2022-10-18 11:59:43 +02:00
|
|
|
package integration
|
|
|
|
|
|
|
|
import (
|
2022-10-23 14:13:22 +02:00
|
|
|
"fmt"
|
2022-12-22 16:41:49 +01:00
|
|
|
"net/netip"
|
2022-10-24 14:59:14 +02:00
|
|
|
"strings"
|
2022-10-18 11:59:43 +02:00
|
|
|
"testing"
|
2022-10-23 14:13:22 +02:00
|
|
|
"time"
|
|
|
|
|
2022-11-14 15:01:31 +01:00
|
|
|
"github.com/juanfont/headscale/integration/hsic"
|
2022-11-08 16:10:03 +01:00
|
|
|
"github.com/juanfont/headscale/integration/tsic"
|
2022-10-23 14:13:22 +02:00
|
|
|
"github.com/rs/zerolog/log"
|
2022-10-18 11:59:43 +02:00
|
|
|
)
|
|
|
|
|
2022-10-21 14:08:04 +02:00
|
|
|
func TestPingAllByIP(t *testing.T) {
|
2022-10-18 11:59:43 +02:00
|
|
|
IntegrationSkip(t)
|
2022-11-22 12:05:58 +01:00
|
|
|
t.Parallel()
|
2022-10-18 11:59:43 +02:00
|
|
|
|
|
|
|
scenario, err := NewScenario()
|
|
|
|
if err != nil {
|
|
|
|
t.Errorf("failed to create scenario: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
spec := map[string]int{
|
|
|
|
"namespace1": len(TailscaleVersions),
|
|
|
|
"namespace2": len(TailscaleVersions),
|
|
|
|
}
|
|
|
|
|
2022-11-08 16:10:03 +01:00
|
|
|
err = scenario.CreateHeadscaleEnv(spec, []tsic.Option{}, hsic.WithTestName("pingallbyip"))
|
2022-10-18 11:59:43 +02:00
|
|
|
if err != nil {
|
|
|
|
t.Errorf("failed to create headscale environment: %s", err)
|
|
|
|
}
|
|
|
|
|
2022-10-23 12:41:35 +02:00
|
|
|
allClients, err := scenario.ListTailscaleClients()
|
|
|
|
if err != nil {
|
|
|
|
t.Errorf("failed to get clients: %s", err)
|
|
|
|
}
|
2022-10-18 11:59:43 +02:00
|
|
|
|
2022-10-23 12:41:35 +02:00
|
|
|
allIps, err := scenario.ListTailscaleClientsIPs()
|
|
|
|
if err != nil {
|
|
|
|
t.Errorf("failed to get clients: %s", err)
|
2022-10-18 11:59:43 +02:00
|
|
|
}
|
|
|
|
|
2022-10-18 12:19:43 +02:00
|
|
|
err = scenario.WaitForTailscaleSync()
|
2022-10-18 11:59:43 +02:00
|
|
|
if err != nil {
|
|
|
|
t.Errorf("failed wait for tailscale clients to be in sync: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
success := 0
|
|
|
|
|
|
|
|
for _, client := range allClients {
|
|
|
|
for _, ip := range allIps {
|
2022-10-21 14:07:46 +02:00
|
|
|
err := client.Ping(ip.String())
|
2022-10-18 11:59:43 +02:00
|
|
|
if err != nil {
|
2022-10-21 13:17:54 +02:00
|
|
|
t.Errorf("failed to ping %s from %s: %s", ip, client.Hostname(), err)
|
2022-10-18 11:59:43 +02:00
|
|
|
} else {
|
|
|
|
success++
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
t.Logf("%d successful pings out of %d", success, len(allClients)*len(allIps))
|
|
|
|
|
2022-10-21 17:44:40 +02:00
|
|
|
err = scenario.Shutdown()
|
|
|
|
if err != nil {
|
|
|
|
t.Errorf("failed to tear down scenario: %s", err)
|
|
|
|
}
|
2022-10-18 11:59:43 +02:00
|
|
|
}
|
2022-10-21 14:08:14 +02:00
|
|
|
|
2022-12-22 16:41:49 +01:00
|
|
|
func TestAuthKeyLogoutAndRelogin(t *testing.T) {
|
|
|
|
IntegrationSkip(t)
|
|
|
|
t.Parallel()
|
|
|
|
|
|
|
|
scenario, err := NewScenario()
|
|
|
|
if err != nil {
|
|
|
|
t.Errorf("failed to create scenario: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
spec := map[string]int{
|
|
|
|
"namespace1": len(TailscaleVersions),
|
|
|
|
"namespace2": len(TailscaleVersions),
|
|
|
|
}
|
|
|
|
|
|
|
|
err = scenario.CreateHeadscaleEnv(spec, []tsic.Option{}, hsic.WithTestName("pingallbyip"))
|
|
|
|
if err != nil {
|
|
|
|
t.Errorf("failed to create headscale environment: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
allClients, err := scenario.ListTailscaleClients()
|
|
|
|
if err != nil {
|
|
|
|
t.Errorf("failed to get clients: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
err = scenario.WaitForTailscaleSync()
|
|
|
|
if err != nil {
|
|
|
|
t.Errorf("failed wait for tailscale clients to be in sync: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
clientIPs := make(map[TailscaleClient][]netip.Addr)
|
|
|
|
for _, client := range allClients {
|
|
|
|
ips, err := client.IPs()
|
|
|
|
if err != nil {
|
|
|
|
t.Errorf("failed to get IPs for client %s: %s", client.Hostname(), err)
|
|
|
|
}
|
|
|
|
clientIPs[client] = ips
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, client := range allClients {
|
|
|
|
err := client.Logout()
|
|
|
|
if err != nil {
|
|
|
|
t.Errorf("failed to logout client %s: %s", client.Hostname(), err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
scenario.WaitForTailscaleLogout()
|
|
|
|
|
|
|
|
t.Logf("all clients logged out")
|
|
|
|
|
|
|
|
headscale, err := scenario.Headscale()
|
|
|
|
if err != nil {
|
|
|
|
t.Errorf("failed to get headscale server: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
for namespaceName := range spec {
|
2022-12-27 20:05:21 +01:00
|
|
|
key, err := scenario.CreatePreAuthKey(namespaceName, true, false)
|
2022-12-22 16:41:49 +01:00
|
|
|
if err != nil {
|
|
|
|
t.Errorf("failed to create pre-auth key for namespace %s: %s", namespaceName, err)
|
|
|
|
}
|
|
|
|
|
|
|
|
err = scenario.RunTailscaleUp(namespaceName, headscale.GetEndpoint(), key.GetKey())
|
|
|
|
if err != nil {
|
|
|
|
t.Errorf("failed to run tailscale up for namespace %s: %s", namespaceName, err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
err = scenario.WaitForTailscaleSync()
|
|
|
|
if err != nil {
|
|
|
|
t.Errorf("failed wait for tailscale clients to be in sync: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
allClients, err = scenario.ListTailscaleClients()
|
|
|
|
if err != nil {
|
|
|
|
t.Errorf("failed to get clients: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
allIps, err := scenario.ListTailscaleClientsIPs()
|
|
|
|
if err != nil {
|
|
|
|
t.Errorf("failed to get clients: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
success := 0
|
|
|
|
for _, client := range allClients {
|
|
|
|
for _, ip := range allIps {
|
|
|
|
err := client.Ping(ip.String())
|
|
|
|
if err != nil {
|
|
|
|
t.Errorf("failed to ping %s from %s: %s", ip, client.Hostname(), err)
|
|
|
|
} else {
|
|
|
|
success++
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
t.Logf("%d successful pings out of %d", success, len(allClients)*len(allIps))
|
|
|
|
|
|
|
|
for _, client := range allClients {
|
|
|
|
ips, err := client.IPs()
|
|
|
|
if err != nil {
|
|
|
|
t.Errorf("failed to get IPs for client %s: %s", client.Hostname(), err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// lets check if the IPs are the same
|
|
|
|
if len(ips) != len(clientIPs[client]) {
|
|
|
|
t.Errorf("IPs changed for client %s", client.Hostname())
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, ip := range ips {
|
|
|
|
found := false
|
|
|
|
for _, oldIP := range clientIPs[client] {
|
|
|
|
if ip == oldIP {
|
|
|
|
found = true
|
|
|
|
|
|
|
|
break
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if !found {
|
|
|
|
t.Errorf("IPs changed for client %s. Used to be %v now %v", client.Hostname(), clientIPs[client], ips)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
t.Logf("all clients IPs are the same")
|
|
|
|
|
|
|
|
err = scenario.Shutdown()
|
|
|
|
if err != nil {
|
|
|
|
t.Errorf("failed to tear down scenario: %s", err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-12-27 20:05:21 +01:00
|
|
|
func TestEphemeral(t *testing.T) {
|
|
|
|
IntegrationSkip(t)
|
|
|
|
t.Parallel()
|
|
|
|
|
|
|
|
scenario, err := NewScenario()
|
|
|
|
if err != nil {
|
|
|
|
t.Errorf("failed to create scenario: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
spec := map[string]int{
|
|
|
|
"namespace1": len(TailscaleVersions),
|
|
|
|
"namespace2": len(TailscaleVersions),
|
|
|
|
}
|
|
|
|
|
|
|
|
headscale, err := scenario.Headscale(hsic.WithTestName("ephemeral"))
|
|
|
|
if err != nil {
|
|
|
|
t.Errorf("failed to create headscale environment: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
for namespaceName, clientCount := range spec {
|
|
|
|
err = scenario.CreateNamespace(namespaceName)
|
|
|
|
if err != nil {
|
|
|
|
t.Errorf("failed to create namespace %s: %s", namespaceName, err)
|
|
|
|
}
|
|
|
|
|
|
|
|
err = scenario.CreateTailscaleNodesInNamespace(namespaceName, "all", clientCount, []tsic.Option{}...)
|
|
|
|
if err != nil {
|
|
|
|
t.Errorf("failed to create tailscale nodes in namespace %s: %s", namespaceName, err)
|
|
|
|
}
|
|
|
|
|
|
|
|
key, err := scenario.CreatePreAuthKey(namespaceName, true, true)
|
|
|
|
if err != nil {
|
|
|
|
t.Errorf("failed to create pre-auth key for namespace %s: %s", namespaceName, err)
|
|
|
|
}
|
|
|
|
|
|
|
|
err = scenario.RunTailscaleUp(namespaceName, headscale.GetEndpoint(), key.GetKey())
|
|
|
|
if err != nil {
|
|
|
|
t.Errorf("failed to run tailscale up for namespace %s: %s", namespaceName, err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
err = scenario.WaitForTailscaleSync()
|
|
|
|
if err != nil {
|
|
|
|
t.Errorf("failed wait for tailscale clients to be in sync: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
allClients, err := scenario.ListTailscaleClients()
|
|
|
|
if err != nil {
|
|
|
|
t.Errorf("failed to get clients: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
allIps, err := scenario.ListTailscaleClientsIPs()
|
|
|
|
if err != nil {
|
|
|
|
t.Errorf("failed to get clients: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
success := 0
|
|
|
|
for _, client := range allClients {
|
|
|
|
for _, ip := range allIps {
|
|
|
|
err := client.Ping(ip.String())
|
|
|
|
if err != nil {
|
|
|
|
t.Errorf("failed to ping %s from %s: %s", ip, client.Hostname(), err)
|
|
|
|
} else {
|
|
|
|
success++
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
t.Logf("%d successful pings out of %d", success, len(allClients)*len(allIps))
|
|
|
|
|
|
|
|
for _, client := range allClients {
|
|
|
|
err := client.Logout()
|
|
|
|
if err != nil {
|
|
|
|
t.Errorf("failed to logout client %s: %s", client.Hostname(), err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
scenario.WaitForTailscaleLogout()
|
|
|
|
|
|
|
|
t.Logf("all clients logged out")
|
|
|
|
|
|
|
|
for namespaceName := range spec {
|
|
|
|
machines, err := headscale.ListMachinesInNamespace(namespaceName)
|
|
|
|
if err != nil {
|
|
|
|
log.Error().
|
|
|
|
Err(err).
|
|
|
|
Str("namespace", namespaceName).
|
|
|
|
Msg("Error listing machines in namespace")
|
|
|
|
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
if len(machines) != 0 {
|
|
|
|
t.Errorf("expected no machines, got %d in namespace %s", len(machines), namespaceName)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
err = scenario.Shutdown()
|
|
|
|
if err != nil {
|
|
|
|
t.Errorf("failed to tear down scenario: %s", err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-10-21 14:08:14 +02:00
|
|
|
func TestPingAllByHostname(t *testing.T) {
|
|
|
|
IntegrationSkip(t)
|
2022-11-22 12:05:58 +01:00
|
|
|
t.Parallel()
|
2022-10-21 14:08:14 +02:00
|
|
|
|
|
|
|
scenario, err := NewScenario()
|
|
|
|
if err != nil {
|
|
|
|
t.Errorf("failed to create scenario: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
spec := map[string]int{
|
2022-10-23 11:42:15 +02:00
|
|
|
// Omit 1.16.2 (-1) because it does not have the FQDN field
|
|
|
|
"namespace3": len(TailscaleVersions) - 1,
|
|
|
|
"namespace4": len(TailscaleVersions) - 1,
|
2022-10-21 14:08:14 +02:00
|
|
|
}
|
|
|
|
|
2022-11-08 16:10:03 +01:00
|
|
|
err = scenario.CreateHeadscaleEnv(spec, []tsic.Option{}, hsic.WithTestName("pingallbyname"))
|
2022-10-21 14:08:14 +02:00
|
|
|
if err != nil {
|
|
|
|
t.Errorf("failed to create headscale environment: %s", err)
|
|
|
|
}
|
|
|
|
|
2022-10-23 12:41:35 +02:00
|
|
|
allClients, err := scenario.ListTailscaleClients()
|
|
|
|
if err != nil {
|
|
|
|
t.Errorf("failed to get clients: %s", err)
|
2022-10-21 14:08:14 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
err = scenario.WaitForTailscaleSync()
|
|
|
|
if err != nil {
|
|
|
|
t.Errorf("failed wait for tailscale clients to be in sync: %s", err)
|
|
|
|
}
|
|
|
|
|
2022-10-23 12:41:35 +02:00
|
|
|
allHostnames, err := scenario.ListTailscaleClientsFQDNs()
|
|
|
|
if err != nil {
|
|
|
|
t.Errorf("failed to get FQDNs: %s", err)
|
2022-10-21 17:44:40 +02:00
|
|
|
}
|
|
|
|
|
2022-10-21 14:08:14 +02:00
|
|
|
success := 0
|
|
|
|
|
|
|
|
for _, client := range allClients {
|
2022-10-21 17:44:40 +02:00
|
|
|
for _, hostname := range allHostnames {
|
|
|
|
err := client.Ping(hostname)
|
2022-10-21 14:08:14 +02:00
|
|
|
if err != nil {
|
2022-10-23 11:55:37 +02:00
|
|
|
t.Errorf("failed to ping %s from %s: %s", hostname, client.Hostname(), err)
|
2022-10-21 14:08:14 +02:00
|
|
|
} else {
|
|
|
|
success++
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
t.Logf("%d successful pings out of %d", success, len(allClients)*len(allClients))
|
|
|
|
|
|
|
|
err = scenario.Shutdown()
|
|
|
|
if err != nil {
|
|
|
|
t.Errorf("failed to tear down scenario: %s", err)
|
|
|
|
}
|
|
|
|
}
|
2022-10-23 14:13:22 +02:00
|
|
|
|
2022-12-01 14:01:06 +01:00
|
|
|
// If subtests are parallel, then they will start before setup is run.
|
|
|
|
// This might mean we approach setup slightly wrong, but for now, ignore
|
|
|
|
// the linter
|
|
|
|
// nolint:tparallel
|
2022-10-23 14:13:22 +02:00
|
|
|
func TestTaildrop(t *testing.T) {
|
|
|
|
IntegrationSkip(t)
|
2022-11-22 12:05:58 +01:00
|
|
|
t.Parallel()
|
2022-10-23 14:13:22 +02:00
|
|
|
|
|
|
|
retry := func(times int, sleepInverval time.Duration, doWork func() error) error {
|
|
|
|
var err error
|
|
|
|
for attempts := 0; attempts < times; attempts++ {
|
|
|
|
err = doWork()
|
|
|
|
if err == nil {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
time.Sleep(sleepInverval)
|
|
|
|
}
|
|
|
|
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
scenario, err := NewScenario()
|
|
|
|
if err != nil {
|
|
|
|
t.Errorf("failed to create scenario: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
spec := map[string]int{
|
|
|
|
// Omit 1.16.2 (-1) because it does not have the FQDN field
|
|
|
|
"taildrop": len(TailscaleVersions) - 1,
|
|
|
|
}
|
|
|
|
|
2022-11-08 16:10:03 +01:00
|
|
|
err = scenario.CreateHeadscaleEnv(spec, []tsic.Option{}, hsic.WithTestName("taildrop"))
|
2022-10-23 14:13:22 +02:00
|
|
|
if err != nil {
|
|
|
|
t.Errorf("failed to create headscale environment: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
allClients, err := scenario.ListTailscaleClients()
|
|
|
|
if err != nil {
|
|
|
|
t.Errorf("failed to get clients: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
err = scenario.WaitForTailscaleSync()
|
|
|
|
if err != nil {
|
|
|
|
t.Errorf("failed wait for tailscale clients to be in sync: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// This will essentially fetch and cache all the FQDNs
|
|
|
|
_, err = scenario.ListTailscaleClientsFQDNs()
|
|
|
|
if err != nil {
|
|
|
|
t.Errorf("failed to get FQDNs: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, client := range allClients {
|
|
|
|
command := []string{"touch", fmt.Sprintf("/tmp/file_from_%s", client.Hostname())}
|
|
|
|
|
2022-11-03 17:00:23 +01:00
|
|
|
if _, _, err := client.Execute(command); err != nil {
|
2022-10-23 14:13:22 +02:00
|
|
|
t.Errorf("failed to create taildrop file on %s, err: %s", client.Hostname(), err)
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, peer := range allClients {
|
|
|
|
if client.Hostname() == peer.Hostname() {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
// It is safe to ignore this error as we handled it when caching it
|
|
|
|
peerFQDN, _ := peer.FQDN()
|
|
|
|
|
|
|
|
t.Run(fmt.Sprintf("%s-%s", client.Hostname(), peer.Hostname()), func(t *testing.T) {
|
|
|
|
command := []string{
|
|
|
|
"tailscale", "file", "cp",
|
|
|
|
fmt.Sprintf("/tmp/file_from_%s", client.Hostname()),
|
|
|
|
fmt.Sprintf("%s:", peerFQDN),
|
|
|
|
}
|
|
|
|
|
|
|
|
err := retry(10, 1*time.Second, func() error {
|
|
|
|
t.Logf(
|
|
|
|
"Sending file from %s to %s\n",
|
|
|
|
client.Hostname(),
|
|
|
|
peer.Hostname(),
|
|
|
|
)
|
2022-11-03 17:00:23 +01:00
|
|
|
_, _, err := client.Execute(command)
|
2022-10-23 14:13:22 +02:00
|
|
|
|
|
|
|
return err
|
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
t.Errorf(
|
|
|
|
"failed to send taildrop file on %s, err: %s",
|
|
|
|
client.Hostname(),
|
|
|
|
err,
|
|
|
|
)
|
|
|
|
}
|
|
|
|
})
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, client := range allClients {
|
|
|
|
command := []string{
|
|
|
|
"tailscale", "file",
|
|
|
|
"get",
|
|
|
|
"/tmp/",
|
|
|
|
}
|
2022-11-03 17:00:23 +01:00
|
|
|
if _, _, err := client.Execute(command); err != nil {
|
2022-10-23 14:13:22 +02:00
|
|
|
t.Errorf("failed to get taildrop file on %s, err: %s", client.Hostname(), err)
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, peer := range allClients {
|
|
|
|
if client.Hostname() == peer.Hostname() {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
t.Run(fmt.Sprintf("%s-%s", client.Hostname(), peer.Hostname()), func(t *testing.T) {
|
|
|
|
command := []string{
|
|
|
|
"ls",
|
|
|
|
fmt.Sprintf("/tmp/file_from_%s", peer.Hostname()),
|
|
|
|
}
|
|
|
|
log.Printf(
|
|
|
|
"Checking file in %s from %s\n",
|
|
|
|
client.Hostname(),
|
|
|
|
peer.Hostname(),
|
|
|
|
)
|
|
|
|
|
2022-11-03 17:00:23 +01:00
|
|
|
result, _, err := client.Execute(command)
|
2022-10-23 14:13:22 +02:00
|
|
|
if err != nil {
|
|
|
|
t.Errorf("failed to execute command to ls taildrop: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
log.Printf("Result for %s: %s\n", peer.Hostname(), result)
|
|
|
|
if fmt.Sprintf("/tmp/file_from_%s\n", peer.Hostname()) != result {
|
|
|
|
t.Errorf(
|
|
|
|
"taildrop result is not correct %s, wanted %s",
|
|
|
|
result,
|
|
|
|
fmt.Sprintf("/tmp/file_from_%s\n", peer.Hostname()),
|
|
|
|
)
|
|
|
|
}
|
|
|
|
})
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
err = scenario.Shutdown()
|
|
|
|
if err != nil {
|
|
|
|
t.Errorf("failed to tear down scenario: %s", err)
|
|
|
|
}
|
|
|
|
}
|
2022-10-24 14:59:14 +02:00
|
|
|
|
|
|
|
func TestResolveMagicDNS(t *testing.T) {
|
|
|
|
IntegrationSkip(t)
|
2022-11-22 12:05:58 +01:00
|
|
|
t.Parallel()
|
2022-10-24 14:59:14 +02:00
|
|
|
|
|
|
|
scenario, err := NewScenario()
|
|
|
|
if err != nil {
|
|
|
|
t.Errorf("failed to create scenario: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
spec := map[string]int{
|
|
|
|
// Omit 1.16.2 (-1) because it does not have the FQDN field
|
|
|
|
"magicdns1": len(TailscaleVersions) - 1,
|
|
|
|
"magicdns2": len(TailscaleVersions) - 1,
|
|
|
|
}
|
|
|
|
|
2022-11-08 16:10:03 +01:00
|
|
|
err = scenario.CreateHeadscaleEnv(spec, []tsic.Option{}, hsic.WithTestName("magicdns"))
|
2022-10-24 14:59:14 +02:00
|
|
|
if err != nil {
|
|
|
|
t.Errorf("failed to create headscale environment: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
allClients, err := scenario.ListTailscaleClients()
|
|
|
|
if err != nil {
|
|
|
|
t.Errorf("failed to get clients: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
err = scenario.WaitForTailscaleSync()
|
|
|
|
if err != nil {
|
|
|
|
t.Errorf("failed wait for tailscale clients to be in sync: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Poor mans cache
|
|
|
|
_, err = scenario.ListTailscaleClientsFQDNs()
|
|
|
|
if err != nil {
|
|
|
|
t.Errorf("failed to get FQDNs: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
_, err = scenario.ListTailscaleClientsIPs()
|
|
|
|
if err != nil {
|
|
|
|
t.Errorf("failed to get IPs: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, client := range allClients {
|
|
|
|
for _, peer := range allClients {
|
|
|
|
// It is safe to ignore this error as we handled it when caching it
|
|
|
|
peerFQDN, _ := peer.FQDN()
|
|
|
|
|
|
|
|
command := []string{
|
|
|
|
"tailscale",
|
|
|
|
"ip", peerFQDN,
|
|
|
|
}
|
2022-11-03 17:00:23 +01:00
|
|
|
result, _, err := client.Execute(command)
|
2022-10-24 14:59:14 +02:00
|
|
|
if err != nil {
|
|
|
|
t.Errorf(
|
|
|
|
"failed to execute resolve/ip command %s from %s: %s",
|
|
|
|
peerFQDN,
|
|
|
|
client.Hostname(),
|
|
|
|
err,
|
|
|
|
)
|
|
|
|
}
|
|
|
|
|
|
|
|
ips, err := peer.IPs()
|
|
|
|
if err != nil {
|
|
|
|
t.Errorf(
|
|
|
|
"failed to get ips for %s: %s",
|
|
|
|
peer.Hostname(),
|
|
|
|
err,
|
|
|
|
)
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, ip := range ips {
|
|
|
|
if !strings.Contains(result, ip.String()) {
|
|
|
|
t.Errorf("ip %s is not found in \n%s\n", ip.String(), result)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
err = scenario.Shutdown()
|
|
|
|
if err != nil {
|
|
|
|
t.Errorf("failed to tear down scenario: %s", err)
|
|
|
|
}
|
|
|
|
}
|