-
-
Notifications
You must be signed in to change notification settings - Fork 1.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Bug] "Could not get the create map update" #2073
Comments
I'm gettting these errors in the log for (some) of the existing clients:
|
It turns out that I made a change to the acls just before upgrading, and that causes the |
Specifcally, I spelled "acceept" incorrectly. It would be great if the ACL loader would do a sanity check on the contents. |
I think I had a similar problem. I had In addition to what @stblassitude mentioned, I think it would be great if the server would just ignore the ACL file, and notify the admin if the sanity check fails. |
Is this issue present in beta1 and some of the latest alphas? I'm gonna tag a new beta with some other fixes but won't be able to improve this until next week. |
It's definitely in -beta2, I'm not sure if it was in -beta1. |
Would be great if I could have a couple of minimal reproducible example acls and if you can test some other version! |
Both of the following ACLs trigger errors.
{
"acls": [
{ "action": "acceept", "src": ["testb"], "dst": ["testb:*"]},
]
}
{
"acls": [
{ "action": "accept", "src": ["testb"], "dst": ["testb"]},
]
}
Also, I don't have |
I think the main improvement would be to have an error message that mentions ACLs. And I'm happy to help test a newer version. I'm running the docker image. |
this commit aims to improve the feedback of "runtime" policy errors which would only manifest when the rules are compiled to filter rules with nodes. this change will in; file-based mode load the nodes from the db and try to compile the rules on start up and return an error if they would not work as intended. database-based mode prevent a new ACL being written to the database if it does not compile with the current set of node. Fixes juanfont#2073 Fixes juanfont#2044 Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com>
* validate policy against nodes, error if not valid this commit aims to improve the feedback of "runtime" policy errors which would only manifest when the rules are compiled to filter rules with nodes. this change will in; file-based mode load the nodes from the db and try to compile the rules on start up and return an error if they would not work as intended. database-based mode prevent a new ACL being written to the database if it does not compile with the current set of node. Fixes #2073 Fixes #2044 Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com> * ensure stderr can be used in err checks Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com> * test policy set validation Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com> * add new integration test to ghaction Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com> * add back defer for cli tst Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com> --------- Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com>
Is this a support request?
Is there an existing issue for this?
Current Behavior
When trying to register a node I get the following error from headscale:
ERR ../../../home/runner/work/headscale/headscale/hscontrol/poll.go:719 > Could not get the create map update error="invalid action" node=net.example.com node.id=1 omitPeers=false readOnly=false stream=true
The command I used:
tailscale up --login-server https://net.example.com --advertise-exit-node=true --hostname=net.example.com --accept-dns=true
However
headscale node ls
outputs:Expected Behavior
The node should register and connect to the tailnet (or headnet?) correctly
Steps To Reproduce
Unsure. Just try to register a node.
Environment
Runtime environment
Anything else?
I'm using caddy (version: 2.6.2) as a reverse proxy
The text was updated successfully, but these errors were encountered: