mirror of
				https://github.com/juanfont/headscale.git
				synced 2025-10-28 10:51:44 +01:00 
			
		
		
		
	
		
			
				
	
	
		
			638 lines
		
	
	
		
			18 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			638 lines
		
	
	
		
			18 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| package integration
 | |
| 
 | |
| import (
 | |
| 	"maps"
 | |
| 	"net/netip"
 | |
| 	"sort"
 | |
| 	"testing"
 | |
| 	"time"
 | |
| 
 | |
| 	"github.com/google/go-cmp/cmp"
 | |
| 	"github.com/google/go-cmp/cmp/cmpopts"
 | |
| 	v1 "github.com/juanfont/headscale/gen/go/headscale/v1"
 | |
| 	"github.com/juanfont/headscale/integration/hsic"
 | |
| 	"github.com/juanfont/headscale/integration/tsic"
 | |
| 	"github.com/oauth2-proxy/mockoidc"
 | |
| 	"github.com/samber/lo"
 | |
| 	"github.com/stretchr/testify/assert"
 | |
| )
 | |
| 
 | |
| func TestOIDCAuthenticationPingAll(t *testing.T) {
 | |
| 	IntegrationSkip(t)
 | |
| 
 | |
| 	// Logins to MockOIDC is served by a queue with a strict order,
 | |
| 	// if we use more than one node per user, the order of the logins
 | |
| 	// will not be deterministic and the test will fail.
 | |
| 	spec := ScenarioSpec{
 | |
| 		NodesPerUser: 1,
 | |
| 		Users:        []string{"user1", "user2"},
 | |
| 		OIDCUsers: []mockoidc.MockUser{
 | |
| 			oidcMockUser("user1", true),
 | |
| 			oidcMockUser("user2", false),
 | |
| 		},
 | |
| 	}
 | |
| 
 | |
| 	scenario, err := NewScenario(spec)
 | |
| 	assertNoErr(t, err)
 | |
| 
 | |
| 	defer scenario.ShutdownAssertNoPanics(t)
 | |
| 
 | |
| 	oidcMap := map[string]string{
 | |
| 		"HEADSCALE_OIDC_ISSUER":             scenario.mockOIDC.Issuer(),
 | |
| 		"HEADSCALE_OIDC_CLIENT_ID":          scenario.mockOIDC.ClientID(),
 | |
| 		"CREDENTIALS_DIRECTORY_TEST":        "/tmp",
 | |
| 		"HEADSCALE_OIDC_CLIENT_SECRET_PATH": "${CREDENTIALS_DIRECTORY_TEST}/hs_client_oidc_secret",
 | |
| 	}
 | |
| 
 | |
| 	err = scenario.CreateHeadscaleEnvWithLoginURL(
 | |
| 		nil,
 | |
| 		hsic.WithTestName("oidcauthping"),
 | |
| 		hsic.WithConfigEnv(oidcMap),
 | |
| 		hsic.WithTLS(),
 | |
| 		hsic.WithFileInContainer("/tmp/hs_client_oidc_secret", []byte(scenario.mockOIDC.ClientSecret())),
 | |
| 	)
 | |
| 	assertNoErrHeadscaleEnv(t, err)
 | |
| 
 | |
| 	allClients, err := scenario.ListTailscaleClients()
 | |
| 	assertNoErrListClients(t, err)
 | |
| 
 | |
| 	allIps, err := scenario.ListTailscaleClientsIPs()
 | |
| 	assertNoErrListClientIPs(t, err)
 | |
| 
 | |
| 	err = scenario.WaitForTailscaleSync()
 | |
| 	assertNoErrSync(t, err)
 | |
| 
 | |
| 	// assertClientsState(t, allClients)
 | |
| 
 | |
| 	allAddrs := lo.Map(allIps, func(x netip.Addr, index int) string {
 | |
| 		return x.String()
 | |
| 	})
 | |
| 
 | |
| 	success := pingAllHelper(t, allClients, allAddrs)
 | |
| 	t.Logf("%d successful pings out of %d", success, len(allClients)*len(allIps))
 | |
| 
 | |
| 	headscale, err := scenario.Headscale()
 | |
| 	assertNoErr(t, err)
 | |
| 
 | |
| 	listUsers, err := headscale.ListUsers()
 | |
| 	assertNoErr(t, err)
 | |
| 
 | |
| 	want := []*v1.User{
 | |
| 		{
 | |
| 			Id:    1,
 | |
| 			Name:  "user1",
 | |
| 			Email: "user1@test.no",
 | |
| 		},
 | |
| 		{
 | |
| 			Id:         2,
 | |
| 			Name:       "user1",
 | |
| 			Email:      "user1@headscale.net",
 | |
| 			Provider:   "oidc",
 | |
| 			ProviderId: scenario.mockOIDC.Issuer() + "/user1",
 | |
| 		},
 | |
| 		{
 | |
| 			Id:    3,
 | |
| 			Name:  "user2",
 | |
| 			Email: "user2@test.no",
 | |
| 		},
 | |
| 		{
 | |
| 			Id:         4,
 | |
| 			Name:       "user2",
 | |
| 			Email:      "", // Unverified
 | |
| 			Provider:   "oidc",
 | |
| 			ProviderId: scenario.mockOIDC.Issuer() + "/user2",
 | |
| 		},
 | |
| 	}
 | |
| 
 | |
| 	sort.Slice(listUsers, func(i, j int) bool {
 | |
| 		return listUsers[i].GetId() < listUsers[j].GetId()
 | |
| 	})
 | |
| 
 | |
| 	if diff := cmp.Diff(want, listUsers, cmpopts.IgnoreUnexported(v1.User{}), cmpopts.IgnoreFields(v1.User{}, "CreatedAt")); diff != "" {
 | |
| 		t.Fatalf("unexpected users: %s", diff)
 | |
| 	}
 | |
| }
 | |
| 
 | |
| // This test is really flaky.
 | |
| func TestOIDCExpireNodesBasedOnTokenExpiry(t *testing.T) {
 | |
| 	IntegrationSkip(t)
 | |
| 
 | |
| 	shortAccessTTL := 5 * time.Minute
 | |
| 
 | |
| 	spec := ScenarioSpec{
 | |
| 		NodesPerUser: 1,
 | |
| 		Users:        []string{"user1", "user2"},
 | |
| 		OIDCUsers: []mockoidc.MockUser{
 | |
| 			oidcMockUser("user1", true),
 | |
| 			oidcMockUser("user2", false),
 | |
| 		},
 | |
| 		OIDCAccessTTL: shortAccessTTL,
 | |
| 	}
 | |
| 
 | |
| 	scenario, err := NewScenario(spec)
 | |
| 	assertNoErr(t, err)
 | |
| 	defer scenario.ShutdownAssertNoPanics(t)
 | |
| 
 | |
| 	oidcMap := map[string]string{
 | |
| 		"HEADSCALE_OIDC_ISSUER":                scenario.mockOIDC.Issuer(),
 | |
| 		"HEADSCALE_OIDC_CLIENT_ID":             scenario.mockOIDC.ClientID(),
 | |
| 		"HEADSCALE_OIDC_CLIENT_SECRET":         scenario.mockOIDC.ClientSecret(),
 | |
| 		"HEADSCALE_OIDC_USE_EXPIRY_FROM_TOKEN": "1",
 | |
| 	}
 | |
| 
 | |
| 	err = scenario.CreateHeadscaleEnvWithLoginURL(
 | |
| 		nil,
 | |
| 		hsic.WithTestName("oidcexpirenodes"),
 | |
| 		hsic.WithConfigEnv(oidcMap),
 | |
| 	)
 | |
| 	assertNoErrHeadscaleEnv(t, err)
 | |
| 
 | |
| 	allClients, err := scenario.ListTailscaleClients()
 | |
| 	assertNoErrListClients(t, err)
 | |
| 
 | |
| 	allIps, err := scenario.ListTailscaleClientsIPs()
 | |
| 	assertNoErrListClientIPs(t, err)
 | |
| 
 | |
| 	err = scenario.WaitForTailscaleSync()
 | |
| 	assertNoErrSync(t, err)
 | |
| 
 | |
| 	// assertClientsState(t, allClients)
 | |
| 
 | |
| 	allAddrs := lo.Map(allIps, func(x netip.Addr, index int) string {
 | |
| 		return x.String()
 | |
| 	})
 | |
| 
 | |
| 	success := pingAllHelper(t, allClients, allAddrs)
 | |
| 	t.Logf("%d successful pings out of %d (before expiry)", success, len(allClients)*len(allIps))
 | |
| 
 | |
| 	// This is not great, but this sadly is a time dependent test, so the
 | |
| 	// safe thing to do is wait out the whole TTL time (and a bit more out
 | |
| 	// of safety reasons) before checking if the clients have logged out.
 | |
| 	// The Wait function can't do it itself as it has an upper bound of 1
 | |
| 	// min.
 | |
| 	assert.EventuallyWithT(t, func(ct *assert.CollectT) {
 | |
| 		for _, client := range allClients {
 | |
| 			status, err := client.Status()
 | |
| 			assert.NoError(ct, err)
 | |
| 			assert.Equal(ct, "NeedsLogin", status.BackendState)
 | |
| 		}
 | |
| 	}, shortAccessTTL+10*time.Second, 5*time.Second)
 | |
| }
 | |
| 
 | |
| func TestOIDC024UserCreation(t *testing.T) {
 | |
| 	IntegrationSkip(t)
 | |
| 
 | |
| 	tests := []struct {
 | |
| 		name          string
 | |
| 		config        map[string]string
 | |
| 		emailVerified bool
 | |
| 		cliUsers      []string
 | |
| 		oidcUsers     []string
 | |
| 		want          func(iss string) []*v1.User
 | |
| 	}{
 | |
| 		{
 | |
| 			name:          "no-migration-verified-email",
 | |
| 			emailVerified: true,
 | |
| 			cliUsers:      []string{"user1", "user2"},
 | |
| 			oidcUsers:     []string{"user1", "user2"},
 | |
| 			want: func(iss string) []*v1.User {
 | |
| 				return []*v1.User{
 | |
| 					{
 | |
| 						Id:    1,
 | |
| 						Name:  "user1",
 | |
| 						Email: "user1@test.no",
 | |
| 					},
 | |
| 					{
 | |
| 						Id:         2,
 | |
| 						Name:       "user1",
 | |
| 						Email:      "user1@headscale.net",
 | |
| 						Provider:   "oidc",
 | |
| 						ProviderId: iss + "/user1",
 | |
| 					},
 | |
| 					{
 | |
| 						Id:    3,
 | |
| 						Name:  "user2",
 | |
| 						Email: "user2@test.no",
 | |
| 					},
 | |
| 					{
 | |
| 						Id:         4,
 | |
| 						Name:       "user2",
 | |
| 						Email:      "user2@headscale.net",
 | |
| 						Provider:   "oidc",
 | |
| 						ProviderId: iss + "/user2",
 | |
| 					},
 | |
| 				}
 | |
| 			},
 | |
| 		},
 | |
| 		{
 | |
| 			name:          "no-migration-not-verified-email",
 | |
| 			emailVerified: false,
 | |
| 			cliUsers:      []string{"user1", "user2"},
 | |
| 			oidcUsers:     []string{"user1", "user2"},
 | |
| 			want: func(iss string) []*v1.User {
 | |
| 				return []*v1.User{
 | |
| 					{
 | |
| 						Id:    1,
 | |
| 						Name:  "user1",
 | |
| 						Email: "user1@test.no",
 | |
| 					},
 | |
| 					{
 | |
| 						Id:         2,
 | |
| 						Name:       "user1",
 | |
| 						Provider:   "oidc",
 | |
| 						ProviderId: iss + "/user1",
 | |
| 					},
 | |
| 					{
 | |
| 						Id:    3,
 | |
| 						Name:  "user2",
 | |
| 						Email: "user2@test.no",
 | |
| 					},
 | |
| 					{
 | |
| 						Id:         4,
 | |
| 						Name:       "user2",
 | |
| 						Provider:   "oidc",
 | |
| 						ProviderId: iss + "/user2",
 | |
| 					},
 | |
| 				}
 | |
| 			},
 | |
| 		},
 | |
| 		{
 | |
| 			name:          "migration-no-strip-domains-not-verified-email",
 | |
| 			emailVerified: false,
 | |
| 			cliUsers:      []string{"user1.headscale.net", "user2.headscale.net"},
 | |
| 			oidcUsers:     []string{"user1", "user2"},
 | |
| 			want: func(iss string) []*v1.User {
 | |
| 				return []*v1.User{
 | |
| 					{
 | |
| 						Id:    1,
 | |
| 						Name:  "user1.headscale.net",
 | |
| 						Email: "user1.headscale.net@test.no",
 | |
| 					},
 | |
| 					{
 | |
| 						Id:         2,
 | |
| 						Name:       "user1",
 | |
| 						Provider:   "oidc",
 | |
| 						ProviderId: iss + "/user1",
 | |
| 					},
 | |
| 					{
 | |
| 						Id:    3,
 | |
| 						Name:  "user2.headscale.net",
 | |
| 						Email: "user2.headscale.net@test.no",
 | |
| 					},
 | |
| 					{
 | |
| 						Id:         4,
 | |
| 						Name:       "user2",
 | |
| 						Provider:   "oidc",
 | |
| 						ProviderId: iss + "/user2",
 | |
| 					},
 | |
| 				}
 | |
| 			},
 | |
| 		},
 | |
| 	}
 | |
| 
 | |
| 	for _, tt := range tests {
 | |
| 		t.Run(tt.name, func(t *testing.T) {
 | |
| 			spec := ScenarioSpec{
 | |
| 				NodesPerUser: 1,
 | |
| 			}
 | |
| 			spec.Users = append(spec.Users, tt.cliUsers...)
 | |
| 
 | |
| 			for _, user := range tt.oidcUsers {
 | |
| 				spec.OIDCUsers = append(spec.OIDCUsers, oidcMockUser(user, tt.emailVerified))
 | |
| 			}
 | |
| 
 | |
| 			scenario, err := NewScenario(spec)
 | |
| 			assertNoErr(t, err)
 | |
| 			defer scenario.ShutdownAssertNoPanics(t)
 | |
| 
 | |
| 			oidcMap := map[string]string{
 | |
| 				"HEADSCALE_OIDC_ISSUER":             scenario.mockOIDC.Issuer(),
 | |
| 				"HEADSCALE_OIDC_CLIENT_ID":          scenario.mockOIDC.ClientID(),
 | |
| 				"CREDENTIALS_DIRECTORY_TEST":        "/tmp",
 | |
| 				"HEADSCALE_OIDC_CLIENT_SECRET_PATH": "${CREDENTIALS_DIRECTORY_TEST}/hs_client_oidc_secret",
 | |
| 			}
 | |
| 			maps.Copy(oidcMap, tt.config)
 | |
| 
 | |
| 			err = scenario.CreateHeadscaleEnvWithLoginURL(
 | |
| 				nil,
 | |
| 				hsic.WithTestName("oidcmigration"),
 | |
| 				hsic.WithConfigEnv(oidcMap),
 | |
| 				hsic.WithTLS(),
 | |
| 				hsic.WithFileInContainer("/tmp/hs_client_oidc_secret", []byte(scenario.mockOIDC.ClientSecret())),
 | |
| 			)
 | |
| 			assertNoErrHeadscaleEnv(t, err)
 | |
| 
 | |
| 			// Ensure that the nodes have logged in, this is what
 | |
| 			// triggers user creation via OIDC.
 | |
| 			err = scenario.WaitForTailscaleSync()
 | |
| 			assertNoErrSync(t, err)
 | |
| 
 | |
| 			headscale, err := scenario.Headscale()
 | |
| 			assertNoErr(t, err)
 | |
| 
 | |
| 			want := tt.want(scenario.mockOIDC.Issuer())
 | |
| 
 | |
| 			listUsers, err := headscale.ListUsers()
 | |
| 			assertNoErr(t, err)
 | |
| 
 | |
| 			sort.Slice(listUsers, func(i, j int) bool {
 | |
| 				return listUsers[i].GetId() < listUsers[j].GetId()
 | |
| 			})
 | |
| 
 | |
| 			if diff := cmp.Diff(want, listUsers, cmpopts.IgnoreUnexported(v1.User{}), cmpopts.IgnoreFields(v1.User{}, "CreatedAt")); diff != "" {
 | |
| 				t.Errorf("unexpected users: %s", diff)
 | |
| 			}
 | |
| 		})
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func TestOIDCAuthenticationWithPKCE(t *testing.T) {
 | |
| 	IntegrationSkip(t)
 | |
| 
 | |
| 	// Single user with one node for testing PKCE flow
 | |
| 	spec := ScenarioSpec{
 | |
| 		NodesPerUser: 1,
 | |
| 		Users:        []string{"user1"},
 | |
| 		OIDCUsers: []mockoidc.MockUser{
 | |
| 			oidcMockUser("user1", true),
 | |
| 		},
 | |
| 	}
 | |
| 
 | |
| 	scenario, err := NewScenario(spec)
 | |
| 	assertNoErr(t, err)
 | |
| 	defer scenario.ShutdownAssertNoPanics(t)
 | |
| 
 | |
| 	oidcMap := map[string]string{
 | |
| 		"HEADSCALE_OIDC_ISSUER":             scenario.mockOIDC.Issuer(),
 | |
| 		"HEADSCALE_OIDC_CLIENT_ID":          scenario.mockOIDC.ClientID(),
 | |
| 		"HEADSCALE_OIDC_CLIENT_SECRET_PATH": "${CREDENTIALS_DIRECTORY_TEST}/hs_client_oidc_secret",
 | |
| 		"CREDENTIALS_DIRECTORY_TEST":        "/tmp",
 | |
| 		"HEADSCALE_OIDC_PKCE_ENABLED":       "1", // Enable PKCE
 | |
| 	}
 | |
| 
 | |
| 	err = scenario.CreateHeadscaleEnvWithLoginURL(
 | |
| 		nil,
 | |
| 		hsic.WithTestName("oidcauthpkce"),
 | |
| 		hsic.WithConfigEnv(oidcMap),
 | |
| 		hsic.WithTLS(),
 | |
| 		hsic.WithFileInContainer("/tmp/hs_client_oidc_secret", []byte(scenario.mockOIDC.ClientSecret())),
 | |
| 	)
 | |
| 	assertNoErrHeadscaleEnv(t, err)
 | |
| 
 | |
| 	// Get all clients and verify they can connect
 | |
| 	allClients, err := scenario.ListTailscaleClients()
 | |
| 	assertNoErrListClients(t, err)
 | |
| 
 | |
| 	allIps, err := scenario.ListTailscaleClientsIPs()
 | |
| 	assertNoErrListClientIPs(t, err)
 | |
| 
 | |
| 	err = scenario.WaitForTailscaleSync()
 | |
| 	assertNoErrSync(t, err)
 | |
| 
 | |
| 	allAddrs := lo.Map(allIps, func(x netip.Addr, index int) string {
 | |
| 		return x.String()
 | |
| 	})
 | |
| 
 | |
| 	success := pingAllHelper(t, allClients, allAddrs)
 | |
| 	t.Logf("%d successful pings out of %d", success, len(allClients)*len(allIps))
 | |
| }
 | |
| 
 | |
| func TestOIDCReloginSameNodeNewUser(t *testing.T) {
 | |
| 	IntegrationSkip(t)
 | |
| 
 | |
| 	// Create no nodes and no users
 | |
| 	scenario, err := NewScenario(ScenarioSpec{
 | |
| 		// First login creates the first OIDC user
 | |
| 		// Second login logs in the same node, which creates a new node
 | |
| 		// Third login logs in the same node back into the original user
 | |
| 		OIDCUsers: []mockoidc.MockUser{
 | |
| 			oidcMockUser("user1", true),
 | |
| 			oidcMockUser("user2", true),
 | |
| 			oidcMockUser("user1", true),
 | |
| 		},
 | |
| 	})
 | |
| 	assertNoErr(t, err)
 | |
| 	defer scenario.ShutdownAssertNoPanics(t)
 | |
| 
 | |
| 	oidcMap := map[string]string{
 | |
| 		"HEADSCALE_OIDC_ISSUER":             scenario.mockOIDC.Issuer(),
 | |
| 		"HEADSCALE_OIDC_CLIENT_ID":          scenario.mockOIDC.ClientID(),
 | |
| 		"CREDENTIALS_DIRECTORY_TEST":        "/tmp",
 | |
| 		"HEADSCALE_OIDC_CLIENT_SECRET_PATH": "${CREDENTIALS_DIRECTORY_TEST}/hs_client_oidc_secret",
 | |
| 	}
 | |
| 
 | |
| 	err = scenario.CreateHeadscaleEnvWithLoginURL(
 | |
| 		nil,
 | |
| 		hsic.WithTestName("oidcauthrelog"),
 | |
| 		hsic.WithConfigEnv(oidcMap),
 | |
| 		hsic.WithTLS(),
 | |
| 		hsic.WithFileInContainer("/tmp/hs_client_oidc_secret", []byte(scenario.mockOIDC.ClientSecret())),
 | |
| 		hsic.WithEmbeddedDERPServerOnly(),
 | |
| 	)
 | |
| 	assertNoErrHeadscaleEnv(t, err)
 | |
| 
 | |
| 	headscale, err := scenario.Headscale()
 | |
| 	assertNoErr(t, err)
 | |
| 
 | |
| 	listUsers, err := headscale.ListUsers()
 | |
| 	assertNoErr(t, err)
 | |
| 	assert.Empty(t, listUsers)
 | |
| 
 | |
| 	ts, err := scenario.CreateTailscaleNode("unstable", tsic.WithNetwork(scenario.networks[scenario.testDefaultNetwork]))
 | |
| 	assertNoErr(t, err)
 | |
| 
 | |
| 	u, err := ts.LoginWithURL(headscale.GetEndpoint())
 | |
| 	assertNoErr(t, err)
 | |
| 
 | |
| 	_, err = doLoginURL(ts.Hostname(), u)
 | |
| 	assertNoErr(t, err)
 | |
| 
 | |
| 	listUsers, err = headscale.ListUsers()
 | |
| 	assertNoErr(t, err)
 | |
| 	assert.Len(t, listUsers, 1)
 | |
| 	wantUsers := []*v1.User{
 | |
| 		{
 | |
| 			Id:         1,
 | |
| 			Name:       "user1",
 | |
| 			Email:      "user1@headscale.net",
 | |
| 			Provider:   "oidc",
 | |
| 			ProviderId: scenario.mockOIDC.Issuer() + "/user1",
 | |
| 		},
 | |
| 	}
 | |
| 
 | |
| 	sort.Slice(listUsers, func(i, j int) bool {
 | |
| 		return listUsers[i].GetId() < listUsers[j].GetId()
 | |
| 	})
 | |
| 
 | |
| 	if diff := cmp.Diff(wantUsers, listUsers, cmpopts.IgnoreUnexported(v1.User{}), cmpopts.IgnoreFields(v1.User{}, "CreatedAt")); diff != "" {
 | |
| 		t.Fatalf("unexpected users: %s", diff)
 | |
| 	}
 | |
| 
 | |
| 	listNodes, err := headscale.ListNodes()
 | |
| 	assertNoErr(t, err)
 | |
| 	assert.Len(t, listNodes, 1)
 | |
| 
 | |
| 	// Log out user1 and log in user2, this should create a new node
 | |
| 	// for user2, the node should have the same machine key and
 | |
| 	// a new node key.
 | |
| 	err = ts.Logout()
 | |
| 	assertNoErr(t, err)
 | |
| 
 | |
| 	// Wait for logout to complete and then do second logout
 | |
| 	assert.EventuallyWithT(t, func(ct *assert.CollectT) {
 | |
| 		// Check that the first logout completed
 | |
| 		status, err := ts.Status()
 | |
| 		assert.NoError(ct, err)
 | |
| 		assert.Equal(ct, "NeedsLogin", status.BackendState)
 | |
| 	}, 5*time.Second, 1*time.Second)
 | |
| 
 | |
| 	// TODO(kradalby): Not sure why we need to logout twice, but it fails and
 | |
| 	// logs in immediately after the first logout and I cannot reproduce it
 | |
| 	// manually.
 | |
| 	err = ts.Logout()
 | |
| 	assertNoErr(t, err)
 | |
| 
 | |
| 	u, err = ts.LoginWithURL(headscale.GetEndpoint())
 | |
| 	assertNoErr(t, err)
 | |
| 
 | |
| 	_, err = doLoginURL(ts.Hostname(), u)
 | |
| 	assertNoErr(t, err)
 | |
| 
 | |
| 	listUsers, err = headscale.ListUsers()
 | |
| 	assertNoErr(t, err)
 | |
| 	assert.Len(t, listUsers, 2)
 | |
| 	wantUsers = []*v1.User{
 | |
| 		{
 | |
| 			Id:         1,
 | |
| 			Name:       "user1",
 | |
| 			Email:      "user1@headscale.net",
 | |
| 			Provider:   "oidc",
 | |
| 			ProviderId: scenario.mockOIDC.Issuer() + "/user1",
 | |
| 		},
 | |
| 		{
 | |
| 			Id:         2,
 | |
| 			Name:       "user2",
 | |
| 			Email:      "user2@headscale.net",
 | |
| 			Provider:   "oidc",
 | |
| 			ProviderId: scenario.mockOIDC.Issuer() + "/user2",
 | |
| 		},
 | |
| 	}
 | |
| 
 | |
| 	sort.Slice(listUsers, func(i, j int) bool {
 | |
| 		return listUsers[i].GetId() < listUsers[j].GetId()
 | |
| 	})
 | |
| 
 | |
| 	if diff := cmp.Diff(wantUsers, listUsers, cmpopts.IgnoreUnexported(v1.User{}), cmpopts.IgnoreFields(v1.User{}, "CreatedAt")); diff != "" {
 | |
| 		t.Fatalf("unexpected users: %s", diff)
 | |
| 	}
 | |
| 
 | |
| 	listNodesAfterNewUserLogin, err := headscale.ListNodes()
 | |
| 	assertNoErr(t, err)
 | |
| 	assert.Len(t, listNodesAfterNewUserLogin, 2)
 | |
| 
 | |
| 	// Machine key is the same as the "machine" has not changed,
 | |
| 	// but Node key is not as it is a new node
 | |
| 	assert.Equal(t, listNodes[0].GetMachineKey(), listNodesAfterNewUserLogin[0].GetMachineKey())
 | |
| 	assert.Equal(t, listNodesAfterNewUserLogin[0].GetMachineKey(), listNodesAfterNewUserLogin[1].GetMachineKey())
 | |
| 	assert.NotEqual(t, listNodesAfterNewUserLogin[0].GetNodeKey(), listNodesAfterNewUserLogin[1].GetNodeKey())
 | |
| 
 | |
| 	// Log out user2, and log into user1, no new node should be created,
 | |
| 	// the node should now "become" node1 again
 | |
| 	err = ts.Logout()
 | |
| 	assertNoErr(t, err)
 | |
| 
 | |
| 	// Wait for logout to complete and then do second logout
 | |
| 	assert.EventuallyWithT(t, func(ct *assert.CollectT) {
 | |
| 		// Check that the first logout completed
 | |
| 		status, err := ts.Status()
 | |
| 		assert.NoError(ct, err)
 | |
| 		assert.Equal(ct, "NeedsLogin", status.BackendState)
 | |
| 	}, 5*time.Second, 1*time.Second)
 | |
| 
 | |
| 	// TODO(kradalby): Not sure why we need to logout twice, but it fails and
 | |
| 	// logs in immediately after the first logout and I cannot reproduce it
 | |
| 	// manually.
 | |
| 	err = ts.Logout()
 | |
| 	assertNoErr(t, err)
 | |
| 
 | |
| 	u, err = ts.LoginWithURL(headscale.GetEndpoint())
 | |
| 	assertNoErr(t, err)
 | |
| 
 | |
| 	_, err = doLoginURL(ts.Hostname(), u)
 | |
| 	assertNoErr(t, err)
 | |
| 
 | |
| 	listUsers, err = headscale.ListUsers()
 | |
| 	assertNoErr(t, err)
 | |
| 	assert.Len(t, listUsers, 2)
 | |
| 	wantUsers = []*v1.User{
 | |
| 		{
 | |
| 			Id:         1,
 | |
| 			Name:       "user1",
 | |
| 			Email:      "user1@headscale.net",
 | |
| 			Provider:   "oidc",
 | |
| 			ProviderId: scenario.mockOIDC.Issuer() + "/user1",
 | |
| 		},
 | |
| 		{
 | |
| 			Id:         2,
 | |
| 			Name:       "user2",
 | |
| 			Email:      "user2@headscale.net",
 | |
| 			Provider:   "oidc",
 | |
| 			ProviderId: scenario.mockOIDC.Issuer() + "/user2",
 | |
| 		},
 | |
| 	}
 | |
| 
 | |
| 	sort.Slice(listUsers, func(i, j int) bool {
 | |
| 		return listUsers[i].GetId() < listUsers[j].GetId()
 | |
| 	})
 | |
| 
 | |
| 	if diff := cmp.Diff(wantUsers, listUsers, cmpopts.IgnoreUnexported(v1.User{}), cmpopts.IgnoreFields(v1.User{}, "CreatedAt")); diff != "" {
 | |
| 		t.Fatalf("unexpected users: %s", diff)
 | |
| 	}
 | |
| 
 | |
| 	listNodesAfterLoggingBackIn, err := headscale.ListNodes()
 | |
| 	assertNoErr(t, err)
 | |
| 	assert.Len(t, listNodesAfterLoggingBackIn, 2)
 | |
| 
 | |
| 	// Validate that the machine we had when we logged in the first time, has the same
 | |
| 	// machine key, but a different ID than the newly logged in version of the same
 | |
| 	// machine.
 | |
| 	assert.Equal(t, listNodes[0].GetMachineKey(), listNodesAfterNewUserLogin[0].GetMachineKey())
 | |
| 	assert.Equal(t, listNodes[0].GetNodeKey(), listNodesAfterNewUserLogin[0].GetNodeKey())
 | |
| 	assert.Equal(t, listNodes[0].GetId(), listNodesAfterNewUserLogin[0].GetId())
 | |
| 	assert.Equal(t, listNodes[0].GetMachineKey(), listNodesAfterNewUserLogin[1].GetMachineKey())
 | |
| 	assert.NotEqual(t, listNodes[0].GetId(), listNodesAfterNewUserLogin[1].GetId())
 | |
| 	assert.NotEqual(t, listNodes[0].GetUser().GetId(), listNodesAfterNewUserLogin[1].GetUser().GetId())
 | |
| 
 | |
| 	// Even tho we are logging in again with the same user, the previous key has been expired
 | |
| 	// and a new one has been generated. The node entry in the database should be the same
 | |
| 	// as the user + machinekey still matches.
 | |
| 	assert.Equal(t, listNodes[0].GetMachineKey(), listNodesAfterLoggingBackIn[0].GetMachineKey())
 | |
| 	assert.NotEqual(t, listNodes[0].GetNodeKey(), listNodesAfterLoggingBackIn[0].GetNodeKey())
 | |
| 	assert.Equal(t, listNodes[0].GetId(), listNodesAfterLoggingBackIn[0].GetId())
 | |
| 
 | |
| 	// The "logged back in" machine should have the same machinekey but a different nodekey
 | |
| 	// than the version logged in with a different user.
 | |
| 	assert.Equal(t, listNodesAfterLoggingBackIn[0].GetMachineKey(), listNodesAfterLoggingBackIn[1].GetMachineKey())
 | |
| 	assert.NotEqual(t, listNodesAfterLoggingBackIn[0].GetNodeKey(), listNodesAfterLoggingBackIn[1].GetNodeKey())
 | |
| }
 | |
| 
 | |
| func assertTailscaleNodesLogout(t *testing.T, clients []TailscaleClient) {
 | |
| 	t.Helper()
 | |
| 
 | |
| 	for _, client := range clients {
 | |
| 		status, err := client.Status()
 | |
| 		assertNoErr(t, err)
 | |
| 
 | |
| 		assert.Equal(t, "NeedsLogin", status.BackendState)
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func oidcMockUser(username string, emailVerified bool) mockoidc.MockUser {
 | |
| 	return mockoidc.MockUser{
 | |
| 		Subject:           username,
 | |
| 		PreferredUsername: username,
 | |
| 		Email:             username + "@headscale.net",
 | |
| 		EmailVerified:     emailVerified,
 | |
| 	}
 | |
| }
 |