2021-04-25 23:24:42 +08:00
|
|
|
package main
|
|
|
|
|
|
|
|
import (
|
2022-01-29 02:58:22 +08:00
|
|
|
"io/fs"
|
2021-04-25 23:24:42 +08:00
|
|
|
"os"
|
|
|
|
"path/filepath"
|
2021-04-27 08:30:06 +08:00
|
|
|
"strings"
|
2021-04-25 23:24:42 +08:00
|
|
|
"testing"
|
|
|
|
|
2022-06-03 15:26:46 +08:00
|
|
|
"github.com/juanfont/headscale"
|
2021-04-25 23:24:42 +08:00
|
|
|
"github.com/spf13/viper"
|
|
|
|
"gopkg.in/check.v1"
|
|
|
|
)
|
|
|
|
|
|
|
|
func Test(t *testing.T) {
|
|
|
|
check.TestingT(t)
|
|
|
|
}
|
|
|
|
|
|
|
|
var _ = check.Suite(&Suite{})
|
|
|
|
|
|
|
|
type Suite struct{}
|
|
|
|
|
|
|
|
func (s *Suite) SetUpSuite(c *check.C) {
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *Suite) TearDownSuite(c *check.C) {
|
|
|
|
}
|
2021-04-27 08:30:06 +08:00
|
|
|
|
2022-06-05 17:55:27 +08:00
|
|
|
func (*Suite) TestConfigFileLoading(c *check.C) {
|
2022-08-10 05:21:19 +08:00
|
|
|
tmpDir, err := os.MkdirTemp("", "headscale")
|
2022-06-05 17:55:27 +08:00
|
|
|
if err != nil {
|
|
|
|
c.Fatal(err)
|
|
|
|
}
|
|
|
|
defer os.RemoveAll(tmpDir)
|
|
|
|
|
|
|
|
path, err := os.Getwd()
|
|
|
|
if err != nil {
|
|
|
|
c.Fatal(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
cfgFile := filepath.Join(tmpDir, "config.yaml")
|
|
|
|
|
|
|
|
// Symlink the example config file
|
|
|
|
err = os.Symlink(
|
|
|
|
filepath.Clean(path+"/../../config-example.yaml"),
|
|
|
|
cfgFile,
|
|
|
|
)
|
|
|
|
if err != nil {
|
|
|
|
c.Fatal(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Load example config, it should load without validation errors
|
2022-06-07 22:24:35 +08:00
|
|
|
err = headscale.LoadConfig(cfgFile, true)
|
2022-06-05 17:55:27 +08:00
|
|
|
c.Assert(err, check.IsNil)
|
|
|
|
|
|
|
|
// Test that config file was interpreted correctly
|
|
|
|
c.Assert(viper.GetString("server_url"), check.Equals, "http://127.0.0.1:8080")
|
|
|
|
c.Assert(viper.GetString("listen_addr"), check.Equals, "0.0.0.0:8080")
|
|
|
|
c.Assert(viper.GetString("metrics_listen_addr"), check.Equals, "127.0.0.1:9090")
|
|
|
|
c.Assert(viper.GetString("db_type"), check.Equals, "sqlite3")
|
|
|
|
c.Assert(viper.GetString("db_path"), check.Equals, "/var/lib/headscale/db.sqlite")
|
|
|
|
c.Assert(viper.GetString("tls_letsencrypt_hostname"), check.Equals, "")
|
|
|
|
c.Assert(viper.GetString("tls_letsencrypt_listen"), check.Equals, ":http")
|
|
|
|
c.Assert(viper.GetString("tls_letsencrypt_challenge_type"), check.Equals, "HTTP-01")
|
|
|
|
c.Assert(viper.GetStringSlice("dns_config.nameservers")[0], check.Equals, "1.1.1.1")
|
|
|
|
c.Assert(
|
2022-06-07 22:24:35 +08:00
|
|
|
headscale.GetFileMode("unix_socket_permission"),
|
2022-06-05 17:55:27 +08:00
|
|
|
check.Equals,
|
|
|
|
fs.FileMode(0o770),
|
|
|
|
)
|
|
|
|
c.Assert(viper.GetBool("logtail.enabled"), check.Equals, false)
|
|
|
|
}
|
|
|
|
|
2021-10-25 04:21:01 +08:00
|
|
|
func (*Suite) TestConfigLoading(c *check.C) {
|
2022-08-10 05:21:19 +08:00
|
|
|
tmpDir, err := os.MkdirTemp("", "headscale")
|
2021-05-15 20:36:13 +08:00
|
|
|
if err != nil {
|
|
|
|
c.Fatal(err)
|
|
|
|
}
|
|
|
|
defer os.RemoveAll(tmpDir)
|
|
|
|
|
|
|
|
path, err := os.Getwd()
|
|
|
|
if err != nil {
|
|
|
|
c.Fatal(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Symlink the example config file
|
2021-11-13 16:36:45 +08:00
|
|
|
err = os.Symlink(
|
|
|
|
filepath.Clean(path+"/../../config-example.yaml"),
|
|
|
|
filepath.Join(tmpDir, "config.yaml"),
|
|
|
|
)
|
2021-05-15 20:36:13 +08:00
|
|
|
if err != nil {
|
|
|
|
c.Fatal(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Load example config, it should load without validation errors
|
2022-06-07 22:24:35 +08:00
|
|
|
err = headscale.LoadConfig(tmpDir, false)
|
2021-05-15 20:36:13 +08:00
|
|
|
c.Assert(err, check.IsNil)
|
|
|
|
|
|
|
|
// Test that config file was interpreted correctly
|
2021-07-30 23:07:19 +08:00
|
|
|
c.Assert(viper.GetString("server_url"), check.Equals, "http://127.0.0.1:8080")
|
|
|
|
c.Assert(viper.GetString("listen_addr"), check.Equals, "0.0.0.0:8080")
|
2022-02-28 21:40:02 +08:00
|
|
|
c.Assert(viper.GetString("metrics_listen_addr"), check.Equals, "127.0.0.1:9090")
|
2021-05-15 20:36:13 +08:00
|
|
|
c.Assert(viper.GetString("db_type"), check.Equals, "sqlite3")
|
2022-01-03 07:17:42 +08:00
|
|
|
c.Assert(viper.GetString("db_path"), check.Equals, "/var/lib/headscale/db.sqlite")
|
2021-05-15 20:36:13 +08:00
|
|
|
c.Assert(viper.GetString("tls_letsencrypt_hostname"), check.Equals, "")
|
2021-07-24 06:12:01 +08:00
|
|
|
c.Assert(viper.GetString("tls_letsencrypt_listen"), check.Equals, ":http")
|
2021-05-15 20:36:13 +08:00
|
|
|
c.Assert(viper.GetString("tls_letsencrypt_challenge_type"), check.Equals, "HTTP-01")
|
2021-08-24 14:10:09 +08:00
|
|
|
c.Assert(viper.GetStringSlice("dns_config.nameservers")[0], check.Equals, "1.1.1.1")
|
2022-01-26 06:11:15 +08:00
|
|
|
c.Assert(
|
2022-06-03 15:26:46 +08:00
|
|
|
headscale.GetFileMode("unix_socket_permission"),
|
2022-01-26 06:11:15 +08:00
|
|
|
check.Equals,
|
|
|
|
fs.FileMode(0o770),
|
|
|
|
)
|
2022-05-30 20:57:43 +08:00
|
|
|
c.Assert(viper.GetBool("logtail.enabled"), check.Equals, false)
|
2022-06-10 03:20:11 +08:00
|
|
|
c.Assert(viper.GetBool("randomize_client_port"), check.Equals, false)
|
2021-05-15 20:36:13 +08:00
|
|
|
}
|
|
|
|
|
2021-08-26 02:03:04 +08:00
|
|
|
func (*Suite) TestDNSConfigLoading(c *check.C) {
|
2022-08-10 05:21:19 +08:00
|
|
|
tmpDir, err := os.MkdirTemp("", "headscale")
|
2021-08-26 02:03:04 +08:00
|
|
|
if err != nil {
|
|
|
|
c.Fatal(err)
|
|
|
|
}
|
|
|
|
defer os.RemoveAll(tmpDir)
|
|
|
|
|
|
|
|
path, err := os.Getwd()
|
|
|
|
if err != nil {
|
|
|
|
c.Fatal(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Symlink the example config file
|
2021-11-13 16:36:45 +08:00
|
|
|
err = os.Symlink(
|
|
|
|
filepath.Clean(path+"/../../config-example.yaml"),
|
|
|
|
filepath.Join(tmpDir, "config.yaml"),
|
|
|
|
)
|
2021-08-26 02:03:04 +08:00
|
|
|
if err != nil {
|
|
|
|
c.Fatal(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Load example config, it should load without validation errors
|
2022-06-07 22:24:35 +08:00
|
|
|
err = headscale.LoadConfig(tmpDir, false)
|
2021-08-26 02:03:04 +08:00
|
|
|
c.Assert(err, check.IsNil)
|
|
|
|
|
2022-06-03 15:26:46 +08:00
|
|
|
dnsConfig, baseDomain := headscale.GetDNSConfig()
|
2021-08-26 02:03:04 +08:00
|
|
|
|
|
|
|
c.Assert(dnsConfig.Nameservers[0].String(), check.Equals, "1.1.1.1")
|
|
|
|
c.Assert(dnsConfig.Resolvers[0].Addr, check.Equals, "1.1.1.1")
|
2021-10-02 17:14:18 +08:00
|
|
|
c.Assert(dnsConfig.Proxied, check.Equals, true)
|
|
|
|
c.Assert(baseDomain, check.Equals, "example.com")
|
2021-08-26 02:03:04 +08:00
|
|
|
}
|
|
|
|
|
2021-04-27 08:30:06 +08:00
|
|
|
func writeConfig(c *check.C, tmpDir string, configYaml []byte) {
|
|
|
|
// Populate a custom config file
|
|
|
|
configFile := filepath.Join(tmpDir, "config.yaml")
|
2022-08-10 05:21:19 +08:00
|
|
|
err := os.WriteFile(configFile, configYaml, 0o600)
|
2021-04-27 08:30:06 +08:00
|
|
|
if err != nil {
|
|
|
|
c.Fatalf("Couldn't write file %s", configFile)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (*Suite) TestTLSConfigValidation(c *check.C) {
|
2022-08-10 05:21:19 +08:00
|
|
|
tmpDir, err := os.MkdirTemp("", "headscale")
|
2021-04-27 08:30:06 +08:00
|
|
|
if err != nil {
|
|
|
|
c.Fatal(err)
|
|
|
|
}
|
2021-10-23 01:14:29 +08:00
|
|
|
// defer os.RemoveAll(tmpDir)
|
2022-08-21 16:42:23 +08:00
|
|
|
configYaml := []byte(`---
|
|
|
|
tls_letsencrypt_hostname: example.com
|
|
|
|
tls_letsencrypt_challenge_type: ""
|
|
|
|
tls_cert_path: abc.pem
|
|
|
|
noise:
|
|
|
|
private_key_path: noise_private.key`)
|
2021-04-27 08:30:06 +08:00
|
|
|
writeConfig(c, tmpDir, configYaml)
|
|
|
|
|
|
|
|
// Check configuration validation errors (1)
|
2022-06-07 22:24:35 +08:00
|
|
|
err = headscale.LoadConfig(tmpDir, false)
|
2021-04-27 08:30:06 +08:00
|
|
|
c.Assert(err, check.NotNil)
|
|
|
|
// check.Matches can not handle multiline strings
|
|
|
|
tmp := strings.ReplaceAll(err.Error(), "\n", "***")
|
2021-10-23 01:14:29 +08:00
|
|
|
c.Assert(
|
|
|
|
tmp,
|
|
|
|
check.Matches,
|
|
|
|
".*Fatal config error: set either tls_letsencrypt_hostname or tls_cert_path/tls_key_path, not both.*",
|
|
|
|
)
|
|
|
|
c.Assert(
|
|
|
|
tmp,
|
|
|
|
check.Matches,
|
|
|
|
".*Fatal config error: the only supported values for tls_letsencrypt_challenge_type are.*",
|
|
|
|
)
|
2021-11-13 16:36:45 +08:00
|
|
|
c.Assert(
|
|
|
|
tmp,
|
|
|
|
check.Matches,
|
|
|
|
".*Fatal config error: server_url must start with https:// or http://.*",
|
|
|
|
)
|
2021-04-27 08:30:06 +08:00
|
|
|
|
|
|
|
// Check configuration validation errors (2)
|
2022-08-21 16:42:23 +08:00
|
|
|
configYaml = []byte(`---
|
|
|
|
noise:
|
|
|
|
private_key_path: noise_private.key
|
|
|
|
server_url: http://127.0.0.1:8080
|
|
|
|
tls_letsencrypt_hostname: example.com
|
|
|
|
tls_letsencrypt_challenge_type: TLS-ALPN-01
|
|
|
|
`)
|
2021-04-27 08:30:06 +08:00
|
|
|
writeConfig(c, tmpDir, configYaml)
|
2022-06-07 22:24:35 +08:00
|
|
|
err = headscale.LoadConfig(tmpDir, false)
|
2021-07-17 10:02:05 +08:00
|
|
|
c.Assert(err, check.IsNil)
|
2021-04-27 08:30:06 +08:00
|
|
|
}
|