mirror of
				https://github.com/juanfont/headscale.git
				synced 2025-10-31 13:07:46 +09:00 
			
		
		
		
	more linter fixups (#2212)
* linter fixes Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com> * conf Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com> * update nix hash Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com> --------- Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com>
This commit is contained in:
		| @@ -13,6 +13,7 @@ import ( | ||||
| 	"github.com/juanfont/headscale/integration/hsic" | ||||
| 	"github.com/juanfont/headscale/integration/tsic" | ||||
| 	"github.com/stretchr/testify/assert" | ||||
| 	"github.com/stretchr/testify/require" | ||||
| ) | ||||
|  | ||||
| func executeAndUnmarshal[T any](headscale ControlServer, command []string, result T) error { | ||||
| @@ -34,7 +35,7 @@ func TestUserCommand(t *testing.T) { | ||||
| 	t.Parallel() | ||||
|  | ||||
| 	scenario, err := NewScenario(dockertestMaxWait()) | ||||
| 	assertNoErr(t, err) | ||||
| 	require.NoError(t, err) | ||||
| 	defer scenario.ShutdownAssertNoPanics(t) | ||||
|  | ||||
| 	spec := map[string]int{ | ||||
| @@ -43,10 +44,10 @@ func TestUserCommand(t *testing.T) { | ||||
| 	} | ||||
|  | ||||
| 	err = scenario.CreateHeadscaleEnv(spec, []tsic.Option{}, hsic.WithTestName("clins")) | ||||
| 	assertNoErr(t, err) | ||||
| 	require.NoError(t, err) | ||||
|  | ||||
| 	headscale, err := scenario.Headscale() | ||||
| 	assertNoErr(t, err) | ||||
| 	require.NoError(t, err) | ||||
|  | ||||
| 	var listUsers []v1.User | ||||
| 	err = executeAndUnmarshal(headscale, | ||||
| @@ -59,7 +60,7 @@ func TestUserCommand(t *testing.T) { | ||||
| 		}, | ||||
| 		&listUsers, | ||||
| 	) | ||||
| 	assertNoErr(t, err) | ||||
| 	require.NoError(t, err) | ||||
|  | ||||
| 	result := []string{listUsers[0].GetName(), listUsers[1].GetName()} | ||||
| 	sort.Strings(result) | ||||
| @@ -81,7 +82,7 @@ func TestUserCommand(t *testing.T) { | ||||
| 			"newname", | ||||
| 		}, | ||||
| 	) | ||||
| 	assertNoErr(t, err) | ||||
| 	require.NoError(t, err) | ||||
|  | ||||
| 	var listAfterRenameUsers []v1.User | ||||
| 	err = executeAndUnmarshal(headscale, | ||||
| @@ -94,7 +95,7 @@ func TestUserCommand(t *testing.T) { | ||||
| 		}, | ||||
| 		&listAfterRenameUsers, | ||||
| 	) | ||||
| 	assertNoErr(t, err) | ||||
| 	require.NoError(t, err) | ||||
|  | ||||
| 	result = []string{listAfterRenameUsers[0].GetName(), listAfterRenameUsers[1].GetName()} | ||||
| 	sort.Strings(result) | ||||
| @@ -114,7 +115,7 @@ func TestPreAuthKeyCommand(t *testing.T) { | ||||
| 	count := 3 | ||||
|  | ||||
| 	scenario, err := NewScenario(dockertestMaxWait()) | ||||
| 	assertNoErr(t, err) | ||||
| 	require.NoError(t, err) | ||||
| 	defer scenario.ShutdownAssertNoPanics(t) | ||||
|  | ||||
| 	spec := map[string]int{ | ||||
| @@ -122,13 +123,13 @@ func TestPreAuthKeyCommand(t *testing.T) { | ||||
| 	} | ||||
|  | ||||
| 	err = scenario.CreateHeadscaleEnv(spec, []tsic.Option{}, hsic.WithTestName("clipak")) | ||||
| 	assertNoErr(t, err) | ||||
| 	require.NoError(t, err) | ||||
|  | ||||
| 	headscale, err := scenario.Headscale() | ||||
| 	assertNoErr(t, err) | ||||
| 	require.NoError(t, err) | ||||
|  | ||||
| 	keys := make([]*v1.PreAuthKey, count) | ||||
| 	assertNoErr(t, err) | ||||
| 	require.NoError(t, err) | ||||
|  | ||||
| 	for index := 0; index < count; index++ { | ||||
| 		var preAuthKey v1.PreAuthKey | ||||
| @@ -150,7 +151,7 @@ func TestPreAuthKeyCommand(t *testing.T) { | ||||
| 			}, | ||||
| 			&preAuthKey, | ||||
| 		) | ||||
| 		assertNoErr(t, err) | ||||
| 		require.NoError(t, err) | ||||
|  | ||||
| 		keys[index] = &preAuthKey | ||||
| 	} | ||||
| @@ -171,7 +172,7 @@ func TestPreAuthKeyCommand(t *testing.T) { | ||||
| 		}, | ||||
| 		&listedPreAuthKeys, | ||||
| 	) | ||||
| 	assertNoErr(t, err) | ||||
| 	require.NoError(t, err) | ||||
|  | ||||
| 	// There is one key created by "scenario.CreateHeadscaleEnv" | ||||
| 	assert.Len(t, listedPreAuthKeys, 4) | ||||
| @@ -212,7 +213,7 @@ func TestPreAuthKeyCommand(t *testing.T) { | ||||
| 			continue | ||||
| 		} | ||||
|  | ||||
| 		assert.Equal(t, listedPreAuthKeys[index].GetAclTags(), []string{"tag:test1", "tag:test2"}) | ||||
| 		assert.Equal(t, []string{"tag:test1", "tag:test2"}, listedPreAuthKeys[index].GetAclTags()) | ||||
| 	} | ||||
|  | ||||
| 	// Test key expiry | ||||
| @@ -226,7 +227,7 @@ func TestPreAuthKeyCommand(t *testing.T) { | ||||
| 			listedPreAuthKeys[1].GetKey(), | ||||
| 		}, | ||||
| 	) | ||||
| 	assertNoErr(t, err) | ||||
| 	require.NoError(t, err) | ||||
|  | ||||
| 	var listedPreAuthKeysAfterExpire []v1.PreAuthKey | ||||
| 	err = executeAndUnmarshal( | ||||
| @@ -242,7 +243,7 @@ func TestPreAuthKeyCommand(t *testing.T) { | ||||
| 		}, | ||||
| 		&listedPreAuthKeysAfterExpire, | ||||
| 	) | ||||
| 	assertNoErr(t, err) | ||||
| 	require.NoError(t, err) | ||||
|  | ||||
| 	assert.True(t, listedPreAuthKeysAfterExpire[1].GetExpiration().AsTime().Before(time.Now())) | ||||
| 	assert.True(t, listedPreAuthKeysAfterExpire[2].GetExpiration().AsTime().After(time.Now())) | ||||
| @@ -256,7 +257,7 @@ func TestPreAuthKeyCommandWithoutExpiry(t *testing.T) { | ||||
| 	user := "pre-auth-key-without-exp-user" | ||||
|  | ||||
| 	scenario, err := NewScenario(dockertestMaxWait()) | ||||
| 	assertNoErr(t, err) | ||||
| 	require.NoError(t, err) | ||||
| 	defer scenario.ShutdownAssertNoPanics(t) | ||||
|  | ||||
| 	spec := map[string]int{ | ||||
| @@ -264,10 +265,10 @@ func TestPreAuthKeyCommandWithoutExpiry(t *testing.T) { | ||||
| 	} | ||||
|  | ||||
| 	err = scenario.CreateHeadscaleEnv(spec, []tsic.Option{}, hsic.WithTestName("clipaknaexp")) | ||||
| 	assertNoErr(t, err) | ||||
| 	require.NoError(t, err) | ||||
|  | ||||
| 	headscale, err := scenario.Headscale() | ||||
| 	assertNoErr(t, err) | ||||
| 	require.NoError(t, err) | ||||
|  | ||||
| 	var preAuthKey v1.PreAuthKey | ||||
| 	err = executeAndUnmarshal( | ||||
| @@ -284,7 +285,7 @@ func TestPreAuthKeyCommandWithoutExpiry(t *testing.T) { | ||||
| 		}, | ||||
| 		&preAuthKey, | ||||
| 	) | ||||
| 	assertNoErr(t, err) | ||||
| 	require.NoError(t, err) | ||||
|  | ||||
| 	var listedPreAuthKeys []v1.PreAuthKey | ||||
| 	err = executeAndUnmarshal( | ||||
| @@ -300,7 +301,7 @@ func TestPreAuthKeyCommandWithoutExpiry(t *testing.T) { | ||||
| 		}, | ||||
| 		&listedPreAuthKeys, | ||||
| 	) | ||||
| 	assertNoErr(t, err) | ||||
| 	require.NoError(t, err) | ||||
|  | ||||
| 	// There is one key created by "scenario.CreateHeadscaleEnv" | ||||
| 	assert.Len(t, listedPreAuthKeys, 2) | ||||
| @@ -319,7 +320,7 @@ func TestPreAuthKeyCommandReusableEphemeral(t *testing.T) { | ||||
| 	user := "pre-auth-key-reus-ephm-user" | ||||
|  | ||||
| 	scenario, err := NewScenario(dockertestMaxWait()) | ||||
| 	assertNoErr(t, err) | ||||
| 	require.NoError(t, err) | ||||
| 	defer scenario.ShutdownAssertNoPanics(t) | ||||
|  | ||||
| 	spec := map[string]int{ | ||||
| @@ -327,10 +328,10 @@ func TestPreAuthKeyCommandReusableEphemeral(t *testing.T) { | ||||
| 	} | ||||
|  | ||||
| 	err = scenario.CreateHeadscaleEnv(spec, []tsic.Option{}, hsic.WithTestName("clipakresueeph")) | ||||
| 	assertNoErr(t, err) | ||||
| 	require.NoError(t, err) | ||||
|  | ||||
| 	headscale, err := scenario.Headscale() | ||||
| 	assertNoErr(t, err) | ||||
| 	require.NoError(t, err) | ||||
|  | ||||
| 	var preAuthReusableKey v1.PreAuthKey | ||||
| 	err = executeAndUnmarshal( | ||||
| @@ -347,7 +348,7 @@ func TestPreAuthKeyCommandReusableEphemeral(t *testing.T) { | ||||
| 		}, | ||||
| 		&preAuthReusableKey, | ||||
| 	) | ||||
| 	assertNoErr(t, err) | ||||
| 	require.NoError(t, err) | ||||
|  | ||||
| 	var preAuthEphemeralKey v1.PreAuthKey | ||||
| 	err = executeAndUnmarshal( | ||||
| @@ -364,7 +365,7 @@ func TestPreAuthKeyCommandReusableEphemeral(t *testing.T) { | ||||
| 		}, | ||||
| 		&preAuthEphemeralKey, | ||||
| 	) | ||||
| 	assertNoErr(t, err) | ||||
| 	require.NoError(t, err) | ||||
|  | ||||
| 	assert.True(t, preAuthEphemeralKey.GetEphemeral()) | ||||
| 	assert.False(t, preAuthEphemeralKey.GetReusable()) | ||||
| @@ -383,7 +384,7 @@ func TestPreAuthKeyCommandReusableEphemeral(t *testing.T) { | ||||
| 		}, | ||||
| 		&listedPreAuthKeys, | ||||
| 	) | ||||
| 	assertNoErr(t, err) | ||||
| 	require.NoError(t, err) | ||||
|  | ||||
| 	// There is one key created by "scenario.CreateHeadscaleEnv" | ||||
| 	assert.Len(t, listedPreAuthKeys, 3) | ||||
| @@ -397,7 +398,7 @@ func TestPreAuthKeyCorrectUserLoggedInCommand(t *testing.T) { | ||||
| 	user2 := "user2" | ||||
|  | ||||
| 	scenario, err := NewScenario(dockertestMaxWait()) | ||||
| 	assertNoErr(t, err) | ||||
| 	require.NoError(t, err) | ||||
| 	defer scenario.ShutdownAssertNoPanics(t) | ||||
|  | ||||
| 	spec := map[string]int{ | ||||
| @@ -413,10 +414,10 @@ func TestPreAuthKeyCorrectUserLoggedInCommand(t *testing.T) { | ||||
| 		hsic.WithTLS(), | ||||
| 		hsic.WithHostnameAsServerURL(), | ||||
| 	) | ||||
| 	assertNoErr(t, err) | ||||
| 	require.NoError(t, err) | ||||
|  | ||||
| 	headscale, err := scenario.Headscale() | ||||
| 	assertNoErr(t, err) | ||||
| 	require.NoError(t, err) | ||||
|  | ||||
| 	var user2Key v1.PreAuthKey | ||||
|  | ||||
| @@ -438,10 +439,10 @@ func TestPreAuthKeyCorrectUserLoggedInCommand(t *testing.T) { | ||||
| 		}, | ||||
| 		&user2Key, | ||||
| 	) | ||||
| 	assertNoErr(t, err) | ||||
| 	require.NoError(t, err) | ||||
|  | ||||
| 	allClients, err := scenario.ListTailscaleClients() | ||||
| 	assertNoErrListClients(t, err) | ||||
| 	require.NoError(t, err) | ||||
|  | ||||
| 	assert.Len(t, allClients, 1) | ||||
|  | ||||
| @@ -449,22 +450,22 @@ func TestPreAuthKeyCorrectUserLoggedInCommand(t *testing.T) { | ||||
|  | ||||
| 	// Log out from user1 | ||||
| 	err = client.Logout() | ||||
| 	assertNoErr(t, err) | ||||
| 	require.NoError(t, err) | ||||
|  | ||||
| 	err = scenario.WaitForTailscaleLogout() | ||||
| 	assertNoErr(t, err) | ||||
| 	require.NoError(t, err) | ||||
|  | ||||
| 	status, err := client.Status() | ||||
| 	assertNoErr(t, err) | ||||
| 	require.NoError(t, err) | ||||
| 	if status.BackendState == "Starting" || status.BackendState == "Running" { | ||||
| 		t.Fatalf("expected node to be logged out, backend state: %s", status.BackendState) | ||||
| 	} | ||||
|  | ||||
| 	err = client.Login(headscale.GetEndpoint(), user2Key.GetKey()) | ||||
| 	assertNoErr(t, err) | ||||
| 	require.NoError(t, err) | ||||
|  | ||||
| 	status, err = client.Status() | ||||
| 	assertNoErr(t, err) | ||||
| 	require.NoError(t, err) | ||||
| 	if status.BackendState != "Running" { | ||||
| 		t.Fatalf("expected node to be logged in, backend state: %s", status.BackendState) | ||||
| 	} | ||||
| @@ -485,7 +486,7 @@ func TestPreAuthKeyCorrectUserLoggedInCommand(t *testing.T) { | ||||
| 		}, | ||||
| 		&listNodes, | ||||
| 	) | ||||
| 	assert.Nil(t, err) | ||||
| 	require.NoError(t, err) | ||||
| 	assert.Len(t, listNodes, 1) | ||||
|  | ||||
| 	assert.Equal(t, "user2", listNodes[0].GetUser().GetName()) | ||||
| @@ -498,7 +499,7 @@ func TestApiKeyCommand(t *testing.T) { | ||||
| 	count := 5 | ||||
|  | ||||
| 	scenario, err := NewScenario(dockertestMaxWait()) | ||||
| 	assertNoErr(t, err) | ||||
| 	require.NoError(t, err) | ||||
| 	defer scenario.ShutdownAssertNoPanics(t) | ||||
|  | ||||
| 	spec := map[string]int{ | ||||
| @@ -507,10 +508,10 @@ func TestApiKeyCommand(t *testing.T) { | ||||
| 	} | ||||
|  | ||||
| 	err = scenario.CreateHeadscaleEnv(spec, []tsic.Option{}, hsic.WithTestName("clins")) | ||||
| 	assertNoErr(t, err) | ||||
| 	require.NoError(t, err) | ||||
|  | ||||
| 	headscale, err := scenario.Headscale() | ||||
| 	assertNoErr(t, err) | ||||
| 	require.NoError(t, err) | ||||
|  | ||||
| 	keys := make([]string, count) | ||||
|  | ||||
| @@ -526,7 +527,7 @@ func TestApiKeyCommand(t *testing.T) { | ||||
| 				"json", | ||||
| 			}, | ||||
| 		) | ||||
| 		assert.Nil(t, err) | ||||
| 		require.NoError(t, err) | ||||
| 		assert.NotEmpty(t, apiResult) | ||||
|  | ||||
| 		keys[idx] = apiResult | ||||
| @@ -545,7 +546,7 @@ func TestApiKeyCommand(t *testing.T) { | ||||
| 		}, | ||||
| 		&listedAPIKeys, | ||||
| 	) | ||||
| 	assert.Nil(t, err) | ||||
| 	require.NoError(t, err) | ||||
|  | ||||
| 	assert.Len(t, listedAPIKeys, 5) | ||||
|  | ||||
| @@ -601,7 +602,7 @@ func TestApiKeyCommand(t *testing.T) { | ||||
| 				listedAPIKeys[idx].GetPrefix(), | ||||
| 			}, | ||||
| 		) | ||||
| 		assert.Nil(t, err) | ||||
| 		require.NoError(t, err) | ||||
|  | ||||
| 		expiredPrefixes[listedAPIKeys[idx].GetPrefix()] = true | ||||
| 	} | ||||
| @@ -617,7 +618,7 @@ func TestApiKeyCommand(t *testing.T) { | ||||
| 		}, | ||||
| 		&listedAfterExpireAPIKeys, | ||||
| 	) | ||||
| 	assert.Nil(t, err) | ||||
| 	require.NoError(t, err) | ||||
|  | ||||
| 	for index := range listedAfterExpireAPIKeys { | ||||
| 		if _, ok := expiredPrefixes[listedAfterExpireAPIKeys[index].GetPrefix()]; ok { | ||||
| @@ -643,7 +644,7 @@ func TestApiKeyCommand(t *testing.T) { | ||||
| 			"--prefix", | ||||
| 			listedAPIKeys[0].GetPrefix(), | ||||
| 		}) | ||||
| 	assert.Nil(t, err) | ||||
| 	require.NoError(t, err) | ||||
|  | ||||
| 	var listedAPIKeysAfterDelete []v1.ApiKey | ||||
| 	err = executeAndUnmarshal(headscale, | ||||
| @@ -656,7 +657,7 @@ func TestApiKeyCommand(t *testing.T) { | ||||
| 		}, | ||||
| 		&listedAPIKeysAfterDelete, | ||||
| 	) | ||||
| 	assert.Nil(t, err) | ||||
| 	require.NoError(t, err) | ||||
|  | ||||
| 	assert.Len(t, listedAPIKeysAfterDelete, 4) | ||||
| } | ||||
| @@ -666,7 +667,7 @@ func TestNodeTagCommand(t *testing.T) { | ||||
| 	t.Parallel() | ||||
|  | ||||
| 	scenario, err := NewScenario(dockertestMaxWait()) | ||||
| 	assertNoErr(t, err) | ||||
| 	require.NoError(t, err) | ||||
| 	defer scenario.ShutdownAssertNoPanics(t) | ||||
|  | ||||
| 	spec := map[string]int{ | ||||
| @@ -674,17 +675,17 @@ func TestNodeTagCommand(t *testing.T) { | ||||
| 	} | ||||
|  | ||||
| 	err = scenario.CreateHeadscaleEnv(spec, []tsic.Option{}, hsic.WithTestName("clins")) | ||||
| 	assertNoErr(t, err) | ||||
| 	require.NoError(t, err) | ||||
|  | ||||
| 	headscale, err := scenario.Headscale() | ||||
| 	assertNoErr(t, err) | ||||
| 	require.NoError(t, err) | ||||
|  | ||||
| 	machineKeys := []string{ | ||||
| 		"mkey:9b2ffa7e08cc421a3d2cca9012280f6a236fd0de0b4ce005b30a98ad930306fe", | ||||
| 		"mkey:6abd00bb5fdda622db51387088c68e97e71ce58e7056aa54f592b6a8219d524c", | ||||
| 	} | ||||
| 	nodes := make([]*v1.Node, len(machineKeys)) | ||||
| 	assert.Nil(t, err) | ||||
| 	require.NoError(t, err) | ||||
|  | ||||
| 	for index, machineKey := range machineKeys { | ||||
| 		_, err := headscale.Execute( | ||||
| @@ -702,7 +703,7 @@ func TestNodeTagCommand(t *testing.T) { | ||||
| 				"json", | ||||
| 			}, | ||||
| 		) | ||||
| 		assert.Nil(t, err) | ||||
| 		require.NoError(t, err) | ||||
|  | ||||
| 		var node v1.Node | ||||
| 		err = executeAndUnmarshal( | ||||
| @@ -720,7 +721,7 @@ func TestNodeTagCommand(t *testing.T) { | ||||
| 			}, | ||||
| 			&node, | ||||
| 		) | ||||
| 		assert.Nil(t, err) | ||||
| 		require.NoError(t, err) | ||||
|  | ||||
| 		nodes[index] = &node | ||||
| 	} | ||||
| @@ -739,7 +740,7 @@ func TestNodeTagCommand(t *testing.T) { | ||||
| 		}, | ||||
| 		&node, | ||||
| 	) | ||||
| 	assert.Nil(t, err) | ||||
| 	require.NoError(t, err) | ||||
|  | ||||
| 	assert.Equal(t, []string{"tag:test"}, node.GetForcedTags()) | ||||
|  | ||||
| @@ -753,7 +754,7 @@ func TestNodeTagCommand(t *testing.T) { | ||||
| 			"--output", "json", | ||||
| 		}, | ||||
| 	) | ||||
| 	assert.ErrorContains(t, err, "tag must start with the string 'tag:'") | ||||
| 	require.ErrorContains(t, err, "tag must start with the string 'tag:'") | ||||
|  | ||||
| 	// Test list all nodes after added seconds | ||||
| 	resultMachines := make([]*v1.Node, len(machineKeys)) | ||||
| @@ -767,7 +768,7 @@ func TestNodeTagCommand(t *testing.T) { | ||||
| 		}, | ||||
| 		&resultMachines, | ||||
| 	) | ||||
| 	assert.Nil(t, err) | ||||
| 	require.NoError(t, err) | ||||
| 	found := false | ||||
| 	for _, node := range resultMachines { | ||||
| 		if node.GetForcedTags() != nil { | ||||
| @@ -778,9 +779,8 @@ func TestNodeTagCommand(t *testing.T) { | ||||
| 			} | ||||
| 		} | ||||
| 	} | ||||
| 	assert.Equal( | ||||
| 	assert.True( | ||||
| 		t, | ||||
| 		true, | ||||
| 		found, | ||||
| 		"should find a node with the tag 'tag:test' in the list of nodes", | ||||
| 	) | ||||
| @@ -791,18 +791,22 @@ func TestNodeAdvertiseTagNoACLCommand(t *testing.T) { | ||||
| 	t.Parallel() | ||||
|  | ||||
| 	scenario, err := NewScenario(dockertestMaxWait()) | ||||
| 	assertNoErr(t, err) | ||||
| 	require.NoError(t, err) | ||||
| 	defer scenario.ShutdownAssertNoPanics(t) | ||||
|  | ||||
| 	spec := map[string]int{ | ||||
| 		"user1": 1, | ||||
| 	} | ||||
|  | ||||
| 	err = scenario.CreateHeadscaleEnv(spec, []tsic.Option{tsic.WithTags([]string{"tag:test"})}, hsic.WithTestName("cliadvtags")) | ||||
| 	assertNoErr(t, err) | ||||
| 	err = scenario.CreateHeadscaleEnv( | ||||
| 		spec, | ||||
| 		[]tsic.Option{tsic.WithTags([]string{"tag:test"})}, | ||||
| 		hsic.WithTestName("cliadvtags"), | ||||
| 	) | ||||
| 	require.NoError(t, err) | ||||
|  | ||||
| 	headscale, err := scenario.Headscale() | ||||
| 	assertNoErr(t, err) | ||||
| 	require.NoError(t, err) | ||||
|  | ||||
| 	// Test list all nodes after added seconds | ||||
| 	resultMachines := make([]*v1.Node, spec["user1"]) | ||||
| @@ -817,7 +821,7 @@ func TestNodeAdvertiseTagNoACLCommand(t *testing.T) { | ||||
| 		}, | ||||
| 		&resultMachines, | ||||
| 	) | ||||
| 	assert.Nil(t, err) | ||||
| 	require.NoError(t, err) | ||||
| 	found := false | ||||
| 	for _, node := range resultMachines { | ||||
| 		if node.GetInvalidTags() != nil { | ||||
| @@ -828,9 +832,8 @@ func TestNodeAdvertiseTagNoACLCommand(t *testing.T) { | ||||
| 			} | ||||
| 		} | ||||
| 	} | ||||
| 	assert.Equal( | ||||
| 	assert.True( | ||||
| 		t, | ||||
| 		true, | ||||
| 		found, | ||||
| 		"should not find a node with the tag 'tag:test' in the list of nodes", | ||||
| 	) | ||||
| @@ -841,31 +844,36 @@ func TestNodeAdvertiseTagWithACLCommand(t *testing.T) { | ||||
| 	t.Parallel() | ||||
|  | ||||
| 	scenario, err := NewScenario(dockertestMaxWait()) | ||||
| 	assertNoErr(t, err) | ||||
| 	require.NoError(t, err) | ||||
| 	defer scenario.ShutdownAssertNoPanics(t) | ||||
|  | ||||
| 	spec := map[string]int{ | ||||
| 		"user1": 1, | ||||
| 	} | ||||
|  | ||||
| 	err = scenario.CreateHeadscaleEnv(spec, []tsic.Option{tsic.WithTags([]string{"tag:exists"})}, hsic.WithTestName("cliadvtags"), hsic.WithACLPolicy( | ||||
| 		&policy.ACLPolicy{ | ||||
| 			ACLs: []policy.ACL{ | ||||
| 				{ | ||||
| 					Action:       "accept", | ||||
| 					Sources:      []string{"*"}, | ||||
| 					Destinations: []string{"*:*"}, | ||||
| 	err = scenario.CreateHeadscaleEnv( | ||||
| 		spec, | ||||
| 		[]tsic.Option{tsic.WithTags([]string{"tag:exists"})}, | ||||
| 		hsic.WithTestName("cliadvtags"), | ||||
| 		hsic.WithACLPolicy( | ||||
| 			&policy.ACLPolicy{ | ||||
| 				ACLs: []policy.ACL{ | ||||
| 					{ | ||||
| 						Action:       "accept", | ||||
| 						Sources:      []string{"*"}, | ||||
| 						Destinations: []string{"*:*"}, | ||||
| 					}, | ||||
| 				}, | ||||
| 				TagOwners: map[string][]string{ | ||||
| 					"tag:exists": {"user1"}, | ||||
| 				}, | ||||
| 			}, | ||||
| 			TagOwners: map[string][]string{ | ||||
| 				"tag:exists": {"user1"}, | ||||
| 			}, | ||||
| 		}, | ||||
| 	)) | ||||
| 	assertNoErr(t, err) | ||||
| 		), | ||||
| 	) | ||||
| 	require.NoError(t, err) | ||||
|  | ||||
| 	headscale, err := scenario.Headscale() | ||||
| 	assertNoErr(t, err) | ||||
| 	require.NoError(t, err) | ||||
|  | ||||
| 	// Test list all nodes after added seconds | ||||
| 	resultMachines := make([]*v1.Node, spec["user1"]) | ||||
| @@ -880,7 +888,7 @@ func TestNodeAdvertiseTagWithACLCommand(t *testing.T) { | ||||
| 		}, | ||||
| 		&resultMachines, | ||||
| 	) | ||||
| 	assert.Nil(t, err) | ||||
| 	require.NoError(t, err) | ||||
| 	found := false | ||||
| 	for _, node := range resultMachines { | ||||
| 		if node.GetValidTags() != nil { | ||||
| @@ -891,9 +899,8 @@ func TestNodeAdvertiseTagWithACLCommand(t *testing.T) { | ||||
| 			} | ||||
| 		} | ||||
| 	} | ||||
| 	assert.Equal( | ||||
| 	assert.True( | ||||
| 		t, | ||||
| 		true, | ||||
| 		found, | ||||
| 		"should not find a node with the tag 'tag:exists' in the list of nodes", | ||||
| 	) | ||||
| @@ -904,7 +911,7 @@ func TestNodeCommand(t *testing.T) { | ||||
| 	t.Parallel() | ||||
|  | ||||
| 	scenario, err := NewScenario(dockertestMaxWait()) | ||||
| 	assertNoErr(t, err) | ||||
| 	require.NoError(t, err) | ||||
| 	defer scenario.ShutdownAssertNoPanics(t) | ||||
|  | ||||
| 	spec := map[string]int{ | ||||
| @@ -913,10 +920,10 @@ func TestNodeCommand(t *testing.T) { | ||||
| 	} | ||||
|  | ||||
| 	err = scenario.CreateHeadscaleEnv(spec, []tsic.Option{}, hsic.WithTestName("clins")) | ||||
| 	assertNoErr(t, err) | ||||
| 	require.NoError(t, err) | ||||
|  | ||||
| 	headscale, err := scenario.Headscale() | ||||
| 	assertNoErr(t, err) | ||||
| 	require.NoError(t, err) | ||||
|  | ||||
| 	// Pregenerated machine keys | ||||
| 	machineKeys := []string{ | ||||
| @@ -927,7 +934,7 @@ func TestNodeCommand(t *testing.T) { | ||||
| 		"mkey:cf7b0fd05da556fdc3bab365787b506fd82d64a70745db70e00e86c1b1c03084", | ||||
| 	} | ||||
| 	nodes := make([]*v1.Node, len(machineKeys)) | ||||
| 	assert.Nil(t, err) | ||||
| 	require.NoError(t, err) | ||||
|  | ||||
| 	for index, machineKey := range machineKeys { | ||||
| 		_, err := headscale.Execute( | ||||
| @@ -945,7 +952,7 @@ func TestNodeCommand(t *testing.T) { | ||||
| 				"json", | ||||
| 			}, | ||||
| 		) | ||||
| 		assert.Nil(t, err) | ||||
| 		require.NoError(t, err) | ||||
|  | ||||
| 		var node v1.Node | ||||
| 		err = executeAndUnmarshal( | ||||
| @@ -963,7 +970,7 @@ func TestNodeCommand(t *testing.T) { | ||||
| 			}, | ||||
| 			&node, | ||||
| 		) | ||||
| 		assert.Nil(t, err) | ||||
| 		require.NoError(t, err) | ||||
|  | ||||
| 		nodes[index] = &node | ||||
| 	} | ||||
| @@ -983,7 +990,7 @@ func TestNodeCommand(t *testing.T) { | ||||
| 		}, | ||||
| 		&listAll, | ||||
| 	) | ||||
| 	assert.Nil(t, err) | ||||
| 	require.NoError(t, err) | ||||
|  | ||||
| 	assert.Len(t, listAll, 5) | ||||
|  | ||||
| @@ -1004,7 +1011,7 @@ func TestNodeCommand(t *testing.T) { | ||||
| 		"mkey:dc721977ac7415aafa87f7d4574cbe07c6b171834a6d37375782bdc1fb6b3584", | ||||
| 	} | ||||
| 	otherUserMachines := make([]*v1.Node, len(otherUserMachineKeys)) | ||||
| 	assert.Nil(t, err) | ||||
| 	require.NoError(t, err) | ||||
|  | ||||
| 	for index, machineKey := range otherUserMachineKeys { | ||||
| 		_, err := headscale.Execute( | ||||
| @@ -1022,7 +1029,7 @@ func TestNodeCommand(t *testing.T) { | ||||
| 				"json", | ||||
| 			}, | ||||
| 		) | ||||
| 		assert.Nil(t, err) | ||||
| 		require.NoError(t, err) | ||||
|  | ||||
| 		var node v1.Node | ||||
| 		err = executeAndUnmarshal( | ||||
| @@ -1040,7 +1047,7 @@ func TestNodeCommand(t *testing.T) { | ||||
| 			}, | ||||
| 			&node, | ||||
| 		) | ||||
| 		assert.Nil(t, err) | ||||
| 		require.NoError(t, err) | ||||
|  | ||||
| 		otherUserMachines[index] = &node | ||||
| 	} | ||||
| @@ -1060,7 +1067,7 @@ func TestNodeCommand(t *testing.T) { | ||||
| 		}, | ||||
| 		&listAllWithotherUser, | ||||
| 	) | ||||
| 	assert.Nil(t, err) | ||||
| 	require.NoError(t, err) | ||||
|  | ||||
| 	// All nodes, nodes + otherUser | ||||
| 	assert.Len(t, listAllWithotherUser, 7) | ||||
| @@ -1086,7 +1093,7 @@ func TestNodeCommand(t *testing.T) { | ||||
| 		}, | ||||
| 		&listOnlyotherUserMachineUser, | ||||
| 	) | ||||
| 	assert.Nil(t, err) | ||||
| 	require.NoError(t, err) | ||||
|  | ||||
| 	assert.Len(t, listOnlyotherUserMachineUser, 2) | ||||
|  | ||||
| @@ -1118,7 +1125,7 @@ func TestNodeCommand(t *testing.T) { | ||||
| 			"--force", | ||||
| 		}, | ||||
| 	) | ||||
| 	assert.Nil(t, err) | ||||
| 	require.NoError(t, err) | ||||
|  | ||||
| 	// Test: list main user after node is deleted | ||||
| 	var listOnlyMachineUserAfterDelete []v1.Node | ||||
| @@ -1135,7 +1142,7 @@ func TestNodeCommand(t *testing.T) { | ||||
| 		}, | ||||
| 		&listOnlyMachineUserAfterDelete, | ||||
| 	) | ||||
| 	assert.Nil(t, err) | ||||
| 	require.NoError(t, err) | ||||
|  | ||||
| 	assert.Len(t, listOnlyMachineUserAfterDelete, 4) | ||||
| } | ||||
| @@ -1145,7 +1152,7 @@ func TestNodeExpireCommand(t *testing.T) { | ||||
| 	t.Parallel() | ||||
|  | ||||
| 	scenario, err := NewScenario(dockertestMaxWait()) | ||||
| 	assertNoErr(t, err) | ||||
| 	require.NoError(t, err) | ||||
| 	defer scenario.ShutdownAssertNoPanics(t) | ||||
|  | ||||
| 	spec := map[string]int{ | ||||
| @@ -1153,10 +1160,10 @@ func TestNodeExpireCommand(t *testing.T) { | ||||
| 	} | ||||
|  | ||||
| 	err = scenario.CreateHeadscaleEnv(spec, []tsic.Option{}, hsic.WithTestName("clins")) | ||||
| 	assertNoErr(t, err) | ||||
| 	require.NoError(t, err) | ||||
|  | ||||
| 	headscale, err := scenario.Headscale() | ||||
| 	assertNoErr(t, err) | ||||
| 	require.NoError(t, err) | ||||
|  | ||||
| 	// Pregenerated machine keys | ||||
| 	machineKeys := []string{ | ||||
| @@ -1184,7 +1191,7 @@ func TestNodeExpireCommand(t *testing.T) { | ||||
| 				"json", | ||||
| 			}, | ||||
| 		) | ||||
| 		assert.Nil(t, err) | ||||
| 		require.NoError(t, err) | ||||
|  | ||||
| 		var node v1.Node | ||||
| 		err = executeAndUnmarshal( | ||||
| @@ -1202,7 +1209,7 @@ func TestNodeExpireCommand(t *testing.T) { | ||||
| 			}, | ||||
| 			&node, | ||||
| 		) | ||||
| 		assert.Nil(t, err) | ||||
| 		require.NoError(t, err) | ||||
|  | ||||
| 		nodes[index] = &node | ||||
| 	} | ||||
| @@ -1221,7 +1228,7 @@ func TestNodeExpireCommand(t *testing.T) { | ||||
| 		}, | ||||
| 		&listAll, | ||||
| 	) | ||||
| 	assert.Nil(t, err) | ||||
| 	require.NoError(t, err) | ||||
|  | ||||
| 	assert.Len(t, listAll, 5) | ||||
|  | ||||
| @@ -1241,7 +1248,7 @@ func TestNodeExpireCommand(t *testing.T) { | ||||
| 				fmt.Sprintf("%d", listAll[idx].GetId()), | ||||
| 			}, | ||||
| 		) | ||||
| 		assert.Nil(t, err) | ||||
| 		require.NoError(t, err) | ||||
| 	} | ||||
|  | ||||
| 	var listAllAfterExpiry []v1.Node | ||||
| @@ -1256,7 +1263,7 @@ func TestNodeExpireCommand(t *testing.T) { | ||||
| 		}, | ||||
| 		&listAllAfterExpiry, | ||||
| 	) | ||||
| 	assert.Nil(t, err) | ||||
| 	require.NoError(t, err) | ||||
|  | ||||
| 	assert.Len(t, listAllAfterExpiry, 5) | ||||
|  | ||||
| @@ -1272,7 +1279,7 @@ func TestNodeRenameCommand(t *testing.T) { | ||||
| 	t.Parallel() | ||||
|  | ||||
| 	scenario, err := NewScenario(dockertestMaxWait()) | ||||
| 	assertNoErr(t, err) | ||||
| 	require.NoError(t, err) | ||||
| 	defer scenario.ShutdownAssertNoPanics(t) | ||||
|  | ||||
| 	spec := map[string]int{ | ||||
| @@ -1280,10 +1287,10 @@ func TestNodeRenameCommand(t *testing.T) { | ||||
| 	} | ||||
|  | ||||
| 	err = scenario.CreateHeadscaleEnv(spec, []tsic.Option{}, hsic.WithTestName("clins")) | ||||
| 	assertNoErr(t, err) | ||||
| 	require.NoError(t, err) | ||||
|  | ||||
| 	headscale, err := scenario.Headscale() | ||||
| 	assertNoErr(t, err) | ||||
| 	require.NoError(t, err) | ||||
|  | ||||
| 	// Pregenerated machine keys | ||||
| 	machineKeys := []string{ | ||||
| @@ -1294,7 +1301,7 @@ func TestNodeRenameCommand(t *testing.T) { | ||||
| 		"mkey:9b2ffa7e08cc421a3d2cca9012280f6a236fd0de0b4ce005b30a98ad930306fe", | ||||
| 	} | ||||
| 	nodes := make([]*v1.Node, len(machineKeys)) | ||||
| 	assert.Nil(t, err) | ||||
| 	require.NoError(t, err) | ||||
|  | ||||
| 	for index, machineKey := range machineKeys { | ||||
| 		_, err := headscale.Execute( | ||||
| @@ -1312,7 +1319,7 @@ func TestNodeRenameCommand(t *testing.T) { | ||||
| 				"json", | ||||
| 			}, | ||||
| 		) | ||||
| 		assertNoErr(t, err) | ||||
| 		require.NoError(t, err) | ||||
|  | ||||
| 		var node v1.Node | ||||
| 		err = executeAndUnmarshal( | ||||
| @@ -1330,7 +1337,7 @@ func TestNodeRenameCommand(t *testing.T) { | ||||
| 			}, | ||||
| 			&node, | ||||
| 		) | ||||
| 		assertNoErr(t, err) | ||||
| 		require.NoError(t, err) | ||||
|  | ||||
| 		nodes[index] = &node | ||||
| 	} | ||||
| @@ -1349,7 +1356,7 @@ func TestNodeRenameCommand(t *testing.T) { | ||||
| 		}, | ||||
| 		&listAll, | ||||
| 	) | ||||
| 	assert.Nil(t, err) | ||||
| 	require.NoError(t, err) | ||||
|  | ||||
| 	assert.Len(t, listAll, 5) | ||||
|  | ||||
| @@ -1370,7 +1377,7 @@ func TestNodeRenameCommand(t *testing.T) { | ||||
| 				fmt.Sprintf("newnode-%d", idx+1), | ||||
| 			}, | ||||
| 		) | ||||
| 		assert.Nil(t, err) | ||||
| 		require.NoError(t, err) | ||||
|  | ||||
| 		assert.Contains(t, res, "Node renamed") | ||||
| 	} | ||||
| @@ -1387,7 +1394,7 @@ func TestNodeRenameCommand(t *testing.T) { | ||||
| 		}, | ||||
| 		&listAllAfterRename, | ||||
| 	) | ||||
| 	assert.Nil(t, err) | ||||
| 	require.NoError(t, err) | ||||
|  | ||||
| 	assert.Len(t, listAllAfterRename, 5) | ||||
|  | ||||
| @@ -1408,7 +1415,7 @@ func TestNodeRenameCommand(t *testing.T) { | ||||
| 			strings.Repeat("t", 64), | ||||
| 		}, | ||||
| 	) | ||||
| 	assert.ErrorContains(t, err, "not be over 63 chars") | ||||
| 	require.ErrorContains(t, err, "not be over 63 chars") | ||||
|  | ||||
| 	var listAllAfterRenameAttempt []v1.Node | ||||
| 	err = executeAndUnmarshal( | ||||
| @@ -1422,7 +1429,7 @@ func TestNodeRenameCommand(t *testing.T) { | ||||
| 		}, | ||||
| 		&listAllAfterRenameAttempt, | ||||
| 	) | ||||
| 	assert.Nil(t, err) | ||||
| 	require.NoError(t, err) | ||||
|  | ||||
| 	assert.Len(t, listAllAfterRenameAttempt, 5) | ||||
|  | ||||
| @@ -1438,7 +1445,7 @@ func TestNodeMoveCommand(t *testing.T) { | ||||
| 	t.Parallel() | ||||
|  | ||||
| 	scenario, err := NewScenario(dockertestMaxWait()) | ||||
| 	assertNoErr(t, err) | ||||
| 	require.NoError(t, err) | ||||
| 	defer scenario.ShutdownAssertNoPanics(t) | ||||
|  | ||||
| 	spec := map[string]int{ | ||||
| @@ -1447,10 +1454,10 @@ func TestNodeMoveCommand(t *testing.T) { | ||||
| 	} | ||||
|  | ||||
| 	err = scenario.CreateHeadscaleEnv(spec, []tsic.Option{}, hsic.WithTestName("clins")) | ||||
| 	assertNoErr(t, err) | ||||
| 	require.NoError(t, err) | ||||
|  | ||||
| 	headscale, err := scenario.Headscale() | ||||
| 	assertNoErr(t, err) | ||||
| 	require.NoError(t, err) | ||||
|  | ||||
| 	// Randomly generated node key | ||||
| 	machineKey := "mkey:688411b767663479632d44140f08a9fde87383adc7cdeb518f62ce28a17ef0aa" | ||||
| @@ -1470,7 +1477,7 @@ func TestNodeMoveCommand(t *testing.T) { | ||||
| 			"json", | ||||
| 		}, | ||||
| 	) | ||||
| 	assert.Nil(t, err) | ||||
| 	require.NoError(t, err) | ||||
|  | ||||
| 	var node v1.Node | ||||
| 	err = executeAndUnmarshal( | ||||
| @@ -1488,11 +1495,11 @@ func TestNodeMoveCommand(t *testing.T) { | ||||
| 		}, | ||||
| 		&node, | ||||
| 	) | ||||
| 	assert.Nil(t, err) | ||||
| 	require.NoError(t, err) | ||||
|  | ||||
| 	assert.Equal(t, uint64(1), node.GetId()) | ||||
| 	assert.Equal(t, "nomad-node", node.GetName()) | ||||
| 	assert.Equal(t, node.GetUser().GetName(), "old-user") | ||||
| 	assert.Equal(t, "old-user", node.GetUser().GetName()) | ||||
|  | ||||
| 	nodeID := fmt.Sprintf("%d", node.GetId()) | ||||
|  | ||||
| @@ -1511,9 +1518,9 @@ func TestNodeMoveCommand(t *testing.T) { | ||||
| 		}, | ||||
| 		&node, | ||||
| 	) | ||||
| 	assert.Nil(t, err) | ||||
| 	require.NoError(t, err) | ||||
|  | ||||
| 	assert.Equal(t, node.GetUser().GetName(), "new-user") | ||||
| 	assert.Equal(t, "new-user", node.GetUser().GetName()) | ||||
|  | ||||
| 	var allNodes []v1.Node | ||||
| 	err = executeAndUnmarshal( | ||||
| @@ -1527,13 +1534,13 @@ func TestNodeMoveCommand(t *testing.T) { | ||||
| 		}, | ||||
| 		&allNodes, | ||||
| 	) | ||||
| 	assert.Nil(t, err) | ||||
| 	require.NoError(t, err) | ||||
|  | ||||
| 	assert.Len(t, allNodes, 1) | ||||
|  | ||||
| 	assert.Equal(t, allNodes[0].GetId(), node.GetId()) | ||||
| 	assert.Equal(t, allNodes[0].GetUser(), node.GetUser()) | ||||
| 	assert.Equal(t, allNodes[0].GetUser().GetName(), "new-user") | ||||
| 	assert.Equal(t, "new-user", allNodes[0].GetUser().GetName()) | ||||
|  | ||||
| 	_, err = headscale.Execute( | ||||
| 		[]string{ | ||||
| @@ -1548,12 +1555,12 @@ func TestNodeMoveCommand(t *testing.T) { | ||||
| 			"json", | ||||
| 		}, | ||||
| 	) | ||||
| 	assert.ErrorContains( | ||||
| 	require.ErrorContains( | ||||
| 		t, | ||||
| 		err, | ||||
| 		"user not found", | ||||
| 	) | ||||
| 	assert.Equal(t, node.GetUser().GetName(), "new-user") | ||||
| 	assert.Equal(t, "new-user", node.GetUser().GetName()) | ||||
|  | ||||
| 	err = executeAndUnmarshal( | ||||
| 		headscale, | ||||
| @@ -1570,9 +1577,9 @@ func TestNodeMoveCommand(t *testing.T) { | ||||
| 		}, | ||||
| 		&node, | ||||
| 	) | ||||
| 	assert.Nil(t, err) | ||||
| 	require.NoError(t, err) | ||||
|  | ||||
| 	assert.Equal(t, node.GetUser().GetName(), "old-user") | ||||
| 	assert.Equal(t, "old-user", node.GetUser().GetName()) | ||||
|  | ||||
| 	err = executeAndUnmarshal( | ||||
| 		headscale, | ||||
| @@ -1589,9 +1596,9 @@ func TestNodeMoveCommand(t *testing.T) { | ||||
| 		}, | ||||
| 		&node, | ||||
| 	) | ||||
| 	assert.Nil(t, err) | ||||
| 	require.NoError(t, err) | ||||
|  | ||||
| 	assert.Equal(t, node.GetUser().GetName(), "old-user") | ||||
| 	assert.Equal(t, "old-user", node.GetUser().GetName()) | ||||
| } | ||||
|  | ||||
| func TestPolicyCommand(t *testing.T) { | ||||
| @@ -1599,7 +1606,7 @@ func TestPolicyCommand(t *testing.T) { | ||||
| 	t.Parallel() | ||||
|  | ||||
| 	scenario, err := NewScenario(dockertestMaxWait()) | ||||
| 	assertNoErr(t, err) | ||||
| 	require.NoError(t, err) | ||||
| 	defer scenario.ShutdownAssertNoPanics(t) | ||||
|  | ||||
| 	spec := map[string]int{ | ||||
| @@ -1614,10 +1621,10 @@ func TestPolicyCommand(t *testing.T) { | ||||
| 			"HEADSCALE_POLICY_MODE": "database", | ||||
| 		}), | ||||
| 	) | ||||
| 	assertNoErr(t, err) | ||||
| 	require.NoError(t, err) | ||||
|  | ||||
| 	headscale, err := scenario.Headscale() | ||||
| 	assertNoErr(t, err) | ||||
| 	require.NoError(t, err) | ||||
|  | ||||
| 	p := policy.ACLPolicy{ | ||||
| 		ACLs: []policy.ACL{ | ||||
| @@ -1637,7 +1644,7 @@ func TestPolicyCommand(t *testing.T) { | ||||
| 	policyFilePath := "/etc/headscale/policy.json" | ||||
|  | ||||
| 	err = headscale.WriteFile(policyFilePath, pBytes) | ||||
| 	assertNoErr(t, err) | ||||
| 	require.NoError(t, err) | ||||
|  | ||||
| 	// No policy is present at this time. | ||||
| 	// Add a new policy from a file. | ||||
| @@ -1651,7 +1658,7 @@ func TestPolicyCommand(t *testing.T) { | ||||
| 		}, | ||||
| 	) | ||||
|  | ||||
| 	assertNoErr(t, err) | ||||
| 	require.NoError(t, err) | ||||
|  | ||||
| 	// Get the current policy and check | ||||
| 	// if it is the same as the one we set. | ||||
| @@ -1667,11 +1674,11 @@ func TestPolicyCommand(t *testing.T) { | ||||
| 		}, | ||||
| 		&output, | ||||
| 	) | ||||
| 	assertNoErr(t, err) | ||||
| 	require.NoError(t, err) | ||||
|  | ||||
| 	assert.Len(t, output.TagOwners, 1) | ||||
| 	assert.Len(t, output.ACLs, 1) | ||||
| 	assert.Equal(t, output.TagOwners["tag:exists"], []string{"policy-user"}) | ||||
| 	assert.Equal(t, []string{"policy-user"}, output.TagOwners["tag:exists"]) | ||||
| } | ||||
|  | ||||
| func TestPolicyBrokenConfigCommand(t *testing.T) { | ||||
| @@ -1679,7 +1686,7 @@ func TestPolicyBrokenConfigCommand(t *testing.T) { | ||||
| 	t.Parallel() | ||||
|  | ||||
| 	scenario, err := NewScenario(dockertestMaxWait()) | ||||
| 	assertNoErr(t, err) | ||||
| 	require.NoError(t, err) | ||||
| 	defer scenario.ShutdownAssertNoPanics(t) | ||||
|  | ||||
| 	spec := map[string]int{ | ||||
| @@ -1694,10 +1701,10 @@ func TestPolicyBrokenConfigCommand(t *testing.T) { | ||||
| 			"HEADSCALE_POLICY_MODE": "database", | ||||
| 		}), | ||||
| 	) | ||||
| 	assertNoErr(t, err) | ||||
| 	require.NoError(t, err) | ||||
|  | ||||
| 	headscale, err := scenario.Headscale() | ||||
| 	assertNoErr(t, err) | ||||
| 	require.NoError(t, err) | ||||
|  | ||||
| 	p := policy.ACLPolicy{ | ||||
| 		ACLs: []policy.ACL{ | ||||
| @@ -1719,7 +1726,7 @@ func TestPolicyBrokenConfigCommand(t *testing.T) { | ||||
| 	policyFilePath := "/etc/headscale/policy.json" | ||||
|  | ||||
| 	err = headscale.WriteFile(policyFilePath, pBytes) | ||||
| 	assertNoErr(t, err) | ||||
| 	require.NoError(t, err) | ||||
|  | ||||
| 	// No policy is present at this time. | ||||
| 	// Add a new policy from a file. | ||||
| @@ -1732,7 +1739,7 @@ func TestPolicyBrokenConfigCommand(t *testing.T) { | ||||
| 			policyFilePath, | ||||
| 		}, | ||||
| 	) | ||||
| 	assert.ErrorContains(t, err, "verifying policy rules: invalid action") | ||||
| 	require.ErrorContains(t, err, "verifying policy rules: invalid action") | ||||
|  | ||||
| 	// The new policy was invalid, the old one should still be in place, which | ||||
| 	// is none. | ||||
| @@ -1745,5 +1752,5 @@ func TestPolicyBrokenConfigCommand(t *testing.T) { | ||||
| 			"json", | ||||
| 		}, | ||||
| 	) | ||||
| 	assert.ErrorContains(t, err, "acl policy not found") | ||||
| 	require.ErrorContains(t, err, "acl policy not found") | ||||
| } | ||||
|   | ||||
		Reference in New Issue
	
	Block a user