Skip to content

Apply nine customizations#18

Merged
thirdeyenick merged 20 commits intomainfrom
bring-back-commits
Jul 8, 2025
Merged

Apply nine customizations#18
thirdeyenick merged 20 commits intomainfrom
bring-back-commits

Conversation

@thirdeyenick
Copy link

@thirdeyenick thirdeyenick commented Jul 7, 2025

This applies our customizations on top of the current tailscale repository. There is no need to pass the controlURL via env variable as this was already added upstream.

Davor Gajic and others added 19 commits July 7, 2025 16:47
This allows for a custom domain in the k8s-nameserver application. It can be set via an argument to the binary and will default to ts.net if not set.
This allows to deploy a dnsConfig resource via the helm chart.
This allows to customize the nameserver deployment via the DNSConfig CRD. It allows to set the command, environment variables and pod labels.
This allows to customize the FQDN validation of tailscale services.
When comparing the node names to the received network peer map in "containerboot", it might be that network peers have no final dot appended to their FQDN. In that case, the operator should also not add a final dot to the FQDN. With the help of the OPERATOR_NO_FQDN_DOT_APPEND env variable this can be achieved and there will be no dot added to the content of the TS_TAILNET_TARGET_FQDN env variable which is read by "containerboot".
This adds an argument for the k8s-nameserver to watch and read the
dnsrecods configMap directly. As the default way of mount propagating
the dnsrecords might take some time to sync when the configMap updates,
reading and watching the configMap directly should reduce this time.
This fixes the referenced role in the nameserver service account role binding
It seems windows tests need a big github runner which we do not have
currently. vm tests seem to need higher privileges and are disabled by
default on third party repos (forks), so ee therefore disable these
tests.
@thirdeyenick thirdeyenick merged commit ca43002 into main Jul 8, 2025
54 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Development

Successfully merging this pull request may close these issues.

2 participants