2021-10-09 18:22:21 +08:00
|
|
|
package headscale
|
|
|
|
|
|
|
|
import (
|
2022-02-25 17:27:27 +08:00
|
|
|
"fmt"
|
|
|
|
|
2021-10-09 18:22:21 +08:00
|
|
|
"gopkg.in/check.v1"
|
|
|
|
"inet.af/netaddr"
|
2021-10-18 05:58:09 +08:00
|
|
|
"tailscale.com/tailcfg"
|
|
|
|
"tailscale.com/types/dnstype"
|
2021-10-09 18:22:21 +08:00
|
|
|
)
|
|
|
|
|
|
|
|
func (s *Suite) TestMagicDNSRootDomains100(c *check.C) {
|
2022-01-15 23:18:49 +08:00
|
|
|
prefixes := []netaddr.IPPrefix{
|
|
|
|
netaddr.MustParseIPPrefix("100.64.0.0/10"),
|
|
|
|
}
|
|
|
|
domains := generateMagicDNSRootDomains(prefixes)
|
2021-10-09 18:22:21 +08:00
|
|
|
|
|
|
|
found := false
|
2021-10-10 18:43:41 +08:00
|
|
|
for _, domain := range domains {
|
2021-10-09 18:22:21 +08:00
|
|
|
if domain == "64.100.in-addr.arpa." {
|
|
|
|
found = true
|
2021-11-14 23:46:09 +08:00
|
|
|
|
2021-10-09 18:22:21 +08:00
|
|
|
break
|
|
|
|
}
|
|
|
|
}
|
|
|
|
c.Assert(found, check.Equals, true)
|
|
|
|
|
|
|
|
found = false
|
2021-10-10 18:43:41 +08:00
|
|
|
for _, domain := range domains {
|
2021-10-09 18:22:21 +08:00
|
|
|
if domain == "100.100.in-addr.arpa." {
|
|
|
|
found = true
|
2021-11-14 23:46:09 +08:00
|
|
|
|
2021-10-09 18:22:21 +08:00
|
|
|
break
|
|
|
|
}
|
|
|
|
}
|
|
|
|
c.Assert(found, check.Equals, true)
|
|
|
|
|
|
|
|
found = false
|
2021-10-10 18:43:41 +08:00
|
|
|
for _, domain := range domains {
|
2021-10-09 18:22:21 +08:00
|
|
|
if domain == "127.100.in-addr.arpa." {
|
|
|
|
found = true
|
2021-11-14 23:46:09 +08:00
|
|
|
|
2021-10-09 18:22:21 +08:00
|
|
|
break
|
|
|
|
}
|
|
|
|
}
|
|
|
|
c.Assert(found, check.Equals, true)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *Suite) TestMagicDNSRootDomains172(c *check.C) {
|
2022-01-15 23:18:49 +08:00
|
|
|
prefixes := []netaddr.IPPrefix{
|
|
|
|
netaddr.MustParseIPPrefix("172.16.0.0/16"),
|
|
|
|
}
|
|
|
|
domains := generateMagicDNSRootDomains(prefixes)
|
2021-10-09 18:22:21 +08:00
|
|
|
|
|
|
|
found := false
|
2021-10-10 18:43:41 +08:00
|
|
|
for _, domain := range domains {
|
2021-10-09 18:22:21 +08:00
|
|
|
if domain == "0.16.172.in-addr.arpa." {
|
|
|
|
found = true
|
2021-11-14 23:46:09 +08:00
|
|
|
|
2021-10-09 18:22:21 +08:00
|
|
|
break
|
|
|
|
}
|
|
|
|
}
|
|
|
|
c.Assert(found, check.Equals, true)
|
|
|
|
|
|
|
|
found = false
|
2021-10-10 18:43:41 +08:00
|
|
|
for _, domain := range domains {
|
2021-10-09 18:22:21 +08:00
|
|
|
if domain == "255.16.172.in-addr.arpa." {
|
|
|
|
found = true
|
2021-11-14 23:46:09 +08:00
|
|
|
|
2021-10-09 18:22:21 +08:00
|
|
|
break
|
|
|
|
}
|
|
|
|
}
|
|
|
|
c.Assert(found, check.Equals, true)
|
|
|
|
}
|
2021-10-18 05:58:09 +08:00
|
|
|
|
2022-01-15 23:18:49 +08:00
|
|
|
// Happens when netmask is a multiple of 4 bits (sounds likely).
|
|
|
|
func (s *Suite) TestMagicDNSRootDomainsIPv6Single(c *check.C) {
|
|
|
|
prefixes := []netaddr.IPPrefix{
|
|
|
|
netaddr.MustParseIPPrefix("fd7a:115c:a1e0::/48"),
|
|
|
|
}
|
|
|
|
domains := generateMagicDNSRootDomains(prefixes)
|
|
|
|
|
|
|
|
c.Assert(len(domains), check.Equals, 1)
|
2022-01-26 06:11:15 +08:00
|
|
|
c.Assert(
|
|
|
|
domains[0].WithTrailingDot(),
|
|
|
|
check.Equals,
|
|
|
|
"0.e.1.a.c.5.1.1.a.7.d.f.ip6.arpa.",
|
|
|
|
)
|
2022-01-15 23:18:49 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
func (s *Suite) TestMagicDNSRootDomainsIPv6SingleMultiple(c *check.C) {
|
|
|
|
prefixes := []netaddr.IPPrefix{
|
|
|
|
netaddr.MustParseIPPrefix("fd7a:115c:a1e0::/50"),
|
|
|
|
}
|
|
|
|
domains := generateMagicDNSRootDomains(prefixes)
|
|
|
|
|
|
|
|
yieldsRoot := func(dom string) bool {
|
|
|
|
for _, candidate := range domains {
|
|
|
|
if candidate.WithTrailingDot() == dom {
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
|
|
|
c.Assert(len(domains), check.Equals, 4)
|
|
|
|
c.Assert(yieldsRoot("0.0.e.1.a.c.5.1.1.a.7.d.f.ip6.arpa."), check.Equals, true)
|
|
|
|
c.Assert(yieldsRoot("1.0.e.1.a.c.5.1.1.a.7.d.f.ip6.arpa."), check.Equals, true)
|
|
|
|
c.Assert(yieldsRoot("2.0.e.1.a.c.5.1.1.a.7.d.f.ip6.arpa."), check.Equals, true)
|
|
|
|
c.Assert(yieldsRoot("3.0.e.1.a.c.5.1.1.a.7.d.f.ip6.arpa."), check.Equals, true)
|
|
|
|
}
|
|
|
|
|
2021-10-18 05:58:09 +08:00
|
|
|
func (s *Suite) TestDNSConfigMapResponseWithMagicDNS(c *check.C) {
|
2021-11-16 00:16:04 +08:00
|
|
|
namespaceShared1, err := app.CreateNamespace("shared1")
|
2021-10-18 05:58:09 +08:00
|
|
|
c.Assert(err, check.IsNil)
|
|
|
|
|
2021-11-16 00:16:04 +08:00
|
|
|
namespaceShared2, err := app.CreateNamespace("shared2")
|
2021-10-18 05:58:09 +08:00
|
|
|
c.Assert(err, check.IsNil)
|
|
|
|
|
2021-11-16 00:16:04 +08:00
|
|
|
namespaceShared3, err := app.CreateNamespace("shared3")
|
2021-10-18 05:58:09 +08:00
|
|
|
c.Assert(err, check.IsNil)
|
|
|
|
|
2021-11-16 00:16:04 +08:00
|
|
|
preAuthKeyInShared1, err := app.CreatePreAuthKey(
|
|
|
|
namespaceShared1.Name,
|
|
|
|
false,
|
|
|
|
false,
|
|
|
|
nil,
|
|
|
|
)
|
2021-10-18 05:58:09 +08:00
|
|
|
c.Assert(err, check.IsNil)
|
|
|
|
|
2021-11-16 00:16:04 +08:00
|
|
|
preAuthKeyInShared2, err := app.CreatePreAuthKey(
|
|
|
|
namespaceShared2.Name,
|
|
|
|
false,
|
|
|
|
false,
|
|
|
|
nil,
|
|
|
|
)
|
2021-10-18 05:58:09 +08:00
|
|
|
c.Assert(err, check.IsNil)
|
|
|
|
|
2021-11-16 00:16:04 +08:00
|
|
|
preAuthKeyInShared3, err := app.CreatePreAuthKey(
|
|
|
|
namespaceShared3.Name,
|
|
|
|
false,
|
|
|
|
false,
|
|
|
|
nil,
|
|
|
|
)
|
2021-10-18 05:58:09 +08:00
|
|
|
c.Assert(err, check.IsNil)
|
|
|
|
|
2021-11-16 00:16:04 +08:00
|
|
|
PreAuthKey2InShared1, err := app.CreatePreAuthKey(
|
|
|
|
namespaceShared1.Name,
|
|
|
|
false,
|
|
|
|
false,
|
|
|
|
nil,
|
|
|
|
)
|
2021-10-18 05:58:09 +08:00
|
|
|
c.Assert(err, check.IsNil)
|
|
|
|
|
2021-11-16 00:16:04 +08:00
|
|
|
_, err = app.GetMachine(namespaceShared1.Name, "test_get_shared_nodes_1")
|
2021-10-18 05:58:09 +08:00
|
|
|
c.Assert(err, check.NotNil)
|
|
|
|
|
2021-11-16 00:16:04 +08:00
|
|
|
machineInShared1 := &Machine{
|
2021-10-18 05:58:09 +08:00
|
|
|
ID: 1,
|
|
|
|
MachineKey: "686824e749f3b7f2a5927ee6c1e422aee5292592d9179a271ed7b3e659b44a66",
|
|
|
|
NodeKey: "686824e749f3b7f2a5927ee6c1e422aee5292592d9179a271ed7b3e659b44a66",
|
|
|
|
DiscoKey: "686824e749f3b7f2a5927ee6c1e422aee5292592d9179a271ed7b3e659b44a66",
|
2022-06-11 23:33:48 +08:00
|
|
|
Hostname: "test_get_shared_nodes_1",
|
2021-11-16 00:16:04 +08:00
|
|
|
NamespaceID: namespaceShared1.ID,
|
|
|
|
Namespace: *namespaceShared1,
|
2021-11-18 16:49:55 +08:00
|
|
|
RegisterMethod: RegisterMethodAuthKey,
|
2022-01-16 21:16:59 +08:00
|
|
|
IPAddresses: []netaddr.IP{netaddr.MustParseIP("100.64.0.1")},
|
2021-11-16 00:16:04 +08:00
|
|
|
AuthKeyID: uint(preAuthKeyInShared1.ID),
|
2021-10-18 05:58:09 +08:00
|
|
|
}
|
2021-11-16 00:16:04 +08:00
|
|
|
app.db.Save(machineInShared1)
|
2021-10-18 05:58:09 +08:00
|
|
|
|
2022-04-25 03:54:38 +08:00
|
|
|
_, err = app.GetMachine(namespaceShared1.Name, machineInShared1.Hostname)
|
2021-10-18 05:58:09 +08:00
|
|
|
c.Assert(err, check.IsNil)
|
|
|
|
|
2021-11-16 00:16:04 +08:00
|
|
|
machineInShared2 := &Machine{
|
2021-10-18 05:58:09 +08:00
|
|
|
ID: 2,
|
|
|
|
MachineKey: "dec46ef9dc45c7d2f03bfcd5a640d9e24e3cc68ce3d9da223867c9bc6d5e9863",
|
|
|
|
NodeKey: "dec46ef9dc45c7d2f03bfcd5a640d9e24e3cc68ce3d9da223867c9bc6d5e9863",
|
|
|
|
DiscoKey: "dec46ef9dc45c7d2f03bfcd5a640d9e24e3cc68ce3d9da223867c9bc6d5e9863",
|
2022-06-11 23:33:48 +08:00
|
|
|
Hostname: "test_get_shared_nodes_2",
|
2021-11-16 00:16:04 +08:00
|
|
|
NamespaceID: namespaceShared2.ID,
|
|
|
|
Namespace: *namespaceShared2,
|
2021-11-18 16:49:55 +08:00
|
|
|
RegisterMethod: RegisterMethodAuthKey,
|
2022-01-16 21:16:59 +08:00
|
|
|
IPAddresses: []netaddr.IP{netaddr.MustParseIP("100.64.0.2")},
|
2021-11-16 00:16:04 +08:00
|
|
|
AuthKeyID: uint(preAuthKeyInShared2.ID),
|
2021-10-18 05:58:09 +08:00
|
|
|
}
|
2021-11-16 00:16:04 +08:00
|
|
|
app.db.Save(machineInShared2)
|
2021-10-18 05:58:09 +08:00
|
|
|
|
2022-04-25 03:54:38 +08:00
|
|
|
_, err = app.GetMachine(namespaceShared2.Name, machineInShared2.Hostname)
|
2021-10-18 05:58:09 +08:00
|
|
|
c.Assert(err, check.IsNil)
|
|
|
|
|
2021-11-16 00:16:04 +08:00
|
|
|
machineInShared3 := &Machine{
|
2021-10-18 05:58:09 +08:00
|
|
|
ID: 3,
|
|
|
|
MachineKey: "dec46ef9dc45c7d2f03bfcd5a640d9e24e3cc68ce3d9da223867c9bc6d5e9863",
|
|
|
|
NodeKey: "dec46ef9dc45c7d2f03bfcd5a640d9e24e3cc68ce3d9da223867c9bc6d5e9863",
|
|
|
|
DiscoKey: "dec46ef9dc45c7d2f03bfcd5a640d9e24e3cc68ce3d9da223867c9bc6d5e9863",
|
2022-06-11 23:33:48 +08:00
|
|
|
Hostname: "test_get_shared_nodes_3",
|
2021-11-16 00:16:04 +08:00
|
|
|
NamespaceID: namespaceShared3.ID,
|
|
|
|
Namespace: *namespaceShared3,
|
2021-11-18 16:49:55 +08:00
|
|
|
RegisterMethod: RegisterMethodAuthKey,
|
2022-01-16 21:16:59 +08:00
|
|
|
IPAddresses: []netaddr.IP{netaddr.MustParseIP("100.64.0.3")},
|
2021-11-16 00:16:04 +08:00
|
|
|
AuthKeyID: uint(preAuthKeyInShared3.ID),
|
2021-10-18 05:58:09 +08:00
|
|
|
}
|
2021-11-16 00:16:04 +08:00
|
|
|
app.db.Save(machineInShared3)
|
2021-10-18 05:58:09 +08:00
|
|
|
|
2022-04-25 03:54:38 +08:00
|
|
|
_, err = app.GetMachine(namespaceShared3.Name, machineInShared3.Hostname)
|
2021-10-18 05:58:09 +08:00
|
|
|
c.Assert(err, check.IsNil)
|
|
|
|
|
2021-11-16 00:16:04 +08:00
|
|
|
machine2InShared1 := &Machine{
|
2021-10-18 05:58:09 +08:00
|
|
|
ID: 4,
|
|
|
|
MachineKey: "dec46ef9dc45c7d2f03bfcd5a640d9e24e3cc68ce3d9da223867c9bc6d5e9863",
|
|
|
|
NodeKey: "dec46ef9dc45c7d2f03bfcd5a640d9e24e3cc68ce3d9da223867c9bc6d5e9863",
|
|
|
|
DiscoKey: "dec46ef9dc45c7d2f03bfcd5a640d9e24e3cc68ce3d9da223867c9bc6d5e9863",
|
2022-06-11 23:33:48 +08:00
|
|
|
Hostname: "test_get_shared_nodes_4",
|
2021-11-16 00:16:04 +08:00
|
|
|
NamespaceID: namespaceShared1.ID,
|
|
|
|
Namespace: *namespaceShared1,
|
2021-11-18 16:49:55 +08:00
|
|
|
RegisterMethod: RegisterMethodAuthKey,
|
2022-01-16 21:16:59 +08:00
|
|
|
IPAddresses: []netaddr.IP{netaddr.MustParseIP("100.64.0.4")},
|
2021-11-16 00:16:04 +08:00
|
|
|
AuthKeyID: uint(PreAuthKey2InShared1.ID),
|
2021-10-18 05:58:09 +08:00
|
|
|
}
|
2021-11-16 00:16:04 +08:00
|
|
|
app.db.Save(machine2InShared1)
|
2021-10-18 05:58:09 +08:00
|
|
|
|
|
|
|
baseDomain := "foobar.headscale.net"
|
|
|
|
dnsConfigOrig := tailcfg.DNSConfig{
|
2022-06-11 23:33:48 +08:00
|
|
|
Routes: make(map[string][]*dnstype.Resolver),
|
2021-10-18 05:58:09 +08:00
|
|
|
Domains: []string{baseDomain},
|
|
|
|
Proxied: true,
|
|
|
|
}
|
|
|
|
|
2021-11-16 00:16:04 +08:00
|
|
|
peersOfMachineInShared1, err := app.getPeers(machineInShared1)
|
2021-10-18 05:58:09 +08:00
|
|
|
c.Assert(err, check.IsNil)
|
|
|
|
|
2021-11-16 00:16:04 +08:00
|
|
|
dnsConfig := getMapResponseDNSConfig(
|
|
|
|
&dnsConfigOrig,
|
|
|
|
baseDomain,
|
|
|
|
*machineInShared1,
|
|
|
|
peersOfMachineInShared1,
|
|
|
|
)
|
2021-10-18 05:58:09 +08:00
|
|
|
c.Assert(dnsConfig, check.NotNil)
|
|
|
|
|
2022-02-25 17:27:27 +08:00
|
|
|
c.Assert(len(dnsConfig.Routes), check.Equals, 3)
|
|
|
|
|
|
|
|
domainRouteShared1 := fmt.Sprintf("%s.%s", namespaceShared1.Name, baseDomain)
|
|
|
|
_, ok := dnsConfig.Routes[domainRouteShared1]
|
|
|
|
c.Assert(ok, check.Equals, true)
|
|
|
|
|
|
|
|
domainRouteShared2 := fmt.Sprintf("%s.%s", namespaceShared2.Name, baseDomain)
|
|
|
|
_, ok = dnsConfig.Routes[domainRouteShared2]
|
|
|
|
c.Assert(ok, check.Equals, true)
|
|
|
|
|
|
|
|
domainRouteShared3 := fmt.Sprintf("%s.%s", namespaceShared3.Name, baseDomain)
|
|
|
|
_, ok = dnsConfig.Routes[domainRouteShared3]
|
|
|
|
c.Assert(ok, check.Equals, true)
|
2021-10-18 05:58:09 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
func (s *Suite) TestDNSConfigMapResponseWithoutMagicDNS(c *check.C) {
|
2021-11-16 00:16:04 +08:00
|
|
|
namespaceShared1, err := app.CreateNamespace("shared1")
|
2021-10-18 05:58:09 +08:00
|
|
|
c.Assert(err, check.IsNil)
|
|
|
|
|
2021-11-16 00:16:04 +08:00
|
|
|
namespaceShared2, err := app.CreateNamespace("shared2")
|
2021-10-18 05:58:09 +08:00
|
|
|
c.Assert(err, check.IsNil)
|
|
|
|
|
2021-11-16 00:16:04 +08:00
|
|
|
namespaceShared3, err := app.CreateNamespace("shared3")
|
2021-10-18 05:58:09 +08:00
|
|
|
c.Assert(err, check.IsNil)
|
|
|
|
|
2021-11-16 00:16:04 +08:00
|
|
|
preAuthKeyInShared1, err := app.CreatePreAuthKey(
|
|
|
|
namespaceShared1.Name,
|
|
|
|
false,
|
|
|
|
false,
|
|
|
|
nil,
|
|
|
|
)
|
2021-10-18 05:58:09 +08:00
|
|
|
c.Assert(err, check.IsNil)
|
|
|
|
|
2021-11-16 00:16:04 +08:00
|
|
|
preAuthKeyInShared2, err := app.CreatePreAuthKey(
|
|
|
|
namespaceShared2.Name,
|
|
|
|
false,
|
|
|
|
false,
|
|
|
|
nil,
|
|
|
|
)
|
2021-10-18 05:58:09 +08:00
|
|
|
c.Assert(err, check.IsNil)
|
|
|
|
|
2021-11-16 00:16:04 +08:00
|
|
|
preAuthKeyInShared3, err := app.CreatePreAuthKey(
|
|
|
|
namespaceShared3.Name,
|
|
|
|
false,
|
|
|
|
false,
|
|
|
|
nil,
|
|
|
|
)
|
2021-10-18 05:58:09 +08:00
|
|
|
c.Assert(err, check.IsNil)
|
|
|
|
|
2021-11-16 00:16:04 +08:00
|
|
|
preAuthKey2InShared1, err := app.CreatePreAuthKey(
|
|
|
|
namespaceShared1.Name,
|
|
|
|
false,
|
|
|
|
false,
|
|
|
|
nil,
|
|
|
|
)
|
2021-10-18 05:58:09 +08:00
|
|
|
c.Assert(err, check.IsNil)
|
|
|
|
|
2021-11-16 00:16:04 +08:00
|
|
|
_, err = app.GetMachine(namespaceShared1.Name, "test_get_shared_nodes_1")
|
2021-10-18 05:58:09 +08:00
|
|
|
c.Assert(err, check.NotNil)
|
|
|
|
|
2021-11-16 00:16:04 +08:00
|
|
|
machineInShared1 := &Machine{
|
2021-10-18 05:58:09 +08:00
|
|
|
ID: 1,
|
|
|
|
MachineKey: "686824e749f3b7f2a5927ee6c1e422aee5292592d9179a271ed7b3e659b44a66",
|
|
|
|
NodeKey: "686824e749f3b7f2a5927ee6c1e422aee5292592d9179a271ed7b3e659b44a66",
|
|
|
|
DiscoKey: "686824e749f3b7f2a5927ee6c1e422aee5292592d9179a271ed7b3e659b44a66",
|
2022-06-11 23:33:48 +08:00
|
|
|
Hostname: "test_get_shared_nodes_1",
|
2021-11-16 00:16:04 +08:00
|
|
|
NamespaceID: namespaceShared1.ID,
|
|
|
|
Namespace: *namespaceShared1,
|
2021-11-18 16:49:55 +08:00
|
|
|
RegisterMethod: RegisterMethodAuthKey,
|
2022-01-16 21:16:59 +08:00
|
|
|
IPAddresses: []netaddr.IP{netaddr.MustParseIP("100.64.0.1")},
|
2021-11-16 00:16:04 +08:00
|
|
|
AuthKeyID: uint(preAuthKeyInShared1.ID),
|
2021-10-18 05:58:09 +08:00
|
|
|
}
|
2021-11-16 00:16:04 +08:00
|
|
|
app.db.Save(machineInShared1)
|
2021-10-18 05:58:09 +08:00
|
|
|
|
2022-04-25 03:54:38 +08:00
|
|
|
_, err = app.GetMachine(namespaceShared1.Name, machineInShared1.Hostname)
|
2021-10-18 05:58:09 +08:00
|
|
|
c.Assert(err, check.IsNil)
|
|
|
|
|
2021-11-16 00:16:04 +08:00
|
|
|
machineInShared2 := &Machine{
|
2021-10-18 05:58:09 +08:00
|
|
|
ID: 2,
|
|
|
|
MachineKey: "dec46ef9dc45c7d2f03bfcd5a640d9e24e3cc68ce3d9da223867c9bc6d5e9863",
|
|
|
|
NodeKey: "dec46ef9dc45c7d2f03bfcd5a640d9e24e3cc68ce3d9da223867c9bc6d5e9863",
|
|
|
|
DiscoKey: "dec46ef9dc45c7d2f03bfcd5a640d9e24e3cc68ce3d9da223867c9bc6d5e9863",
|
2022-06-11 23:33:48 +08:00
|
|
|
Hostname: "test_get_shared_nodes_2",
|
2021-11-16 00:16:04 +08:00
|
|
|
NamespaceID: namespaceShared2.ID,
|
|
|
|
Namespace: *namespaceShared2,
|
2021-11-18 16:49:55 +08:00
|
|
|
RegisterMethod: RegisterMethodAuthKey,
|
2022-01-16 21:16:59 +08:00
|
|
|
IPAddresses: []netaddr.IP{netaddr.MustParseIP("100.64.0.2")},
|
2021-11-16 00:16:04 +08:00
|
|
|
AuthKeyID: uint(preAuthKeyInShared2.ID),
|
2021-10-18 05:58:09 +08:00
|
|
|
}
|
2021-11-16 00:16:04 +08:00
|
|
|
app.db.Save(machineInShared2)
|
2021-10-18 05:58:09 +08:00
|
|
|
|
2022-04-25 03:54:38 +08:00
|
|
|
_, err = app.GetMachine(namespaceShared2.Name, machineInShared2.Hostname)
|
2021-10-18 05:58:09 +08:00
|
|
|
c.Assert(err, check.IsNil)
|
|
|
|
|
2021-11-16 00:16:04 +08:00
|
|
|
machineInShared3 := &Machine{
|
2021-10-18 05:58:09 +08:00
|
|
|
ID: 3,
|
|
|
|
MachineKey: "dec46ef9dc45c7d2f03bfcd5a640d9e24e3cc68ce3d9da223867c9bc6d5e9863",
|
|
|
|
NodeKey: "dec46ef9dc45c7d2f03bfcd5a640d9e24e3cc68ce3d9da223867c9bc6d5e9863",
|
|
|
|
DiscoKey: "dec46ef9dc45c7d2f03bfcd5a640d9e24e3cc68ce3d9da223867c9bc6d5e9863",
|
2022-06-11 23:33:48 +08:00
|
|
|
Hostname: "test_get_shared_nodes_3",
|
2021-11-16 00:16:04 +08:00
|
|
|
NamespaceID: namespaceShared3.ID,
|
|
|
|
Namespace: *namespaceShared3,
|
2021-11-18 16:49:55 +08:00
|
|
|
RegisterMethod: RegisterMethodAuthKey,
|
2022-01-16 21:16:59 +08:00
|
|
|
IPAddresses: []netaddr.IP{netaddr.MustParseIP("100.64.0.3")},
|
2021-11-16 00:16:04 +08:00
|
|
|
AuthKeyID: uint(preAuthKeyInShared3.ID),
|
2021-10-18 05:58:09 +08:00
|
|
|
}
|
2021-11-16 00:16:04 +08:00
|
|
|
app.db.Save(machineInShared3)
|
2021-10-18 05:58:09 +08:00
|
|
|
|
2022-04-25 03:54:38 +08:00
|
|
|
_, err = app.GetMachine(namespaceShared3.Name, machineInShared3.Hostname)
|
2021-10-18 05:58:09 +08:00
|
|
|
c.Assert(err, check.IsNil)
|
|
|
|
|
2021-11-16 00:16:04 +08:00
|
|
|
machine2InShared1 := &Machine{
|
2021-10-18 05:58:09 +08:00
|
|
|
ID: 4,
|
|
|
|
MachineKey: "dec46ef9dc45c7d2f03bfcd5a640d9e24e3cc68ce3d9da223867c9bc6d5e9863",
|
|
|
|
NodeKey: "dec46ef9dc45c7d2f03bfcd5a640d9e24e3cc68ce3d9da223867c9bc6d5e9863",
|
|
|
|
DiscoKey: "dec46ef9dc45c7d2f03bfcd5a640d9e24e3cc68ce3d9da223867c9bc6d5e9863",
|
2022-06-11 23:33:48 +08:00
|
|
|
Hostname: "test_get_shared_nodes_4",
|
2021-11-16 00:16:04 +08:00
|
|
|
NamespaceID: namespaceShared1.ID,
|
|
|
|
Namespace: *namespaceShared1,
|
2021-11-18 16:49:55 +08:00
|
|
|
RegisterMethod: RegisterMethodAuthKey,
|
2022-01-16 21:16:59 +08:00
|
|
|
IPAddresses: []netaddr.IP{netaddr.MustParseIP("100.64.0.4")},
|
2021-11-16 00:16:04 +08:00
|
|
|
AuthKeyID: uint(preAuthKey2InShared1.ID),
|
2021-10-18 05:58:09 +08:00
|
|
|
}
|
2021-11-16 00:16:04 +08:00
|
|
|
app.db.Save(machine2InShared1)
|
2021-10-18 05:58:09 +08:00
|
|
|
|
|
|
|
baseDomain := "foobar.headscale.net"
|
|
|
|
dnsConfigOrig := tailcfg.DNSConfig{
|
2022-06-11 23:33:48 +08:00
|
|
|
Routes: make(map[string][]*dnstype.Resolver),
|
2021-10-18 05:58:09 +08:00
|
|
|
Domains: []string{baseDomain},
|
|
|
|
Proxied: false,
|
|
|
|
}
|
|
|
|
|
2021-11-16 00:16:04 +08:00
|
|
|
peersOfMachine1Shared1, err := app.getPeers(machineInShared1)
|
2021-10-18 05:58:09 +08:00
|
|
|
c.Assert(err, check.IsNil)
|
|
|
|
|
2021-11-16 00:16:04 +08:00
|
|
|
dnsConfig := getMapResponseDNSConfig(
|
|
|
|
&dnsConfigOrig,
|
|
|
|
baseDomain,
|
|
|
|
*machineInShared1,
|
|
|
|
peersOfMachine1Shared1,
|
|
|
|
)
|
2021-10-18 05:58:09 +08:00
|
|
|
c.Assert(dnsConfig, check.NotNil)
|
|
|
|
c.Assert(len(dnsConfig.Routes), check.Equals, 0)
|
|
|
|
c.Assert(len(dnsConfig.Domains), check.Equals, 1)
|
|
|
|
}
|