2024-08-05 19:06:48 +00:00
// Copyright (c) Tailscale Inc & AUTHORS
// SPDX-License-Identifier: BSD-3-Clause
// The tta server is the Tailscale Test Agent.
//
// It runs on each Tailscale node being integration tested and permits the test
// harness to control the node. It connects out to the test drver (rather than
// accepting any TCP connections inbound, which might be blocked depending on
// the scenario being tested) and then the test driver turns the TCP connection
// around and sends request back.
package main
import (
2024-08-23 18:27:42 +00:00
"bytes"
2024-08-08 22:37:47 +00:00
"context"
2024-08-05 19:06:48 +00:00
"errors"
"flag"
"io"
"log"
"net"
"net/http"
2024-08-07 00:33:45 +00:00
"net/http/httputil"
"net/url"
2024-08-05 19:06:48 +00:00
"os"
"os/exec"
2024-08-07 00:33:45 +00:00
"regexp"
2024-08-05 19:06:48 +00:00
"strings"
"sync"
"time"
2024-08-14 04:09:53 +00:00
"tailscale.com/atomicfile"
2024-08-07 00:33:45 +00:00
"tailscale.com/client/tailscale"
2024-08-08 03:32:11 +00:00
"tailscale.com/hostinfo"
2024-08-07 00:33:45 +00:00
"tailscale.com/util/must"
2024-08-05 19:06:48 +00:00
"tailscale.com/util/set"
"tailscale.com/version/distro"
)
var (
driverAddr = flag . String ( "driver" , "test-driver.tailscale:8008" , "address of the test driver; by default we use the DNS name test-driver.tailscale which is special cased in the emulated network's DNS server" )
)
2024-08-07 00:33:45 +00:00
func absify ( cmd string ) string {
2024-08-05 19:06:48 +00:00
if distro . Get ( ) == distro . Gokrazy && ! strings . Contains ( cmd , "/" ) {
2024-08-07 00:33:45 +00:00
return "/user/" + cmd
2024-08-05 19:06:48 +00:00
}
2024-08-07 00:33:45 +00:00
return cmd
}
func serveCmd ( w http . ResponseWriter , cmd string , args ... string ) {
log . Printf ( "Got serveCmd for %q %v" , cmd , args )
out , err := exec . Command ( absify ( cmd ) , args ... ) . CombinedOutput ( )
2024-08-05 19:06:48 +00:00
w . Header ( ) . Set ( "Content-Type" , "text/plain; charset=utf-8" )
if err != nil {
w . Header ( ) . Set ( "Exec-Err" , err . Error ( ) )
w . WriteHeader ( 500 )
2024-08-07 00:33:45 +00:00
log . Printf ( "Err on serveCmd for %q %v, %d bytes of output: %v" , cmd , args , len ( out ) , err )
} else {
log . Printf ( "Did serveCmd for %q %v, %d bytes of output" , cmd , args , len ( out ) )
2024-08-05 19:06:48 +00:00
}
w . Write ( out )
}
2024-08-07 00:33:45 +00:00
type localClientRoundTripper struct {
2024-08-08 22:37:47 +00:00
lc tailscale . LocalClient
2024-08-07 00:33:45 +00:00
}
2024-08-08 22:37:47 +00:00
func ( rt * localClientRoundTripper ) RoundTrip ( req * http . Request ) ( * http . Response , error ) {
2024-08-08 04:31:50 +00:00
req = req . Clone ( req . Context ( ) )
req . RequestURI = ""
2024-08-07 00:33:45 +00:00
return rt . lc . DoLocalRequest ( req )
}
2024-08-05 19:06:48 +00:00
func main ( ) {
2024-08-23 18:27:42 +00:00
var logBuf logBuffer
log . SetOutput ( io . MultiWriter ( os . Stderr , & logBuf ) )
2024-08-05 19:06:48 +00:00
if distro . Get ( ) == distro . Gokrazy {
2024-08-08 03:32:11 +00:00
if ! hostinfo . IsNATLabGuestVM ( ) {
2024-08-05 19:06:48 +00:00
// "Exiting immediately with status code 0 when the
// GOKRAZY_FIRST_START=1 environment variable is set means “don’ t
// start the program on boot”"
return
}
}
flag . Parse ( )
2024-08-07 00:33:45 +00:00
if distro . Get ( ) == distro . Gokrazy {
2024-08-14 04:09:53 +00:00
cmdLine , _ := os . ReadFile ( "/proc/cmdline" )
explicitNS := false
for _ , s := range strings . Fields ( string ( cmdLine ) ) {
if ns , ok := strings . CutPrefix ( s , "tta.nameserver=" ) ; ok {
err := atomicfile . WriteFile ( "/tmp/resolv.conf" , [ ] byte ( "nameserver " + ns + "\n" ) , 0644 )
log . Printf ( "Wrote /tmp/resolv.conf: %v" , err )
explicitNS = true
2024-08-07 00:33:45 +00:00
break
}
}
2024-08-14 04:09:53 +00:00
if ! explicitNS {
nsRx := regexp . MustCompile ( ` (?m)^nameserver (.*) ` )
for t := time . Now ( ) ; time . Since ( t ) < 10 * time . Second ; time . Sleep ( 10 * time . Millisecond ) {
all , _ := os . ReadFile ( "/etc/resolv.conf" )
if nsRx . Match ( all ) {
break
}
}
}
2024-08-07 00:33:45 +00:00
}
2024-08-05 19:06:48 +00:00
log . Printf ( "Tailscale Test Agent running." )
2024-08-08 22:37:47 +00:00
gokRP := httputil . NewSingleHostReverseProxy ( must . Get ( url . Parse ( "http://gokrazy" ) ) )
gokRP . Transport = & http . Transport {
DialContext : func ( ctx context . Context , network , addr string ) ( net . Conn , error ) {
if network != "tcp" {
return nil , errors . New ( "unexpected network" )
}
if addr != "gokrazy:80" {
return nil , errors . New ( "unexpected addr" )
}
var d net . Dialer
return d . DialContext ( ctx , "unix" , "/run/gokrazy-http.sock" )
} ,
}
var ttaMux http . ServeMux // agent mux
var serveMux http . ServeMux
serveMux . HandleFunc ( "/" , func ( w http . ResponseWriter , r * http . Request ) {
if r . Header . Get ( "X-TTA-GoKrazy" ) == "1" {
gokRP . ServeHTTP ( w , r )
return
}
ttaMux . ServeHTTP ( w , r )
} )
2024-08-05 19:06:48 +00:00
var hs http . Server
2024-08-08 22:37:47 +00:00
hs . Handler = & serveMux
2024-08-05 19:06:48 +00:00
var (
stMu sync . Mutex
newSet = set . Set [ net . Conn ] { } // conns in StateNew
)
needConnCh := make ( chan bool , 1 )
hs . ConnState = func ( c net . Conn , s http . ConnState ) {
stMu . Lock ( )
defer stMu . Unlock ( )
2024-08-10 20:46:47 +00:00
oldLen := len ( newSet )
2024-08-05 19:06:48 +00:00
switch s {
case http . StateNew :
newSet . Add ( c )
2024-08-07 00:33:45 +00:00
default :
2024-08-05 19:06:48 +00:00
newSet . Delete ( c )
}
2024-08-10 20:46:47 +00:00
if oldLen != 0 && len ( newSet ) == 0 {
2024-08-05 19:06:48 +00:00
select {
case needConnCh <- true :
default :
}
}
}
conns := make ( chan net . Conn , 1 )
2024-08-07 00:33:45 +00:00
2024-08-08 22:37:47 +00:00
lcRP := httputil . NewSingleHostReverseProxy ( must . Get ( url . Parse ( "http://local-tailscaled.sock" ) ) )
lcRP . Transport = new ( localClientRoundTripper )
2024-08-10 20:46:47 +00:00
ttaMux . HandleFunc ( "/localapi/" , func ( w http . ResponseWriter , r * http . Request ) {
log . Printf ( "Got localapi request: %v" , r . URL )
t0 := time . Now ( )
lcRP . ServeHTTP ( w , r )
log . Printf ( "Did localapi request in %v: %v" , time . Since ( t0 ) . Round ( time . Millisecond ) , r . URL )
} )
2024-08-05 19:06:48 +00:00
2024-08-08 22:37:47 +00:00
ttaMux . HandleFunc ( "/" , func ( w http . ResponseWriter , r * http . Request ) {
2024-08-05 19:06:48 +00:00
io . WriteString ( w , "TTA\n" )
return
} )
2024-08-08 22:37:47 +00:00
ttaMux . HandleFunc ( "/up" , func ( w http . ResponseWriter , r * http . Request ) {
2024-08-07 00:33:45 +00:00
serveCmd ( w , "tailscale" , "up" , "--login-server=http://control.tailscale" )
2024-08-05 19:06:48 +00:00
} )
2024-08-10 20:46:47 +00:00
ttaMux . HandleFunc ( "/fw" , addFirewallHandler )
2024-08-23 18:27:42 +00:00
ttaMux . HandleFunc ( "/logs" , func ( w http . ResponseWriter , r * http . Request ) {
logBuf . mu . Lock ( )
defer logBuf . mu . Unlock ( )
w . Header ( ) . Set ( "Content-Type" , "text/plain; charset=utf-8" )
w . Write ( logBuf . buf . Bytes ( ) )
} )
2024-08-05 19:06:48 +00:00
go hs . Serve ( chanListener ( conns ) )
2024-08-10 20:46:47 +00:00
// For doing agent operations locally from gokrazy:
2024-08-23 18:27:42 +00:00
// (e.g. with "wget -O - localhost:8123/fw" or "wget -O - localhost:8123/logs"
// to get early tta logs before the port 124 connection is established)
2024-08-10 20:46:47 +00:00
go func ( ) {
err := http . ListenAndServe ( "127.0.0.1:8123" , & ttaMux )
if err != nil {
log . Fatalf ( "ListenAndServe: %v" , err )
}
} ( )
2024-08-05 19:06:48 +00:00
var lastErr string
needConnCh <- true
for {
<- needConnCh
c , err := connect ( )
if err != nil {
s := err . Error ( )
if s != lastErr {
log . Printf ( "Connect failure: %v" , s )
}
lastErr = s
time . Sleep ( time . Second )
continue
}
conns <- c
}
}
func connect ( ) ( net . Conn , error ) {
c , err := net . Dial ( "tcp" , * driverAddr )
if err != nil {
return nil , err
}
return c , nil
}
2024-08-07 00:33:45 +00:00
type chanListener <- chan net . Conn
2024-08-05 19:06:48 +00:00
func ( cl chanListener ) Accept ( ) ( net . Conn , error ) {
c , ok := <- cl
if ! ok {
return nil , errors . New ( "closed" )
}
return c , nil
}
func ( cl chanListener ) Close ( ) error {
return nil
}
func ( cl chanListener ) Addr ( ) net . Addr {
return & net . TCPAddr {
IP : net . ParseIP ( "52.0.0.34" ) , // TS..DR(iver)
Port : 123 ,
}
}
2024-08-10 20:46:47 +00:00
func addFirewallHandler ( w http . ResponseWriter , r * http . Request ) {
if addFirewall == nil {
http . Error ( w , "firewall not supported" , 500 )
return
}
err := addFirewall ( )
if err != nil {
http . Error ( w , err . Error ( ) , 500 )
return
}
io . WriteString ( w , "OK\n" )
}
var addFirewall func ( ) error // set by fw_linux.go
2024-08-23 18:27:42 +00:00
// logBuffer is a bytes.Buffer that is safe for concurrent use
// intended to capture early logs from the process, even if
// gokrazy's syslog streaming isn't working or yet working.
// It only captures the first 1MB of logs, as that's considered
// plenty for early debugging. At runtime, it's assumed that
// syslog log streaming is working.
type logBuffer struct {
mu sync . Mutex
buf bytes . Buffer
}
func ( lb * logBuffer ) Write ( p [ ] byte ) ( n int , err error ) {
lb . mu . Lock ( )
defer lb . mu . Unlock ( )
const maxSize = 1 << 20 // more than plenty; see type comment
if lb . buf . Len ( ) > maxSize {
return len ( p ) , nil
}
return lb . buf . Write ( p )
}