mirror of
				https://github.com/juanfont/headscale.git
				synced 2025-10-31 16:11:03 +01:00 
			
		
		
		
	cleanup linter warnings (#2206)
Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com>
This commit is contained in:
		
							parent
							
								
									028d9aab73
								
							
						
					
					
						commit
						e2d5ee0927
					
				| @ -111,9 +111,7 @@ func generateUserProfiles( | |||||||
| 
 | 
 | ||||||
| func generateDNSConfig( | func generateDNSConfig( | ||||||
| 	cfg *types.Config, | 	cfg *types.Config, | ||||||
| 	baseDomain string, |  | ||||||
| 	node *types.Node, | 	node *types.Node, | ||||||
| 	peers types.Nodes, |  | ||||||
| ) *tailcfg.DNSConfig { | ) *tailcfg.DNSConfig { | ||||||
| 	if cfg.DNSConfig == nil { | 	if cfg.DNSConfig == nil { | ||||||
| 		return nil | 		return nil | ||||||
| @ -532,12 +530,7 @@ func appendPeerChanges( | |||||||
| 
 | 
 | ||||||
| 	profiles := generateUserProfiles(node, changed) | 	profiles := generateUserProfiles(node, changed) | ||||||
| 
 | 
 | ||||||
| 	dnsConfig := generateDNSConfig( | 	dnsConfig := generateDNSConfig(cfg, node) | ||||||
| 		cfg, |  | ||||||
| 		cfg.BaseDomain, |  | ||||||
| 		node, |  | ||||||
| 		peers, |  | ||||||
| 	) |  | ||||||
| 
 | 
 | ||||||
| 	tailPeers, err := tailNodes(changed, capVer, pol, cfg) | 	tailPeers, err := tailNodes(changed, capVer, pol, cfg) | ||||||
| 	if err != nil { | 	if err != nil { | ||||||
|  | |||||||
| @ -114,24 +114,12 @@ func TestDNSConfigMapResponse(t *testing.T) { | |||||||
| 			} | 			} | ||||||
| 
 | 
 | ||||||
| 			nodeInShared1 := mach("test_get_shared_nodes_1", "shared1", 1) | 			nodeInShared1 := mach("test_get_shared_nodes_1", "shared1", 1) | ||||||
| 			nodeInShared2 := mach("test_get_shared_nodes_2", "shared2", 2) |  | ||||||
| 			nodeInShared3 := mach("test_get_shared_nodes_3", "shared3", 3) |  | ||||||
| 			node2InShared1 := mach("test_get_shared_nodes_4", "shared1", 1) |  | ||||||
| 
 |  | ||||||
| 			peersOfNodeInShared1 := types.Nodes{ |  | ||||||
| 				nodeInShared1, |  | ||||||
| 				nodeInShared2, |  | ||||||
| 				nodeInShared3, |  | ||||||
| 				node2InShared1, |  | ||||||
| 			} |  | ||||||
| 
 | 
 | ||||||
| 			got := generateDNSConfig( | 			got := generateDNSConfig( | ||||||
| 				&types.Config{ | 				&types.Config{ | ||||||
| 					DNSConfig: &dnsConfigOrig, | 					DNSConfig: &dnsConfigOrig, | ||||||
| 				}, | 				}, | ||||||
| 				baseDomain, |  | ||||||
| 				nodeInShared1, | 				nodeInShared1, | ||||||
| 				peersOfNodeInShared1, |  | ||||||
| 			) | 			) | ||||||
| 
 | 
 | ||||||
| 			if diff := cmp.Diff(tt.want, got, cmpopts.EquateEmpty()); diff != "" { | 			if diff := cmp.Diff(tt.want, got, cmpopts.EquateEmpty()); diff != "" { | ||||||
|  | |||||||
| @ -10,7 +10,6 @@ import ( | |||||||
| 	"github.com/juanfont/headscale/hscontrol/types" | 	"github.com/juanfont/headscale/hscontrol/types" | ||||||
| 	"github.com/rs/zerolog/log" | 	"github.com/rs/zerolog/log" | ||||||
| 	"golang.org/x/net/http2" | 	"golang.org/x/net/http2" | ||||||
| 	"golang.org/x/net/http2/h2c" |  | ||||||
| 	"tailscale.com/control/controlbase" | 	"tailscale.com/control/controlbase" | ||||||
| 	"tailscale.com/control/controlhttp" | 	"tailscale.com/control/controlhttp" | ||||||
| 	"tailscale.com/tailcfg" | 	"tailscale.com/tailcfg" | ||||||
| @ -101,18 +100,12 @@ func (h *Headscale) NoiseUpgradeHandler( | |||||||
| 		Methods(http.MethodPost) | 		Methods(http.MethodPost) | ||||||
| 	router.HandleFunc("/machine/map", noiseServer.NoisePollNetMapHandler) | 	router.HandleFunc("/machine/map", noiseServer.NoisePollNetMapHandler) | ||||||
| 
 | 
 | ||||||
| 	server := http.Server{ |  | ||||||
| 		ReadTimeout: types.HTTPTimeout, |  | ||||||
| 	} |  | ||||||
| 
 |  | ||||||
| 	noiseServer.httpBaseConfig = &http.Server{ | 	noiseServer.httpBaseConfig = &http.Server{ | ||||||
| 		Handler:           router, | 		Handler:           router, | ||||||
| 		ReadHeaderTimeout: types.HTTPTimeout, | 		ReadHeaderTimeout: types.HTTPTimeout, | ||||||
| 	} | 	} | ||||||
| 	noiseServer.http2Server = &http2.Server{} | 	noiseServer.http2Server = &http2.Server{} | ||||||
| 
 | 
 | ||||||
| 	server.Handler = h2c.NewHandler(router, noiseServer.http2Server) |  | ||||||
| 
 |  | ||||||
| 	noiseServer.http2Server.ServeConn( | 	noiseServer.http2Server.ServeConn( | ||||||
| 		noiseConn, | 		noiseConn, | ||||||
| 		&http2.ServeConnOpts{ | 		&http2.ServeConnOpts{ | ||||||
|  | |||||||
| @ -22,6 +22,8 @@ import ( | |||||||
| 	"tailscale.com/wgengine/filter" | 	"tailscale.com/wgengine/filter" | ||||||
| ) | ) | ||||||
| 
 | 
 | ||||||
|  | var allPorts = filter.PortRange{First: 0, Last: 0xffff} | ||||||
|  | 
 | ||||||
| // This test is both testing the routes command and the propagation of | // This test is both testing the routes command and the propagation of | ||||||
| // routes. | // routes. | ||||||
| func TestEnablingRoutes(t *testing.T) { | func TestEnablingRoutes(t *testing.T) { | ||||||
| @ -1249,11 +1251,11 @@ func TestSubnetRouteACL(t *testing.T) { | |||||||
| 			Dsts: []filter.NetPortRange{ | 			Dsts: []filter.NetPortRange{ | ||||||
| 				{ | 				{ | ||||||
| 					Net:   netip.MustParsePrefix("100.64.0.2/32"), | 					Net:   netip.MustParsePrefix("100.64.0.2/32"), | ||||||
| 					Ports: filter.PortRange{0, 0xffff}, | 					Ports: allPorts, | ||||||
| 				}, | 				}, | ||||||
| 				{ | 				{ | ||||||
| 					Net:   netip.MustParsePrefix("fd7a:115c:a1e0::2/128"), | 					Net:   netip.MustParsePrefix("fd7a:115c:a1e0::2/128"), | ||||||
| 					Ports: filter.PortRange{0, 0xffff}, | 					Ports: allPorts, | ||||||
| 				}, | 				}, | ||||||
| 			}, | 			}, | ||||||
| 			Caps: []filter.CapMatch{}, | 			Caps: []filter.CapMatch{}, | ||||||
| @ -1281,11 +1283,11 @@ func TestSubnetRouteACL(t *testing.T) { | |||||||
| 			Dsts: []filter.NetPortRange{ | 			Dsts: []filter.NetPortRange{ | ||||||
| 				{ | 				{ | ||||||
| 					Net:   netip.MustParsePrefix("100.64.0.1/32"), | 					Net:   netip.MustParsePrefix("100.64.0.1/32"), | ||||||
| 					Ports: filter.PortRange{0, 0xffff}, | 					Ports: allPorts, | ||||||
| 				}, | 				}, | ||||||
| 				{ | 				{ | ||||||
| 					Net:   netip.MustParsePrefix("fd7a:115c:a1e0::1/128"), | 					Net:   netip.MustParsePrefix("fd7a:115c:a1e0::1/128"), | ||||||
| 					Ports: filter.PortRange{0, 0xffff}, | 					Ports: allPorts, | ||||||
| 				}, | 				}, | ||||||
| 			}, | 			}, | ||||||
| 			Caps: []filter.CapMatch{}, | 			Caps: []filter.CapMatch{}, | ||||||
| @ -1303,7 +1305,7 @@ func TestSubnetRouteACL(t *testing.T) { | |||||||
| 			Dsts: []filter.NetPortRange{ | 			Dsts: []filter.NetPortRange{ | ||||||
| 				{ | 				{ | ||||||
| 					Net:   netip.MustParsePrefix("10.33.0.0/16"), | 					Net:   netip.MustParsePrefix("10.33.0.0/16"), | ||||||
| 					Ports: filter.PortRange{0, 0xffff}, | 					Ports: allPorts, | ||||||
| 				}, | 				}, | ||||||
| 			}, | 			}, | ||||||
| 			Caps: []filter.CapMatch{}, | 			Caps: []filter.CapMatch{}, | ||||||
|  | |||||||
		Loading…
	
	
			
			x
			
			
		
	
		Reference in New Issue
	
	Block a user