mirror of
https://github.com/juanfont/headscale.git
synced 2024-12-27 06:35:52 -05:00
c73e8476b9
A lot of things are breaking in 0.23 so instead of having this be a long process, just rip of the plaster. Updates #1758 Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com>
208 lines
5.8 KiB
Go
208 lines
5.8 KiB
Go
package main
|
|
|
|
import (
|
|
"io/fs"
|
|
"os"
|
|
"path/filepath"
|
|
"strings"
|
|
"testing"
|
|
|
|
"github.com/juanfont/headscale/hscontrol/types"
|
|
"github.com/juanfont/headscale/hscontrol/util"
|
|
"github.com/spf13/viper"
|
|
"gopkg.in/check.v1"
|
|
)
|
|
|
|
func Test(t *testing.T) {
|
|
check.TestingT(t)
|
|
}
|
|
|
|
var _ = check.Suite(&Suite{})
|
|
|
|
type Suite struct{}
|
|
|
|
func (s *Suite) SetUpSuite(c *check.C) {
|
|
}
|
|
|
|
func (s *Suite) TearDownSuite(c *check.C) {
|
|
}
|
|
|
|
func (*Suite) TestConfigFileLoading(c *check.C) {
|
|
tmpDir, err := os.MkdirTemp("", "headscale")
|
|
if err != nil {
|
|
c.Fatal(err)
|
|
}
|
|
defer os.RemoveAll(tmpDir)
|
|
|
|
path, err := os.Getwd()
|
|
if err != nil {
|
|
c.Fatal(err)
|
|
}
|
|
|
|
cfgFile := filepath.Join(tmpDir, "config.yaml")
|
|
|
|
// Symlink the example config file
|
|
err = os.Symlink(
|
|
filepath.Clean(path+"/../../config-example.yaml"),
|
|
cfgFile,
|
|
)
|
|
if err != nil {
|
|
c.Fatal(err)
|
|
}
|
|
|
|
// Load example config, it should load without validation errors
|
|
err = types.LoadConfig(cfgFile, true)
|
|
c.Assert(err, check.IsNil)
|
|
|
|
// Test that config file was interpreted correctly
|
|
c.Assert(viper.GetString("server_url"), check.Equals, "http://127.0.0.1:8080")
|
|
c.Assert(viper.GetString("listen_addr"), check.Equals, "127.0.0.1:8080")
|
|
c.Assert(viper.GetString("metrics_listen_addr"), check.Equals, "127.0.0.1:9090")
|
|
c.Assert(viper.GetString("database.type"), check.Equals, "sqlite")
|
|
c.Assert(viper.GetString("database.sqlite.path"), check.Equals, "/var/lib/headscale/db.sqlite")
|
|
c.Assert(viper.GetString("tls_letsencrypt_hostname"), check.Equals, "")
|
|
c.Assert(viper.GetString("tls_letsencrypt_listen"), check.Equals, ":http")
|
|
c.Assert(viper.GetString("tls_letsencrypt_challenge_type"), check.Equals, "HTTP-01")
|
|
c.Assert(viper.GetStringSlice("dns_config.nameservers")[0], check.Equals, "1.1.1.1")
|
|
c.Assert(
|
|
util.GetFileMode("unix_socket_permission"),
|
|
check.Equals,
|
|
fs.FileMode(0o770),
|
|
)
|
|
c.Assert(viper.GetBool("logtail.enabled"), check.Equals, false)
|
|
}
|
|
|
|
func (*Suite) TestConfigLoading(c *check.C) {
|
|
tmpDir, err := os.MkdirTemp("", "headscale")
|
|
if err != nil {
|
|
c.Fatal(err)
|
|
}
|
|
defer os.RemoveAll(tmpDir)
|
|
|
|
path, err := os.Getwd()
|
|
if err != nil {
|
|
c.Fatal(err)
|
|
}
|
|
|
|
// Symlink the example config file
|
|
err = os.Symlink(
|
|
filepath.Clean(path+"/../../config-example.yaml"),
|
|
filepath.Join(tmpDir, "config.yaml"),
|
|
)
|
|
if err != nil {
|
|
c.Fatal(err)
|
|
}
|
|
|
|
// Load example config, it should load without validation errors
|
|
err = types.LoadConfig(tmpDir, false)
|
|
c.Assert(err, check.IsNil)
|
|
|
|
// Test that config file was interpreted correctly
|
|
c.Assert(viper.GetString("server_url"), check.Equals, "http://127.0.0.1:8080")
|
|
c.Assert(viper.GetString("listen_addr"), check.Equals, "127.0.0.1:8080")
|
|
c.Assert(viper.GetString("metrics_listen_addr"), check.Equals, "127.0.0.1:9090")
|
|
c.Assert(viper.GetString("database.type"), check.Equals, "sqlite")
|
|
c.Assert(viper.GetString("database.sqlite.path"), check.Equals, "/var/lib/headscale/db.sqlite")
|
|
c.Assert(viper.GetString("tls_letsencrypt_hostname"), check.Equals, "")
|
|
c.Assert(viper.GetString("tls_letsencrypt_listen"), check.Equals, ":http")
|
|
c.Assert(viper.GetString("tls_letsencrypt_challenge_type"), check.Equals, "HTTP-01")
|
|
c.Assert(viper.GetStringSlice("dns_config.nameservers")[0], check.Equals, "1.1.1.1")
|
|
c.Assert(
|
|
util.GetFileMode("unix_socket_permission"),
|
|
check.Equals,
|
|
fs.FileMode(0o770),
|
|
)
|
|
c.Assert(viper.GetBool("logtail.enabled"), check.Equals, false)
|
|
c.Assert(viper.GetBool("randomize_client_port"), check.Equals, false)
|
|
}
|
|
|
|
func (*Suite) TestDNSConfigLoading(c *check.C) {
|
|
tmpDir, err := os.MkdirTemp("", "headscale")
|
|
if err != nil {
|
|
c.Fatal(err)
|
|
}
|
|
defer os.RemoveAll(tmpDir)
|
|
|
|
path, err := os.Getwd()
|
|
if err != nil {
|
|
c.Fatal(err)
|
|
}
|
|
|
|
// Symlink the example config file
|
|
err = os.Symlink(
|
|
filepath.Clean(path+"/../../config-example.yaml"),
|
|
filepath.Join(tmpDir, "config.yaml"),
|
|
)
|
|
if err != nil {
|
|
c.Fatal(err)
|
|
}
|
|
|
|
// Load example config, it should load without validation errors
|
|
err = types.LoadConfig(tmpDir, false)
|
|
c.Assert(err, check.IsNil)
|
|
|
|
dnsConfig, baseDomain := types.GetDNSConfig()
|
|
|
|
c.Assert(dnsConfig.Nameservers[0].String(), check.Equals, "1.1.1.1")
|
|
c.Assert(dnsConfig.Resolvers[0].Addr, check.Equals, "1.1.1.1")
|
|
c.Assert(dnsConfig.Proxied, check.Equals, true)
|
|
c.Assert(baseDomain, check.Equals, "example.com")
|
|
}
|
|
|
|
func writeConfig(c *check.C, tmpDir string, configYaml []byte) {
|
|
// Populate a custom config file
|
|
configFile := filepath.Join(tmpDir, "config.yaml")
|
|
err := os.WriteFile(configFile, configYaml, 0o600)
|
|
if err != nil {
|
|
c.Fatalf("Couldn't write file %s", configFile)
|
|
}
|
|
}
|
|
|
|
func (*Suite) TestTLSConfigValidation(c *check.C) {
|
|
tmpDir, err := os.MkdirTemp("", "headscale")
|
|
if err != nil {
|
|
c.Fatal(err)
|
|
}
|
|
// defer os.RemoveAll(tmpDir)
|
|
configYaml := []byte(`---
|
|
tls_letsencrypt_hostname: example.com
|
|
tls_letsencrypt_challenge_type: ""
|
|
tls_cert_path: abc.pem
|
|
noise:
|
|
private_key_path: noise_private.key`)
|
|
writeConfig(c, tmpDir, configYaml)
|
|
|
|
// Check configuration validation errors (1)
|
|
err = types.LoadConfig(tmpDir, false)
|
|
c.Assert(err, check.NotNil)
|
|
// check.Matches can not handle multiline strings
|
|
tmp := strings.ReplaceAll(err.Error(), "\n", "***")
|
|
c.Assert(
|
|
tmp,
|
|
check.Matches,
|
|
".*Fatal config error: set either tls_letsencrypt_hostname or tls_cert_path/tls_key_path, not both.*",
|
|
)
|
|
c.Assert(
|
|
tmp,
|
|
check.Matches,
|
|
".*Fatal config error: the only supported values for tls_letsencrypt_challenge_type are.*",
|
|
)
|
|
c.Assert(
|
|
tmp,
|
|
check.Matches,
|
|
".*Fatal config error: server_url must start with https:// or http://.*",
|
|
)
|
|
|
|
// Check configuration validation errors (2)
|
|
configYaml = []byte(`---
|
|
noise:
|
|
private_key_path: noise_private.key
|
|
server_url: http://127.0.0.1:8080
|
|
tls_letsencrypt_hostname: example.com
|
|
tls_letsencrypt_challenge_type: TLS-ALPN-01
|
|
`)
|
|
writeConfig(c, tmpDir, configYaml)
|
|
err = types.LoadConfig(tmpDir, false)
|
|
c.Assert(err, check.IsNil)
|
|
}
|