mirror of
				https://github.com/juanfont/headscale.git
				synced 2025-10-28 10:51:44 +01:00 
			
		
		
		
	* types/node: add helper funcs for node tags
Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com>
* types/node: add DebugString method for node
Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com>
* policy/v2: add String func to AutoApprover interface
Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com>
* policy/v2: simplify, use slices.Contains
Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com>
* policy/v2: debug, use nodes.DebugString
Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com>
* policy/v1: fix potential nil pointer in NodeCanApproveRoute
Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com>
* policy/v1: slices.Contains
Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com>
* integration/tsic: fix diff in login commands
Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com>
* integration: fix webauth running with wrong scenario
Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com>
* integration: move common oidc opts to func
Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com>
* integration: require node count, more verbose
Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com>
* auth: remove uneffective route approve
Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com>
* .github/workflows: fmt
Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com>
* integration/tsic: add id func
Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com>
* integration: remove call that might be nil
Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com>
* integration: test autoapprovers against web/authkey x group/tag/user
Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com>
* integration: unique network id per scenario
Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com>
* Revert "integration: move common oidc opts to func"
This reverts commit 7e9d165d4a.
* remove cmd
Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com>
* integration: clean docker images between runs in ci
Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com>
* integration: run autoapprove test against differnt policy modes
Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com>
* integration/tsic: append, not overrwrite extra login args
Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com>
* .github/workflows: remove polv2
Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com>
---------
Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com>
		
	
			
		
			
				
	
	
		
			173 lines
		
	
	
		
			4.2 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			173 lines
		
	
	
		
			4.2 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
package integration
 | 
						|
 | 
						|
import (
 | 
						|
	"net/netip"
 | 
						|
	"testing"
 | 
						|
 | 
						|
	"slices"
 | 
						|
 | 
						|
	"github.com/juanfont/headscale/integration/hsic"
 | 
						|
	"github.com/samber/lo"
 | 
						|
	"github.com/stretchr/testify/assert"
 | 
						|
	"github.com/stretchr/testify/require"
 | 
						|
)
 | 
						|
 | 
						|
func TestAuthWebFlowAuthenticationPingAll(t *testing.T) {
 | 
						|
	IntegrationSkip(t)
 | 
						|
 | 
						|
	spec := ScenarioSpec{
 | 
						|
		NodesPerUser: len(MustTestVersions),
 | 
						|
		Users:        []string{"user1", "user2"},
 | 
						|
	}
 | 
						|
 | 
						|
	scenario, err := NewScenario(spec)
 | 
						|
	if err != nil {
 | 
						|
		t.Fatalf("failed to create scenario: %s", err)
 | 
						|
	}
 | 
						|
	defer scenario.ShutdownAssertNoPanics(t)
 | 
						|
 | 
						|
	err = scenario.CreateHeadscaleEnvWithLoginURL(
 | 
						|
		nil,
 | 
						|
		hsic.WithTestName("webauthping"),
 | 
						|
		hsic.WithEmbeddedDERPServerOnly(),
 | 
						|
		hsic.WithTLS(),
 | 
						|
	)
 | 
						|
	assertNoErrHeadscaleEnv(t, err)
 | 
						|
 | 
						|
	allClients, err := scenario.ListTailscaleClients()
 | 
						|
	assertNoErrListClients(t, err)
 | 
						|
 | 
						|
	allIps, err := scenario.ListTailscaleClientsIPs()
 | 
						|
	assertNoErrListClientIPs(t, err)
 | 
						|
 | 
						|
	err = scenario.WaitForTailscaleSync()
 | 
						|
	assertNoErrSync(t, err)
 | 
						|
 | 
						|
	// assertClientsState(t, allClients)
 | 
						|
 | 
						|
	allAddrs := lo.Map(allIps, func(x netip.Addr, index int) string {
 | 
						|
		return x.String()
 | 
						|
	})
 | 
						|
 | 
						|
	success := pingAllHelper(t, allClients, allAddrs)
 | 
						|
	t.Logf("%d successful pings out of %d", success, len(allClients)*len(allIps))
 | 
						|
}
 | 
						|
 | 
						|
func TestAuthWebFlowLogoutAndRelogin(t *testing.T) {
 | 
						|
	IntegrationSkip(t)
 | 
						|
	t.Parallel()
 | 
						|
 | 
						|
	spec := ScenarioSpec{
 | 
						|
		NodesPerUser: len(MustTestVersions),
 | 
						|
		Users:        []string{"user1", "user2"},
 | 
						|
	}
 | 
						|
 | 
						|
	scenario, err := NewScenario(spec)
 | 
						|
	assertNoErr(t, err)
 | 
						|
	defer scenario.ShutdownAssertNoPanics(t)
 | 
						|
 | 
						|
	err = scenario.CreateHeadscaleEnvWithLoginURL(
 | 
						|
		nil,
 | 
						|
		hsic.WithTestName("weblogout"),
 | 
						|
		hsic.WithTLS(),
 | 
						|
	)
 | 
						|
	assertNoErrHeadscaleEnv(t, err)
 | 
						|
 | 
						|
	allClients, err := scenario.ListTailscaleClients()
 | 
						|
	assertNoErrListClients(t, err)
 | 
						|
 | 
						|
	allIps, err := scenario.ListTailscaleClientsIPs()
 | 
						|
	assertNoErrListClientIPs(t, err)
 | 
						|
 | 
						|
	err = scenario.WaitForTailscaleSync()
 | 
						|
	assertNoErrSync(t, err)
 | 
						|
 | 
						|
	// assertClientsState(t, allClients)
 | 
						|
 | 
						|
	allAddrs := lo.Map(allIps, func(x netip.Addr, index int) string {
 | 
						|
		return x.String()
 | 
						|
	})
 | 
						|
 | 
						|
	success := pingAllHelper(t, allClients, allAddrs)
 | 
						|
	t.Logf("%d successful pings out of %d", success, len(allClients)*len(allIps))
 | 
						|
 | 
						|
	headscale, err := scenario.Headscale()
 | 
						|
	assertNoErrGetHeadscale(t, err)
 | 
						|
 | 
						|
	listNodes, err := headscale.ListNodes()
 | 
						|
	assert.Equal(t, len(listNodes), len(allClients))
 | 
						|
	nodeCountBeforeLogout := len(listNodes)
 | 
						|
	t.Logf("node count before logout: %d", nodeCountBeforeLogout)
 | 
						|
 | 
						|
	clientIPs := make(map[TailscaleClient][]netip.Addr)
 | 
						|
	for _, client := range allClients {
 | 
						|
		ips, err := client.IPs()
 | 
						|
		if err != nil {
 | 
						|
			t.Fatalf("failed to get IPs for client %s: %s", client.Hostname(), err)
 | 
						|
		}
 | 
						|
		clientIPs[client] = ips
 | 
						|
	}
 | 
						|
 | 
						|
	for _, client := range allClients {
 | 
						|
		err := client.Logout()
 | 
						|
		if err != nil {
 | 
						|
			t.Fatalf("failed to logout client %s: %s", client.Hostname(), err)
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
	err = scenario.WaitForTailscaleLogout()
 | 
						|
	assertNoErrLogout(t, err)
 | 
						|
 | 
						|
	t.Logf("all clients logged out")
 | 
						|
 | 
						|
	for _, userName := range spec.Users {
 | 
						|
		err = scenario.RunTailscaleUpWithURL(userName, headscale.GetEndpoint())
 | 
						|
		if err != nil {
 | 
						|
			t.Fatalf("failed to run tailscale up (%q): %s", headscale.GetEndpoint(), err)
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
	t.Logf("all clients logged in again")
 | 
						|
 | 
						|
	allIps, err = scenario.ListTailscaleClientsIPs()
 | 
						|
	assertNoErrListClientIPs(t, err)
 | 
						|
 | 
						|
	allAddrs = lo.Map(allIps, func(x netip.Addr, index int) string {
 | 
						|
		return x.String()
 | 
						|
	})
 | 
						|
 | 
						|
	success = pingAllHelper(t, allClients, allAddrs)
 | 
						|
	t.Logf("%d successful pings out of %d", success, len(allClients)*len(allIps))
 | 
						|
 | 
						|
	listNodes, err = headscale.ListNodes()
 | 
						|
	require.Equal(t, nodeCountBeforeLogout, len(listNodes))
 | 
						|
	t.Logf("node count first login: %d, after relogin: %d", nodeCountBeforeLogout, len(listNodes))
 | 
						|
 | 
						|
	for _, client := range allClients {
 | 
						|
		ips, err := client.IPs()
 | 
						|
		if err != nil {
 | 
						|
			t.Fatalf("failed to get IPs for client %s: %s", client.Hostname(), err)
 | 
						|
		}
 | 
						|
 | 
						|
		// lets check if the IPs are the same
 | 
						|
		if len(ips) != len(clientIPs[client]) {
 | 
						|
			t.Fatalf("IPs changed for client %s", client.Hostname())
 | 
						|
		}
 | 
						|
 | 
						|
		for _, ip := range ips {
 | 
						|
			found := slices.Contains(clientIPs[client], ip)
 | 
						|
 | 
						|
			if !found {
 | 
						|
				t.Fatalf(
 | 
						|
					"IPs changed for client %s. Used to be %v now %v",
 | 
						|
					client.Hostname(),
 | 
						|
					clientIPs[client],
 | 
						|
					ips,
 | 
						|
				)
 | 
						|
			}
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
	t.Logf("all clients IPs are the same")
 | 
						|
}
 |