cleanup linter warnings (#2206)
Some checks failed
Build / build (push) Has been cancelled
Build documentation / build (push) Has been cancelled
Tests / test (push) Has been cancelled
Build documentation / deploy (push) Has been cancelled
GitHub Actions Version Updater / build (push) Has been cancelled
update-flake-lock / lockfile (push) Has been cancelled

Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com>
This commit is contained in:
Kristoffer Dalby 2024-10-23 10:45:59 -05:00 committed by GitHub
parent 028d9aab73
commit e2d5ee0927
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
4 changed files with 8 additions and 32 deletions

View File

@ -111,9 +111,7 @@ func generateUserProfiles(
func generateDNSConfig( func generateDNSConfig(
cfg *types.Config, cfg *types.Config,
baseDomain string,
node *types.Node, node *types.Node,
peers types.Nodes,
) *tailcfg.DNSConfig { ) *tailcfg.DNSConfig {
if cfg.DNSConfig == nil { if cfg.DNSConfig == nil {
return nil return nil
@ -532,12 +530,7 @@ func appendPeerChanges(
profiles := generateUserProfiles(node, changed) profiles := generateUserProfiles(node, changed)
dnsConfig := generateDNSConfig( dnsConfig := generateDNSConfig(cfg, node)
cfg,
cfg.BaseDomain,
node,
peers,
)
tailPeers, err := tailNodes(changed, capVer, pol, cfg) tailPeers, err := tailNodes(changed, capVer, pol, cfg)
if err != nil { if err != nil {

View File

@ -114,24 +114,12 @@ func TestDNSConfigMapResponse(t *testing.T) {
} }
nodeInShared1 := mach("test_get_shared_nodes_1", "shared1", 1) nodeInShared1 := mach("test_get_shared_nodes_1", "shared1", 1)
nodeInShared2 := mach("test_get_shared_nodes_2", "shared2", 2)
nodeInShared3 := mach("test_get_shared_nodes_3", "shared3", 3)
node2InShared1 := mach("test_get_shared_nodes_4", "shared1", 1)
peersOfNodeInShared1 := types.Nodes{
nodeInShared1,
nodeInShared2,
nodeInShared3,
node2InShared1,
}
got := generateDNSConfig( got := generateDNSConfig(
&types.Config{ &types.Config{
DNSConfig: &dnsConfigOrig, DNSConfig: &dnsConfigOrig,
}, },
baseDomain,
nodeInShared1, nodeInShared1,
peersOfNodeInShared1,
) )
if diff := cmp.Diff(tt.want, got, cmpopts.EquateEmpty()); diff != "" { if diff := cmp.Diff(tt.want, got, cmpopts.EquateEmpty()); diff != "" {

View File

@ -10,7 +10,6 @@ import (
"github.com/juanfont/headscale/hscontrol/types" "github.com/juanfont/headscale/hscontrol/types"
"github.com/rs/zerolog/log" "github.com/rs/zerolog/log"
"golang.org/x/net/http2" "golang.org/x/net/http2"
"golang.org/x/net/http2/h2c"
"tailscale.com/control/controlbase" "tailscale.com/control/controlbase"
"tailscale.com/control/controlhttp" "tailscale.com/control/controlhttp"
"tailscale.com/tailcfg" "tailscale.com/tailcfg"
@ -101,18 +100,12 @@ func (h *Headscale) NoiseUpgradeHandler(
Methods(http.MethodPost) Methods(http.MethodPost)
router.HandleFunc("/machine/map", noiseServer.NoisePollNetMapHandler) router.HandleFunc("/machine/map", noiseServer.NoisePollNetMapHandler)
server := http.Server{
ReadTimeout: types.HTTPTimeout,
}
noiseServer.httpBaseConfig = &http.Server{ noiseServer.httpBaseConfig = &http.Server{
Handler: router, Handler: router,
ReadHeaderTimeout: types.HTTPTimeout, ReadHeaderTimeout: types.HTTPTimeout,
} }
noiseServer.http2Server = &http2.Server{} noiseServer.http2Server = &http2.Server{}
server.Handler = h2c.NewHandler(router, noiseServer.http2Server)
noiseServer.http2Server.ServeConn( noiseServer.http2Server.ServeConn(
noiseConn, noiseConn,
&http2.ServeConnOpts{ &http2.ServeConnOpts{

View File

@ -22,6 +22,8 @@ import (
"tailscale.com/wgengine/filter" "tailscale.com/wgengine/filter"
) )
var allPorts = filter.PortRange{First: 0, Last: 0xffff}
// This test is both testing the routes command and the propagation of // This test is both testing the routes command and the propagation of
// routes. // routes.
func TestEnablingRoutes(t *testing.T) { func TestEnablingRoutes(t *testing.T) {
@ -1249,11 +1251,11 @@ func TestSubnetRouteACL(t *testing.T) {
Dsts: []filter.NetPortRange{ Dsts: []filter.NetPortRange{
{ {
Net: netip.MustParsePrefix("100.64.0.2/32"), Net: netip.MustParsePrefix("100.64.0.2/32"),
Ports: filter.PortRange{0, 0xffff}, Ports: allPorts,
}, },
{ {
Net: netip.MustParsePrefix("fd7a:115c:a1e0::2/128"), Net: netip.MustParsePrefix("fd7a:115c:a1e0::2/128"),
Ports: filter.PortRange{0, 0xffff}, Ports: allPorts,
}, },
}, },
Caps: []filter.CapMatch{}, Caps: []filter.CapMatch{},
@ -1281,11 +1283,11 @@ func TestSubnetRouteACL(t *testing.T) {
Dsts: []filter.NetPortRange{ Dsts: []filter.NetPortRange{
{ {
Net: netip.MustParsePrefix("100.64.0.1/32"), Net: netip.MustParsePrefix("100.64.0.1/32"),
Ports: filter.PortRange{0, 0xffff}, Ports: allPorts,
}, },
{ {
Net: netip.MustParsePrefix("fd7a:115c:a1e0::1/128"), Net: netip.MustParsePrefix("fd7a:115c:a1e0::1/128"),
Ports: filter.PortRange{0, 0xffff}, Ports: allPorts,
}, },
}, },
Caps: []filter.CapMatch{}, Caps: []filter.CapMatch{},
@ -1303,7 +1305,7 @@ func TestSubnetRouteACL(t *testing.T) {
Dsts: []filter.NetPortRange{ Dsts: []filter.NetPortRange{
{ {
Net: netip.MustParsePrefix("10.33.0.0/16"), Net: netip.MustParsePrefix("10.33.0.0/16"),
Ports: filter.PortRange{0, 0xffff}, Ports: allPorts,
}, },
}, },
Caps: []filter.CapMatch{}, Caps: []filter.CapMatch{},