mirror of
				https://github.com/juanfont/headscale.git
				synced 2025-11-04 01:51:04 +01:00 
			
		
		
		
	Mark the flag properly experimental
Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com>
This commit is contained in:
		
							parent
							
								
									22da5bfc1d
								
							
						
					
					
						commit
						c02e105065
					
				
							
								
								
									
										4
									
								
								acls.go
									
									
									
									
									
								
							
							
						
						
									
										4
									
								
								acls.go
									
									
									
									
									
								
							@ -56,7 +56,7 @@ const (
 | 
			
		||||
	ProtocolFC       = 133 // Fibre Channel
 | 
			
		||||
)
 | 
			
		||||
 | 
			
		||||
var featureEnableSSH = envknob.RegisterBool("HEADSCALE_FEATURE_SSH")
 | 
			
		||||
var featureEnableSSH = envknob.RegisterBool("HEADSCALE_EXPERIMENTAL_FEATURE_SSH")
 | 
			
		||||
 | 
			
		||||
// LoadACLPolicy loads the ACL policy from the specify path, and generates the ACL rules.
 | 
			
		||||
func (h *Headscale) LoadACLPolicy(path string) error {
 | 
			
		||||
@ -135,7 +135,7 @@ func (h *Headscale) UpdateACLRules() error {
 | 
			
		||||
		}
 | 
			
		||||
		h.sshPolicy.Rules = sshRules
 | 
			
		||||
	} else if h.aclPolicy != nil && len(h.aclPolicy.SSHs) > 0 {
 | 
			
		||||
		log.Info().Msg("SSH ACLs has been defined, but HEADSCALE_FEATURE_SSH is not enabled, this is a unstable feature, check docs before activating")
 | 
			
		||||
		log.Info().Msg("SSH ACLs has been defined, but HEADSCALE_EXPERIMENTAL_FEATURE_SSH is not enabled, this is a unstable feature, check docs before activating")
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	return nil
 | 
			
		||||
 | 
			
		||||
@ -79,7 +79,7 @@ func TestSSHOneNamespaceAllToAll(t *testing.T) {
 | 
			
		||||
			},
 | 
			
		||||
		),
 | 
			
		||||
		hsic.WithConfigEnv(map[string]string{
 | 
			
		||||
			"HEADSCALE_FEATURE_SSH": "1",
 | 
			
		||||
			"HEADSCALE_EXPERIMENTAL_FEATURE_SSH": "1",
 | 
			
		||||
		}),
 | 
			
		||||
	)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
@ -156,7 +156,7 @@ func TestSSHMultipleNamespacesAllToAll(t *testing.T) {
 | 
			
		||||
			},
 | 
			
		||||
		),
 | 
			
		||||
		hsic.WithConfigEnv(map[string]string{
 | 
			
		||||
			"HEADSCALE_FEATURE_SSH": "1",
 | 
			
		||||
			"HEADSCALE_EXPERIMENTAL_FEATURE_SSH": "1",
 | 
			
		||||
		}),
 | 
			
		||||
	)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
@ -232,7 +232,7 @@ func TestSSHNoSSHConfigured(t *testing.T) {
 | 
			
		||||
		),
 | 
			
		||||
		hsic.WithTestName("sshnoneconfigured"),
 | 
			
		||||
		hsic.WithConfigEnv(map[string]string{
 | 
			
		||||
			"HEADSCALE_FEATURE_SSH": "1",
 | 
			
		||||
			"HEADSCALE_EXPERIMENTAL_FEATURE_SSH": "1",
 | 
			
		||||
		}),
 | 
			
		||||
	)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
@ -309,7 +309,7 @@ func TestSSHIsBlockedInACL(t *testing.T) {
 | 
			
		||||
		),
 | 
			
		||||
		hsic.WithTestName("sshisblockedinacl"),
 | 
			
		||||
		hsic.WithConfigEnv(map[string]string{
 | 
			
		||||
			"HEADSCALE_FEATURE_SSH": "1",
 | 
			
		||||
			"HEADSCALE_EXPERIMENTAL_FEATURE_SSH": "1",
 | 
			
		||||
		}),
 | 
			
		||||
	)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
@ -394,7 +394,7 @@ func TestSSNamespaceOnlyIsolation(t *testing.T) {
 | 
			
		||||
		),
 | 
			
		||||
		hsic.WithTestName("sshtwonamespaceaclblock"),
 | 
			
		||||
		hsic.WithConfigEnv(map[string]string{
 | 
			
		||||
			"HEADSCALE_FEATURE_SSH": "1",
 | 
			
		||||
			"HEADSCALE_EXPERIMENTAL_FEATURE_SSH": "1",
 | 
			
		||||
		}),
 | 
			
		||||
	)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
 | 
			
		||||
		Loading…
	
	
			
			x
			
			
		
	
		Reference in New Issue
	
	Block a user