{"payload":{"feedbackUrl":"https://github.com/orgs/community/discussions/53140","repo":{"id":237523442,"defaultBranch":"main","name":"tailscale","ownerLogin":"tailscale","currentUserCanPush":false,"isFork":false,"isEmpty":false,"createdAt":"2020-01-31T22:00:03.000Z","ownerAvatar":"https://avatars.githubusercontent.com/u/48932923?v=4","public":true,"private":false,"isOrgOwned":true},"refInfo":{"name":"","listCacheKey":"v0:1717212815.0","currentOid":""},"activityList":{"items":[{"before":"9dcf56726e6b6e7b1631976a269d77675abc3edb","after":"c727dcdc7ec45c3803f68cb648c0df8c82cf3f5a","ref":"refs/heads/adrian/suggest-test-cleanup","pushedAt":"2024-06-01T04:16:53.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"sailorfrag","name":"Adrian Dewhurst","path":"/sailorfrag","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/70300501?s=80&v=4"},"commit":{"message":"ipn/ipnlocal: simplify suggest exit node tests\n\nThis mostly removes a lot of repetition by predefining some nodes and\nother data structures, plus adds some helpers for creating Peer entries\nin the netmap. Several existing test cases were reworked to ensure\nbetter coverage of edge cases, and several new test cases were added to\nhandle some additional responsibility that is in (or will be shortly\nmoving in) suggestExitNode().\n\nUpdates tailscale/corp#19681\n\nChange-Id: Ie14c2988d7fd482f7d6a877f78525f7788669b85\nSigned-off-by: Adrian Dewhurst ","shortMessageHtmlLink":"ipn/ipnlocal: simplify suggest exit node tests"}},{"before":null,"after":"9dcf56726e6b6e7b1631976a269d77675abc3edb","ref":"refs/heads/adrian/suggest-test-cleanup","pushedAt":"2024-06-01T03:33:35.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"sailorfrag","name":"Adrian Dewhurst","path":"/sailorfrag","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/70300501?s=80&v=4"},"commit":{"message":"ipn/ipnlocal: simplify suggest exit node tests\n\nThis mostly removes a lot of repetition by predefining some nodes and\nother data structures, plus adds some helpers for creating Peer entries\nin the netmap. Several existing test cases were reworked to ensure\nbetter coverage of edge cases, and several new test cases were added to\nhandle some additional responsibility that is in (or will be shortly\nmoving in) suggestExitNode().\n\nUpdates tailscale/corp#19681\n\nChange-Id: Ie14c2988d7fd482f7d6a877f78525f7788669b85\nSigned-off-by: Adrian Dewhurst ","shortMessageHtmlLink":"ipn/ipnlocal: simplify suggest exit node tests"}},{"before":"dcdbbc2b486f1a3295568cfcbd1f7ded1b70494f","after":"a4c9354a933c8bcff7c741adec9b75d00dde367b","ref":"refs/heads/maisem/appc2","pushedAt":"2024-06-01T00:51:12.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"maisem","name":"Maisem Ali","path":"/maisem","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/3953239?s=80&v=4"},"commit":{"message":"cmd/natc: initial implementation of a NAT based connector\n\nThis adds a new prototype `cmd/natc` which can be used\nto expose a services/domains to the tailnet.\n\nIt requires the user to specify a set of IPv4 prefixes\nfrom the CGNAT range. It advertises these as normal subnet\nroutes. It listens for DNS on the first IP of the first range\nprovided to it.\n\nWhen it gets a DNS query it allocates an IP for that domain\nfrom the v4 range. Subsequent connections to the assigned IP\nare then tcp proxied to the domain.\n\nIt is marked as a WIP prototype and requires the use of the\n`TAILSCALE_USE_WIP_CODE` env var.\n\nUpdates tailscale/corp#20503\n\nSigned-off-by: Maisem Ali ","shortMessageHtmlLink":"cmd/natc: initial implementation of a NAT based connector"}},{"before":"12b7db2d99762552223d9648aa8df0e3fe3dbd53","after":"dcdbbc2b486f1a3295568cfcbd1f7ded1b70494f","ref":"refs/heads/maisem/appc2","pushedAt":"2024-06-01T00:49:09.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"maisem","name":"Maisem Ali","path":"/maisem","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/3953239?s=80&v=4"},"commit":{"message":"cmd/natc: initial implementation of a NAT based connector\n\nThis adds a new prototype `cmd/natc` which can be used\nto expose a services/domains to the tailnet.\n\nIt requires the user to specify a set of IPv4 prefixes\nfrom the CGNAT range. It advertises these as normal subnet\nroutes. It listens for DNS on the first IP of the first range\nprovided to it.\n\nWhen it gets a DNS query it allocates an IP for that domain\nfrom the v4 range. Subsequent connections to the assigned IP\nare then tcp proxied to the domain.\n\nIt is marked as a WIP prototype and requires the use of the\n`TAILSCALE_USE_WIP_CODE` env var.\n\nUpdates tailscale/corp#20503\n\nSigned-off-by: Maisem Ali ","shortMessageHtmlLink":"cmd/natc: initial implementation of a NAT based connector"}},{"before":"0b0e9a9a3ece29819399c739d271ab248aa19770","after":"12b7db2d99762552223d9648aa8df0e3fe3dbd53","ref":"refs/heads/maisem/appc2","pushedAt":"2024-06-01T00:46:12.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"maisem","name":"Maisem Ali","path":"/maisem","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/3953239?s=80&v=4"},"commit":{"message":"cmd/natc: initial implementation of a NAT based connector\n\nThis adds a new prototype `cmd/natc` which can be used\nto expose a services/domains to the tailnet.\n\nIt requires the user to specify a set of IPv4 prefixes\nfrom the CGNAT range. It advertises these as normal subnet\nroutes. It listens for DNS on the first IP of the first range\nprovided to it.\n\nWhen it gets a DNS query it allocates an IP for that domain\nfrom the v4 range. Subsequent connections to the assigned IP\nare then tcp proxied to the domain.\n\nUpdates tailscale/corp#20503\n\nSigned-off-by: Maisem Ali ","shortMessageHtmlLink":"cmd/natc: initial implementation of a NAT based connector"}},{"before":"f961e335aa7277cc80bf71a9fd6bba425d4b61b4","after":null,"ref":"refs/heads/awly/clientupdate-outdated-alpine-release","pushedAt":"2024-05-31T22:34:44.000Z","pushType":"branch_deletion","commitsCount":0,"pusher":{"login":"awly","name":"Andrew Lytvynov","path":"/awly","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/1146263?s=80&v=4"}},{"before":"c2a4719e9eed1641b7743b384feb13d54416b097","after":"bcb55fdeb6d128e7532774bb868315bc92375949","ref":"refs/heads/main","pushedAt":"2024-05-31T22:34:43.000Z","pushType":"pr_merge","commitsCount":1,"pusher":{"login":"awly","name":"Andrew Lytvynov","path":"/awly","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/1146263?s=80&v=4"},"commit":{"message":"clientupdate: mention when Alpine system upgrade is needed (#12306)\n\nAlpine APK repos are versioned, and contain different package sets.\r\nOlder APK releases and repos don't have the latest tailscale package.\r\nWhen we report \"no update available\", check whether pkgs.tailscale.com\r\nhas a newer tarball release. If it does, it's possible that the system\r\nis on an older Alpine release. Print additional messages to suggest the\r\nuser to upgrade their OS.\r\n\r\nFixes #11309\r\n\r\nSigned-off-by: Andrew Lytvynov ","shortMessageHtmlLink":"clientupdate: mention when Alpine system upgrade is needed (#12306)"}},{"before":null,"after":"c283eb318ecf5baf14aa9dba731f915614eeabf3","ref":"refs/heads/adrian/allowed-suggestion-empty","pushedAt":"2024-05-31T22:32:46.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"sailorfrag","name":"Adrian Dewhurst","path":"/sailorfrag","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/70300501?s=80&v=4"},"commit":{"message":"ipn/ipnlocal: clean up last suggestion and allowed policy\n\nChange-Id: I94ecc9a0d1b622de3df4ef90523f1d3e67b4bfba","shortMessageHtmlLink":"ipn/ipnlocal: clean up last suggestion and allowed policy"}},{"before":"20e3119dbda872deadc3fbe2cd2aeba485b8ae95","after":null,"ref":"refs/heads/irbekrm/cherry_stateful","pushedAt":"2024-05-31T22:27:53.000Z","pushType":"branch_deletion","commitsCount":0,"pusher":{"login":"irbekrm","name":"Irbe Krumina","path":"/irbekrm","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/24879183?s=80&v=4"}},{"before":"e64efe4f777cb5b4d9efd603ad1360a509006cd1","after":"dff1de72641f85ac7365a9489ca789f947299689","ref":"refs/heads/release-branch/1.66","pushedAt":"2024-05-31T22:27:52.000Z","pushType":"pr_merge","commitsCount":1,"pusher":{"login":"irbekrm","name":"Irbe Krumina","path":"/irbekrm","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/24879183?s=80&v=4"},"commit":{"message":"cmd/tailscale/cli: allow 'tailscale up' to succeed if --stateful-filtering is not explicitly set on linux (#12312) (#12314)\n\nThis fixes an issue where, on containerized environments an upgrade\r\n1.66.3 -> 1.66.4 failed with default containerboot configuration.\r\nThis was because containerboot by default runs 'tailscale up'\r\nthat requires all previously set flags to be explicitly provided\r\non subsequent runs and we explicitly set --stateful-filtering\r\nto true on 1.66.3, removed that settingon 1.66.4.\r\n\r\nUpdates tailscale/tailscale#12307\r\n\r\nSigned-off-by: Irbe Krumina \r\nCo-authored-by: Andrew Lytvynov \r\n(cherry picked from commit c2a4719e9eed1641b7743b384feb13d54416b097)","shortMessageHtmlLink":"cmd/tailscale/cli: allow 'tailscale up' to succeed if --stateful-filt…"}},{"before":"7403bbead7c5a7c4ce8f5dba14e48bff4ba40a5b","after":"f961e335aa7277cc80bf71a9fd6bba425d4b61b4","ref":"refs/heads/awly/clientupdate-outdated-alpine-release","pushedAt":"2024-05-31T22:26:57.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"awly","name":"Andrew Lytvynov","path":"/awly","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/1146263?s=80&v=4"},"commit":{"message":"clientupdate: mention when Alpine system upgrade is needed\n\nAlpine APK repos are versioned, and contain different package sets.\nOlder APK releases and repos don't have the latest tailscale package.\nWhen we report \"no update available\", check whether pkgs.tailscale.com\nhas a newer tarball release. If it does, it's possible that the system\nis on an older Alpine release. Print additional messages to suggest the\nuser to upgrade their OS.\n\nFixes #11309\n\nSigned-off-by: Andrew Lytvynov ","shortMessageHtmlLink":"clientupdate: mention when Alpine system upgrade is needed"}},{"before":null,"after":"20e3119dbda872deadc3fbe2cd2aeba485b8ae95","ref":"refs/heads/irbekrm/cherry_stateful","pushedAt":"2024-05-31T21:48:48.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"irbekrm","name":"Irbe Krumina","path":"/irbekrm","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/24879183?s=80&v=4"},"commit":{"message":"cmd/tailscale/cli: allow 'tailscale up' to succeed if --stateful-filtering is not explicitly set on linux (#12312)\n\nThis fixes an issue where, on containerized environments an upgrade\n1.66.3 -> 1.66.4 failed with default containerboot configuration.\nThis was because containerboot by default runs 'tailscale up'\nthat requires all previously set flags to be explicitly provided\non subsequent runs and we explicitly set --stateful-filtering\nto true on 1.66.3, removed that settingon 1.66.4.\n\nUpdates tailscale/tailscale#12307\n\nSigned-off-by: Irbe Krumina \nCo-authored-by: Andrew Lytvynov \n(cherry picked from commit c2a4719e9eed1641b7743b384feb13d54416b097)","shortMessageHtmlLink":"cmd/tailscale/cli: allow 'tailscale up' to succeed if --stateful-filt…"}},{"before":"32456774dc2f89b5f6eade1aeb8d0a1cd4de4881","after":null,"ref":"refs/heads/irbekrm/dont_error_on_stateful_filter","pushedAt":"2024-05-31T21:42:33.000Z","pushType":"branch_deletion","commitsCount":0,"pusher":{"login":"irbekrm","name":"Irbe Krumina","path":"/irbekrm","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/24879183?s=80&v=4"}},{"before":"36d0ac6f8e7ecb1f4991f97c06d3d519a481cf42","after":"c2a4719e9eed1641b7743b384feb13d54416b097","ref":"refs/heads/main","pushedAt":"2024-05-31T21:42:32.000Z","pushType":"pr_merge","commitsCount":1,"pusher":{"login":"irbekrm","name":"Irbe Krumina","path":"/irbekrm","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/24879183?s=80&v=4"},"commit":{"message":"cmd/tailscale/cli: allow 'tailscale up' to succeed if --stateful-filtering is not explicitly set on linux (#12312)\n\nThis fixes an issue where, on containerized environments an upgrade\r\n1.66.3 -> 1.66.4 failed with default containerboot configuration.\r\nThis was because containerboot by default runs 'tailscale up'\r\nthat requires all previously set flags to be explicitly provided\r\non subsequent runs and we explicitly set --stateful-filtering\r\nto true on 1.66.3, removed that settingon 1.66.4.\r\n\r\nUpdates tailscale/tailscale#12307\r\n\r\nSigned-off-by: Irbe Krumina \r\nCo-authored-by: Andrew Lytvynov ","shortMessageHtmlLink":"cmd/tailscale/cli: allow 'tailscale up' to succeed if --stateful-filt…"}},{"before":"12221f34dfbe9ca22163cd92f54794b68dc0046e","after":"32456774dc2f89b5f6eade1aeb8d0a1cd4de4881","ref":"refs/heads/irbekrm/dont_error_on_stateful_filter","pushedAt":"2024-05-31T21:35:01.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"irbekrm","name":"Irbe Krumina","path":"/irbekrm","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/24879183?s=80&v=4"},"commit":{"message":"cmd/tailscale/cli: allow 'tailscale up' to succeed if --stateful-filtering is not explicitly set on linux\n\nThis fixes an issue where, on containerized environments an upgrade\n1.66.3 -> 1.66.4 failed with default containerboot configuration.\nThis was because containerboot by default runs 'tailscale up'\nthat requires all previously set flags to be explicitly provided\non subsequent runs and we explicitly set --stateful-filtering\nto true on 1.66.3, removed that settingon 1.66.4.\n\nUpdates tailscale/tailscale#12307\n\nCo-authored-by: Andrew Lytvynov \nSigned-off-by: Irbe Krumina ","shortMessageHtmlLink":"cmd/tailscale/cli: allow 'tailscale up' to succeed if --stateful-filt…"}},{"before":"9a635517c0e6b65b2c7c897c8af4a67ec821f6f8","after":"12221f34dfbe9ca22163cd92f54794b68dc0046e","ref":"refs/heads/irbekrm/dont_error_on_stateful_filter","pushedAt":"2024-05-31T21:33:17.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"irbekrm","name":"Irbe Krumina","path":"/irbekrm","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/24879183?s=80&v=4"},"commit":{"message":"Update cmd/tailscale/cli/up.go\n\nCo-authored-by: Andrew Lytvynov \nSigned-off-by: Irbe Krumina ","shortMessageHtmlLink":"Update cmd/tailscale/cli/up.go"}},{"before":null,"after":"0b0e9a9a3ece29819399c739d271ab248aa19770","ref":"refs/heads/maisem/appc2","pushedAt":"2024-05-31T21:14:02.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"maisem","name":"Maisem Ali","path":"/maisem","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/3953239?s=80&v=4"},"commit":{"message":"cmd/natc: initial implementation of a NAT based connector\n\nThis adds a new prototype `cmd/natc` which can be used\nto expose a services/domains to the tailnet.\n\nIt requires the user to specify a set of IPv4 prefixes\nfrom the CGNAT range. It advertises these as normal subnet\nroutes. It listens for DNS on the first IP of the first range\nprovided to it.\n\nWhen it gets a DNS query it allocates an IP for that domain\nfrom the v4 range. Subsequent connections to the assigned IP\nare then tcp proxied to the domain.\n\nUpdates tailscale/corp#20503\n\nSigned-off-by: Maisem Ali ","shortMessageHtmlLink":"cmd/natc: initial implementation of a NAT based connector"}},{"before":"7511e3ad40db728c93b4570e336da31ee8620a05","after":null,"ref":"refs/heads/andrew/CheckTag","pushedAt":"2024-05-31T21:10:56.000Z","pushType":"branch_deletion","commitsCount":0,"pusher":{"login":"andrew-d","name":"Andrew Dunham","path":"/andrew-d","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/1079173?s=80&v=4"}},{"before":"0a5bd63d32701539f0cd697bd910f69a7ca275ad","after":"36d0ac6f8e7ecb1f4991f97c06d3d519a481cf42","ref":"refs/heads/main","pushedAt":"2024-05-31T21:10:55.000Z","pushType":"pr_merge","commitsCount":1,"pusher":{"login":"andrew-d","name":"Andrew Dunham","path":"/andrew-d","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/1079173?s=80&v=4"},"commit":{"message":"tailcfg: use strings.CutPrefix for CheckTag; add test\n\nUpdates #cleanup\n\nSigned-off-by: Andrew Dunham \nChange-Id: I42eddc7547a6dd50c4d5b2a9fc88a19aac9767aa","shortMessageHtmlLink":"tailcfg: use strings.CutPrefix for CheckTag; add test"}},{"before":null,"after":"7511e3ad40db728c93b4570e336da31ee8620a05","ref":"refs/heads/andrew/CheckTag","pushedAt":"2024-05-31T21:01:21.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"andrew-d","name":"Andrew Dunham","path":"/andrew-d","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/1079173?s=80&v=4"},"commit":{"message":"tailcfg: use strings.CutPrefix for CheckTag; add test\n\nUpdates #cleanup\n\nSigned-off-by: Andrew Dunham \nChange-Id: I42eddc7547a6dd50c4d5b2a9fc88a19aac9767aa","shortMessageHtmlLink":"tailcfg: use strings.CutPrefix for CheckTag; add test"}},{"before":"99e03941309b3b5424290a0a98d619265d894cb7","after":"9a635517c0e6b65b2c7c897c8af4a67ec821f6f8","ref":"refs/heads/irbekrm/dont_error_on_stateful_filter","pushedAt":"2024-05-31T20:55:32.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"irbekrm","name":"Irbe Krumina","path":"/irbekrm","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/24879183?s=80&v=4"},"commit":{"message":"cmd/tailscale/cli: allow 'tailscale up' to succeed if --stateful-filtering is not explicitly set on linux\n\nThis fixes an issue where, on containerized environments an upgrade\n1.66.3 -> 1.66.4 failed with default containerboot configuration.\nThis was because containerboot by default runs 'tailscale up'\nthat requires all previously set flags to be explicitly provided\non subsequent runs and we explicitly set --stateful-filtering\nto true on 1.66.3, removed that settingon 1.66.4.\n\nUpdates tailscale/tailscale#12307\n\nSigned-off-by: Irbe Krumina ","shortMessageHtmlLink":"cmd/tailscale/cli: allow 'tailscale up' to succeed if --stateful-filt…"}},{"before":null,"after":"99e03941309b3b5424290a0a98d619265d894cb7","ref":"refs/heads/irbekrm/dont_error_on_stateful_filter","pushedAt":"2024-05-31T20:53:42.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"irbekrm","name":"Irbe Krumina","path":"/irbekrm","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/24879183?s=80&v=4"},"commit":{"message":"cmd/tailscale/cli: allow 'tailscale up' to succeed if --stateful-filtering is not explicitly set on linux\n\nThis fixes an issue where, on containerized environments an upgrade\n1.66.3 -> 1.66.4 failed with default containerboot configuration.\nThis was because containerboot by default runs 'tailscale up'\nthat requires all previously set flags to be explicitly provided\non subsequent runs and we explicitly set --stateful-filtering\nto true on 1.66.3, removed that settingon 1.66.4.\n\nSigned-off-by: Irbe Krumina ","shortMessageHtmlLink":"cmd/tailscale/cli: allow 'tailscale up' to succeed if --stateful-filt…"}},{"before":"ac64e345132140c33bab5accae5fa0ae51e90d64","after":"3cd0e9d78f794793835b2ed2c2946f00f22ab06e","ref":"refs/heads/fran/maisem-test-w-flag","pushedAt":"2024-05-31T19:13:52.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"franbull","name":null,"path":"/franbull","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/1024241?s=80&v=4"},"commit":{"message":"cmd/appc: add --ignore-destinations flag\n\nSigned-off-by: Fran Bull ","shortMessageHtmlLink":"cmd/appc: add --ignore-destinations flag"}},{"before":"1ec027347363a5617bcbe69338ad9f78bfe8b7a7","after":"0a5bd63d32701539f0cd697bd910f69a7ca275ad","ref":"refs/heads/main","pushedAt":"2024-05-31T18:39:39.000Z","pushType":"pr_merge","commitsCount":1,"pusher":{"login":"irbekrm","name":"Irbe Krumina","path":"/irbekrm","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/24879183?s=80&v=4"},"commit":{"message":"ipn/store/kubestore, cmd/containerboot: allow overriding client api server URL via ENV (#12115)\n\nUpdates tailscale/tailscale#11397\r\n\r\nSigned-off-by: Chandon Pierre ","shortMessageHtmlLink":"ipn/store/kubestore, cmd/containerboot: allow overriding client api s…"}},{"before":"2e036ea100d6e396bfaa257dec328ec73e6f4bc4","after":null,"ref":"refs/heads/irbekrm/kube_makefile","pushedAt":"2024-05-31T18:15:03.000Z","pushType":"branch_deletion","commitsCount":0,"pusher":{"login":"irbekrm","name":"Irbe Krumina","path":"/irbekrm","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/24879183?s=80&v=4"}},{"before":"f2270835391879ccd3fd465934a33ceae84a1302","after":"1ec027347363a5617bcbe69338ad9f78bfe8b7a7","ref":"refs/heads/main","pushedAt":"2024-05-31T18:15:02.000Z","pushType":"pr_merge","commitsCount":1,"pusher":{"login":"irbekrm","name":"Irbe Krumina","path":"/irbekrm","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/24879183?s=80&v=4"},"commit":{"message":"docs/k8s: fix subnet router manifests (#12305)\n\nIn https://github.com/tailscale/tailscale/pull/11363\r\nI changed the subnet router manifest to run in tun\r\nmode (for performance reasons), but did not\r\nchange the security context to give it net_admin,\r\nwhich is required to for the tailscale socket.\r\n\r\nUpdates tailscale/tailscale#12083\r\n\r\nSigned-off-by: Irbe Krumina ","shortMessageHtmlLink":"docs/k8s: fix subnet router manifests (#12305)"}},{"before":"a45157e70a6494a4e3ad7abd82402244b1325e5c","after":"7403bbead7c5a7c4ce8f5dba14e48bff4ba40a5b","ref":"refs/heads/awly/clientupdate-outdated-alpine-release","pushedAt":"2024-05-31T17:59:56.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"awly","name":"Andrew Lytvynov","path":"/awly","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/1146263?s=80&v=4"},"commit":{"message":"clientupdate: mention when Alpine system upgrade is needed\n\nAlpine APK repos are versioned, and contain different package sets.\nOlder APK releases and repos don't have the latest tailscale package.\nWhen we report \"no update available\", check whether pkgs.tailscale.com\nhas a newer tarball release. If it does, it's possible that the system\nis on an older Alpine release. Print additional messages to suggest the\nuser to upgrade their OS.\n\nFixes #11309\n\nSigned-off-by: Andrew Lytvynov ","shortMessageHtmlLink":"clientupdate: mention when Alpine system upgrade is needed"}},{"before":null,"after":"a45157e70a6494a4e3ad7abd82402244b1325e5c","ref":"refs/heads/awly/clientupdate-outdated-alpine-release","pushedAt":"2024-05-31T17:58:19.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"awly","name":"Andrew Lytvynov","path":"/awly","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/1146263?s=80&v=4"},"commit":{"message":"clientupdate: mention when Alpine system upgrade is needed\n\nAlpine APK repos are versioned, and contain different package sets.\nOlder APK releases and repos don't have the latest tailscale package.\nWhen we report \"no update available\", check whether pkgs.tailscale.com\nhas a newer tarball release. If it does, it's possible that the system\nis on an older Alpine release. Print additional messages to suggest the\nuser to upgrade their OS.\n\nFixes #11309\n\nSigned-off-by: Andrew Lytvynov ","shortMessageHtmlLink":"clientupdate: mention when Alpine system upgrade is needed"}},{"before":"1381c4675e3bc521725856e6d605fbf55073d6ad","after":"b9e386500db7702048f2dd6f87b074d18b1ba40c","ref":"refs/heads/jwhited/stunstamp","pushedAt":"2024-05-31T17:45:22.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"jwhited","name":"Jordan Whited","path":"/jwhited","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/10344482?s=80&v=4"},"commit":{"message":"fixup! cmd/stunstamp: implement service to measure DERP STUN RTT","shortMessageHtmlLink":"fixup! cmd/stunstamp: implement service to measure DERP STUN RTT"}},{"before":"49ad4e1351c75a04d195d3ef82f0e3811afaaa07","after":"d2704b920b68651ec5aa2bc25afce1c4da56fbfa","ref":"refs/heads/irbekrm/proxycidrs","pushedAt":"2024-05-31T17:31:59.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"irbekrm","name":"Irbe Krumina","path":"/irbekrm","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/24879183?s=80&v=4"},"commit":{"message":"WIP","shortMessageHtmlLink":"WIP"}}],"hasNextPage":true,"hasPreviousPage":false,"activityType":"all","actor":null,"timePeriod":"all","sort":"DESC","perPage":30,"cursor":"djE6ks8AAAAEWY4kLgA","startCursor":null,"endCursor":null}},"title":"Activity · tailscale/tailscale"}