⬆️ Updating add-on Tailscale to d6d8a51

This commit is contained in:
Community Hass.io Add-ons Bot 2024-01-07 18:52:49 +00:00
parent 475d5cfb0d
commit 6b07ba5f73
6 changed files with 29 additions and 10 deletions

View file

@ -870,10 +870,10 @@ SOFTWARE.
[vscode-armhf-shield]: https://img.shields.io/badge/armhf-no-red.svg [vscode-armhf-shield]: https://img.shields.io/badge/armhf-no-red.svg
[vscode-armv7-shield]: https://img.shields.io/badge/armv7-no-red.svg [vscode-armv7-shield]: https://img.shields.io/badge/armv7-no-red.svg
[vscode-i386-shield]: https://img.shields.io/badge/i386-no-red.svg [vscode-i386-shield]: https://img.shields.io/badge/i386-no-red.svg
[addon-tailscale]: https://github.com/hassio-addons/addon-tailscale/tree/d5c20db [addon-tailscale]: https://github.com/hassio-addons/addon-tailscale/tree/d6d8a51
[addon-doc-tailscale]: https://github.com/hassio-addons/addon-tailscale/blob/d5c20db/README.md [addon-doc-tailscale]: https://github.com/hassio-addons/addon-tailscale/blob/d6d8a51/README.md
[tailscale-issue]: https://github.com/hassio-addons/addon-tailscale/issues [tailscale-issue]: https://github.com/hassio-addons/addon-tailscale/issues
[tailscale-version-shield]: https://img.shields.io/badge/version-d5c20db-blue.svg [tailscale-version-shield]: https://img.shields.io/badge/version-d6d8a51-blue.svg
[tailscale-aarch64-shield]: https://img.shields.io/badge/aarch64-yes-green.svg [tailscale-aarch64-shield]: https://img.shields.io/badge/aarch64-yes-green.svg
[tailscale-amd64-shield]: https://img.shields.io/badge/amd64-yes-green.svg [tailscale-amd64-shield]: https://img.shields.io/badge/amd64-yes-green.svg
[tailscale-armhf-shield]: https://img.shields.io/badge/armhf-no-red.svg [tailscale-armhf-shield]: https://img.shields.io/badge/armhf-no-red.svg

View file

@ -1,4 +1,5 @@
# Changelog since v0.13.1 # Changelog since v0.13.1
- Make Proxy and Funnel port configurable (#277)
- Use new tailscale cli arguments and merge proxy and funnel into longrun serve service (#306) - Use new tailscale cli arguments and merge proxy and funnel into longrun serve service (#306)
Co-authored-by: lmagyar <lmagyar@users.noreply.github.com> Co-authored-by: lmagyar <lmagyar@users.noreply.github.com>

View file

@ -67,6 +67,7 @@ funnel: false
log_level: info log_level: info
login_server: "https://controlplane.tailscale.com" login_server: "https://controlplane.tailscale.com"
proxy: false proxy: false
proxy_and_funnel_port: 443
snat_subnet_routes: true snat_subnet_routes: true
tags: tags:
- tag:example - tag:example
@ -158,9 +159,9 @@ More information: [Tailscale Funnel][tailscale_info_funnel]
**Note**: _After initial setup, it can take up to 10 minutes for the domain to **Note**: _After initial setup, it can take up to 10 minutes for the domain to
be publicly available._ be publicly available._
**Note:** _You should not use any port number in the URL that you used **Note:** _You should not use the port number in the URL that you used
previously to access Home Assistant. Tailscale Funnel works on the default HTTPS previously to access Home Assistant. Tailscale Funnel works on the default HTTPS
port 443._ port 443 (or the port configured in option `proxy_and_funnel_port`)._
**Note:** _If you encounter strange browser behaviour or strange error messages, **Note:** _If you encounter strange browser behaviour or strange error messages,
try to clear all site related cookies, clear all browser cache, restart browser._ try to clear all site related cookies, clear all browser cache, restart browser._
@ -234,9 +235,19 @@ More information: [Enabling HTTPS][tailscale_info_https]
1. Restart the add-on. 1. Restart the add-on.
**Note:** _You should not use any port number in the URL that you used **Note:** _You should not use the port number in the URL that you used
previously to access Home Assistant. Tailscale Proxy works on the default HTTPS previously to access Home Assistant. Tailscale Proxy works on the default HTTPS
port 443._ port 443 (or the port configured in option `proxy_and_funnel_port`)._
### Option: `proxy_and_funnel_port`
This option allows you to configure the port the Tailscale Proxy and Funnel
features are accessible on the tailnet (in case of Tailscale Proxy is enabled)
and optionally on the internet (in case of Tailscale Funnel is also enabled).
Only port number 443, 8443 and 10000 is allowed by Tailscale.
When not set, port number 443 is used by default.
### Option: `snat_subnet_routes` ### Option: `snat_subnet_routes`

View file

@ -48,5 +48,5 @@ If you are more interested in stable releases of our add-ons:
[patreon-shield]: https://frenck.dev/wp-content/uploads/2019/12/patreon.png [patreon-shield]: https://frenck.dev/wp-content/uploads/2019/12/patreon.png
[patreon]: https://www.patreon.com/frenck [patreon]: https://www.patreon.com/frenck
[project-stage-shield]: https://img.shields.io/badge/project%20stage-experimental-yellow.svg [project-stage-shield]: https://img.shields.io/badge/project%20stage-experimental-yellow.svg
[release-shield]: https://img.shields.io/badge/version-d5c20db-blue.svg [release-shield]: https://img.shields.io/badge/version-d6d8a51-blue.svg
[release]: https://github.com/hassio-addons/addon-tailscale/tree/d5c20db [release]: https://github.com/hassio-addons/addon-tailscale/tree/d6d8a51

View file

@ -1,5 +1,5 @@
name: Tailscale name: Tailscale
version: d5c20db version: d6d8a51
slug: tailscale slug: tailscale
description: Zero config VPN for building secure networks description: Zero config VPN for building secure networks
url: https://github.com/hassio-addons/addon-tailscale url: https://github.com/hassio-addons/addon-tailscale
@ -34,6 +34,7 @@ schema:
log_level: list(trace|debug|info|notice|warning|error|fatal)? log_level: list(trace|debug|info|notice|warning|error|fatal)?
login_server: url? login_server: url?
proxy: bool? proxy: bool?
proxy_and_funnel_port: list(443|8443|10000)?
snat_subnet_routes: bool? snat_subnet_routes: bool?
tags: tags:
- match(^tag:[a-zA-Z0-9]-?[a-zA-Z0-9]+$)? - match(^tag:[a-zA-Z0-9]-?[a-zA-Z0-9]+$)?

View file

@ -50,6 +50,12 @@ configuration:
This option allows you to enable Tailscale's Proxy feature to present your This option allows you to enable Tailscale's Proxy feature to present your
Home Assistant instance on your tailnet with a valid certificate. Home Assistant instance on your tailnet with a valid certificate.
When not set, this option is disabled by default. When not set, this option is disabled by default.
proxy_and_funnel_port:
name: Tailscale Proxy and Funnel port
description: >-
This option allows you to configure the port the Tailscale Proxy and Funnel
features are accessible on.
Only port number 443, 8443 and 10000 is allowed by Tailscale.
snat_subnet_routes: snat_subnet_routes:
name: Source NAT subnet routes name: Source NAT subnet routes
description: >- description: >-