tailscale / tailscale

The easiest, most secure way to use WireGuard and 2FA.
https://tailscale.com
BSD 3-Clause "New" or "Revised" License
17.22k stars 1.31k forks source link

Auto-Update Failing: Fedora 40 #12150

Open shladek opened 4 weeks ago

shladek commented 4 weeks ago

What is the issue?

1.66.3 was released today , and I was trying to update it on a node that has auto-updates enabled. I went to the admin console and hit the "start update" button and received the notification that it was up and running.

Looking at the node in question I see from the journal:

May 15 20:53:39 appland tailscaled[623]: c2n: update command failed: exit status 1, output: Failed to start transient service unit: Connection reset by peer May 15 20:53:39 appland systemd[1]: tailscaled.service: Got notification message from PID 3462, but reception only permitted for main PID 623 May 15 20:53:39 appland systemd[1]: tailscaled.service: Got notification message from PID 3462, but reception only permitted for main PID 623 May 15 20:53:39 appland tailscaled[623]: c2n: running "systemd-run --wait --pipe --collect /usr/bin/tailscale update --yes" May 15 20:53:38 appland tailscaled[623]: c2n: GET /update received May 15 20:53:38 appland tailscaled[623]: c2n: POST /update received

The update doesn't complete and dnf update does show it as still available:

sudo dnf update tailscale

Last metadata expiration check: 0:14:44 ago on Wed 15 May 2024 10:12:07 PM EDT. Dependencies resolved.

Package Architecture Version Repository Size

Upgrading: tailscale aarch64 1.66.3-1 tailscale-stable 25 M

Transaction Summary

Upgrade 1 Package

Don't see a similar issue, so thought I'd raise this one.

Steps to reproduce

  1. See the upgrade available arrow in Admin Console
  2. Click start upgrade
  3. Upgrade says successful, but still doesn't apply the upgrade

Are there any recent changes that introduced the issue?

N/A

OS

Linux

OS version

Fedora 40

Tailscale version

1.66.1

Other software

This system runs nftables with a very basic firewall: sudo cat /etc/sysconfig/nftables.conf

This is our tailscale exit node firewall that will

reside in another location other than our own

don't trust anything coming in on the local network

that we haven't established

but always allow incoming tailscale connections

table inet firewall { chain incoming { type filter hook input priority 0; policy accept; ct state vmap { invalid : drop, established : accept, related : accept } iifname {end0, wlan0} drop } }

Bug report

BUG-4cdf818b0f9a73b8744cf16b6c8d23574f592b71d9cd3d1759d417d0dddac21d-20240516023044Z-2d19ef9f795e6ec1

shladek commented 15 hours ago

12442 makes this much much worse. I now have a node sitting remotely that I am no longer able to remote into nor update when the fix comes in.