|
|
1 год назад | |
|---|---|---|
| .. | ||
| .gitignore | 898695e312 cmd/gitops-pusher: add etag cache file for the three version problem (#5124) | 3 лет назад |
| README.md | 3280c81c95 .github,cmd/gitops-pusher: update to checkout@v4 | 2 лет назад |
| cache.go | 71029cea2d all: update copyright and license headers | 3 лет назад |
| gitops-pusher.go | c0c4791ce7 cmd/gitops-pusher: ignore previous etag if local acls match control (#13068) | 1 год назад |
| gitops-pusher_test.go | 9ab70212f4 cmd/gitops-pusher: re-use existing types from acl package | 2 лет назад |
This is a small tool to help people achieve a GitOps workflow with Tailscale ACL changes. This tool is intended to be used in a CI flow that looks like this:
name: Tailscale ACL syncing
on:
push:
branches: [ "main" ]
pull_request:
branches: [ "main" ]
jobs:
acls:
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@v4
- name: Setup Go environment
uses: actions/[email protected]
- name: Install gitops-pusher
run: go install tailscale.com/cmd/gitops-pusher@latest
- name: Deploy ACL
if: github.event_name == 'push'
env:
TS_API_KEY: ${{ secrets.TS_API_KEY }}
TS_TAILNET: ${{ secrets.TS_TAILNET }}
run: |
~/go/bin/gitops-pusher --policy-file ./policy.hujson apply
- name: ACL tests
if: github.event_name == 'pull_request'
env:
TS_API_KEY: ${{ secrets.TS_API_KEY }}
TS_TAILNET: ${{ secrets.TS_TAILNET }}
run: |
~/go/bin/gitops-pusher --policy-file ./policy.hujson test
Change the value of the --policy-file flag to point to the policy file on
disk. Policy files should be in HuJSON
format.