Mario Minardi

Results 29 comments of Mario Minardi

Gotcha, thank you for the confirmation Maciej! Will use the decorator in that case.

This is resolved as of #359 . A new [tailscale_dns_split_nameservers](https://registry.terraform.io/providers/tailscale/tailscale/latest/docs/resources/dns_split_nameservers) resource has been added as of the [v0.16.0 ](https://github.com/tailscale/terraform-provider-tailscale/releases/tag/v0.16.0)release.

@tomelliff that sounds good to me! Feel free to add us on the PR when it is ready.

Hey folks! Closing this out as the default version has been bumped a few times since this PR. New versions of the action also allow for specifying `latest` instead of...

Hey folks! This is available as of v0.24.0 of the provider using the [identity_token](https://registry.terraform.io/providers/tailscale/tailscale/latest/docs#identity_token-1) and [oauth_client_id](https://registry.terraform.io/providers/tailscale/tailscale/latest/docs#oauth_client_id-1) arguments. See https://tailscale.com/kb/1581/workload-identity-federation for more details on the setup required tailscale side.

Thanks for calling this out @hosom ! This should be addressed as of https://github.com/tailscale/tailscale-client-go/pull/112 (with https://github.com/tailscale/tailscale-client-go/pull/115 containing a follow-up bugfix). Our README for the v2 of the client has also...

Hey @artmakh ! Clarification on this behaviour from [our knowledge base](https://tailscale.com/kb/1215/oauth-clients#generating-long-lived-auth-keys): > When you create an OAuth client with the scope devices, you must select one or more [tags](https://tailscale.com/kb/1068/tags), which...

Hey folks! Closing this out as we have support for macOS and windows runners as of [v3.2.0 of the action](https://github.com/tailscale/github-action/releases/tag/v3.2.0). Feel free to open new issues if you encounter any...

Thank you for reporting this @kim-anchorzero! As a clarifying question: in your above example after applying the configuration the first time are you also [enabling / allowing the exit node...

Gotcha! This is definitely a rough / awkward edge with using auto approvers in the ACL in combination with the `tailscale_device_subnet_routes` resource as I think there is contention between the...