Script 'mail_helper' called by obssrc Hello community, here is the log from the commit of package tailscale for openSUSE:Factory checked in at 2024-05-22 21:32:10 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Comparing /work/SRC/openSUSE:Factory/tailscale (Old) and /work/SRC/openSUSE:Factory/.tailscale.new.1880 (New) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "tailscale" Wed May 22 21:32:10 2024 rev:5 rq:1175719 version:1.66.4 Changes: -------- --- /work/SRC/openSUSE:Factory/tailscale/tailscale.changes 2024-05-11 18:25:09.218856794 +0200 +++ /work/SRC/openSUSE:Factory/.tailscale.new.1880/tailscale.changes 2024-05-22 21:32:40.506413882 +0200 @@ -1,0 +2,25 @@ +Wed May 22 08:36:37 UTC 2024 - Richard Rahl <rra...@disroot.org> + +- update to 1.66.4: + * Fixed: Restored UDP connectivity through Mullvad exit nodes + * Stateful filtering is now off by default + +- update to 1.66.3: + * Login URLs did not always appear in the console when running tailscale up + * Starting with v1.66, the Kubernetes operator must always run the same or later version + as the proxies it manages. + * Expose cloud services on cluster network to the tailnet, using Kubernetes ExternalName Services + * Expose tailnet services that use Tailscale HTTPS to cluster workloads + * Cluster workloads can now refer to Tailscale Ingress resources by their MagicDNS names + * Configure environment variables for Tailscale Kubernetes operator proxies using ProxyClass CRD + * Expose tailscaled metrics endpoint for Tailscale Kubernetes operator proxies through ProxyClass CRD + * Configure labels for the Kubernetes operator Pods with Helm chart values + * Configure affinity rules for Kubernetes operator proxy Pods with ProxyClass + * Kubernetes operator proxy init container no longer attempts to enable IPv6 forwarding on systems + that don't have IPv6 module loaded + * Tailscale containers running on Kubernetes no longer error if an empty Kubernetes Secret is + pre-created for the tailscaled state + * Improved the ambiguous error messages when Tailscale running on Kubernetes does not have the right + permissions to perform actions against the tailscaled state Secret + +------------------------------------------------------------------- Old: ---- tailscale-1.66.1.tar.gz New: ---- tailscale-1.66.4.tar.gz ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ tailscale.spec ++++++ --- /var/tmp/diff_new_pack.uCAAGg/_old 2024-05-22 21:32:43.166511176 +0200 +++ /var/tmp/diff_new_pack.uCAAGg/_new 2024-05-22 21:32:43.170511323 +0200 @@ -17,7 +17,7 @@ Name: tailscale -Version: 1.66.1 +Version: 1.66.4 Release: 0 Summary: The easiest, most secure way to use WireGuard and 2FA License: BSD-3-Clause ++++++ _service ++++++ --- /var/tmp/diff_new_pack.uCAAGg/_old 2024-05-22 21:32:43.202512494 +0200 +++ /var/tmp/diff_new_pack.uCAAGg/_new 2024-05-22 21:32:43.206512639 +0200 @@ -3,18 +3,17 @@ <param name="url">https://github.com/tailscale/tailscale.git</param> <param name="scm">git</param> <param name="package-meta">yes</param> - <param name="revision">v1.66.1</param> + <param name="revision">v1.66.4</param> <param name="versionformat">@PARENT_TAG@</param> <param name="versionrewrite-pattern">v(.*)</param> <param name="changesgenerate">disable</param> </service> - <service name="set_version" mode="manual"> - </service> <service name="recompress" mode="manual"> <param name="file">*.tar</param> <param name="compression">gz</param> </service> <service name="go_modules" mode="manual"> </service> + <service name="set_version" mode="manual" /> </services> ++++++ tailscale-1.66.1.tar.gz -> tailscale-1.66.4.tar.gz ++++++ /work/SRC/openSUSE:Factory/tailscale/tailscale-1.66.1.tar.gz /work/SRC/openSUSE:Factory/.tailscale.new.1880/tailscale-1.66.4.tar.gz differ: char 12, line 1 ++++++ vendor.tar.gz ++++++ /work/SRC/openSUSE:Factory/tailscale/vendor.tar.gz /work/SRC/openSUSE:Factory/.tailscale.new.1880/vendor.tar.gz differ: char 5, line 1