feat(issue-17): add Tailscale VPN setup for container remote access #21

Merged
shoko merged 2 commits from feat/issue-17-tailscale-setup into main 2026-03-30 08:29:57 +02:00
Owner

Summary

Implement Tailscale VPN setup for Issue #17 (Phase 1b of Issue #11).

Changes

  1. tailscale-setup.sh (skills/kugetsu/scripts/tailscale-setup.sh)

    • Multi-distro support (Debian/Ubuntu, Fedora)
    • Automatic OS detection and package installation
    • Systemd integration for tailscaled daemon
    • User choice: AUTHKEY or headless browser login
    • Configurable device name (defaults to hostname)
    • Verification steps after setup
  2. SKILL.md

    • Add Tailscale VPN section under Remote Access
    • Document benefits and setup commands
    • Link to full documentation
  3. docs/kugetsu-setup.md

    • Add Tailscale section (Remote Access via Tailscale)
    • Compare Tailscale vs port forwarding
    • Document authentication methods
    • Add post-setup usage examples
    • Include uninstall instructions

Why Tailscale?

  • No public IP required on host or container
  • Each container gets unique Tailscale IP
  • Access from anywhere across different networks
  • Normal internet access still preserved

Testing

Manual testing required:

  • Run tailscale-setup.sh in container with systemd
  • Verify AUTHKEY method works
  • Verify headless login method works
  • Connect from another Tailscale device
  • Test SSH over Tailscale network

Closes #17

## Summary Implement Tailscale VPN setup for Issue #17 (Phase 1b of Issue #11). ### Changes 1. **tailscale-setup.sh** (`skills/kugetsu/scripts/tailscale-setup.sh`) - Multi-distro support (Debian/Ubuntu, Fedora) - Automatic OS detection and package installation - Systemd integration for tailscaled daemon - User choice: AUTHKEY or headless browser login - Configurable device name (defaults to hostname) - Verification steps after setup 2. **SKILL.md** - Add Tailscale VPN section under Remote Access - Document benefits and setup commands - Link to full documentation 3. **docs/kugetsu-setup.md** - Add Tailscale section (Remote Access via Tailscale) - Compare Tailscale vs port forwarding - Document authentication methods - Add post-setup usage examples - Include uninstall instructions ### Why Tailscale? - No public IP required on host or container - Each container gets unique Tailscale IP - Access from anywhere across different networks - Normal internet access still preserved ### Testing Manual testing required: - [ ] Run tailscale-setup.sh in container with systemd - [ ] Verify AUTHKEY method works - [ ] Verify headless login method works - [ ] Connect from another Tailscale device - [ ] Test SSH over Tailscale network Closes #17
shoko added 1 commit 2026-03-30 07:14:40 +02:00
- Add tailscale-setup.sh:
  - Multi-distro support (Debian/Ubuntu, Fedora)
  - Automatic OS detection
  - Systemd integration for tailscaled daemon
  - User choice: AUTHKEY or headless browser login
  - Configurable device name (defaults to hostname)
  - Verification steps after setup

- Update SKILL.md:
  - Add Tailscale VPN section under Remote Access
  - Document benefits and setup commands
  - Link to full documentation

- Update docs/kugetsu-setup.md:
  - Add Tailscale section before Security Notes
  - Compare Tailscale vs port forwarding
  - Document authentication methods
  - Add post-setup usage examples
  - Include uninstall instructions
shoko added 1 commit 2026-03-30 08:21:49 +02:00
The Tailscale GPG key URL returns 404 on some systems. Creating
the repo file manually with gpgcheck=0 as a workaround.
han approved these changes 2026-03-30 08:24:24 +02:00
han left a comment
First-time contributor

lgtm

lgtm
shoko merged commit 4606c59ce8 into main 2026-03-30 08:29:57 +02:00
Sign in to join this conversation.