mirror of
				https://github.com/juanfont/headscale.git
				synced 2025-11-04 10:01:05 +01:00 
			
		
		
		
	* types/node: add helper funcs for node tags Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com> * types/node: add DebugString method for node Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com> * policy/v2: add String func to AutoApprover interface Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com> * policy/v2: simplify, use slices.Contains Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com> * policy/v2: debug, use nodes.DebugString Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com> * policy/v1: fix potential nil pointer in NodeCanApproveRoute Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com> * policy/v1: slices.Contains Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com> * integration/tsic: fix diff in login commands Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com> * integration: fix webauth running with wrong scenario Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com> * integration: move common oidc opts to func Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com> * integration: require node count, more verbose Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com> * auth: remove uneffective route approve Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com> * .github/workflows: fmt Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com> * integration/tsic: add id func Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com> * integration: remove call that might be nil Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com> * integration: test autoapprovers against web/authkey x group/tag/user Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com> * integration: unique network id per scenario Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com> * Revert "integration: move common oidc opts to func" This reverts commit 7e9d165d4a900c304f1083b665f1a24a26e06e55. * remove cmd Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com> * integration: clean docker images between runs in ci Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com> * integration: run autoapprove test against differnt policy modes Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com> * integration/tsic: append, not overrwrite extra login args Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com> * .github/workflows: remove polv2 Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com> --------- Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com>
		
			
				
	
	
		
			1231 lines
		
	
	
		
			31 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			1231 lines
		
	
	
		
			31 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
package tsic
 | 
						|
 | 
						|
import (
 | 
						|
	"archive/tar"
 | 
						|
	"bytes"
 | 
						|
	"context"
 | 
						|
	"encoding/json"
 | 
						|
	"errors"
 | 
						|
	"fmt"
 | 
						|
	"io"
 | 
						|
	"log"
 | 
						|
	"net/netip"
 | 
						|
	"net/url"
 | 
						|
	"os"
 | 
						|
	"reflect"
 | 
						|
	"runtime/debug"
 | 
						|
	"strconv"
 | 
						|
	"strings"
 | 
						|
	"time"
 | 
						|
 | 
						|
	"github.com/juanfont/headscale/hscontrol/types"
 | 
						|
	"github.com/juanfont/headscale/hscontrol/util"
 | 
						|
	"github.com/juanfont/headscale/integration/dockertestutil"
 | 
						|
	"github.com/juanfont/headscale/integration/integrationutil"
 | 
						|
	"github.com/ory/dockertest/v3"
 | 
						|
	"github.com/ory/dockertest/v3/docker"
 | 
						|
	"tailscale.com/ipn"
 | 
						|
	"tailscale.com/ipn/ipnstate"
 | 
						|
	"tailscale.com/net/netcheck"
 | 
						|
	"tailscale.com/types/netmap"
 | 
						|
)
 | 
						|
 | 
						|
const (
 | 
						|
	tsicHashLength       = 6
 | 
						|
	defaultPingTimeout   = 300 * time.Millisecond
 | 
						|
	defaultPingCount     = 10
 | 
						|
	dockerContextPath    = "../."
 | 
						|
	caCertRoot           = "/usr/local/share/ca-certificates"
 | 
						|
	dockerExecuteTimeout = 60 * time.Second
 | 
						|
)
 | 
						|
 | 
						|
var (
 | 
						|
	errTailscalePingFailed             = errors.New("ping failed")
 | 
						|
	errTailscalePingNotDERP            = errors.New("ping not via DERP")
 | 
						|
	errTailscaleNotLoggedIn            = errors.New("tailscale not logged in")
 | 
						|
	errTailscaleWrongPeerCount         = errors.New("wrong peer count")
 | 
						|
	errTailscaleCannotUpWithoutAuthkey = errors.New("cannot up without authkey")
 | 
						|
	errTailscaleNotConnected           = errors.New("tailscale not connected")
 | 
						|
	errTailscaledNotReadyForLogin      = errors.New("tailscaled not ready for login")
 | 
						|
	errInvalidClientConfig             = errors.New("verifiably invalid client config requested")
 | 
						|
)
 | 
						|
 | 
						|
const (
 | 
						|
	VersionHead = "head"
 | 
						|
)
 | 
						|
 | 
						|
func errTailscaleStatus(hostname string, err error) error {
 | 
						|
	return fmt.Errorf("%s failed to fetch tailscale status: %w", hostname, err)
 | 
						|
}
 | 
						|
 | 
						|
// TailscaleInContainer is an implementation of TailscaleClient which
 | 
						|
// sets up a Tailscale instance inside a container.
 | 
						|
type TailscaleInContainer struct {
 | 
						|
	version  string
 | 
						|
	hostname string
 | 
						|
 | 
						|
	pool      *dockertest.Pool
 | 
						|
	container *dockertest.Resource
 | 
						|
	network   *dockertest.Network
 | 
						|
 | 
						|
	// "cache"
 | 
						|
	ips  []netip.Addr
 | 
						|
	fqdn string
 | 
						|
 | 
						|
	// optional config
 | 
						|
	caCerts           [][]byte
 | 
						|
	headscaleHostname string
 | 
						|
	withWebsocketDERP bool
 | 
						|
	withSSH           bool
 | 
						|
	withTags          []string
 | 
						|
	withEntrypoint    []string
 | 
						|
	withExtraHosts    []string
 | 
						|
	workdir           string
 | 
						|
	netfilter         string
 | 
						|
	extraLoginArgs    []string
 | 
						|
	withAcceptRoutes  bool
 | 
						|
 | 
						|
	// build options, solely for HEAD
 | 
						|
	buildConfig TailscaleInContainerBuildConfig
 | 
						|
}
 | 
						|
 | 
						|
type TailscaleInContainerBuildConfig struct {
 | 
						|
	tags []string
 | 
						|
}
 | 
						|
 | 
						|
// Option represent optional settings that can be given to a
 | 
						|
// Tailscale instance.
 | 
						|
type Option = func(c *TailscaleInContainer)
 | 
						|
 | 
						|
// WithCACert adds it to the trusted surtificate of the Tailscale container.
 | 
						|
func WithCACert(cert []byte) Option {
 | 
						|
	return func(tsic *TailscaleInContainer) {
 | 
						|
		tsic.caCerts = append(tsic.caCerts, cert)
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
// WithNetwork sets the Docker container network to use with
 | 
						|
// the Tailscale instance.
 | 
						|
func WithNetwork(network *dockertest.Network) Option {
 | 
						|
	return func(tsic *TailscaleInContainer) {
 | 
						|
		tsic.network = network
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
// WithHeadscaleName set the name of the headscale instance,
 | 
						|
// mostly useful in combination with TLS and WithCACert.
 | 
						|
func WithHeadscaleName(hsName string) Option {
 | 
						|
	return func(tsic *TailscaleInContainer) {
 | 
						|
		tsic.headscaleHostname = hsName
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
// WithTags associates the given tags to the Tailscale instance.
 | 
						|
func WithTags(tags []string) Option {
 | 
						|
	return func(tsic *TailscaleInContainer) {
 | 
						|
		tsic.withTags = tags
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
// WithWebsocketDERP toggles a development knob to
 | 
						|
// force enable DERP connection through the new websocket protocol.
 | 
						|
func WithWebsocketDERP(enabled bool) Option {
 | 
						|
	return func(tsic *TailscaleInContainer) {
 | 
						|
		tsic.withWebsocketDERP = enabled
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
// WithSSH enables SSH for the Tailscale instance.
 | 
						|
func WithSSH() Option {
 | 
						|
	return func(tsic *TailscaleInContainer) {
 | 
						|
		tsic.withSSH = true
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
// WithDockerWorkdir allows the docker working directory to be set.
 | 
						|
func WithDockerWorkdir(dir string) Option {
 | 
						|
	return func(tsic *TailscaleInContainer) {
 | 
						|
		tsic.workdir = dir
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func WithExtraHosts(hosts []string) Option {
 | 
						|
	return func(tsic *TailscaleInContainer) {
 | 
						|
		tsic.withExtraHosts = hosts
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
// WithDockerEntrypoint allows the docker entrypoint of the container
 | 
						|
// to be overridden. This is a dangerous option which can make
 | 
						|
// the container not work as intended as a typo might prevent
 | 
						|
// tailscaled and other processes from starting.
 | 
						|
// Use with caution.
 | 
						|
func WithDockerEntrypoint(args []string) Option {
 | 
						|
	return func(tsic *TailscaleInContainer) {
 | 
						|
		tsic.withEntrypoint = args
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
// WithNetfilter configures Tailscales parameter --netfilter-mode
 | 
						|
// allowing us to turn of modifying ip[6]tables/nftables.
 | 
						|
// It takes: "on", "off", "nodivert".
 | 
						|
func WithNetfilter(state string) Option {
 | 
						|
	return func(tsic *TailscaleInContainer) {
 | 
						|
		tsic.netfilter = state
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
// WithBuildTag adds an additional value to the `-tags=` parameter
 | 
						|
// of the Go compiler, allowing callers to customize the Tailscale client build.
 | 
						|
// This option is only meaningful when invoked on **HEAD** versions of the client.
 | 
						|
// Attempts to use it with any other version is a bug in the calling code.
 | 
						|
func WithBuildTag(tag string) Option {
 | 
						|
	return func(tsic *TailscaleInContainer) {
 | 
						|
		if tsic.version != VersionHead {
 | 
						|
			panic(errInvalidClientConfig)
 | 
						|
		}
 | 
						|
 | 
						|
		tsic.buildConfig.tags = append(
 | 
						|
			tsic.buildConfig.tags, tag,
 | 
						|
		)
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
// WithExtraLoginArgs adds additional arguments to the `tailscale up` command
 | 
						|
// as part of the Login function.
 | 
						|
func WithExtraLoginArgs(args []string) Option {
 | 
						|
	return func(tsic *TailscaleInContainer) {
 | 
						|
		tsic.extraLoginArgs = append(tsic.extraLoginArgs, args...)
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
// WithAcceptRoutes tells the node to accept incomming routes.
 | 
						|
func WithAcceptRoutes() Option {
 | 
						|
	return func(tsic *TailscaleInContainer) {
 | 
						|
		tsic.withAcceptRoutes = true
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
// New returns a new TailscaleInContainer instance.
 | 
						|
func New(
 | 
						|
	pool *dockertest.Pool,
 | 
						|
	version string,
 | 
						|
	opts ...Option,
 | 
						|
) (*TailscaleInContainer, error) {
 | 
						|
	hash, err := util.GenerateRandomStringDNSSafe(tsicHashLength)
 | 
						|
	if err != nil {
 | 
						|
		return nil, err
 | 
						|
	}
 | 
						|
 | 
						|
	hostname := fmt.Sprintf("ts-%s-%s", strings.ReplaceAll(version, ".", "-"), hash)
 | 
						|
 | 
						|
	tsic := &TailscaleInContainer{
 | 
						|
		version:  version,
 | 
						|
		hostname: hostname,
 | 
						|
 | 
						|
		pool: pool,
 | 
						|
 | 
						|
		withEntrypoint: []string{
 | 
						|
			"/bin/sh",
 | 
						|
			"-c",
 | 
						|
			"/bin/sleep 3 ; update-ca-certificates ; tailscaled --tun=tsdev --verbose=10",
 | 
						|
		},
 | 
						|
	}
 | 
						|
 | 
						|
	for _, opt := range opts {
 | 
						|
		opt(tsic)
 | 
						|
	}
 | 
						|
 | 
						|
	if tsic.network == nil {
 | 
						|
		return nil, fmt.Errorf("no network set, called from: \n%s", string(debug.Stack()))
 | 
						|
	}
 | 
						|
 | 
						|
	tailscaleOptions := &dockertest.RunOptions{
 | 
						|
		Name:       hostname,
 | 
						|
		Networks:   []*dockertest.Network{tsic.network},
 | 
						|
		Entrypoint: tsic.withEntrypoint,
 | 
						|
		ExtraHosts: tsic.withExtraHosts,
 | 
						|
		Env:        []string{},
 | 
						|
	}
 | 
						|
 | 
						|
	if tsic.withWebsocketDERP {
 | 
						|
		if version != VersionHead {
 | 
						|
			return tsic, errInvalidClientConfig
 | 
						|
		}
 | 
						|
 | 
						|
		WithBuildTag("ts_debug_websockets")(tsic)
 | 
						|
 | 
						|
		tailscaleOptions.Env = append(
 | 
						|
			tailscaleOptions.Env,
 | 
						|
			fmt.Sprintf("TS_DEBUG_DERP_WS_CLIENT=%t", tsic.withWebsocketDERP),
 | 
						|
		)
 | 
						|
	}
 | 
						|
 | 
						|
	tailscaleOptions.ExtraHosts = append(tailscaleOptions.ExtraHosts,
 | 
						|
		"host.docker.internal:host-gateway")
 | 
						|
 | 
						|
	if tsic.workdir != "" {
 | 
						|
		tailscaleOptions.WorkingDir = tsic.workdir
 | 
						|
	}
 | 
						|
 | 
						|
	// dockertest isn't very good at handling containers that has already
 | 
						|
	// been created, this is an attempt to make sure this container isn't
 | 
						|
	// present.
 | 
						|
	err = pool.RemoveContainerByName(hostname)
 | 
						|
	if err != nil {
 | 
						|
		return nil, err
 | 
						|
	}
 | 
						|
 | 
						|
	var container *dockertest.Resource
 | 
						|
 | 
						|
	if version != VersionHead {
 | 
						|
		// build options are not meaningful with pre-existing images,
 | 
						|
		// let's not lead anyone astray by pretending otherwise.
 | 
						|
		defaultBuildConfig := TailscaleInContainerBuildConfig{}
 | 
						|
		hasBuildConfig := !reflect.DeepEqual(defaultBuildConfig, tsic.buildConfig)
 | 
						|
		if hasBuildConfig {
 | 
						|
			return tsic, errInvalidClientConfig
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
	switch version {
 | 
						|
	case VersionHead:
 | 
						|
		buildOptions := &dockertest.BuildOptions{
 | 
						|
			Dockerfile: "Dockerfile.tailscale-HEAD",
 | 
						|
			ContextDir: dockerContextPath,
 | 
						|
			BuildArgs:  []docker.BuildArg{},
 | 
						|
		}
 | 
						|
 | 
						|
		buildTags := strings.Join(tsic.buildConfig.tags, ",")
 | 
						|
		if len(buildTags) > 0 {
 | 
						|
			buildOptions.BuildArgs = append(
 | 
						|
				buildOptions.BuildArgs,
 | 
						|
				docker.BuildArg{
 | 
						|
					Name:  "BUILD_TAGS",
 | 
						|
					Value: buildTags,
 | 
						|
				},
 | 
						|
			)
 | 
						|
		}
 | 
						|
 | 
						|
		container, err = pool.BuildAndRunWithBuildOptions(
 | 
						|
			buildOptions,
 | 
						|
			tailscaleOptions,
 | 
						|
			dockertestutil.DockerRestartPolicy,
 | 
						|
			dockertestutil.DockerAllowLocalIPv6,
 | 
						|
			dockertestutil.DockerAllowNetworkAdministration,
 | 
						|
		)
 | 
						|
	case "unstable":
 | 
						|
		tailscaleOptions.Repository = "tailscale/tailscale"
 | 
						|
		tailscaleOptions.Tag = version
 | 
						|
 | 
						|
		container, err = pool.RunWithOptions(
 | 
						|
			tailscaleOptions,
 | 
						|
			dockertestutil.DockerRestartPolicy,
 | 
						|
			dockertestutil.DockerAllowLocalIPv6,
 | 
						|
			dockertestutil.DockerAllowNetworkAdministration,
 | 
						|
		)
 | 
						|
	default:
 | 
						|
		tailscaleOptions.Repository = "tailscale/tailscale"
 | 
						|
		tailscaleOptions.Tag = "v" + version
 | 
						|
 | 
						|
		container, err = pool.RunWithOptions(
 | 
						|
			tailscaleOptions,
 | 
						|
			dockertestutil.DockerRestartPolicy,
 | 
						|
			dockertestutil.DockerAllowLocalIPv6,
 | 
						|
			dockertestutil.DockerAllowNetworkAdministration,
 | 
						|
		)
 | 
						|
	}
 | 
						|
 | 
						|
	if err != nil {
 | 
						|
		return nil, fmt.Errorf(
 | 
						|
			"%s could not start tailscale container (version: %s): %w",
 | 
						|
			hostname,
 | 
						|
			version,
 | 
						|
			err,
 | 
						|
		)
 | 
						|
	}
 | 
						|
	log.Printf("Created %s container\n", hostname)
 | 
						|
 | 
						|
	tsic.container = container
 | 
						|
 | 
						|
	for i, cert := range tsic.caCerts {
 | 
						|
		err = tsic.WriteFile(fmt.Sprintf("%s/user-%d.crt", caCertRoot, i), cert)
 | 
						|
		if err != nil {
 | 
						|
			return nil, fmt.Errorf("failed to write TLS certificate to container: %w", err)
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
	return tsic, nil
 | 
						|
}
 | 
						|
 | 
						|
// Shutdown stops and cleans up the Tailscale container.
 | 
						|
func (t *TailscaleInContainer) Shutdown() (string, string, error) {
 | 
						|
	stdoutPath, stderrPath, err := t.SaveLog("/tmp/control")
 | 
						|
	if err != nil {
 | 
						|
		log.Printf(
 | 
						|
			"Failed to save log from %s: %s",
 | 
						|
			t.hostname,
 | 
						|
			fmt.Errorf("failed to save log: %w", err),
 | 
						|
		)
 | 
						|
	}
 | 
						|
 | 
						|
	return stdoutPath, stderrPath, t.pool.Purge(t.container)
 | 
						|
}
 | 
						|
 | 
						|
// Hostname returns the hostname of the Tailscale instance.
 | 
						|
func (t *TailscaleInContainer) Hostname() string {
 | 
						|
	return t.hostname
 | 
						|
}
 | 
						|
 | 
						|
// Version returns the running Tailscale version of the instance.
 | 
						|
func (t *TailscaleInContainer) Version() string {
 | 
						|
	return t.version
 | 
						|
}
 | 
						|
 | 
						|
// ID returns the Docker container ID of the TailscaleInContainer
 | 
						|
// instance.
 | 
						|
func (t *TailscaleInContainer) ContainerID() string {
 | 
						|
	return t.container.Container.ID
 | 
						|
}
 | 
						|
 | 
						|
// Execute runs a command inside the Tailscale container and returns the
 | 
						|
// result of stdout as a string.
 | 
						|
func (t *TailscaleInContainer) Execute(
 | 
						|
	command []string,
 | 
						|
	options ...dockertestutil.ExecuteCommandOption,
 | 
						|
) (string, string, error) {
 | 
						|
	stdout, stderr, err := dockertestutil.ExecuteCommand(
 | 
						|
		t.container,
 | 
						|
		command,
 | 
						|
		[]string{},
 | 
						|
		options...,
 | 
						|
	)
 | 
						|
	if err != nil {
 | 
						|
		// log.Printf("command issued: %s", strings.Join(command, " "))
 | 
						|
		// log.Printf("command stderr: %s\n", stderr)
 | 
						|
 | 
						|
		if stdout != "" {
 | 
						|
			log.Printf("command stdout: %s\n", stdout)
 | 
						|
		}
 | 
						|
 | 
						|
		if strings.Contains(stderr, "NeedsLogin") {
 | 
						|
			return stdout, stderr, errTailscaleNotLoggedIn
 | 
						|
		}
 | 
						|
 | 
						|
		return stdout, stderr, err
 | 
						|
	}
 | 
						|
 | 
						|
	return stdout, stderr, nil
 | 
						|
}
 | 
						|
 | 
						|
// Retrieve container logs.
 | 
						|
func (t *TailscaleInContainer) Logs(stdout, stderr io.Writer) error {
 | 
						|
	return dockertestutil.WriteLog(
 | 
						|
		t.pool,
 | 
						|
		t.container,
 | 
						|
		stdout, stderr,
 | 
						|
	)
 | 
						|
}
 | 
						|
 | 
						|
func (t *TailscaleInContainer) buildLoginCommand(
 | 
						|
	loginServer, authKey string,
 | 
						|
) []string {
 | 
						|
	command := []string{
 | 
						|
		"tailscale",
 | 
						|
		"up",
 | 
						|
		"--login-server=" + loginServer,
 | 
						|
		"--hostname=" + t.hostname,
 | 
						|
		fmt.Sprintf("--accept-routes=%t", t.withAcceptRoutes),
 | 
						|
	}
 | 
						|
 | 
						|
	if authKey != "" {
 | 
						|
		command = append(command, "--authkey="+authKey)
 | 
						|
	}
 | 
						|
 | 
						|
	if t.extraLoginArgs != nil {
 | 
						|
		command = append(command, t.extraLoginArgs...)
 | 
						|
	}
 | 
						|
 | 
						|
	if t.withSSH {
 | 
						|
		command = append(command, "--ssh")
 | 
						|
	}
 | 
						|
 | 
						|
	if t.netfilter != "" {
 | 
						|
		command = append(command, "--netfilter-mode="+t.netfilter)
 | 
						|
	}
 | 
						|
 | 
						|
	if len(t.withTags) > 0 {
 | 
						|
		command = append(command,
 | 
						|
			fmt.Sprintf(`--advertise-tags=%s`, strings.Join(t.withTags, ",")),
 | 
						|
		)
 | 
						|
	}
 | 
						|
 | 
						|
	return command
 | 
						|
}
 | 
						|
 | 
						|
// Login runs the login routine on the given Tailscale instance.
 | 
						|
// This login mechanism uses the authorised key for authentication.
 | 
						|
func (t *TailscaleInContainer) Login(
 | 
						|
	loginServer, authKey string,
 | 
						|
) error {
 | 
						|
	command := t.buildLoginCommand(loginServer, authKey)
 | 
						|
 | 
						|
	if _, _, err := t.Execute(command, dockertestutil.ExecuteCommandTimeout(dockerExecuteTimeout)); err != nil {
 | 
						|
		return fmt.Errorf(
 | 
						|
			"%s failed to join tailscale client (%s): %w",
 | 
						|
			t.hostname,
 | 
						|
			strings.Join(command, " "),
 | 
						|
			err,
 | 
						|
		)
 | 
						|
	}
 | 
						|
 | 
						|
	return nil
 | 
						|
}
 | 
						|
 | 
						|
// Up runs the login routine on the given Tailscale instance.
 | 
						|
// This login mechanism uses web + command line flow for authentication.
 | 
						|
func (t *TailscaleInContainer) LoginWithURL(
 | 
						|
	loginServer string,
 | 
						|
) (loginURL *url.URL, err error) {
 | 
						|
	command := t.buildLoginCommand(loginServer, "")
 | 
						|
 | 
						|
	stdout, stderr, err := t.Execute(command)
 | 
						|
	if errors.Is(err, errTailscaleNotLoggedIn) {
 | 
						|
		return nil, errTailscaleCannotUpWithoutAuthkey
 | 
						|
	}
 | 
						|
 | 
						|
	defer func() {
 | 
						|
		if err != nil {
 | 
						|
			log.Printf("join command: %q", strings.Join(command, " "))
 | 
						|
		}
 | 
						|
	}()
 | 
						|
 | 
						|
	loginURL, err = util.ParseLoginURLFromCLILogin(stdout + stderr)
 | 
						|
	if err != nil {
 | 
						|
		return nil, err
 | 
						|
	}
 | 
						|
 | 
						|
	return loginURL, nil
 | 
						|
}
 | 
						|
 | 
						|
// Logout runs the logout routine on the given Tailscale instance.
 | 
						|
func (t *TailscaleInContainer) Logout() error {
 | 
						|
	stdout, stderr, err := t.Execute([]string{"tailscale", "logout"})
 | 
						|
	if err != nil {
 | 
						|
		return err
 | 
						|
	}
 | 
						|
 | 
						|
	stdout, stderr, _ = t.Execute([]string{"tailscale", "status"})
 | 
						|
	if !strings.Contains(stdout+stderr, "Logged out.") {
 | 
						|
		return fmt.Errorf("failed to logout, stdout: %s, stderr: %s", stdout, stderr)
 | 
						|
	}
 | 
						|
 | 
						|
	return t.waitForBackendState("NeedsLogin")
 | 
						|
}
 | 
						|
 | 
						|
// Helper that runs `tailscale up` with no arguments.
 | 
						|
func (t *TailscaleInContainer) Up() error {
 | 
						|
	command := []string{
 | 
						|
		"tailscale",
 | 
						|
		"up",
 | 
						|
	}
 | 
						|
 | 
						|
	if _, _, err := t.Execute(command, dockertestutil.ExecuteCommandTimeout(dockerExecuteTimeout)); err != nil {
 | 
						|
		return fmt.Errorf(
 | 
						|
			"%s failed to bring tailscale client up (%s): %w",
 | 
						|
			t.hostname,
 | 
						|
			strings.Join(command, " "),
 | 
						|
			err,
 | 
						|
		)
 | 
						|
	}
 | 
						|
 | 
						|
	return nil
 | 
						|
}
 | 
						|
 | 
						|
// Helper that runs `tailscale down` with no arguments.
 | 
						|
func (t *TailscaleInContainer) Down() error {
 | 
						|
	command := []string{
 | 
						|
		"tailscale",
 | 
						|
		"down",
 | 
						|
	}
 | 
						|
 | 
						|
	if _, _, err := t.Execute(command, dockertestutil.ExecuteCommandTimeout(dockerExecuteTimeout)); err != nil {
 | 
						|
		return fmt.Errorf(
 | 
						|
			"%s failed to bring tailscale client down (%s): %w",
 | 
						|
			t.hostname,
 | 
						|
			strings.Join(command, " "),
 | 
						|
			err,
 | 
						|
		)
 | 
						|
	}
 | 
						|
 | 
						|
	return nil
 | 
						|
}
 | 
						|
 | 
						|
// IPs returns the netip.Addr of the Tailscale instance.
 | 
						|
func (t *TailscaleInContainer) IPs() ([]netip.Addr, error) {
 | 
						|
	if t.ips != nil && len(t.ips) != 0 {
 | 
						|
		return t.ips, nil
 | 
						|
	}
 | 
						|
 | 
						|
	ips := make([]netip.Addr, 0)
 | 
						|
 | 
						|
	command := []string{
 | 
						|
		"tailscale",
 | 
						|
		"ip",
 | 
						|
	}
 | 
						|
 | 
						|
	result, _, err := t.Execute(command)
 | 
						|
	if err != nil {
 | 
						|
		return []netip.Addr{}, fmt.Errorf("%s failed to join tailscale client: %w", t.hostname, err)
 | 
						|
	}
 | 
						|
 | 
						|
	for _, address := range strings.Split(result, "\n") {
 | 
						|
		address = strings.TrimSuffix(address, "\n")
 | 
						|
		if len(address) < 1 {
 | 
						|
			continue
 | 
						|
		}
 | 
						|
		ip, err := netip.ParseAddr(address)
 | 
						|
		if err != nil {
 | 
						|
			return nil, err
 | 
						|
		}
 | 
						|
		ips = append(ips, ip)
 | 
						|
	}
 | 
						|
 | 
						|
	return ips, nil
 | 
						|
}
 | 
						|
 | 
						|
func (t *TailscaleInContainer) MustIPs() []netip.Addr {
 | 
						|
	ips, err := t.IPs()
 | 
						|
	if err != nil {
 | 
						|
		panic(err)
 | 
						|
	}
 | 
						|
 | 
						|
	return ips
 | 
						|
}
 | 
						|
 | 
						|
func (t *TailscaleInContainer) MustIPv4() netip.Addr {
 | 
						|
	for _, ip := range t.MustIPs() {
 | 
						|
		if ip.Is4() {
 | 
						|
			return ip
 | 
						|
		}
 | 
						|
	}
 | 
						|
	panic("no ipv4 found")
 | 
						|
}
 | 
						|
 | 
						|
func (t *TailscaleInContainer) MustIPv6() netip.Addr {
 | 
						|
	for _, ip := range t.MustIPs() {
 | 
						|
		if ip.Is6() {
 | 
						|
			return ip
 | 
						|
		}
 | 
						|
	}
 | 
						|
	panic("no ipv6 found")
 | 
						|
}
 | 
						|
 | 
						|
// Status returns the ipnstate.Status of the Tailscale instance.
 | 
						|
func (t *TailscaleInContainer) Status(save ...bool) (*ipnstate.Status, error) {
 | 
						|
	command := []string{
 | 
						|
		"tailscale",
 | 
						|
		"status",
 | 
						|
		"--json",
 | 
						|
	}
 | 
						|
 | 
						|
	result, _, err := t.Execute(command)
 | 
						|
	if err != nil {
 | 
						|
		return nil, fmt.Errorf("failed to execute tailscale status command: %w", err)
 | 
						|
	}
 | 
						|
 | 
						|
	var status ipnstate.Status
 | 
						|
	err = json.Unmarshal([]byte(result), &status)
 | 
						|
	if err != nil {
 | 
						|
		return nil, fmt.Errorf("failed to unmarshal tailscale status: %w", err)
 | 
						|
	}
 | 
						|
 | 
						|
	err = os.WriteFile(fmt.Sprintf("/tmp/control/%s_status.json", t.hostname), []byte(result), 0o755)
 | 
						|
	if err != nil {
 | 
						|
		return nil, fmt.Errorf("status netmap to /tmp/control: %w", err)
 | 
						|
	}
 | 
						|
 | 
						|
	return &status, err
 | 
						|
}
 | 
						|
 | 
						|
// MustStatus returns the ipnstate.Status of the Tailscale instance.
 | 
						|
func (t *TailscaleInContainer) MustStatus() *ipnstate.Status {
 | 
						|
	status, err := t.Status()
 | 
						|
	if err != nil {
 | 
						|
		panic(err)
 | 
						|
	}
 | 
						|
 | 
						|
	return status
 | 
						|
}
 | 
						|
 | 
						|
// MustID returns the ID of the Tailscale instance.
 | 
						|
func (t *TailscaleInContainer) MustID() types.NodeID {
 | 
						|
	status, err := t.Status()
 | 
						|
	if err != nil {
 | 
						|
		panic(err)
 | 
						|
	}
 | 
						|
 | 
						|
	id, err := strconv.ParseUint(string(status.Self.ID), 10, 64)
 | 
						|
	if err != nil {
 | 
						|
		panic(fmt.Sprintf("failed to parse ID: %s", err))
 | 
						|
	}
 | 
						|
 | 
						|
	return types.NodeID(id)
 | 
						|
}
 | 
						|
 | 
						|
// Netmap returns the current Netmap (netmap.NetworkMap) of the Tailscale instance.
 | 
						|
// Only works with Tailscale 1.56 and newer.
 | 
						|
// Panics if version is lower then minimum.
 | 
						|
func (t *TailscaleInContainer) Netmap() (*netmap.NetworkMap, error) {
 | 
						|
	if !util.TailscaleVersionNewerOrEqual("1.56", t.version) {
 | 
						|
		panic(fmt.Sprintf("tsic.Netmap() called with unsupported version: %s", t.version))
 | 
						|
	}
 | 
						|
 | 
						|
	command := []string{
 | 
						|
		"tailscale",
 | 
						|
		"debug",
 | 
						|
		"netmap",
 | 
						|
	}
 | 
						|
 | 
						|
	result, stderr, err := t.Execute(command)
 | 
						|
	if err != nil {
 | 
						|
		fmt.Printf("stderr: %s\n", stderr)
 | 
						|
		return nil, fmt.Errorf("failed to execute tailscale debug netmap command: %w", err)
 | 
						|
	}
 | 
						|
 | 
						|
	var nm netmap.NetworkMap
 | 
						|
	err = json.Unmarshal([]byte(result), &nm)
 | 
						|
	if err != nil {
 | 
						|
		return nil, fmt.Errorf("failed to unmarshal tailscale netmap: %w", err)
 | 
						|
	}
 | 
						|
 | 
						|
	err = os.WriteFile(fmt.Sprintf("/tmp/control/%s_netmap.json", t.hostname), []byte(result), 0o755)
 | 
						|
	if err != nil {
 | 
						|
		return nil, fmt.Errorf("saving netmap to /tmp/control: %w", err)
 | 
						|
	}
 | 
						|
 | 
						|
	return &nm, err
 | 
						|
}
 | 
						|
 | 
						|
// Netmap returns the current Netmap (netmap.NetworkMap) of the Tailscale instance.
 | 
						|
// This implementation is based on getting the netmap from `tailscale debug watch-ipn`
 | 
						|
// as there seem to be some weirdness omitting endpoint and DERP info if we use
 | 
						|
// Patch updates.
 | 
						|
// This implementation works on all supported versions.
 | 
						|
// func (t *TailscaleInContainer) Netmap() (*netmap.NetworkMap, error) {
 | 
						|
// 	// watch-ipn will only give an update if something is happening,
 | 
						|
// 	// since we send keep alives, the worst case for this should be
 | 
						|
// 	// 1 minute, but set a slightly more conservative time.
 | 
						|
// 	ctx, _ := context.WithTimeout(context.Background(), 3*time.Minute)
 | 
						|
 | 
						|
// 	notify, err := t.watchIPN(ctx)
 | 
						|
// 	if err != nil {
 | 
						|
// 		return nil, err
 | 
						|
// 	}
 | 
						|
 | 
						|
// 	if notify.NetMap == nil {
 | 
						|
// 		return nil, fmt.Errorf("no netmap present in ipn.Notify")
 | 
						|
// 	}
 | 
						|
 | 
						|
// 	return notify.NetMap, nil
 | 
						|
// }
 | 
						|
 | 
						|
// watchIPN watches `tailscale debug watch-ipn` for a ipn.Notify object until
 | 
						|
// it gets one that has a netmap.NetworkMap.
 | 
						|
func (t *TailscaleInContainer) watchIPN(ctx context.Context) (*ipn.Notify, error) {
 | 
						|
	pr, pw := io.Pipe()
 | 
						|
 | 
						|
	type result struct {
 | 
						|
		notify *ipn.Notify
 | 
						|
		err    error
 | 
						|
	}
 | 
						|
	resultChan := make(chan result, 1)
 | 
						|
 | 
						|
	// There is no good way to kill the goroutine with watch-ipn,
 | 
						|
	// so make a nice func to send a kill command to issue when
 | 
						|
	// we are done.
 | 
						|
	killWatcher := func() {
 | 
						|
		stdout, stderr, err := t.Execute([]string{
 | 
						|
			"/bin/sh", "-c", `kill $(ps aux | grep "tailscale debug watch-ipn" | grep -v grep | awk '{print $1}') || true`,
 | 
						|
		})
 | 
						|
		if err != nil {
 | 
						|
			log.Printf("failed to kill tailscale watcher, \nstdout: %s\nstderr: %s\nerr: %s", stdout, stderr, err)
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
	go func() {
 | 
						|
		_, _ = t.container.Exec(
 | 
						|
			// Prior to 1.56, the initial "Connected." message was printed to stdout,
 | 
						|
			// filter out with grep.
 | 
						|
			[]string{"/bin/sh", "-c", `tailscale debug watch-ipn | grep -v "Connected."`},
 | 
						|
			dockertest.ExecOptions{
 | 
						|
				// The interesting output is sent to stdout, so ignore stderr.
 | 
						|
				StdOut: pw,
 | 
						|
				// StdErr: pw,
 | 
						|
			},
 | 
						|
		)
 | 
						|
	}()
 | 
						|
 | 
						|
	go func() {
 | 
						|
		decoder := json.NewDecoder(pr)
 | 
						|
		for decoder.More() {
 | 
						|
			var notify ipn.Notify
 | 
						|
			if err := decoder.Decode(¬ify); err != nil {
 | 
						|
				resultChan <- result{nil, fmt.Errorf("parse notify: %w", err)}
 | 
						|
			}
 | 
						|
 | 
						|
			if notify.NetMap != nil {
 | 
						|
				resultChan <- result{¬ify, nil}
 | 
						|
			}
 | 
						|
		}
 | 
						|
	}()
 | 
						|
 | 
						|
	select {
 | 
						|
	case <-ctx.Done():
 | 
						|
		killWatcher()
 | 
						|
 | 
						|
		return nil, ctx.Err()
 | 
						|
 | 
						|
	case result := <-resultChan:
 | 
						|
		killWatcher()
 | 
						|
 | 
						|
		if result.err != nil {
 | 
						|
			return nil, result.err
 | 
						|
		}
 | 
						|
 | 
						|
		return result.notify, nil
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func (t *TailscaleInContainer) DebugDERPRegion(region string) (*ipnstate.DebugDERPRegionReport, error) {
 | 
						|
	if !util.TailscaleVersionNewerOrEqual("1.34", t.version) {
 | 
						|
		panic("tsic.DebugDERPRegion() called with unsupported version: " + t.version)
 | 
						|
	}
 | 
						|
 | 
						|
	command := []string{
 | 
						|
		"tailscale",
 | 
						|
		"debug",
 | 
						|
		"derp",
 | 
						|
		region,
 | 
						|
	}
 | 
						|
 | 
						|
	result, stderr, err := t.Execute(command)
 | 
						|
	if err != nil {
 | 
						|
		fmt.Printf("stderr: %s\n", stderr) // nolint
 | 
						|
 | 
						|
		return nil, fmt.Errorf("failed to execute tailscale debug derp command: %w", err)
 | 
						|
	}
 | 
						|
 | 
						|
	var report ipnstate.DebugDERPRegionReport
 | 
						|
	err = json.Unmarshal([]byte(result), &report)
 | 
						|
	if err != nil {
 | 
						|
		return nil, fmt.Errorf("failed to unmarshal tailscale derp region report: %w", err)
 | 
						|
	}
 | 
						|
 | 
						|
	return &report, err
 | 
						|
}
 | 
						|
 | 
						|
// Netcheck returns the current Netcheck Report (netcheck.Report) of the Tailscale instance.
 | 
						|
func (t *TailscaleInContainer) Netcheck() (*netcheck.Report, error) {
 | 
						|
	command := []string{
 | 
						|
		"tailscale",
 | 
						|
		"netcheck",
 | 
						|
		"--format=json",
 | 
						|
	}
 | 
						|
 | 
						|
	result, stderr, err := t.Execute(command)
 | 
						|
	if err != nil {
 | 
						|
		fmt.Printf("stderr: %s\n", stderr)
 | 
						|
		return nil, fmt.Errorf("failed to execute tailscale debug netcheck command: %w", err)
 | 
						|
	}
 | 
						|
 | 
						|
	var nm netcheck.Report
 | 
						|
	err = json.Unmarshal([]byte(result), &nm)
 | 
						|
	if err != nil {
 | 
						|
		return nil, fmt.Errorf("failed to unmarshal tailscale netcheck: %w", err)
 | 
						|
	}
 | 
						|
 | 
						|
	return &nm, err
 | 
						|
}
 | 
						|
 | 
						|
// FQDN returns the FQDN as a string of the Tailscale instance.
 | 
						|
func (t *TailscaleInContainer) FQDN() (string, error) {
 | 
						|
	if t.fqdn != "" {
 | 
						|
		return t.fqdn, nil
 | 
						|
	}
 | 
						|
 | 
						|
	status, err := t.Status()
 | 
						|
	if err != nil {
 | 
						|
		return "", fmt.Errorf("failed to get FQDN: %w", err)
 | 
						|
	}
 | 
						|
 | 
						|
	return status.Self.DNSName, nil
 | 
						|
}
 | 
						|
 | 
						|
// FailingPeersAsString returns a formatted-ish multi-line-string of peers in the client
 | 
						|
// and a bool indicating if the clients online count and peer count is equal.
 | 
						|
func (t *TailscaleInContainer) FailingPeersAsString() (string, bool, error) {
 | 
						|
	status, err := t.Status()
 | 
						|
	if err != nil {
 | 
						|
		return "", false, fmt.Errorf("failed to get FQDN: %w", err)
 | 
						|
	}
 | 
						|
 | 
						|
	var b strings.Builder
 | 
						|
 | 
						|
	fmt.Fprintf(&b, "Peers of %s\n", t.hostname)
 | 
						|
	fmt.Fprint(&b, "Hostname\tOnline\tLastSeen\n")
 | 
						|
 | 
						|
	peerCount := len(status.Peers())
 | 
						|
	onlineCount := 0
 | 
						|
 | 
						|
	for _, peerKey := range status.Peers() {
 | 
						|
		peer := status.Peer[peerKey]
 | 
						|
 | 
						|
		if peer.Online {
 | 
						|
			onlineCount++
 | 
						|
		}
 | 
						|
 | 
						|
		fmt.Fprintf(&b, "%s\t%t\t%s\n", peer.HostName, peer.Online, peer.LastSeen)
 | 
						|
	}
 | 
						|
 | 
						|
	fmt.Fprintf(&b, "Peer Count: %d, Online Count: %d\n\n", peerCount, onlineCount)
 | 
						|
 | 
						|
	return b.String(), peerCount == onlineCount, nil
 | 
						|
}
 | 
						|
 | 
						|
// WaitForNeedsLogin blocks until the Tailscale (tailscaled) instance has
 | 
						|
// started and needs to be logged into.
 | 
						|
func (t *TailscaleInContainer) WaitForNeedsLogin() error {
 | 
						|
	return t.waitForBackendState("NeedsLogin")
 | 
						|
}
 | 
						|
 | 
						|
// WaitForRunning blocks until the Tailscale (tailscaled) instance is logged in
 | 
						|
// and ready to be used.
 | 
						|
func (t *TailscaleInContainer) WaitForRunning() error {
 | 
						|
	return t.waitForBackendState("Running")
 | 
						|
}
 | 
						|
 | 
						|
func (t *TailscaleInContainer) waitForBackendState(state string) error {
 | 
						|
	return t.pool.Retry(func() error {
 | 
						|
		status, err := t.Status()
 | 
						|
		if err != nil {
 | 
						|
			return errTailscaleStatus(t.hostname, err)
 | 
						|
		}
 | 
						|
 | 
						|
		// ipnstate.Status.CurrentTailnet was added in Tailscale 1.22.0
 | 
						|
		// https://github.com/tailscale/tailscale/pull/3865
 | 
						|
		//
 | 
						|
		// Before that, we can check the BackendState to see if the
 | 
						|
		// tailscaled daemon is connected to the control system.
 | 
						|
		if status.BackendState == state {
 | 
						|
			return nil
 | 
						|
		}
 | 
						|
 | 
						|
		return errTailscaleNotConnected
 | 
						|
	})
 | 
						|
}
 | 
						|
 | 
						|
// WaitForPeers blocks until N number of peers is present in the
 | 
						|
// Peer list of the Tailscale instance and is reporting Online.
 | 
						|
func (t *TailscaleInContainer) WaitForPeers(expected int) error {
 | 
						|
	return t.pool.Retry(func() error {
 | 
						|
		status, err := t.Status()
 | 
						|
		if err != nil {
 | 
						|
			return errTailscaleStatus(t.hostname, err)
 | 
						|
		}
 | 
						|
 | 
						|
		if peers := status.Peers(); len(peers) != expected {
 | 
						|
			return fmt.Errorf(
 | 
						|
				"%s err: %w expected %d, got %d",
 | 
						|
				t.hostname,
 | 
						|
				errTailscaleWrongPeerCount,
 | 
						|
				expected,
 | 
						|
				len(peers),
 | 
						|
			)
 | 
						|
		} else {
 | 
						|
			// Verify that the peers of a given node is Online
 | 
						|
			// has a hostname and a DERP relay.
 | 
						|
			for _, peerKey := range peers {
 | 
						|
				peer := status.Peer[peerKey]
 | 
						|
 | 
						|
				if !peer.Online {
 | 
						|
					return fmt.Errorf("[%s] peer count correct, but %s is not online", t.hostname, peer.HostName)
 | 
						|
				}
 | 
						|
 | 
						|
				if peer.HostName == "" {
 | 
						|
					return fmt.Errorf("[%s] peer count correct, but %s does not have a Hostname", t.hostname, peer.HostName)
 | 
						|
				}
 | 
						|
 | 
						|
				if peer.Relay == "" {
 | 
						|
					return fmt.Errorf("[%s] peer count correct, but %s does not have a DERP", t.hostname, peer.HostName)
 | 
						|
				}
 | 
						|
			}
 | 
						|
		}
 | 
						|
 | 
						|
		return nil
 | 
						|
	})
 | 
						|
}
 | 
						|
 | 
						|
type (
 | 
						|
	// PingOption represent optional settings that can be given
 | 
						|
	// to ping another host.
 | 
						|
	PingOption = func(args *pingArgs)
 | 
						|
 | 
						|
	pingArgs struct {
 | 
						|
		timeout time.Duration
 | 
						|
		count   int
 | 
						|
		direct  bool
 | 
						|
	}
 | 
						|
)
 | 
						|
 | 
						|
// WithPingTimeout sets the timeout for the ping command.
 | 
						|
func WithPingTimeout(timeout time.Duration) PingOption {
 | 
						|
	return func(args *pingArgs) {
 | 
						|
		args.timeout = timeout
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
// WithPingCount sets the count of pings to attempt.
 | 
						|
func WithPingCount(count int) PingOption {
 | 
						|
	return func(args *pingArgs) {
 | 
						|
		args.count = count
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
// WithPingUntilDirect decides if the ping should only succeed
 | 
						|
// if a direct connection is established or if successful
 | 
						|
// DERP ping is sufficient.
 | 
						|
func WithPingUntilDirect(direct bool) PingOption {
 | 
						|
	return func(args *pingArgs) {
 | 
						|
		args.direct = direct
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
// Ping executes the Tailscale ping command and pings a hostname
 | 
						|
// or IP. It accepts a series of PingOption.
 | 
						|
// TODO(kradalby): Make multiping, go routine magic.
 | 
						|
func (t *TailscaleInContainer) Ping(hostnameOrIP string, opts ...PingOption) error {
 | 
						|
	args := pingArgs{
 | 
						|
		timeout: defaultPingTimeout,
 | 
						|
		count:   defaultPingCount,
 | 
						|
		direct:  true,
 | 
						|
	}
 | 
						|
 | 
						|
	for _, opt := range opts {
 | 
						|
		opt(&args)
 | 
						|
	}
 | 
						|
 | 
						|
	command := []string{
 | 
						|
		"tailscale", "ping",
 | 
						|
		fmt.Sprintf("--timeout=%s", args.timeout),
 | 
						|
		fmt.Sprintf("--c=%d", args.count),
 | 
						|
		fmt.Sprintf("--until-direct=%s", strconv.FormatBool(args.direct)),
 | 
						|
	}
 | 
						|
 | 
						|
	command = append(command, hostnameOrIP)
 | 
						|
 | 
						|
	result, _, err := t.Execute(
 | 
						|
		command,
 | 
						|
		dockertestutil.ExecuteCommandTimeout(
 | 
						|
			time.Duration(int64(args.timeout)*int64(args.count)),
 | 
						|
		),
 | 
						|
	)
 | 
						|
	if err != nil {
 | 
						|
		log.Printf("command: %v", command)
 | 
						|
		log.Printf(
 | 
						|
			"failed to run ping command from %s to %s, err: %s",
 | 
						|
			t.Hostname(),
 | 
						|
			hostnameOrIP,
 | 
						|
			err,
 | 
						|
		)
 | 
						|
 | 
						|
		return err
 | 
						|
	}
 | 
						|
 | 
						|
	if strings.Contains(result, "is local") {
 | 
						|
		return nil
 | 
						|
	}
 | 
						|
 | 
						|
	if !strings.Contains(result, "pong") {
 | 
						|
		return errTailscalePingFailed
 | 
						|
	}
 | 
						|
 | 
						|
	if !args.direct {
 | 
						|
		if strings.Contains(result, "via DERP") {
 | 
						|
			return nil
 | 
						|
		} else {
 | 
						|
			return errTailscalePingNotDERP
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
	return nil
 | 
						|
}
 | 
						|
 | 
						|
type (
 | 
						|
	// CurlOption repreent optional settings that can be given
 | 
						|
	// to curl another host.
 | 
						|
	CurlOption = func(args *curlArgs)
 | 
						|
 | 
						|
	curlArgs struct {
 | 
						|
		connectionTimeout time.Duration
 | 
						|
		maxTime           time.Duration
 | 
						|
		retry             int
 | 
						|
		retryDelay        time.Duration
 | 
						|
		retryMaxTime      time.Duration
 | 
						|
	}
 | 
						|
)
 | 
						|
 | 
						|
// WithCurlConnectionTimeout sets the timeout for each connection started
 | 
						|
// by curl.
 | 
						|
func WithCurlConnectionTimeout(timeout time.Duration) CurlOption {
 | 
						|
	return func(args *curlArgs) {
 | 
						|
		args.connectionTimeout = timeout
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
// WithCurlMaxTime sets the max time for a transfer for each connection started
 | 
						|
// by curl.
 | 
						|
func WithCurlMaxTime(t time.Duration) CurlOption {
 | 
						|
	return func(args *curlArgs) {
 | 
						|
		args.maxTime = t
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
// WithCurlRetry sets the number of retries a connection is attempted by curl.
 | 
						|
func WithCurlRetry(ret int) CurlOption {
 | 
						|
	return func(args *curlArgs) {
 | 
						|
		args.retry = ret
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
const (
 | 
						|
	defaultConnectionTimeout = 3 * time.Second
 | 
						|
	defaultMaxTime           = 10 * time.Second
 | 
						|
	defaultRetry             = 5
 | 
						|
	defaultRetryDelay        = 0 * time.Second
 | 
						|
	defaultRetryMaxTime      = 50 * time.Second
 | 
						|
)
 | 
						|
 | 
						|
// Curl executes the Tailscale curl command and curls a hostname
 | 
						|
// or IP. It accepts a series of CurlOption.
 | 
						|
func (t *TailscaleInContainer) Curl(url string, opts ...CurlOption) (string, error) {
 | 
						|
	args := curlArgs{
 | 
						|
		connectionTimeout: defaultConnectionTimeout,
 | 
						|
		maxTime:           defaultMaxTime,
 | 
						|
		retry:             defaultRetry,
 | 
						|
		retryDelay:        defaultRetryDelay,
 | 
						|
		retryMaxTime:      defaultRetryMaxTime,
 | 
						|
	}
 | 
						|
 | 
						|
	for _, opt := range opts {
 | 
						|
		opt(&args)
 | 
						|
	}
 | 
						|
 | 
						|
	command := []string{
 | 
						|
		"curl",
 | 
						|
		"--silent",
 | 
						|
		"--connect-timeout", fmt.Sprintf("%d", int(args.connectionTimeout.Seconds())),
 | 
						|
		"--max-time", fmt.Sprintf("%d", int(args.maxTime.Seconds())),
 | 
						|
		"--retry", fmt.Sprintf("%d", args.retry),
 | 
						|
		"--retry-delay", fmt.Sprintf("%d", int(args.retryDelay.Seconds())),
 | 
						|
		"--retry-max-time", fmt.Sprintf("%d", int(args.retryMaxTime.Seconds())),
 | 
						|
		url,
 | 
						|
	}
 | 
						|
 | 
						|
	var result string
 | 
						|
	result, _, err := t.Execute(command)
 | 
						|
	if err != nil {
 | 
						|
		log.Printf(
 | 
						|
			"failed to run curl command from %s to %s, err: %s",
 | 
						|
			t.Hostname(),
 | 
						|
			url,
 | 
						|
			err,
 | 
						|
		)
 | 
						|
 | 
						|
		return result, err
 | 
						|
	}
 | 
						|
 | 
						|
	return result, nil
 | 
						|
}
 | 
						|
 | 
						|
func (t *TailscaleInContainer) Traceroute(ip netip.Addr) (util.Traceroute, error) {
 | 
						|
	command := []string{
 | 
						|
		"traceroute",
 | 
						|
		ip.String(),
 | 
						|
	}
 | 
						|
 | 
						|
	var result util.Traceroute
 | 
						|
	stdout, stderr, err := t.Execute(command)
 | 
						|
	if err != nil {
 | 
						|
		return result, err
 | 
						|
	}
 | 
						|
 | 
						|
	result, err = util.ParseTraceroute(stdout + stderr)
 | 
						|
	if err != nil {
 | 
						|
		return result, err
 | 
						|
	}
 | 
						|
 | 
						|
	return result, nil
 | 
						|
}
 | 
						|
 | 
						|
// WriteFile save file inside the Tailscale container.
 | 
						|
func (t *TailscaleInContainer) WriteFile(path string, data []byte) error {
 | 
						|
	return integrationutil.WriteFileToContainer(t.pool, t.container, path, data)
 | 
						|
}
 | 
						|
 | 
						|
// SaveLog saves the current stdout log of the container to a path
 | 
						|
// on the host system.
 | 
						|
func (t *TailscaleInContainer) SaveLog(path string) (string, string, error) {
 | 
						|
	// TODO(kradalby): Assert if tailscale logs contains panics.
 | 
						|
	// NOTE(enoperm): `t.WriteLog | countMatchingLines`
 | 
						|
	// is probably most of what is for that,
 | 
						|
	// but I'd rather not change the behaviour here,
 | 
						|
	// as it may affect all the other tests
 | 
						|
	// I have not otherwise touched.
 | 
						|
	return dockertestutil.SaveLog(t.pool, t.container, path)
 | 
						|
}
 | 
						|
 | 
						|
// WriteLogs writes the current stdout/stderr log of the container to
 | 
						|
// the given io.Writers.
 | 
						|
func (t *TailscaleInContainer) WriteLogs(stdout, stderr io.Writer) error {
 | 
						|
	return dockertestutil.WriteLog(t.pool, t.container, stdout, stderr)
 | 
						|
}
 | 
						|
 | 
						|
// ReadFile reads a file from the Tailscale container.
 | 
						|
// It returns the content of the file as a byte slice.
 | 
						|
func (t *TailscaleInContainer) ReadFile(path string) ([]byte, error) {
 | 
						|
	tarBytes, err := integrationutil.FetchPathFromContainer(t.pool, t.container, path)
 | 
						|
	if err != nil {
 | 
						|
		return nil, fmt.Errorf("reading file from container: %w", err)
 | 
						|
	}
 | 
						|
 | 
						|
	var out bytes.Buffer
 | 
						|
	tr := tar.NewReader(bytes.NewReader(tarBytes))
 | 
						|
	for {
 | 
						|
		hdr, err := tr.Next()
 | 
						|
		if err == io.EOF {
 | 
						|
			break // End of archive
 | 
						|
		}
 | 
						|
		if err != nil {
 | 
						|
			return nil, fmt.Errorf("reading tar header: %w", err)
 | 
						|
		}
 | 
						|
 | 
						|
		if !strings.Contains(path, hdr.Name) {
 | 
						|
			return nil, fmt.Errorf("file not found in tar archive, looking for: %s, header was: %s", path, hdr.Name)
 | 
						|
		}
 | 
						|
 | 
						|
		if _, err := io.Copy(&out, tr); err != nil {
 | 
						|
			return nil, fmt.Errorf("copying file to buffer: %w", err)
 | 
						|
		}
 | 
						|
 | 
						|
		// Only support reading the first tile
 | 
						|
		break
 | 
						|
	}
 | 
						|
 | 
						|
	if out.Len() == 0 {
 | 
						|
		return nil, fmt.Errorf("file is empty")
 | 
						|
	}
 | 
						|
 | 
						|
	return out.Bytes(), nil
 | 
						|
}
 |