Github Action getting tailscale cversion 1.42.0 instead of default 1.72.1; ssh timed out until version manually set
First off, thank you for tailscale, it's the first VPN I've ever used that has truly great UX.
This morning our GHA deployments via ssh over tailscale stopped working. As far as I can tell, this was because:
- The
V2tag for tailscale's action points at a commit where the default version is 1.42.0; 1.4.2.0 has known vulnerabilities; - Although you can see warnings on the tailscale admin console, the action completed successfully without complaint;
- But after that, ssh wasn't working, it was just timing out -- maybe tailscale was refusing to route for this vultnerable version?
When I hard-coded 1.78.1 as the required version, everything started working for us. I'm reporting this because:
- The Tailscale action should fail noisily if the version of tailscale specified is too old to be usable
- The default action configuration should not specify a vulnerable version of tailscale.
Again, thanks for Tailscale!
@jhbrown-apeiron I swiched from @v2 to @main on the action which uses 1.72.1.
But +1 on this. This should be maintained as this official package.
@matanbaruch @jhbrown-apeiron I don't necessarily agree but that is expected behavior. https://tailscale.com/kb/1276/tailscale-github-action?q=github+action#tailscale-github-action-version
Though it does look like they've got enough complaints they may actually be changing it https://github.com/tailscale/github-action/pull/131
@matanbaruch @jhbrown-apeiron I don't necessarily agree but that is expected behavior. https://tailscale.com/kb/1276/tailscale-github-action?q=github+action#tailscale-github-action-version
I'd argue that "breaks all the workflows" counts as "meaningful" for "It changes only when there is a meaningful reason to do so." But snark aside, I'm happy it's getting fixed.
@jaxxstorm merged #131 which actually solve our issues.
I think it worth the v3 of the action.
It doesn't necessarily need to be a v3. In fact I would recommend it not be a v3. The typical way that actions work is they have a major and a minor tag, but the major tag alone is the latest version of the minor release. So v2 includes 2.0, 2.1, etc. This would be a v2.1 to me and v2 should also pick it up. If someone wants to stick with v2.0 they would include v2.0 anyone using v2 would expect to get the latest version. If they're very paranoid they can use the commit hash
This morning our GHA deployments via ssh over tailscale stopped working. As far as I can tell, this was because:
We're experiencing this as well with lot of timeout errors on GH like:
# DNS timeouts
error looking up IP of "sts.eu-north-1.amazonaws.com.": lookup sts.eu-north-1.amazonaws.com. on 127.0.0.53:53: read udp 127.0.0.1:54485->127.0.0.53:53: i/o timeout
Error: getaddrinfo EAI_AGAIN sts.eu-north-1.amazonaws.com
# Of if I disable DNS with args: '--accept-dns=false'
Error: Get "https://<redacted>.gr7.eu-north-1.eks.amazonaws.com/api/v1/namespaces/test": dial tcp 172.33.25.157:443: i/o timeout
Unfortunately the suggested fix didn't worked for us, even with 1.78.1 version the issue persists.
What should we do? We're not able to deploy some of our workloads because of this.
Unfortunately the suggested fix didn't worked for us, even with 1.78.1 version the issue persists.
Same here, Github runners aren't able to connect to the tailnet and I can't figure out why. I've tried several tailscale versions (ones that match working machines), different ways of connecting with using --accept-routes and internal networks, the tailscale DNS hosts, and tailscale IPs directly, but none are working.
The weird part is that tailscale status and tailscale netcheck say everything is fine and the action also runs cleanly. I even see the internal subnets come past in ~/tailscaled.log. The GitHub runner also shows up briefly in the tailscale dashboard. Yet, no connection is possible.
I'm thinking it might be the GH runners, but I'm not sure. Hoping anyone here has ideas..
relevant for us. Also if you try SSH from UI most probably you also will not able to connect. After manually restart tailscale on hosts I tried SSH from tailscale UI and it started work and also after this it started work from github actions.
Unfortunately the suggested fix didn't worked for us, even with 1.78.1 version the issue persists.
Same here, Github runners aren't able to connect to the tailnet and I can't figure out why. I've tried several tailscale versions (ones that match working machines), different ways of connecting with using
--accept-routesand internal networks, the tailscale DNS hosts, and tailscale IPs directly, but none are working.The weird part is that
tailscale statusandtailscale netchecksay everything is fine and the action also runs cleanly. I even see the internal subnets come past in~/tailscaled.log. The GitHub runner also shows up briefly in the tailscale dashboard. Yet, no connection is possible.I'm thinking it might be the GH runners, but I'm not sure. Hoping anyone here has ideas..
what does your ACL file look like?
172.33.25.157
This is T-mobile IP address, so not sure why it would be in your DNS path, and likely isn't a Tailscale thing.
I'd recommend opening support tickets for these issues.
On the versioning front here we've released a v3 which:
- Includes https://github.com/tailscale/github-action/pull/131 which allows for opting in to fetching the latest stable version of Tailscale
- Will be a floating tag that is updated to point to the latest
v3.Y.Zreleases of the action as they come out to have behaviour that is more expected of actions releases / tags
Note that the guidance provided here around the default version for the Tailscale client is otherwise still true.
v4 of the GitHub actions includes improvements for dealing with eventual consistency and actually managing system DNS settings when running on a macOS runner. We hope that this will resolve any lingering issues of the sort that @smitmartijn was encountering.
If you still have problems, please feel free to reopen this ticket or file a new one.