2022-10-13 14:03:38 +00:00
|
|
|
package integration
|
|
|
|
|
|
|
|
import (
|
|
|
|
"errors"
|
|
|
|
"fmt"
|
|
|
|
"log"
|
2022-10-14 10:17:59 +00:00
|
|
|
"net/netip"
|
2022-10-13 14:03:38 +00:00
|
|
|
"os"
|
|
|
|
"sync"
|
2022-10-18 09:59:28 +00:00
|
|
|
"time"
|
2022-10-13 14:03:38 +00:00
|
|
|
|
|
|
|
"github.com/juanfont/headscale"
|
|
|
|
v1 "github.com/juanfont/headscale/gen/go/headscale/v1"
|
|
|
|
"github.com/juanfont/headscale/integration/dockertestutil"
|
|
|
|
"github.com/juanfont/headscale/integration/hsic"
|
|
|
|
"github.com/juanfont/headscale/integration/tsic"
|
|
|
|
"github.com/ory/dockertest/v3"
|
2022-11-14 13:27:02 +00:00
|
|
|
"github.com/puzpuzpuz/xsync/v2"
|
2022-10-13 14:03:38 +00:00
|
|
|
)
|
|
|
|
|
2022-10-18 10:21:38 +00:00
|
|
|
const (
|
|
|
|
scenarioHashLength = 6
|
|
|
|
maxWait = 60 * time.Second
|
|
|
|
)
|
2022-10-13 14:03:38 +00:00
|
|
|
|
2022-10-18 10:09:10 +00:00
|
|
|
var (
|
|
|
|
errNoHeadscaleAvailable = errors.New("no headscale available")
|
|
|
|
errNoNamespaceAvailable = errors.New("no namespace available")
|
2022-11-14 17:10:29 +00:00
|
|
|
|
|
|
|
// Tailscale started adding TS2021 support in CapabilityVersion>=28 (v1.24.0), but
|
|
|
|
// proper support in Headscale was only added for CapabilityVersion>=39 clients (v1.30.0).
|
|
|
|
tailscaleVersions2021 = []string{
|
2022-10-18 10:09:10 +00:00
|
|
|
"head",
|
|
|
|
"unstable",
|
2022-12-05 14:06:55 +00:00
|
|
|
"1.34.0",
|
|
|
|
"1.32.3",
|
2022-10-18 10:09:10 +00:00
|
|
|
"1.30.2",
|
2022-11-14 08:45:01 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
tailscaleVersions2019 = []string{
|
2022-11-14 17:10:29 +00:00
|
|
|
"1.28.0",
|
|
|
|
"1.26.2",
|
2022-10-18 10:09:10 +00:00
|
|
|
"1.24.2",
|
|
|
|
"1.22.2",
|
|
|
|
"1.20.4",
|
|
|
|
"1.18.2",
|
|
|
|
}
|
2022-11-14 08:45:01 +00:00
|
|
|
|
|
|
|
// tailscaleVersionsUnavailable = []string{
|
|
|
|
// // These versions seem to fail when fetching from apt.
|
2022-12-09 17:27:42 +00:00
|
|
|
// "1.16.2",
|
2022-11-14 08:45:01 +00:00
|
|
|
// "1.14.6",
|
|
|
|
// "1.12.4",
|
|
|
|
// "1.10.2",
|
|
|
|
// "1.8.7",
|
2022-11-14 13:27:29 +00:00
|
|
|
// }.
|
2022-11-14 08:45:01 +00:00
|
|
|
|
|
|
|
TailscaleVersions = append(
|
|
|
|
tailscaleVersions2021,
|
|
|
|
tailscaleVersions2019...,
|
|
|
|
)
|
2022-10-18 10:09:10 +00:00
|
|
|
)
|
2022-10-13 14:03:38 +00:00
|
|
|
|
|
|
|
type Namespace struct {
|
2022-10-21 11:17:54 +00:00
|
|
|
Clients map[string]TailscaleClient
|
2022-10-13 14:03:38 +00:00
|
|
|
|
|
|
|
createWaitGroup sync.WaitGroup
|
|
|
|
joinWaitGroup sync.WaitGroup
|
2022-10-18 09:59:28 +00:00
|
|
|
syncWaitGroup sync.WaitGroup
|
2022-10-13 14:03:38 +00:00
|
|
|
}
|
|
|
|
|
2022-11-02 09:01:21 +00:00
|
|
|
// TODO(kradalby): make control server configurable, test correctness with Tailscale SaaS.
|
2022-10-13 14:03:38 +00:00
|
|
|
type Scenario struct {
|
|
|
|
// TODO(kradalby): support multiple headcales for later, currently only
|
|
|
|
// use one.
|
2022-11-14 13:27:02 +00:00
|
|
|
controlServers *xsync.MapOf[string, ControlServer]
|
2022-10-13 14:03:38 +00:00
|
|
|
|
|
|
|
namespaces map[string]*Namespace
|
|
|
|
|
|
|
|
pool *dockertest.Pool
|
|
|
|
network *dockertest.Network
|
2022-11-14 13:27:02 +00:00
|
|
|
|
|
|
|
headscaleLock sync.Mutex
|
2022-10-13 14:03:38 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func NewScenario() (*Scenario, error) {
|
|
|
|
hash, err := headscale.GenerateRandomStringDNSSafe(scenarioHashLength)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
pool, err := dockertest.NewPool("")
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("could not connect to docker: %w", err)
|
|
|
|
}
|
|
|
|
|
2022-10-18 10:19:43 +00:00
|
|
|
pool.MaxWait = maxWait
|
2022-10-18 09:59:28 +00:00
|
|
|
|
2022-10-13 14:03:38 +00:00
|
|
|
networkName := fmt.Sprintf("hs-%s", hash)
|
|
|
|
if overrideNetworkName := os.Getenv("HEADSCALE_TEST_NETWORK_NAME"); overrideNetworkName != "" {
|
|
|
|
networkName = overrideNetworkName
|
|
|
|
}
|
|
|
|
|
|
|
|
network, err := dockertestutil.GetFirstOrCreateNetwork(pool, networkName)
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("failed to create or get network: %w", err)
|
|
|
|
}
|
|
|
|
|
2022-10-14 08:38:27 +00:00
|
|
|
// We run the test suite in a docker container that calls a couple of endpoints for
|
|
|
|
// readiness checks, this ensures that we can run the tests with individual networks
|
|
|
|
// and have the client reach the different containers
|
|
|
|
err = dockertestutil.AddContainerToNetwork(pool, network, "headscale-test-suite")
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("failed to add test suite container to network: %w", err)
|
|
|
|
}
|
|
|
|
|
2022-10-13 14:03:38 +00:00
|
|
|
return &Scenario{
|
2022-11-14 13:27:02 +00:00
|
|
|
controlServers: xsync.NewMapOf[ControlServer](),
|
2022-10-13 14:03:38 +00:00
|
|
|
namespaces: make(map[string]*Namespace),
|
|
|
|
|
|
|
|
pool: pool,
|
|
|
|
network: network,
|
|
|
|
}, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *Scenario) Shutdown() error {
|
2022-11-14 13:27:02 +00:00
|
|
|
s.controlServers.Range(func(_ string, control ControlServer) bool {
|
2022-10-13 14:03:38 +00:00
|
|
|
err := control.Shutdown()
|
|
|
|
if err != nil {
|
2022-11-14 13:27:02 +00:00
|
|
|
log.Printf(
|
|
|
|
"Failed to shut down control: %s",
|
|
|
|
fmt.Errorf("failed to tear down control: %w", err),
|
|
|
|
)
|
2022-10-13 14:03:38 +00:00
|
|
|
}
|
2022-11-14 13:27:02 +00:00
|
|
|
|
|
|
|
return true
|
|
|
|
})
|
2022-10-13 14:03:38 +00:00
|
|
|
|
|
|
|
for namespaceName, namespace := range s.namespaces {
|
|
|
|
for _, client := range namespace.Clients {
|
2022-10-21 11:17:54 +00:00
|
|
|
log.Printf("removing client %s in namespace %s", client.Hostname(), namespaceName)
|
2022-10-13 14:03:38 +00:00
|
|
|
err := client.Shutdown()
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("failed to tear down client: %w", err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-10-14 08:38:27 +00:00
|
|
|
if err := s.pool.RemoveNetwork(s.network); err != nil {
|
|
|
|
return fmt.Errorf("failed to remove network: %w", err)
|
|
|
|
}
|
2022-10-13 14:03:38 +00:00
|
|
|
|
|
|
|
// TODO(kradalby): This seem redundant to the previous call
|
|
|
|
// if err := s.network.Close(); err != nil {
|
|
|
|
// return fmt.Errorf("failed to tear down network: %w", err)
|
|
|
|
// }
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2022-10-23 10:41:35 +00:00
|
|
|
func (s *Scenario) Namespaces() []string {
|
|
|
|
namespaces := make([]string, 0)
|
|
|
|
for namespace := range s.namespaces {
|
|
|
|
namespaces = append(namespaces, namespace)
|
|
|
|
}
|
|
|
|
|
|
|
|
return namespaces
|
|
|
|
}
|
|
|
|
|
2022-10-13 14:03:38 +00:00
|
|
|
/// Headscale related stuff
|
|
|
|
// Note: These functions assume that there is a _single_ headscale instance for now
|
|
|
|
|
|
|
|
// TODO(kradalby): make port and headscale configurable, multiple instances support?
|
2022-11-14 13:27:02 +00:00
|
|
|
func (s *Scenario) Headscale(opts ...hsic.Option) (ControlServer, error) {
|
|
|
|
s.headscaleLock.Lock()
|
|
|
|
defer s.headscaleLock.Unlock()
|
|
|
|
|
|
|
|
if headscale, ok := s.controlServers.Load("headscale"); ok {
|
|
|
|
return headscale, nil
|
|
|
|
}
|
|
|
|
|
2022-11-06 19:22:21 +00:00
|
|
|
headscale, err := hsic.New(s.pool, s.network, opts...)
|
2022-10-13 14:03:38 +00:00
|
|
|
if err != nil {
|
2022-11-14 13:27:02 +00:00
|
|
|
return nil, fmt.Errorf("failed to create headscale container: %w", err)
|
2022-10-13 14:03:38 +00:00
|
|
|
}
|
|
|
|
|
2022-11-10 16:06:10 +00:00
|
|
|
err = headscale.WaitForReady()
|
|
|
|
if err != nil {
|
2022-11-14 13:27:02 +00:00
|
|
|
return nil, fmt.Errorf("failed reach headscale container: %w", err)
|
2022-11-10 16:06:10 +00:00
|
|
|
}
|
|
|
|
|
2022-11-14 13:27:02 +00:00
|
|
|
s.controlServers.Store("headscale", headscale)
|
2022-10-13 14:03:38 +00:00
|
|
|
|
2022-11-14 13:27:02 +00:00
|
|
|
return headscale, nil
|
2022-10-13 14:03:38 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func (s *Scenario) CreatePreAuthKey(namespace string) (*v1.PreAuthKey, error) {
|
2022-11-14 13:27:02 +00:00
|
|
|
if headscale, err := s.Headscale(); err == nil {
|
2022-10-13 14:03:38 +00:00
|
|
|
key, err := headscale.CreateAuthKey(namespace)
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("failed to create namespace: %w", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
return key, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil, fmt.Errorf("failed to create namespace: %w", errNoHeadscaleAvailable)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *Scenario) CreateNamespace(namespace string) error {
|
2022-11-14 13:27:02 +00:00
|
|
|
if headscale, err := s.Headscale(); err == nil {
|
2022-10-13 14:03:38 +00:00
|
|
|
err := headscale.CreateNamespace(namespace)
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("failed to create namespace: %w", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
s.namespaces[namespace] = &Namespace{
|
2022-10-21 11:17:54 +00:00
|
|
|
Clients: make(map[string]TailscaleClient),
|
2022-10-13 14:03:38 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
return fmt.Errorf("failed to create namespace: %w", errNoHeadscaleAvailable)
|
|
|
|
}
|
|
|
|
|
|
|
|
/// Client related stuff
|
|
|
|
|
|
|
|
func (s *Scenario) CreateTailscaleNodesInNamespace(
|
2022-10-18 10:19:43 +00:00
|
|
|
namespaceStr string,
|
2022-10-18 09:59:28 +00:00
|
|
|
requestedVersion string,
|
2022-10-13 14:03:38 +00:00
|
|
|
count int,
|
2022-11-08 15:10:03 +00:00
|
|
|
opts ...tsic.Option,
|
2022-10-13 14:03:38 +00:00
|
|
|
) error {
|
2022-10-18 10:19:43 +00:00
|
|
|
if namespace, ok := s.namespaces[namespaceStr]; ok {
|
2022-10-13 14:03:38 +00:00
|
|
|
for i := 0; i < count; i++ {
|
2022-10-18 09:59:28 +00:00
|
|
|
version := requestedVersion
|
|
|
|
if requestedVersion == "all" {
|
|
|
|
version = TailscaleVersions[i%len(TailscaleVersions)]
|
|
|
|
}
|
|
|
|
|
2022-11-14 13:27:02 +00:00
|
|
|
headscale, err := s.Headscale()
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("failed to create tailscale node: %w", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
cert := headscale.GetCert()
|
|
|
|
hostname := headscale.GetHostname()
|
|
|
|
|
2022-10-18 10:19:43 +00:00
|
|
|
namespace.createWaitGroup.Add(1)
|
2022-10-13 14:03:38 +00:00
|
|
|
|
2022-11-08 15:10:03 +00:00
|
|
|
opts = append(opts,
|
|
|
|
tsic.WithHeadscaleTLS(cert),
|
|
|
|
tsic.WithHeadscaleName(hostname),
|
|
|
|
)
|
|
|
|
|
2022-10-13 14:03:38 +00:00
|
|
|
go func() {
|
2022-10-18 10:19:43 +00:00
|
|
|
defer namespace.createWaitGroup.Done()
|
2022-10-13 14:03:38 +00:00
|
|
|
|
|
|
|
// TODO(kradalby): error handle this
|
2022-11-06 19:22:21 +00:00
|
|
|
tsClient, err := tsic.New(
|
|
|
|
s.pool,
|
|
|
|
version,
|
|
|
|
s.network,
|
2022-11-08 15:10:03 +00:00
|
|
|
opts...,
|
2022-11-06 19:22:21 +00:00
|
|
|
)
|
2022-10-13 14:03:38 +00:00
|
|
|
if err != nil {
|
|
|
|
// return fmt.Errorf("failed to add tailscale node: %w", err)
|
2022-11-06 19:22:21 +00:00
|
|
|
log.Printf("failed to create tailscale node: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
err = tsClient.WaitForReady()
|
|
|
|
if err != nil {
|
|
|
|
// return fmt.Errorf("failed to add tailscale node: %w", err)
|
|
|
|
log.Printf("failed to wait for tailscaled: %s", err)
|
2022-10-13 14:03:38 +00:00
|
|
|
}
|
|
|
|
|
2022-10-21 11:17:54 +00:00
|
|
|
namespace.Clients[tsClient.Hostname()] = tsClient
|
2022-10-13 14:03:38 +00:00
|
|
|
}()
|
|
|
|
}
|
2022-10-18 10:19:43 +00:00
|
|
|
namespace.createWaitGroup.Wait()
|
2022-10-13 14:03:38 +00:00
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
return fmt.Errorf("failed to add tailscale node: %w", errNoNamespaceAvailable)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *Scenario) RunTailscaleUp(
|
2022-10-18 10:19:43 +00:00
|
|
|
namespaceStr, loginServer, authKey string,
|
2022-10-13 14:03:38 +00:00
|
|
|
) error {
|
2022-10-18 10:19:43 +00:00
|
|
|
if namespace, ok := s.namespaces[namespaceStr]; ok {
|
|
|
|
for _, client := range namespace.Clients {
|
|
|
|
namespace.joinWaitGroup.Add(1)
|
2022-10-13 14:03:38 +00:00
|
|
|
|
2022-10-21 11:17:54 +00:00
|
|
|
go func(c TailscaleClient) {
|
2022-10-18 10:19:43 +00:00
|
|
|
defer namespace.joinWaitGroup.Done()
|
2022-10-13 14:03:38 +00:00
|
|
|
|
|
|
|
// TODO(kradalby): error handle this
|
2022-10-18 09:59:28 +00:00
|
|
|
_ = c.Up(loginServer, authKey)
|
|
|
|
}(client)
|
2022-11-13 15:58:20 +00:00
|
|
|
|
|
|
|
err := client.WaitForReady()
|
|
|
|
if err != nil {
|
|
|
|
log.Printf("error waiting for client %s to be ready: %s", client.Hostname(), err)
|
|
|
|
}
|
2022-10-13 14:03:38 +00:00
|
|
|
}
|
2022-11-13 15:58:20 +00:00
|
|
|
|
2022-10-18 10:19:43 +00:00
|
|
|
namespace.joinWaitGroup.Wait()
|
2022-10-13 14:03:38 +00:00
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
return fmt.Errorf("failed to up tailscale node: %w", errNoNamespaceAvailable)
|
|
|
|
}
|
2022-10-14 10:17:59 +00:00
|
|
|
|
2022-10-18 09:59:28 +00:00
|
|
|
func (s *Scenario) CountTailscale() int {
|
|
|
|
count := 0
|
|
|
|
|
2022-10-18 10:19:43 +00:00
|
|
|
for _, namespace := range s.namespaces {
|
|
|
|
count += len(namespace.Clients)
|
2022-10-18 09:59:28 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return count
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *Scenario) WaitForTailscaleSync() error {
|
|
|
|
tsCount := s.CountTailscale()
|
|
|
|
|
2022-10-18 10:19:43 +00:00
|
|
|
for _, namespace := range s.namespaces {
|
|
|
|
for _, client := range namespace.Clients {
|
|
|
|
namespace.syncWaitGroup.Add(1)
|
2022-10-18 09:59:28 +00:00
|
|
|
|
2022-10-21 11:17:54 +00:00
|
|
|
go func(c TailscaleClient) {
|
2022-10-18 10:19:43 +00:00
|
|
|
defer namespace.syncWaitGroup.Done()
|
2022-10-18 09:59:28 +00:00
|
|
|
|
|
|
|
// TODO(kradalby): error handle this
|
|
|
|
_ = c.WaitForPeers(tsCount)
|
|
|
|
}(client)
|
|
|
|
}
|
2022-10-18 10:19:43 +00:00
|
|
|
namespace.syncWaitGroup.Wait()
|
2022-10-18 09:59:28 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// CreateHeadscaleEnv is a conventient method returning a set up Headcale
|
|
|
|
// test environment with nodes of all versions, joined to the server with X
|
2022-10-18 10:09:10 +00:00
|
|
|
// namespaces.
|
2022-11-08 15:10:03 +00:00
|
|
|
func (s *Scenario) CreateHeadscaleEnv(
|
|
|
|
namespaces map[string]int,
|
|
|
|
tsOpts []tsic.Option,
|
|
|
|
opts ...hsic.Option,
|
|
|
|
) error {
|
2022-11-14 13:27:02 +00:00
|
|
|
headscale, err := s.Headscale(opts...)
|
2022-10-18 09:59:28 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
for namespaceName, clientCount := range namespaces {
|
|
|
|
err = s.CreateNamespace(namespaceName)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2022-11-08 15:10:03 +00:00
|
|
|
err = s.CreateTailscaleNodesInNamespace(namespaceName, "all", clientCount, tsOpts...)
|
2022-10-18 09:59:28 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
key, err := s.CreatePreAuthKey(namespaceName)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2022-11-14 13:27:02 +00:00
|
|
|
err = s.RunTailscaleUp(namespaceName, headscale.GetEndpoint(), key.GetKey())
|
2022-10-18 09:59:28 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2022-10-14 10:17:59 +00:00
|
|
|
func (s *Scenario) GetIPs(namespace string) ([]netip.Addr, error) {
|
|
|
|
var ips []netip.Addr
|
|
|
|
if ns, ok := s.namespaces[namespace]; ok {
|
|
|
|
for _, client := range ns.Clients {
|
|
|
|
clientIps, err := client.IPs()
|
|
|
|
if err != nil {
|
|
|
|
return ips, fmt.Errorf("failed to get ips: %w", err)
|
|
|
|
}
|
|
|
|
ips = append(ips, clientIps...)
|
|
|
|
}
|
|
|
|
|
|
|
|
return ips, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
return ips, fmt.Errorf("failed to get ips: %w", errNoNamespaceAvailable)
|
|
|
|
}
|
2022-10-18 09:59:28 +00:00
|
|
|
|
2022-10-21 11:17:54 +00:00
|
|
|
func (s *Scenario) GetClients(namespace string) ([]TailscaleClient, error) {
|
|
|
|
var clients []TailscaleClient
|
2022-10-18 09:59:28 +00:00
|
|
|
if ns, ok := s.namespaces[namespace]; ok {
|
|
|
|
for _, client := range ns.Clients {
|
|
|
|
clients = append(clients, client)
|
|
|
|
}
|
|
|
|
|
|
|
|
return clients, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
return clients, fmt.Errorf("failed to get clients: %w", errNoNamespaceAvailable)
|
|
|
|
}
|
2022-10-23 10:41:35 +00:00
|
|
|
|
|
|
|
func (s *Scenario) ListTailscaleClients(namespaces ...string) ([]TailscaleClient, error) {
|
|
|
|
var allClients []TailscaleClient
|
|
|
|
|
|
|
|
if len(namespaces) == 0 {
|
|
|
|
namespaces = s.Namespaces()
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, namespace := range namespaces {
|
|
|
|
clients, err := s.GetClients(namespace)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
allClients = append(allClients, clients...)
|
|
|
|
}
|
|
|
|
|
|
|
|
return allClients, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *Scenario) ListTailscaleClientsIPs(namespaces ...string) ([]netip.Addr, error) {
|
|
|
|
var allIps []netip.Addr
|
|
|
|
|
|
|
|
if len(namespaces) == 0 {
|
|
|
|
namespaces = s.Namespaces()
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, namespace := range namespaces {
|
|
|
|
ips, err := s.GetIPs(namespace)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
allIps = append(allIps, ips...)
|
|
|
|
}
|
|
|
|
|
|
|
|
return allIps, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *Scenario) ListTailscaleClientsFQDNs(namespaces ...string) ([]string, error) {
|
|
|
|
allFQDNs := make([]string, 0)
|
|
|
|
|
|
|
|
clients, err := s.ListTailscaleClients(namespaces...)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, client := range clients {
|
|
|
|
fqdn, err := client.FQDN()
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
allFQDNs = append(allFQDNs, fqdn)
|
|
|
|
}
|
|
|
|
|
|
|
|
return allFQDNs, nil
|
|
|
|
}
|