Use LoadCredential secrets and DynamicUser for tailscalesd.
This commit is contained in:
parent
d5201b471b
commit
6870186009
5 changed files with 134 additions and 44 deletions
|
|
@ -75,6 +75,12 @@ Configuration values can be set using environment variables, or optionally loade
|
|||
- **tailnet** (`TAILSCALESD_TAILNET`): The Tailscale tailnet identifier (required).
|
||||
- **client_id** (`TAILSCALESD_CLIENT_ID`): The Tailscale oauth client id (required).
|
||||
- **client_secret** (`TAILSCALESD_CLIENT_SECRET`): The Tailscale oauth client secret (required).
|
||||
- File-based secret alternatives:
|
||||
- `TAILSCALESD_BEARER_TOKEN_FILE`
|
||||
- `TAILSCALESD_CLIENT_ID_FILE`
|
||||
- `TAILSCALESD_CLIENT_SECRET_FILE`
|
||||
|
||||
For systemd services, prefer `LoadCredential=` plus `%d` (runtime `CREDENTIALS_DIRECTORY`) and set `TAILSCALESD_*_FILE` values to files under `%d`.
|
||||
|
||||
#### Environment File
|
||||
|
||||
|
|
|
|||
Loading…
Add table
Add a link
Reference in a new issue