ilia 83a5d988af
Some checks failed
CI / lint-and-test (pull_request) Successful in 58s
CI / ansible-validation (pull_request) Successful in 2m17s
CI / secret-scanning (pull_request) Successful in 53s
CI / dependency-scan (pull_request) Successful in 57s
CI / sast-scan (pull_request) Successful in 2m17s
CI / license-check (pull_request) Successful in 55s
CI / vault-check (pull_request) Successful in 2m20s
CI / playbook-test (pull_request) Successful in 2m16s
CI / container-scan (pull_request) Successful in 1m25s
CI / sonar-analysis (pull_request) Failing after 1m56s
CI / workflow-summary (pull_request) Successful in 50s
Fix: Update ansible-lint configuration to exclude specific paths and skip certain rules for improved linting flexibility
2025-12-14 21:04:45 -05:00
..

Role: tailscale

Description

Installs and configures Tailscale VPN mesh networking for secure connectivity across all managed hosts.

Requirements

  • Ansible 2.9+
  • Debian/Ubuntu/Alpine Linux
  • Tailscale account and auth key
  • Internet connectivity

Features

  • Cross-platform support (Debian, Ubuntu, Alpine)
  • Automatic OS detection and package installation
  • Secure auth key management via vault
  • Configurable network settings
  • SSH over Tailscale support

Variables

Variable Default Description
tailscale_auth_key {{ vault_tailscale_auth_key }} Auth key from vault
tailscale_hostname {{ inventory_hostname }} Custom hostname
tailscale_accept_routes true Accept subnet routes
tailscale_accept_dns true Accept DNS settings
tailscale_ssh true Enable SSH server
tailscale_shields_up false Block incoming connections

Vault Variables (Required)

Variable Description
vault_tailscale_auth_key Tailscale authentication key

Dependencies

  • Valid Tailscale account
  • Auth key stored in Ansible vault

Example Playbook

- hosts: all
  roles:
    - role: tailscale
      tailscale_accept_routes: false

Tags

  • tailscale: All Tailscale tasks
  • vpn: VPN configuration
  • network: Network setup

Supported Platforms

  • Debian: bullseye, bookworm, trixie
  • Ubuntu: focal, jammy, noble
  • Alpine: all versions

Notes

  • Requires Tailscale auth key in vault
  • Machines need approval in Tailscale admin console
  • Supports both reusable and ephemeral keys
  • Automatic logout/re-auth on key changes