mirror of
				https://github.com/juanfont/headscale.git
				synced 2025-10-28 10:51:44 +01:00 
			
		
		
		
	* feat: support client verify for derp * docs: fix doc for integration test * tests: add integration test for DERP verify endpoint * tests: use `tailcfg.DERPMap` instead of `[]byte` * refactor: introduce func `ContainsNodeKey` * tests(dsic): use string builder for cmd args * ci: fix tests order * tests: fix derper failure * chore: cleanup * tests(verify-client): perfer to use `CreateHeadscaleEnv` * refactor(verify-client): simplify error handling * tests: fix `TestDERPVerifyEndpoint` * refactor: make `doVerify` a seperated func --------- Co-authored-by: 117503445 <t117503445@gmail.com>
		
			
				
	
	
		
			186 lines
		
	
	
		
			3.9 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			186 lines
		
	
	
		
			3.9 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| package integrationutil
 | |
| 
 | |
| import (
 | |
| 	"archive/tar"
 | |
| 	"bytes"
 | |
| 	"crypto/rand"
 | |
| 	"crypto/rsa"
 | |
| 	"crypto/x509"
 | |
| 	"crypto/x509/pkix"
 | |
| 	"encoding/pem"
 | |
| 	"fmt"
 | |
| 	"io"
 | |
| 	"math/big"
 | |
| 	"path/filepath"
 | |
| 	"time"
 | |
| 
 | |
| 	"github.com/juanfont/headscale/integration/dockertestutil"
 | |
| 	"github.com/ory/dockertest/v3"
 | |
| 	"github.com/ory/dockertest/v3/docker"
 | |
| )
 | |
| 
 | |
| func WriteFileToContainer(
 | |
| 	pool *dockertest.Pool,
 | |
| 	container *dockertest.Resource,
 | |
| 	path string,
 | |
| 	data []byte,
 | |
| ) error {
 | |
| 	dirPath, fileName := filepath.Split(path)
 | |
| 
 | |
| 	file := bytes.NewReader(data)
 | |
| 
 | |
| 	buf := bytes.NewBuffer([]byte{})
 | |
| 
 | |
| 	tarWriter := tar.NewWriter(buf)
 | |
| 
 | |
| 	header := &tar.Header{
 | |
| 		Name: fileName,
 | |
| 		Size: file.Size(),
 | |
| 		// Mode:    int64(stat.Mode()),
 | |
| 		// ModTime: stat.ModTime(),
 | |
| 	}
 | |
| 
 | |
| 	err := tarWriter.WriteHeader(header)
 | |
| 	if err != nil {
 | |
| 		return fmt.Errorf("failed write file header to tar: %w", err)
 | |
| 	}
 | |
| 
 | |
| 	_, err = io.Copy(tarWriter, file)
 | |
| 	if err != nil {
 | |
| 		return fmt.Errorf("failed to copy file to tar: %w", err)
 | |
| 	}
 | |
| 
 | |
| 	err = tarWriter.Close()
 | |
| 	if err != nil {
 | |
| 		return fmt.Errorf("failed to close tar: %w", err)
 | |
| 	}
 | |
| 
 | |
| 	// Ensure the directory is present inside the container
 | |
| 	_, _, err = dockertestutil.ExecuteCommand(
 | |
| 		container,
 | |
| 		[]string{"mkdir", "-p", dirPath},
 | |
| 		[]string{},
 | |
| 	)
 | |
| 	if err != nil {
 | |
| 		return fmt.Errorf("failed to ensure directory: %w", err)
 | |
| 	}
 | |
| 
 | |
| 	err = pool.Client.UploadToContainer(
 | |
| 		container.Container.ID,
 | |
| 		docker.UploadToContainerOptions{
 | |
| 			NoOverwriteDirNonDir: false,
 | |
| 			Path:                 dirPath,
 | |
| 			InputStream:          bytes.NewReader(buf.Bytes()),
 | |
| 		},
 | |
| 	)
 | |
| 	if err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 
 | |
| 	return nil
 | |
| }
 | |
| 
 | |
| func FetchPathFromContainer(
 | |
| 	pool *dockertest.Pool,
 | |
| 	container *dockertest.Resource,
 | |
| 	path string,
 | |
| ) ([]byte, error) {
 | |
| 	buf := bytes.NewBuffer([]byte{})
 | |
| 
 | |
| 	err := pool.Client.DownloadFromContainer(
 | |
| 		container.Container.ID,
 | |
| 		docker.DownloadFromContainerOptions{
 | |
| 			OutputStream: buf,
 | |
| 			Path:         path,
 | |
| 		},
 | |
| 	)
 | |
| 	if err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 
 | |
| 	return buf.Bytes(), nil
 | |
| }
 | |
| 
 | |
| // nolint
 | |
| func CreateCertificate(hostname string) ([]byte, []byte, error) {
 | |
| 	// From:
 | |
| 	// https://shaneutt.com/blog/golang-ca-and-signed-cert-go/
 | |
| 
 | |
| 	ca := &x509.Certificate{
 | |
| 		SerialNumber: big.NewInt(2019),
 | |
| 		Subject: pkix.Name{
 | |
| 			Organization: []string{"Headscale testing INC"},
 | |
| 			Country:      []string{"NL"},
 | |
| 			Locality:     []string{"Leiden"},
 | |
| 		},
 | |
| 		NotBefore: time.Now(),
 | |
| 		NotAfter:  time.Now().Add(60 * time.Hour),
 | |
| 		IsCA:      true,
 | |
| 		ExtKeyUsage: []x509.ExtKeyUsage{
 | |
| 			x509.ExtKeyUsageClientAuth,
 | |
| 			x509.ExtKeyUsageServerAuth,
 | |
| 		},
 | |
| 		KeyUsage:              x509.KeyUsageDigitalSignature | x509.KeyUsageCertSign,
 | |
| 		BasicConstraintsValid: true,
 | |
| 	}
 | |
| 
 | |
| 	caPrivKey, err := rsa.GenerateKey(rand.Reader, 4096)
 | |
| 	if err != nil {
 | |
| 		return nil, nil, err
 | |
| 	}
 | |
| 
 | |
| 	cert := &x509.Certificate{
 | |
| 		SerialNumber: big.NewInt(1658),
 | |
| 		Subject: pkix.Name{
 | |
| 			CommonName:   hostname,
 | |
| 			Organization: []string{"Headscale testing INC"},
 | |
| 			Country:      []string{"NL"},
 | |
| 			Locality:     []string{"Leiden"},
 | |
| 		},
 | |
| 		NotBefore:    time.Now(),
 | |
| 		NotAfter:     time.Now().Add(60 * time.Minute),
 | |
| 		SubjectKeyId: []byte{1, 2, 3, 4, 6},
 | |
| 		ExtKeyUsage:  []x509.ExtKeyUsage{x509.ExtKeyUsageClientAuth, x509.ExtKeyUsageServerAuth},
 | |
| 		KeyUsage:     x509.KeyUsageDigitalSignature,
 | |
| 		DNSNames:     []string{hostname},
 | |
| 	}
 | |
| 
 | |
| 	certPrivKey, err := rsa.GenerateKey(rand.Reader, 4096)
 | |
| 	if err != nil {
 | |
| 		return nil, nil, err
 | |
| 	}
 | |
| 
 | |
| 	certBytes, err := x509.CreateCertificate(
 | |
| 		rand.Reader,
 | |
| 		cert,
 | |
| 		ca,
 | |
| 		&certPrivKey.PublicKey,
 | |
| 		caPrivKey,
 | |
| 	)
 | |
| 	if err != nil {
 | |
| 		return nil, nil, err
 | |
| 	}
 | |
| 
 | |
| 	certPEM := new(bytes.Buffer)
 | |
| 
 | |
| 	err = pem.Encode(certPEM, &pem.Block{
 | |
| 		Type:  "CERTIFICATE",
 | |
| 		Bytes: certBytes,
 | |
| 	})
 | |
| 	if err != nil {
 | |
| 		return nil, nil, err
 | |
| 	}
 | |
| 
 | |
| 	certPrivKeyPEM := new(bytes.Buffer)
 | |
| 
 | |
| 	err = pem.Encode(certPrivKeyPEM, &pem.Block{
 | |
| 		Type:  "RSA PRIVATE KEY",
 | |
| 		Bytes: x509.MarshalPKCS1PrivateKey(certPrivKey),
 | |
| 	})
 | |
| 	if err != nil {
 | |
| 		return nil, nil, err
 | |
| 	}
 | |
| 
 | |
| 	return certPEM.Bytes(), certPrivKeyPEM.Bytes(), nil
 | |
| }
 |