mirror of https://github.com/tailscale/tailscale/
build_docker.sh: add run.sh as an entrypoint to the docker image
Fixes #4071 Signed-off-by: Maisem Ali <maisem@tailscale.com>pull/4804/head
parent
bf2fa7b184
commit
3b55bf9306
@ -1,7 +0,0 @@
|
|||||||
# Copyright (c) 2021 Tailscale Inc & AUTHORS All rights reserved.
|
|
||||||
# Use of this source code is governed by a BSD-style
|
|
||||||
# license that can be found in the LICENSE file.
|
|
||||||
|
|
||||||
FROM ghcr.io/tailscale/tailscale:latest
|
|
||||||
COPY run.sh /run.sh
|
|
||||||
CMD "/run.sh"
|
|
@ -1,38 +1,28 @@
|
|||||||
# Copyright (c) 2021 Tailscale Inc & AUTHORS All rights reserved.
|
# Copyright (c) 2022 Tailscale Inc & AUTHORS All rights reserved.
|
||||||
# Use of this source code is governed by a BSD-style
|
# Use of this source code is governed by a BSD-style
|
||||||
# license that can be found in the LICENSE file.
|
# license that can be found in the LICENSE file.
|
||||||
|
|
||||||
ifndef IMAGE_TAG
|
|
||||||
$(error "IMAGE_TAG is not set")
|
|
||||||
endif
|
|
||||||
|
|
||||||
ROUTES ?= ""
|
ROUTES ?= ""
|
||||||
SA_NAME ?= tailscale
|
SA_NAME ?= tailscale
|
||||||
KUBE_SECRET ?= tailscale
|
KUBE_SECRET ?= tailscale
|
||||||
|
|
||||||
build:
|
|
||||||
@docker build . -t $(IMAGE_TAG)
|
|
||||||
|
|
||||||
push: build
|
|
||||||
@docker push $(IMAGE_TAG)
|
|
||||||
|
|
||||||
rbac:
|
rbac:
|
||||||
@sed -e "s;{{KUBE_SECRET}};$(KUBE_SECRET);g" role.yaml | kubectl apply -f -
|
@sed -e "s;{{TS_KUBE_SECRET}};$(TS_KUBE_SECRET);g" role.yaml | kubectl apply -f -
|
||||||
@sed -e "s;{{SA_NAME}};$(SA_NAME);g" rolebinding.yaml | kubectl apply -f -
|
@sed -e "s;{{SA_NAME}};$(SA_NAME);g" rolebinding.yaml | kubectl apply -f -
|
||||||
@sed -e "s;{{SA_NAME}};$(SA_NAME);g" sa.yaml | kubectl apply -f -
|
@sed -e "s;{{SA_NAME}};$(SA_NAME);g" sa.yaml | kubectl apply -f -
|
||||||
|
|
||||||
sidecar:
|
sidecar:
|
||||||
@kubectl delete -f sidecar.yaml --ignore-not-found --grace-period=0
|
@kubectl delete -f sidecar.yaml --ignore-not-found --grace-period=0
|
||||||
@sed -e "s;{{KUBE_SECRET}};$(KUBE_SECRET);g" sidecar.yaml | sed -e "s;{{SA_NAME}};$(SA_NAME);g" | sed -e "s;{{IMAGE_TAG}};$(IMAGE_TAG);g" | kubectl create -f-
|
@sed -e "s;{{TS_KUBE_SECRET}};$(TS_KUBE_SECRET);g" sidecar.yaml | sed -e "s;{{SA_NAME}};$(SA_NAME);g" | kubectl create -f-
|
||||||
|
|
||||||
userspace-sidecar:
|
userspace-sidecar:
|
||||||
@kubectl delete -f userspace-sidecar.yaml --ignore-not-found --grace-period=0
|
@kubectl delete -f userspace-sidecar.yaml --ignore-not-found --grace-period=0
|
||||||
@sed -e "s;{{KUBE_SECRET}};$(KUBE_SECRET);g" userspace-sidecar.yaml | sed -e "s;{{SA_NAME}};$(SA_NAME);g" | sed -e "s;{{IMAGE_TAG}};$(IMAGE_TAG);g" | kubectl create -f-
|
@sed -e "s;{{TS_KUBE_SECRET}};$(TS_KUBE_SECRET);g" userspace-sidecar.yaml | sed -e "s;{{SA_NAME}};$(SA_NAME);g" | kubectl create -f-
|
||||||
|
|
||||||
proxy:
|
proxy:
|
||||||
@kubectl delete -f proxy.yaml --ignore-not-found --grace-period=0
|
kubectl delete -f proxy.yaml --ignore-not-found --grace-period=0
|
||||||
@sed -e "s;{{KUBE_SECRET}};$(KUBE_SECRET);g" proxy.yaml | sed -e "s;{{SA_NAME}};$(SA_NAME);g" | sed -e "s;{{IMAGE_TAG}};$(IMAGE_TAG);g" | sed -e "s;{{DEST_IP}};$(DEST_IP);g" | kubectl create -f-
|
sed -e "s;{{TS_KUBE_SECRET}};$(TS_KUBE_SECRET);g" proxy.yaml | sed -e "s;{{SA_NAME}};$(SA_NAME);g" | sed -e "s;{{TS_DEST_IP}};$(TS_DEST_IP);g" | kubectl create -f-
|
||||||
|
|
||||||
subnet-router:
|
subnet-router:
|
||||||
@kubectl delete -f subnet.yaml --ignore-not-found --grace-period=0
|
@kubectl delete -f subnet.yaml --ignore-not-found --grace-period=0
|
||||||
@sed -e "s;{{KUBE_SECRET}};$(KUBE_SECRET);g" subnet.yaml | sed -e "s;{{SA_NAME}};$(SA_NAME);g" | sed -e "s;{{IMAGE_TAG}};$(IMAGE_TAG);g" | sed -e "s;{{ROUTES}};$(ROUTES);g" | kubectl create -f-
|
@sed -e "s;{{TS_KUBE_SECRET}};$(TS_KUBE_SECRET);g" subnet.yaml | sed -e "s;{{SA_NAME}};$(SA_NAME);g" | sed -e "s;{{TS_ROUTES}};$(TS_ROUTES);g" | kubectl create -f-
|
||||||
|
Loading…
Reference in New Issue