qusal/salt/sys-tailscale
2024-08-16 14:03:58 +02:00
..
files feat: add Tailscale formula 2024-07-05 16:35:32 +02:00
clone.sls feat: add Tailscale formula 2024-07-05 16:35:32 +02:00
clone.top feat: add Tailscale formula 2024-07-05 16:35:32 +02:00
create.sls fix: remove unimplemented policy creation 2024-07-07 15:19:20 +02:00
create.top feat: add Tailscale formula 2024-07-05 16:35:32 +02:00
init.top feat: add Tailscale formula 2024-07-05 16:35:32 +02:00
install-repo.sls feat: add Tailscale formula 2024-07-05 16:35:32 +02:00
install-repo.top feat: add Tailscale formula 2024-07-05 16:35:32 +02:00
install.sls fix: skip YUM weak dependencies installation 2024-08-16 14:03:58 +02:00
install.top feat: add Tailscale formula 2024-07-05 16:35:32 +02:00
README.md doc: interactive Tailscale login command 2024-07-05 17:00:00 +02:00
version feat: add Tailscale formula 2024-07-05 16:35:32 +02:00

sys-tailscale

Tailscale environment in Qubes OS.

Table of Contents

Description

Install Tailscale and use it on the "sys-tailscale" or with any other qube you want to install.

Installation

  • Top:
sudo qubesctl top.enable sys-tailscale
sudo qubesctl --targets=tpl-sys-tailscale state.apply
sudo qubesctl top.disable sys-tailscale
  • State:
sudo qubesctl state.apply sys-tailscale.create
sudo qubesctl --skip-dom0 --targets=tpl-sys-tailscale state.apply sys-tailscale.install

The Tailscale qube requires the Tailscale service to be enabled:

qvm-features QUBE service.tailscale 1

Usage

Authenticate to your Tailnet by following the upstream instructions to generate an auth key for use in automated setups. For interactive setups, get the authorization link from the following command:

sudo tailscale up

On the Tailscale web interface, authorize the new device.

You may want to disable automatic key expiry to avoid having to redo the authentication steps.

There are various functionalities Tailscale provides, consult upstream documentation for more information. There is also an introductory video covering the basics.