mirror of
https://github.com/juanfont/headscale.git
synced 2025-01-03 05:38:08 +00:00
Mark the flag properly experimental
Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com>
This commit is contained in:
parent
22da5bfc1d
commit
c02e105065
4
acls.go
4
acls.go
@ -56,7 +56,7 @@ const (
|
|||||||
ProtocolFC = 133 // Fibre Channel
|
ProtocolFC = 133 // Fibre Channel
|
||||||
)
|
)
|
||||||
|
|
||||||
var featureEnableSSH = envknob.RegisterBool("HEADSCALE_FEATURE_SSH")
|
var featureEnableSSH = envknob.RegisterBool("HEADSCALE_EXPERIMENTAL_FEATURE_SSH")
|
||||||
|
|
||||||
// LoadACLPolicy loads the ACL policy from the specify path, and generates the ACL rules.
|
// LoadACLPolicy loads the ACL policy from the specify path, and generates the ACL rules.
|
||||||
func (h *Headscale) LoadACLPolicy(path string) error {
|
func (h *Headscale) LoadACLPolicy(path string) error {
|
||||||
@ -135,7 +135,7 @@ func (h *Headscale) UpdateACLRules() error {
|
|||||||
}
|
}
|
||||||
h.sshPolicy.Rules = sshRules
|
h.sshPolicy.Rules = sshRules
|
||||||
} else if h.aclPolicy != nil && len(h.aclPolicy.SSHs) > 0 {
|
} else if h.aclPolicy != nil && len(h.aclPolicy.SSHs) > 0 {
|
||||||
log.Info().Msg("SSH ACLs has been defined, but HEADSCALE_FEATURE_SSH is not enabled, this is a unstable feature, check docs before activating")
|
log.Info().Msg("SSH ACLs has been defined, but HEADSCALE_EXPERIMENTAL_FEATURE_SSH is not enabled, this is a unstable feature, check docs before activating")
|
||||||
}
|
}
|
||||||
|
|
||||||
return nil
|
return nil
|
||||||
|
@ -79,7 +79,7 @@ func TestSSHOneNamespaceAllToAll(t *testing.T) {
|
|||||||
},
|
},
|
||||||
),
|
),
|
||||||
hsic.WithConfigEnv(map[string]string{
|
hsic.WithConfigEnv(map[string]string{
|
||||||
"HEADSCALE_FEATURE_SSH": "1",
|
"HEADSCALE_EXPERIMENTAL_FEATURE_SSH": "1",
|
||||||
}),
|
}),
|
||||||
)
|
)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
@ -156,7 +156,7 @@ func TestSSHMultipleNamespacesAllToAll(t *testing.T) {
|
|||||||
},
|
},
|
||||||
),
|
),
|
||||||
hsic.WithConfigEnv(map[string]string{
|
hsic.WithConfigEnv(map[string]string{
|
||||||
"HEADSCALE_FEATURE_SSH": "1",
|
"HEADSCALE_EXPERIMENTAL_FEATURE_SSH": "1",
|
||||||
}),
|
}),
|
||||||
)
|
)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
@ -232,7 +232,7 @@ func TestSSHNoSSHConfigured(t *testing.T) {
|
|||||||
),
|
),
|
||||||
hsic.WithTestName("sshnoneconfigured"),
|
hsic.WithTestName("sshnoneconfigured"),
|
||||||
hsic.WithConfigEnv(map[string]string{
|
hsic.WithConfigEnv(map[string]string{
|
||||||
"HEADSCALE_FEATURE_SSH": "1",
|
"HEADSCALE_EXPERIMENTAL_FEATURE_SSH": "1",
|
||||||
}),
|
}),
|
||||||
)
|
)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
@ -309,7 +309,7 @@ func TestSSHIsBlockedInACL(t *testing.T) {
|
|||||||
),
|
),
|
||||||
hsic.WithTestName("sshisblockedinacl"),
|
hsic.WithTestName("sshisblockedinacl"),
|
||||||
hsic.WithConfigEnv(map[string]string{
|
hsic.WithConfigEnv(map[string]string{
|
||||||
"HEADSCALE_FEATURE_SSH": "1",
|
"HEADSCALE_EXPERIMENTAL_FEATURE_SSH": "1",
|
||||||
}),
|
}),
|
||||||
)
|
)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
@ -394,7 +394,7 @@ func TestSSNamespaceOnlyIsolation(t *testing.T) {
|
|||||||
),
|
),
|
||||||
hsic.WithTestName("sshtwonamespaceaclblock"),
|
hsic.WithTestName("sshtwonamespaceaclblock"),
|
||||||
hsic.WithConfigEnv(map[string]string{
|
hsic.WithConfigEnv(map[string]string{
|
||||||
"HEADSCALE_FEATURE_SSH": "1",
|
"HEADSCALE_EXPERIMENTAL_FEATURE_SSH": "1",
|
||||||
}),
|
}),
|
||||||
)
|
)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
|
Loading…
x
Reference in New Issue
Block a user