mirror of
				https://github.com/juanfont/headscale.git
				synced 2025-10-28 10:51:44 +01:00 
			
		
		
		
	* types/node: add helper funcs for node tags
Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com>
* types/node: add DebugString method for node
Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com>
* policy/v2: add String func to AutoApprover interface
Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com>
* policy/v2: simplify, use slices.Contains
Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com>
* policy/v2: debug, use nodes.DebugString
Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com>
* policy/v1: fix potential nil pointer in NodeCanApproveRoute
Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com>
* policy/v1: slices.Contains
Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com>
* integration/tsic: fix diff in login commands
Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com>
* integration: fix webauth running with wrong scenario
Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com>
* integration: move common oidc opts to func
Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com>
* integration: require node count, more verbose
Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com>
* auth: remove uneffective route approve
Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com>
* .github/workflows: fmt
Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com>
* integration/tsic: add id func
Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com>
* integration: remove call that might be nil
Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com>
* integration: test autoapprovers against web/authkey x group/tag/user
Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com>
* integration: unique network id per scenario
Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com>
* Revert "integration: move common oidc opts to func"
This reverts commit 7e9d165d4a.
* remove cmd
Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com>
* integration: clean docker images between runs in ci
Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com>
* integration: run autoapprove test against differnt policy modes
Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com>
* integration/tsic: append, not overrwrite extra login args
Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com>
* .github/workflows: remove polv2
Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com>
---------
Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com>
		
	
			
		
			
				
	
	
		
			173 lines
		
	
	
		
			4.2 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			173 lines
		
	
	
		
			4.2 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| package integration
 | |
| 
 | |
| import (
 | |
| 	"net/netip"
 | |
| 	"testing"
 | |
| 
 | |
| 	"slices"
 | |
| 
 | |
| 	"github.com/juanfont/headscale/integration/hsic"
 | |
| 	"github.com/samber/lo"
 | |
| 	"github.com/stretchr/testify/assert"
 | |
| 	"github.com/stretchr/testify/require"
 | |
| )
 | |
| 
 | |
| func TestAuthWebFlowAuthenticationPingAll(t *testing.T) {
 | |
| 	IntegrationSkip(t)
 | |
| 
 | |
| 	spec := ScenarioSpec{
 | |
| 		NodesPerUser: len(MustTestVersions),
 | |
| 		Users:        []string{"user1", "user2"},
 | |
| 	}
 | |
| 
 | |
| 	scenario, err := NewScenario(spec)
 | |
| 	if err != nil {
 | |
| 		t.Fatalf("failed to create scenario: %s", err)
 | |
| 	}
 | |
| 	defer scenario.ShutdownAssertNoPanics(t)
 | |
| 
 | |
| 	err = scenario.CreateHeadscaleEnvWithLoginURL(
 | |
| 		nil,
 | |
| 		hsic.WithTestName("webauthping"),
 | |
| 		hsic.WithEmbeddedDERPServerOnly(),
 | |
| 		hsic.WithTLS(),
 | |
| 	)
 | |
| 	assertNoErrHeadscaleEnv(t, err)
 | |
| 
 | |
| 	allClients, err := scenario.ListTailscaleClients()
 | |
| 	assertNoErrListClients(t, err)
 | |
| 
 | |
| 	allIps, err := scenario.ListTailscaleClientsIPs()
 | |
| 	assertNoErrListClientIPs(t, err)
 | |
| 
 | |
| 	err = scenario.WaitForTailscaleSync()
 | |
| 	assertNoErrSync(t, err)
 | |
| 
 | |
| 	// assertClientsState(t, allClients)
 | |
| 
 | |
| 	allAddrs := lo.Map(allIps, func(x netip.Addr, index int) string {
 | |
| 		return x.String()
 | |
| 	})
 | |
| 
 | |
| 	success := pingAllHelper(t, allClients, allAddrs)
 | |
| 	t.Logf("%d successful pings out of %d", success, len(allClients)*len(allIps))
 | |
| }
 | |
| 
 | |
| func TestAuthWebFlowLogoutAndRelogin(t *testing.T) {
 | |
| 	IntegrationSkip(t)
 | |
| 	t.Parallel()
 | |
| 
 | |
| 	spec := ScenarioSpec{
 | |
| 		NodesPerUser: len(MustTestVersions),
 | |
| 		Users:        []string{"user1", "user2"},
 | |
| 	}
 | |
| 
 | |
| 	scenario, err := NewScenario(spec)
 | |
| 	assertNoErr(t, err)
 | |
| 	defer scenario.ShutdownAssertNoPanics(t)
 | |
| 
 | |
| 	err = scenario.CreateHeadscaleEnvWithLoginURL(
 | |
| 		nil,
 | |
| 		hsic.WithTestName("weblogout"),
 | |
| 		hsic.WithTLS(),
 | |
| 	)
 | |
| 	assertNoErrHeadscaleEnv(t, err)
 | |
| 
 | |
| 	allClients, err := scenario.ListTailscaleClients()
 | |
| 	assertNoErrListClients(t, err)
 | |
| 
 | |
| 	allIps, err := scenario.ListTailscaleClientsIPs()
 | |
| 	assertNoErrListClientIPs(t, err)
 | |
| 
 | |
| 	err = scenario.WaitForTailscaleSync()
 | |
| 	assertNoErrSync(t, err)
 | |
| 
 | |
| 	// assertClientsState(t, allClients)
 | |
| 
 | |
| 	allAddrs := lo.Map(allIps, func(x netip.Addr, index int) string {
 | |
| 		return x.String()
 | |
| 	})
 | |
| 
 | |
| 	success := pingAllHelper(t, allClients, allAddrs)
 | |
| 	t.Logf("%d successful pings out of %d", success, len(allClients)*len(allIps))
 | |
| 
 | |
| 	headscale, err := scenario.Headscale()
 | |
| 	assertNoErrGetHeadscale(t, err)
 | |
| 
 | |
| 	listNodes, err := headscale.ListNodes()
 | |
| 	assert.Equal(t, len(listNodes), len(allClients))
 | |
| 	nodeCountBeforeLogout := len(listNodes)
 | |
| 	t.Logf("node count before logout: %d", nodeCountBeforeLogout)
 | |
| 
 | |
| 	clientIPs := make(map[TailscaleClient][]netip.Addr)
 | |
| 	for _, client := range allClients {
 | |
| 		ips, err := client.IPs()
 | |
| 		if err != nil {
 | |
| 			t.Fatalf("failed to get IPs for client %s: %s", client.Hostname(), err)
 | |
| 		}
 | |
| 		clientIPs[client] = ips
 | |
| 	}
 | |
| 
 | |
| 	for _, client := range allClients {
 | |
| 		err := client.Logout()
 | |
| 		if err != nil {
 | |
| 			t.Fatalf("failed to logout client %s: %s", client.Hostname(), err)
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	err = scenario.WaitForTailscaleLogout()
 | |
| 	assertNoErrLogout(t, err)
 | |
| 
 | |
| 	t.Logf("all clients logged out")
 | |
| 
 | |
| 	for _, userName := range spec.Users {
 | |
| 		err = scenario.RunTailscaleUpWithURL(userName, headscale.GetEndpoint())
 | |
| 		if err != nil {
 | |
| 			t.Fatalf("failed to run tailscale up (%q): %s", headscale.GetEndpoint(), err)
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	t.Logf("all clients logged in again")
 | |
| 
 | |
| 	allIps, err = scenario.ListTailscaleClientsIPs()
 | |
| 	assertNoErrListClientIPs(t, err)
 | |
| 
 | |
| 	allAddrs = lo.Map(allIps, func(x netip.Addr, index int) string {
 | |
| 		return x.String()
 | |
| 	})
 | |
| 
 | |
| 	success = pingAllHelper(t, allClients, allAddrs)
 | |
| 	t.Logf("%d successful pings out of %d", success, len(allClients)*len(allIps))
 | |
| 
 | |
| 	listNodes, err = headscale.ListNodes()
 | |
| 	require.Equal(t, nodeCountBeforeLogout, len(listNodes))
 | |
| 	t.Logf("node count first login: %d, after relogin: %d", nodeCountBeforeLogout, len(listNodes))
 | |
| 
 | |
| 	for _, client := range allClients {
 | |
| 		ips, err := client.IPs()
 | |
| 		if err != nil {
 | |
| 			t.Fatalf("failed to get IPs for client %s: %s", client.Hostname(), err)
 | |
| 		}
 | |
| 
 | |
| 		// lets check if the IPs are the same
 | |
| 		if len(ips) != len(clientIPs[client]) {
 | |
| 			t.Fatalf("IPs changed for client %s", client.Hostname())
 | |
| 		}
 | |
| 
 | |
| 		for _, ip := range ips {
 | |
| 			found := slices.Contains(clientIPs[client], ip)
 | |
| 
 | |
| 			if !found {
 | |
| 				t.Fatalf(
 | |
| 					"IPs changed for client %s. Used to be %v now %v",
 | |
| 					client.Hostname(),
 | |
| 					clientIPs[client],
 | |
| 					ips,
 | |
| 				)
 | |
| 			}
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	t.Logf("all clients IPs are the same")
 | |
| }
 |