tailscale-dev / docker-mod

The home for our universal Docker mod
BSD 3-Clause "New" or "Revised" License
58 stars 27 forks source link

Allow the configuration of an exit node and lan access. #8

Open Linuturk opened 1 year ago

tylersmalley commented 11 months ago

Thanks for the PR and apologies for the delay on this; reviewing now.

LimeDrive commented 10 months ago

I’ve been trying the same base on this PR and struggling with it, Tailscale run in an userspace networking in the container, main application must use socks5 or HTTP proxy to connect truth the exit node. An dirty workaround following this docs : https://tailscale.com/kb/1112/userspace-networking/ for me was to add :

fi

Linuturk commented 10 months ago

@LimeDrive thanks for sharing. Based on your work it sounds like my PR might not even be appropriate.

klutchell commented 10 months ago

@LimeDrive do you have a fork where I can try out your changes? Did you find that the proxy settings were always required for exit node use, or only when limited to userspace networking?

LimeDrive commented 9 months ago

@LimeDrive do you have a fork where I can try out your changes? Did you find that the proxy settings were always required for exit node use, or only when limited to userspace networking?

That was the fork I used for testing: https://github.com/LimeDrive/tailscale-mod/pkgs/container/tailscale-mod/131781718?tag=main still dirty code for testing propose.

Proxy settings should only be added with user space networking on init of the mod. If you mount /dev/tun in your container, the Tailscale daemon will launch without, but it might interfere with your system i gess.

I gave up after testing mod with an exit node and found it more efficient to share the container VPN network with Docker for this kind of setup.