validate policy against nodes, error if not valid (#2089)
* validate policy against nodes, error if not valid this commit aims to improve the feedback of "runtime" policy errors which would only manifest when the rules are compiled to filter rules with nodes. this change will in; file-based mode load the nodes from the db and try to compile the rules on start up and return an error if they would not work as intended. database-based mode prevent a new ACL being written to the database if it does not compile with the current set of node. Fixes #2073 Fixes #2044 Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com> * ensure stderr can be used in err checks Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com> * test policy set validation Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com> * add new integration test to ghaction Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com> * add back defer for cli tst Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com> --------- Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com>
This commit is contained in:
parent
fffd9d7ee9
commit
2b5e52b08b
6 changed files with 129 additions and 5 deletions
|
@ -551,7 +551,7 @@ func (t *HeadscaleInContainer) Execute(
|
|||
log.Printf("command stdout: %s\n", stdout)
|
||||
}
|
||||
|
||||
return "", err
|
||||
return stdout, fmt.Errorf("executing command in docker: %w, stderr: %s", err, stderr)
|
||||
}
|
||||
|
||||
return stdout, nil
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue