-
-
Notifications
You must be signed in to change notification settings - Fork 1.9k
Closed
Labels
bugSomething isn't workingSomething isn't workingquestionFurther information is requestedFurther information is requested
Description
Is this a support request?
- This is not a support request
Is there an existing issue for this?
- I have searched the existing issues
Current Behavior
The issue #2863 seems to be present on version v0.27.1 with groups
We currently have a OIDC and we try to pre-assign group to users that are not already existing.
This make the group not work at all.
On this exemple, the users of the group:developer can not access to exit nodes because one of the user of the group is not already existing :
{
"acls": [
(...)
{
"action": "accept",
"src": [
"group:developer"
],
"dst": [
"autogroup:internet:*"
]
},
(...)
],
(...)
"groups": {
"group:developer": [
"xxx@xxx.com",
"xxx@xxx.com",
"xxx@xxx.com",
"xxx@xxx.com",
"xxx@xxx.com"
]
}
}
Expected Behavior
The group should work even if some users are not existing
Steps To Reproduce
Create group with users that are not already existing to the headscale and to a ACL rule with that group
Environment
docker image headscale/headscale:stable
headscale version v0.27.1+dirty
commit: f658a8eacd4d86edc65424b50635afed46ca4b2a
build time: 2025-11-11T19:17:02Z
built with: go1.25.1 linux/amd64
Tailscale version: 1.92.5Runtime environment
- Headscale is behind a (reverse) proxy
- Headscale runs in a container
Debug information
None
Reactions are currently unavailable
Metadata
Metadata
Assignees
Labels
bugSomething isn't workingSomething isn't workingquestionFurther information is requestedFurther information is requested