mirror of
https://github.com/juanfont/headscale.git
synced 2024-11-29 18:33:05 +00:00
Compare commits
17 commits
ace1887b13
...
da7bffa8d9
Author | SHA1 | Date | |
---|---|---|---|
|
da7bffa8d9 | ||
|
e2d5ee0927 | ||
|
46ccfff71d | ||
|
71607ae13c | ||
|
8e26fcfeea | ||
|
610223df67 | ||
|
10a9eda893 | ||
|
9a4c7e4446 | ||
|
aba61ceb1b | ||
|
1efb817acc | ||
|
49952dda40 | ||
|
53a08e5ab6 | ||
|
52cce46cd8 | ||
|
68669238f9 | ||
|
0d6a25d6ee | ||
|
e1416a72cb | ||
|
cec46716b6 |
8 changed files with 120 additions and 69 deletions
71
.github/workflows/build-docker-pr.yml
vendored
Normal file
71
.github/workflows/build-docker-pr.yml
vendored
Normal file
|
@ -0,0 +1,71 @@
|
||||||
|
name: Build
|
||||||
|
|
||||||
|
on:
|
||||||
|
push:
|
||||||
|
branches:
|
||||||
|
- main
|
||||||
|
pull_request:
|
||||||
|
branches:
|
||||||
|
- main
|
||||||
|
|
||||||
|
concurrency:
|
||||||
|
group: ${{ github.workflow }}-$${{ github.head_ref || github.run_id }}
|
||||||
|
cancel-in-progress: true
|
||||||
|
|
||||||
|
jobs:
|
||||||
|
build:
|
||||||
|
runs-on: ubuntu-latest
|
||||||
|
permissions: write-all
|
||||||
|
steps:
|
||||||
|
- uses: actions/checkout@v4
|
||||||
|
with:
|
||||||
|
fetch-depth: 2
|
||||||
|
- name: Get changed files
|
||||||
|
id: changed-files
|
||||||
|
uses: dorny/paths-filter@v3
|
||||||
|
with:
|
||||||
|
filters: |
|
||||||
|
files:
|
||||||
|
- '*.nix'
|
||||||
|
- 'go.*'
|
||||||
|
- '**/*.go'
|
||||||
|
- 'integration_test/'
|
||||||
|
- 'config-example.yaml'
|
||||||
|
- uses: DeterminateSystems/nix-installer-action@main
|
||||||
|
if: steps.changed-files.outputs.files == 'true'
|
||||||
|
- uses: DeterminateSystems/magic-nix-cache-action@main
|
||||||
|
if: steps.changed-files.outputs.files == 'true'
|
||||||
|
|
||||||
|
- name: Run build
|
||||||
|
id: build
|
||||||
|
if: steps.changed-files.outputs.files == 'true'
|
||||||
|
run: |
|
||||||
|
nix build |& tee build-result
|
||||||
|
BUILD_STATUS="${PIPESTATUS[0]}"
|
||||||
|
|
||||||
|
OLD_HASH=$(cat build-result | grep specified: | awk -F ':' '{print $2}' | sed 's/ //g')
|
||||||
|
NEW_HASH=$(cat build-result | grep got: | awk -F ':' '{print $2}' | sed 's/ //g')
|
||||||
|
|
||||||
|
echo "OLD_HASH=$OLD_HASH" >> $GITHUB_OUTPUT
|
||||||
|
echo "NEW_HASH=$NEW_HASH" >> $GITHUB_OUTPUT
|
||||||
|
|
||||||
|
exit $BUILD_STATUS
|
||||||
|
|
||||||
|
- name: Nix gosum diverging
|
||||||
|
uses: actions/github-script@v6
|
||||||
|
if: failure() && steps.build.outcome == 'failure'
|
||||||
|
with:
|
||||||
|
github-token: ${{secrets.GITHUB_TOKEN}}
|
||||||
|
script: |
|
||||||
|
github.rest.pulls.createReviewComment({
|
||||||
|
pull_number: context.issue.number,
|
||||||
|
owner: context.repo.owner,
|
||||||
|
repo: context.repo.repo,
|
||||||
|
body: 'Nix build failed with wrong gosum, please update "vendorSha256" (${{ steps.build.outputs.OLD_HASH }}) for the "headscale" package in flake.nix with the new SHA: ${{ steps.build.outputs.NEW_HASH }}'
|
||||||
|
})
|
||||||
|
|
||||||
|
- uses: actions/upload-artifact@v4
|
||||||
|
if: steps.changed-files.outputs.files == 'true'
|
||||||
|
with:
|
||||||
|
name: headscale-linux
|
||||||
|
path: result/bin/headscale
|
60
.github/workflows/build.yml
vendored
60
.github/workflows/build.yml
vendored
|
@ -1,10 +1,7 @@
|
||||||
name: Build
|
name: Build Docker images for PRs
|
||||||
|
|
||||||
on:
|
on:
|
||||||
push:
|
pull_request_target:
|
||||||
branches:
|
|
||||||
- main
|
|
||||||
pull_request:
|
|
||||||
branches:
|
branches:
|
||||||
- main
|
- main
|
||||||
|
|
||||||
|
@ -31,41 +28,34 @@ jobs:
|
||||||
- '**/*.go'
|
- '**/*.go'
|
||||||
- 'integration_test/'
|
- 'integration_test/'
|
||||||
- 'config-example.yaml'
|
- 'config-example.yaml'
|
||||||
|
- '.ko.yaml'
|
||||||
- uses: DeterminateSystems/nix-installer-action@main
|
- uses: DeterminateSystems/nix-installer-action@main
|
||||||
if: steps.changed-files.outputs.files == 'true'
|
if: steps.changed-files.outputs.files == 'true'
|
||||||
- uses: DeterminateSystems/magic-nix-cache-action@main
|
- uses: DeterminateSystems/magic-nix-cache-action@main
|
||||||
if: steps.changed-files.outputs.files == 'true'
|
if: steps.changed-files.outputs.files == 'true'
|
||||||
|
|
||||||
- name: Run build
|
# - uses: actions/github-script@v7
|
||||||
|
# id: get_pr_data
|
||||||
|
# with:
|
||||||
|
# script: |
|
||||||
|
# return (
|
||||||
|
# await github.rest.repos.listPullRequestsAssociatedWithCommit({
|
||||||
|
# commit_sha: context.sha,
|
||||||
|
# owner: context.repo.owner,
|
||||||
|
# repo: context.repo.repo,
|
||||||
|
# })
|
||||||
|
# ).data[0];
|
||||||
|
|
||||||
|
# - name: Pull Request data
|
||||||
|
# run: |
|
||||||
|
# echo '${{steps.get_pr_data.outputs.result}}'
|
||||||
|
|
||||||
|
- name: Run ko build
|
||||||
id: build
|
id: build
|
||||||
if: steps.changed-files.outputs.files == 'true'
|
if: steps.changed-files.outputs.files == 'true'
|
||||||
|
env:
|
||||||
|
KO_DOCKER_REPO: ghcr.io/${{ github.repository_owner }}/headscale
|
||||||
|
# TAG_PR_NAME: pr-${{ fromJson(steps.get_pr_data.outputs.result).number }}
|
||||||
|
TAG_SHA: ${{ github.sha }}
|
||||||
run: |
|
run: |
|
||||||
nix build |& tee build-result
|
nix develop --command -- ko build --sbom=none --tags=$TAG_SHA ./cmd/headscale
|
||||||
BUILD_STATUS="${PIPESTATUS[0]}"
|
|
||||||
|
|
||||||
OLD_HASH=$(cat build-result | grep specified: | awk -F ':' '{print $2}' | sed 's/ //g')
|
|
||||||
NEW_HASH=$(cat build-result | grep got: | awk -F ':' '{print $2}' | sed 's/ //g')
|
|
||||||
|
|
||||||
echo "OLD_HASH=$OLD_HASH" >> $GITHUB_OUTPUT
|
|
||||||
echo "NEW_HASH=$NEW_HASH" >> $GITHUB_OUTPUT
|
|
||||||
|
|
||||||
exit $BUILD_STATUS
|
|
||||||
|
|
||||||
- name: Nix gosum diverging
|
|
||||||
uses: actions/github-script@v6
|
|
||||||
if: failure() && steps.build.outcome == 'failure'
|
|
||||||
with:
|
|
||||||
github-token: ${{secrets.GITHUB_TOKEN}}
|
|
||||||
script: |
|
|
||||||
github.rest.pulls.createReviewComment({
|
|
||||||
pull_number: context.issue.number,
|
|
||||||
owner: context.repo.owner,
|
|
||||||
repo: context.repo.repo,
|
|
||||||
body: 'Nix build failed with wrong gosum, please update "vendorSha256" (${{ steps.build.outputs.OLD_HASH }}) for the "headscale" package in flake.nix with the new SHA: ${{ steps.build.outputs.NEW_HASH }}'
|
|
||||||
})
|
|
||||||
|
|
||||||
- uses: actions/upload-artifact@v4
|
|
||||||
if: steps.changed-files.outputs.files == 'true'
|
|
||||||
with:
|
|
||||||
name: headscale-linux
|
|
||||||
path: result/bin/headscale
|
|
||||||
|
|
|
@ -28,8 +28,6 @@ builds:
|
||||||
- -mod=readonly
|
- -mod=readonly
|
||||||
ldflags:
|
ldflags:
|
||||||
- -s -w -X github.com/juanfont/headscale/cmd/headscale/cli.Version=v{{.Version}}
|
- -s -w -X github.com/juanfont/headscale/cmd/headscale/cli.Version=v{{.Version}}
|
||||||
tags:
|
|
||||||
- ts2019
|
|
||||||
|
|
||||||
archives:
|
archives:
|
||||||
- id: golang-cross
|
- id: golang-cross
|
||||||
|
|
16
.ko.yaml
Normal file
16
.ko.yaml
Normal file
|
@ -0,0 +1,16 @@
|
||||||
|
defaultBaseImage: gcr.io/distroless/base-debian12:debug
|
||||||
|
defaultPlatforms:
|
||||||
|
- linux/arm64
|
||||||
|
- linux/arm/v7
|
||||||
|
- linux/amd64
|
||||||
|
- linux/386
|
||||||
|
|
||||||
|
builds:
|
||||||
|
- id: headscale
|
||||||
|
main: ./cmd/headscale
|
||||||
|
env:
|
||||||
|
- CGO_ENABLED=0
|
||||||
|
flags:
|
||||||
|
- -mod=readonly
|
||||||
|
ldflags:
|
||||||
|
- -s -w -X github.com/juanfont/headscale/cmd/headscale/cli.Version=v{{.Git.ShortCommit}}
|
|
@ -111,9 +111,7 @@ func generateUserProfiles(
|
||||||
|
|
||||||
func generateDNSConfig(
|
func generateDNSConfig(
|
||||||
cfg *types.Config,
|
cfg *types.Config,
|
||||||
baseDomain string,
|
|
||||||
node *types.Node,
|
node *types.Node,
|
||||||
peers types.Nodes,
|
|
||||||
) *tailcfg.DNSConfig {
|
) *tailcfg.DNSConfig {
|
||||||
if cfg.DNSConfig == nil {
|
if cfg.DNSConfig == nil {
|
||||||
return nil
|
return nil
|
||||||
|
@ -532,12 +530,7 @@ func appendPeerChanges(
|
||||||
|
|
||||||
profiles := generateUserProfiles(node, changed)
|
profiles := generateUserProfiles(node, changed)
|
||||||
|
|
||||||
dnsConfig := generateDNSConfig(
|
dnsConfig := generateDNSConfig(cfg, node)
|
||||||
cfg,
|
|
||||||
cfg.BaseDomain,
|
|
||||||
node,
|
|
||||||
peers,
|
|
||||||
)
|
|
||||||
|
|
||||||
tailPeers, err := tailNodes(changed, capVer, pol, cfg)
|
tailPeers, err := tailNodes(changed, capVer, pol, cfg)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
|
|
|
@ -114,24 +114,12 @@ func TestDNSConfigMapResponse(t *testing.T) {
|
||||||
}
|
}
|
||||||
|
|
||||||
nodeInShared1 := mach("test_get_shared_nodes_1", "shared1", 1)
|
nodeInShared1 := mach("test_get_shared_nodes_1", "shared1", 1)
|
||||||
nodeInShared2 := mach("test_get_shared_nodes_2", "shared2", 2)
|
|
||||||
nodeInShared3 := mach("test_get_shared_nodes_3", "shared3", 3)
|
|
||||||
node2InShared1 := mach("test_get_shared_nodes_4", "shared1", 1)
|
|
||||||
|
|
||||||
peersOfNodeInShared1 := types.Nodes{
|
|
||||||
nodeInShared1,
|
|
||||||
nodeInShared2,
|
|
||||||
nodeInShared3,
|
|
||||||
node2InShared1,
|
|
||||||
}
|
|
||||||
|
|
||||||
got := generateDNSConfig(
|
got := generateDNSConfig(
|
||||||
&types.Config{
|
&types.Config{
|
||||||
DNSConfig: &dnsConfigOrig,
|
DNSConfig: &dnsConfigOrig,
|
||||||
},
|
},
|
||||||
baseDomain,
|
|
||||||
nodeInShared1,
|
nodeInShared1,
|
||||||
peersOfNodeInShared1,
|
|
||||||
)
|
)
|
||||||
|
|
||||||
if diff := cmp.Diff(tt.want, got, cmpopts.EquateEmpty()); diff != "" {
|
if diff := cmp.Diff(tt.want, got, cmpopts.EquateEmpty()); diff != "" {
|
||||||
|
|
|
@ -10,7 +10,6 @@ import (
|
||||||
"github.com/juanfont/headscale/hscontrol/types"
|
"github.com/juanfont/headscale/hscontrol/types"
|
||||||
"github.com/rs/zerolog/log"
|
"github.com/rs/zerolog/log"
|
||||||
"golang.org/x/net/http2"
|
"golang.org/x/net/http2"
|
||||||
"golang.org/x/net/http2/h2c"
|
|
||||||
"tailscale.com/control/controlbase"
|
"tailscale.com/control/controlbase"
|
||||||
"tailscale.com/control/controlhttp"
|
"tailscale.com/control/controlhttp"
|
||||||
"tailscale.com/tailcfg"
|
"tailscale.com/tailcfg"
|
||||||
|
@ -101,18 +100,12 @@ func (h *Headscale) NoiseUpgradeHandler(
|
||||||
Methods(http.MethodPost)
|
Methods(http.MethodPost)
|
||||||
router.HandleFunc("/machine/map", noiseServer.NoisePollNetMapHandler)
|
router.HandleFunc("/machine/map", noiseServer.NoisePollNetMapHandler)
|
||||||
|
|
||||||
server := http.Server{
|
|
||||||
ReadTimeout: types.HTTPTimeout,
|
|
||||||
}
|
|
||||||
|
|
||||||
noiseServer.httpBaseConfig = &http.Server{
|
noiseServer.httpBaseConfig = &http.Server{
|
||||||
Handler: router,
|
Handler: router,
|
||||||
ReadHeaderTimeout: types.HTTPTimeout,
|
ReadHeaderTimeout: types.HTTPTimeout,
|
||||||
}
|
}
|
||||||
noiseServer.http2Server = &http2.Server{}
|
noiseServer.http2Server = &http2.Server{}
|
||||||
|
|
||||||
server.Handler = h2c.NewHandler(router, noiseServer.http2Server)
|
|
||||||
|
|
||||||
noiseServer.http2Server.ServeConn(
|
noiseServer.http2Server.ServeConn(
|
||||||
noiseConn,
|
noiseConn,
|
||||||
&http2.ServeConnOpts{
|
&http2.ServeConnOpts{
|
||||||
|
|
|
@ -22,6 +22,8 @@ import (
|
||||||
"tailscale.com/wgengine/filter"
|
"tailscale.com/wgengine/filter"
|
||||||
)
|
)
|
||||||
|
|
||||||
|
var allPorts = filter.PortRange{First: 0, Last: 0xffff}
|
||||||
|
|
||||||
// This test is both testing the routes command and the propagation of
|
// This test is both testing the routes command and the propagation of
|
||||||
// routes.
|
// routes.
|
||||||
func TestEnablingRoutes(t *testing.T) {
|
func TestEnablingRoutes(t *testing.T) {
|
||||||
|
@ -1249,11 +1251,11 @@ func TestSubnetRouteACL(t *testing.T) {
|
||||||
Dsts: []filter.NetPortRange{
|
Dsts: []filter.NetPortRange{
|
||||||
{
|
{
|
||||||
Net: netip.MustParsePrefix("100.64.0.2/32"),
|
Net: netip.MustParsePrefix("100.64.0.2/32"),
|
||||||
Ports: filter.PortRange{0, 0xffff},
|
Ports: allPorts,
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
Net: netip.MustParsePrefix("fd7a:115c:a1e0::2/128"),
|
Net: netip.MustParsePrefix("fd7a:115c:a1e0::2/128"),
|
||||||
Ports: filter.PortRange{0, 0xffff},
|
Ports: allPorts,
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
Caps: []filter.CapMatch{},
|
Caps: []filter.CapMatch{},
|
||||||
|
@ -1281,11 +1283,11 @@ func TestSubnetRouteACL(t *testing.T) {
|
||||||
Dsts: []filter.NetPortRange{
|
Dsts: []filter.NetPortRange{
|
||||||
{
|
{
|
||||||
Net: netip.MustParsePrefix("100.64.0.1/32"),
|
Net: netip.MustParsePrefix("100.64.0.1/32"),
|
||||||
Ports: filter.PortRange{0, 0xffff},
|
Ports: allPorts,
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
Net: netip.MustParsePrefix("fd7a:115c:a1e0::1/128"),
|
Net: netip.MustParsePrefix("fd7a:115c:a1e0::1/128"),
|
||||||
Ports: filter.PortRange{0, 0xffff},
|
Ports: allPorts,
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
Caps: []filter.CapMatch{},
|
Caps: []filter.CapMatch{},
|
||||||
|
@ -1303,7 +1305,7 @@ func TestSubnetRouteACL(t *testing.T) {
|
||||||
Dsts: []filter.NetPortRange{
|
Dsts: []filter.NetPortRange{
|
||||||
{
|
{
|
||||||
Net: netip.MustParsePrefix("10.33.0.0/16"),
|
Net: netip.MustParsePrefix("10.33.0.0/16"),
|
||||||
Ports: filter.PortRange{0, 0xffff},
|
Ports: allPorts,
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
Caps: []filter.CapMatch{},
|
Caps: []filter.CapMatch{},
|
||||||
|
|
Loading…
Reference in a new issue