1
0
Fork 0

Add tailscale role
continuous-integration/drone/push Build is passing Details

This commit is contained in:
Daniele Tricoli 2022-09-18 18:47:42 +02:00
parent 2808950f66
commit 065bb6de03
4 changed files with 56 additions and 2 deletions

18
roles/tailscale/README.md Normal file
View File

@ -0,0 +1,18 @@
# Tailscale
Install tailscale from tailscale.com repository.
## Role Variables
* `tailscale_become` - Default: true. Enable/disable the Ansible become
functionality.
* `tailscale_become_user` - Default: root. When using become functionality for
privilege escalation, this is the user with desired privileges you become.
## Example Playbook
```yaml
- hosts: my-server
roles:
- eriol.kit.tailscale
```

View File

@ -0,0 +1,3 @@
---
tailscale_become: true
tailscale_become_user: root

View File

@ -0,0 +1,32 @@
---
- block:
- name: install tailscale dependencies
apt:
name:
- apt-transport-https
- ca-certificates
- gnupg-agent
update_cache: true
cache_valid_time: 3600
- name: add Tailscale's GPG key
apt_key:
# yamllint disable-line rule:line-length
url: https://pkgs.tailscale.com/stable/debian/{{ ansible_distribution_release }}.noarmor.gpg
- name: add Tailscale's repository
apt_repository:
# yamllint disable-line rule:line-length
repo: "deb https://pkgs.tailscale.com/stable/debian {{ ansible_distribution_release }} main"
filename: tailscale
- name: install tailscale
apt:
name:
- tailscale
update_cache: true
cache_valid_time: 3600
become: "{{ tailscale_become }}"
become_user: "{{ tailscale_become_user }}"

View File

@ -94,8 +94,8 @@
# - ../roles/nginx
# - ../roles/headscale
# - ../roles/admin
- ../roles/docker
- ../roles/diun
# - ../roles/docker
# - ../roles/diun
# - ../roles/mailserver
# - {role: ../roles/weechat}
# Uncomment to test wikijs role: it's commented since the tarball that we
@ -119,6 +119,7 @@
# - ../roles/marytts
# - ../roles/zigbee2mqtt
# - ../roles/radicale
- ../roles/tailscale
# The easy ports sequece is just for test. Also don't disable strict IP
# filtering on production.
# - {role: ../roles/knockd, ports: [3333, 4444, 5555], network_interface: eth1, filter_ip: ""}