/util/eventbus#hdr-Expected_subscriber_behavior for more discussion. Updates tailscale#17192 Updates tailscale#15160 Change-Id: Ib313cc68aec273daf2b1ad79538266c81ef063e3 Signed-off-by: M. J. Fromberger <[email protected]> (cherry picked from commit 06b0923)
Add options to the eventbus.Bus to plumb in a logger. Route that logger in to the subscriber machinery, and trigger a log message to it when a subscriber fails to respond to its delivered events for 5s or more. The log message includes the package, filename, and line number of the call site that created the subscription. Add tests that verify this works. Updates tailscale#17680 Change-Id: I0546516476b1e13e6a9cf79f19db2fe55e56c698 Signed-off-by: M. J. Fromberger <[email protected]> (cherry picked from commit 061e626)
Signed-off-by: Nick Khyl <[email protected]>
…cResp (tailscale#17828) Otherwise a zero value will panic in Conn.sendUDPStd. Updates tailscale#17827 Signed-off-by: Jordan Whited <[email protected]> (cherry picked from commit 18806de)
Updates tailscale#17830 Signed-off-by: Jordan Whited <[email protected]> (cherry picked from commit 2ad2d4d)
) This reduces memory usage when tailscaled is acting as a peer relay. Updates tailscale#17801 Signed-off-by: Jordan Whited <[email protected]> (cherry picked from commit f4f9dd7)
…le#17881) This commit replaces usage of local.Client in net/udprelay with DERPMap plumbing over the eventbus. This has been a longstanding TODO. This work was also accelerated by a memory leak in net/http when using local.Client over long periods of time. So, this commit also addresses said leak. Updates tailscale#17801 Signed-off-by: Jordan Whited <[email protected]> (cherry picked from commit 9e4d1fd)
Updates tailscale#17894 Signed-off-by: Jordan Whited <[email protected]> (cherry picked from commit 0285e1d)
…#17899) (tailscale#17905) LinkChangeLogLimiter keeps a subscription to track rate limits for log messages. But when its context ended, it would exit the subscription loop, leaving the subscriber still alive. Ensure the subscriber gets cleaned up when the context ends, so we don't stall event processing. Updates tailscale/corp#34311 Change-Id: I82749e482e9a00dfc47f04afbc69dd0237537cb2 (cherry picked from commit ab4b990) Signed-off-by: M. J. Fromberger <[email protected]> Co-authored-by: M. J. Fromberger <[email protected]>
Fixes tailscale#17600 Signed-off-by: Alex Chan <[email protected]> (cherry picked from commit 23359dc)
See http://go/no-ell Updates tailscale/corp#33846 Signed-off-by: Alex Chan <[email protected]> Change-Id: I88ecd9db847e04237c1feab9dfcede5ca1050cc5 (cherry picked from commit fca66fb)
This requires making the internals of LocalBackend a bit more generic, and implementing the `tka.CompactableChonk` interface for `tka.Mem`. Signed-off-by: Alex Chan <[email protected]> Updates tailscale/corp#33599 (cherry picked from commit 1723cb8)
Signed-off-by: Nick Khyl <[email protected]>
I added a RemoveAll() method on tka.Chonk in tailscale#17946, but it's only used in the node to purge local AUMs. We don't need it in the SQLite storage, which currently implements tka.Chonk, so move it to CompactableChonk instead. Also add some automated tests, as a safety net. Updates tailscale/corp#33599 Change-Id: I54de9ccf1d6a3d29b36a94eccb0ebd235acd4ebc Signed-off-by: Alex Chan <[email protected]> (cherry picked from commit c17ba64)
Signed-off-by: Nick Khyl <[email protected]>
anthr76
approved these changes
Nov 21, 2025
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
https://tailscale.com/changelog#2025-11-19
This takes this repo from 1.90.3 > 1.90.8