blob: f85f7534333778f68435a01d9e96e3a67c8a4981 [file] [log] [blame]
Giorgi Lekveishvili4ec4c022024-08-17 15:09:24 +04001# apiVersion: v1
2# kind: PersistentVolumeClaim
3# metadata:
4# name: tailscale
5# namespace: {{ .Release.Namespace }}
6# annotations:
7# helm.sh/resource-policy: keep
8# spec:
9# accessModes:
10# - ReadWriteOnce
11# resources:
12# requests:
13# storage: 1Gi
14---
15apiVersion: headscale.dodo.cloud/v1
16kind: HeadscaleUser
17metadata:
18 name: {{ .Values.username }}
19 namespace: {{ .Release.Namespace }}
20spec:
21 headscaleAddress: {{ .Values.apiServer }}
22 name: {{ .Values.username }}
23 preAuthKey:
24 enabled: true
25 secretName: {{ .Values.preAuthKeySecret }}
26---
27apiVersion: apps/v1
28kind: Deployment
29metadata:
30 name: tailscale
31 namespace: {{ .Release.Namespace }}
32spec:
33 selector:
34 matchLabels:
35 app: tailscale
36 replicas: 1
37 template:
38 metadata:
39 labels:
40 app: tailscale
41 spec:
42 # volumes:
43 # - name: tailscale
44 # persistentVolumeClaim:
45 # claimName: tailscale
46 containers:
47 - name: tailscale
48 image: {{ .Values.image.repository }}:{{ .Values.image.tag }}
49 imagePullPolicy: {{ .Values.image.pullPolicy }}
50 securityContext:
51 privileged: true
52 capabilities:
53 add:
54 - NET_ADMIN
55 env:
56 - name: TS_KUBE_SECRET
57 value: {{ .Values.preAuthKeySecret }}
58 # - name: TS_STATE_DIR
59 # value: /tailscale-state
60 # - name: TS_AUTHKEY
61 # valueFrom:
62 # secretKeyRef:
63 # name: {{ .Values.preAuthKeySecret }}
64 # key: key
65 - name: TS_HOSTNAME
66 value: {{ .Values.hostname }}
Giorgi Lekveishviliefc43ea2024-09-09 19:11:41 +040067 {{- if .Values.ipSubnet }}
Giorgi Lekveishvili4ec4c022024-08-17 15:09:24 +040068 - name: TS_ROUTES
69 value: {{ .Values.ipSubnet }}
Giorgi Lekveishviliefc43ea2024-09-09 19:11:41 +040070 {{- end }}
Giorgi Lekveishvili4ec4c022024-08-17 15:09:24 +040071 - name: TS_EXTRA_ARGS
72 value: --login-server={{ .Values.loginServer }}
73 # volumeMounts:
74 # - name: tailscale
75 # mountPath: /tailscale-state
76---
77apiVersion: rbac.authorization.k8s.io/v1
78kind: Role
79metadata:
80 name: secrets
81 namespace: {{ .Release.Namespace }}
82rules:
83- apiGroups: [""]
84 resources: ["secrets"]
85 verbs: ["get", "watch", "list", "patch", "update"]
86---
87apiVersion: rbac.authorization.k8s.io/v1
88kind: RoleBinding
89metadata:
90 name: secrets
91 namespace: {{ .Release.Namespace }}
92subjects:
93- kind: ServiceAccount
94 name: default
95 namespace: {{ .Release.Namespace }}
96roleRef:
97 kind: Role
98 name: secrets
99 apiGroup: rbac.authorization.k8s.io