_ ______ __________ | | /| / / __ `/ ___/ __ \ | |/ |/ / /_/ / / / /_/ / |__/|__/\__,_/_/ / .___/ /_/ v0.0.3
Secure and simple terminal sharing
warp lets you securely share your terminal with one simple command:
warp open. When connected to your warp, clients can see your terminal exactly as if
they were sitting next to you. You can also grant them write access, the
equivalent of handing them your keyboard.
warp distinguishes itself from "tmux/screen over ssh" by its focus and
ease of use as it does not require an SSH access to your machine or a
shared server for others to collaborate with you.
Despite being still quite experimental,
warp has already proven itself useful
especially in the context of:
# Requires Homebrew installed. See https://brew.sh/ brew install warp
# Requires Go to be installed on your machine. You can easily install Go from # https://golang.org/doc/install go get -u github.com/spolu/warp/client/cmd/warp
In case of difficulties, please refer to
Instantly start sharing your terminal (read-only) under warp ID goofy-dev with:
# You can name your warps however you want (here **goofy-dev**). In particular # a cryptographically secure random ID will be generated for you if you don't # specifiy a name. $ warp open goofy-dev
This will create a new warp goofy-dev and will connect you to it locally with write-access. From there, anyone can connect (read-only) to your warp with:
$ warp connect goofy-dev
Creating a new warp spawns a new shell, and closing it is therefore as easy as
killing that shell with
From inside a warp, retrieve the list of connected users with:
$ warp state
Grant write-access to a client (be extra careful! see the Security section below):
$ warp authorize stan
Revoke previously granted write-access with:
$ warp revoke stan
warp is a powerful, and therefore, dangerous tool. Its misuse can potentially
enable an attacker to easily gain arbitrary remote code execution priviledges.
The connection between your host as well as your warp clients and the
server are established over TLS, protecting you from man in the middle attacks.
By default, warps are created read-only. Being protected by TLS does not
protect you from phishing. Be extra careful when running
Generated warp IDs are cryptographically secure and not publicized. If you want to authorize someone to write to your warp, we recommend you use a generated warp ID (to protect yourself against phishing attacks).
In particular, when your warp does not authorize anyone to write, it does not
warpd daemon to enforce that noone other than you can write to it.
When at least one client is authorized to write,
warp does trust the
daemon it is connected to to enforce the read/write policy of clients.
warp voice :warplets you voice-over a warp
warpis not a fork of tmux
warp is not a fork of tmux and is not a terminal emulator (for now). It
really simply multiplexes stdin/stdout to raw ptys between host and clients.
For that reason, if you connect to a warp already running a GUI-like
application (tmux, vim, htop, ...) it might take time or host interactions for
the GUI-like application to visually reconstruct properly client-side.
In particular, since
warp does not emulate the terminal it cannot reformat or
truncate the output of the host terminal to fit client terminal windows which
may lead to distorted outputs client side if the terminal sizes mismatch. To
warp relies on automatic client terminal resizing (pending
v0.0.4, see Roadmap).
Once connected as a client and whenever the host terminal window size changes,
warp will attempt to resize your terminal window to the hosting tty size. For
that reason it is recommended to run
warp connect from a new terminal
warp is generally broadcasted in warp-dev. Feel free to
connect at any time.
 You can run a warp from within tmux (or screen) or tmux from within a warp. It's also fine to run a warp from within a warp.
 Terminals supporting window resizes based on the
\033[8;h;wt ANSI escape