2022-06-06 19:43:23 +00:00
|
|
|
# Copyright (c) 2022 Tailscale Inc & AUTHORS All rights reserved.
|
2021-10-12 21:24:07 +00:00
|
|
|
# Use of this source code is governed by a BSD-style
|
|
|
|
# license that can be found in the LICENSE file.
|
|
|
|
apiVersion: v1
|
|
|
|
kind: Pod
|
|
|
|
metadata:
|
|
|
|
name: proxy
|
|
|
|
spec:
|
|
|
|
serviceAccountName: "{{SA_NAME}}"
|
|
|
|
initContainers:
|
|
|
|
# In order to run as a proxy we need to enable IP Forwarding inside
|
|
|
|
# the container. The `net.ipv4.ip_forward` sysctl is not whitelisted
|
|
|
|
# in Kubelet by default.
|
|
|
|
- name: sysctler
|
|
|
|
image: busybox
|
|
|
|
securityContext:
|
|
|
|
privileged: true
|
|
|
|
command: ["/bin/sh"]
|
|
|
|
args:
|
|
|
|
- -c
|
2022-08-28 04:55:12 +00:00
|
|
|
- sysctl -w net.ipv4.ip_forward=1 -w net.ipv6.conf.all.forwarding=1
|
2021-10-12 21:24:07 +00:00
|
|
|
resources:
|
|
|
|
requests:
|
|
|
|
cpu: 1m
|
|
|
|
memory: 1Mi
|
|
|
|
containers:
|
|
|
|
- name: tailscale
|
|
|
|
imagePullPolicy: Always
|
2022-06-06 19:43:23 +00:00
|
|
|
image: "ghcr.io/tailscale/tailscale:latest"
|
2021-10-12 21:24:07 +00:00
|
|
|
env:
|
|
|
|
# Store the state in a k8s secret
|
2022-06-06 19:43:23 +00:00
|
|
|
- name: TS_KUBE_SECRET
|
|
|
|
value: "{{TS_KUBE_SECRET}}"
|
|
|
|
- name: TS_USERSPACE
|
2021-10-12 21:24:07 +00:00
|
|
|
value: "false"
|
2022-06-06 19:43:23 +00:00
|
|
|
- name: TS_AUTH_KEY
|
2021-10-12 21:24:07 +00:00
|
|
|
valueFrom:
|
|
|
|
secretKeyRef:
|
|
|
|
name: tailscale-auth
|
2022-09-22 03:20:02 +00:00
|
|
|
key: TS_AUTH_KEY
|
2021-10-12 21:24:07 +00:00
|
|
|
optional: true
|
2022-06-06 19:43:23 +00:00
|
|
|
- name: TS_DEST_IP
|
|
|
|
value: "{{TS_DEST_IP}}"
|
2021-10-12 21:24:07 +00:00
|
|
|
securityContext:
|
|
|
|
capabilities:
|
|
|
|
add:
|
|
|
|
- NET_ADMIN
|