tailscale/cmd/gitops-pusher
Xe Iaso b14e31831a
cmd/gitops-pusher: standardize hujson before posting to validate (#5525)
Apparently the validate route doesn't check content-types or handle
hujson with comments correctly. This patch makes gitops-pusher convert
the hujson to normal json.

Signed-off-by: Xe <xe@tailscale.com>

Signed-off-by: Xe <xe@tailscale.com>
(cherry picked from commit 3564fd61b5)
2022-09-01 14:57:46 -07:00
..
.gitignore cmd/gitops-pusher: add etag cache file for the three version problem (#5124) 2022-07-22 15:07:38 -04:00
cache.go cmd/gitops-pusher: add etag cache file for the three version problem (#5124) 2022-07-22 15:07:38 -04:00
gitops-pusher.go cmd/gitops-pusher: standardize hujson before posting to validate (#5525) 2022-09-01 14:57:46 -07:00
README.md cmd/gitops-pusher: add new GitOps assistant (#4893) 2022-06-21 16:04:48 -04:00

gitops-pusher

This is a small tool to help people achieve a GitOps workflow with Tailscale ACL changes. This tool is intended to be used in a CI flow that looks like this:

name: Tailscale ACL syncing

on:
  push:
    branches: [ "main" ]
  pull_request:
    branches: [ "main" ]

jobs:
  acls:
    runs-on: ubuntu-latest

    steps:
      - uses: actions/checkout@v3
      
      - name: Setup Go environment
        uses: actions/setup-go@v3.2.0
        
      - name: Install gitops-pusher
        run: go install tailscale.com/cmd/gitops-pusher@latest
              
      - name: Deploy ACL
        if: github.event_name == 'push'
        env:
          TS_API_KEY: ${{ secrets.TS_API_KEY }}
          TS_TAILNET: ${{ secrets.TS_TAILNET }}
        run: |
          ~/go/bin/gitops-pusher --policy-file ./policy.hujson apply          

      - name: ACL tests
        if: github.event_name == 'pull_request'
        env:
          TS_API_KEY: ${{ secrets.TS_API_KEY }}
          TS_TAILNET: ${{ secrets.TS_TAILNET }}
        run: |
          ~/go/bin/gitops-pusher --policy-file ./policy.hujson test          

Change the value of the --policy-file flag to point to the policy file on disk. Policy files should be in HuJSON format.