Affected by GO-2022-1119
and 1 other vulnerabilities
GO-2022-1119 : Tailscale daemon is vulnerable to information disclosure via CSRF in tailscale.com
GO-2022-1120 : Tailscale Windows daemon is vulnerable to RCE via CSRF in tailscale.com
Discover Packages
tailscale.com
cmd
gitops-pusher
command
Version:
v1.32.0
Opens a new window with list of versions in this module.
Published: Oct 12, 2022
License: BSD-3-Clause
Opens a new window with license information.
Imports: 14
Opens a new window with list of imports.
Imported by: 0
Opens a new window with list of known importers.
README
README
¶
gitops-pusher
This is a small tool to help people achieve a
GitOps workflow with Tailscale ACL
changes. This tool is intended to be used in a CI flow that looks like this:
name: Tailscale ACL syncing
on:
push:
branches: [ "main" ]
pull_request:
branches: [ "main" ]
jobs:
acls:
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@v3
- name: Setup Go environment
uses: actions/setup-go@v3.2.0
- name: Install gitops-pusher
run: go install tailscale.com/cmd/gitops-pusher@latest
- name: Deploy ACL
if: github.event_name == 'push'
env:
TS_API_KEY: ${{ secrets.TS_API_KEY }}
TS_TAILNET: ${{ secrets.TS_TAILNET }}
run: |
~/go/bin/gitops-pusher --policy-file ./policy.hujson apply
- name: ACL tests
if: github.event_name == 'pull_request'
env:
TS_API_KEY: ${{ secrets.TS_API_KEY }}
TS_TAILNET: ${{ secrets.TS_TAILNET }}
run: |
~/go/bin/gitops-pusher --policy-file ./policy.hujson test
Change the value of the --policy-file
flag to point to the policy file on
disk. Policy files should be in HuJSON
format.
Expand ▾
Collapse ▴
Documentation
¶
Command gitops-pusher allows users to use a GitOps flow for managing Tailscale ACLs.
See README.md for more details.
Source Files
¶
Click to show internal directories.
Click to hide internal directories.