From 277902629dc07d8a7a9d1bbe25dea4e5d5d95583 Mon Sep 17 00:00:00 2001 From: Samuel Allan Date: Thu, 12 Dec 2024 17:03:18 +1030 Subject: [PATCH] continue testing and adding notes --- docs/manual-testing-playbook.md | 100 ++++++++++++++++++++++++++++++-- 1 file changed, 95 insertions(+), 5 deletions(-) diff --git a/docs/manual-testing-playbook.md b/docs/manual-testing-playbook.md index c5c82f8..5e66c0a 100644 --- a/docs/manual-testing-playbook.md +++ b/docs/manual-testing-playbook.md @@ -63,7 +63,7 @@ for vm in $TAILSCALE_VM_1 $TAILSCALE_VM_2; do done ``` -## Test smaller functionality +## Test functionality not affected by confinement None of these are affected by snap confinement, and should work as officially documented. @@ -124,11 +124,10 @@ Expect a long string starting with "BUG-" (printed as an identifier to use in bu lxc exec $TAILSCALE_VM_1 -- tailscale bugreport ``` -Test bash completion. +### Bash completion ```bash -vm="$TAILSCALE_VM_2" -lxc exec $vm -- bash +lxc exec $TAILSCALE_VM_1 -- bash # In the vm: @@ -140,4 +139,95 @@ lxc exec $vm -- bash # Type `tailscale ` and press tab twice. Verify that you see tailscales-specific completion ``` -... +TODO +working - not necessarily tested with all flags though: +- tailscale up +- tailscale down +- tailscale login +- tailscale logout +- tailscale web +- tailscale ping +- tailscale nc (see section below for how tested) +- tailscale set +- tailscale serve +- tailscale funnel (it didn't work on "the internet" - I could still only resolve the domain in the tailnet, but nothing from the snap should be causing that) +- tailscale cert (if writing to files in a writable snap data dir +- tailscale dns status + + +## Functionality affected by strict confinement + +This functionality works to some extend, +but comes with some limitations due to strict confinement. + +### Tailscale file copying + +For copying a file from one tailscale machine to another. +This does work, but only for file and directory locations accessible by the snap. +For the tailscale snap, these paths will be: + +- `SNAP_USER_COMMON`: `$HOME/snap/tailscale/common` +- `SNAP_USER_DATA`: `$HOME/snap/tailscale/x$N` +- `SNAP_COMMON`: `/var/snap/tailscale/common` (only writable if running tailscale as root) +- `SNAP_DATA`: `/var/snap/tailscale/x$N` (only writable if running tailscale as root) + +See https://ubuntu.com/robotics/docs/snap-data-and-file-storage for more information on the file paths. + +To test a successful case of file copying between hosts: + +```bash +lxc exec $TAILSCALE_VM_1 -- sh -c "echo hello | tee snap/tailscale/common/greeting.txt" +lxc exec $TAILSCALE_VM_1 -- tailscale file cp snap/tailscale/common/greeting.txt $TAILSCALE_VM_2: + +lxc exec $TAILSCALE_VM_2 -- tailscale file get -conflict overwrite snap/tailscale/common/ +lxc exec $TAILSCALE_VM_2 -- cat snap/tailscale/common/greeting.txt # expect "hello" output +``` + +To test a failure case - attempting to copy a file from a directory not readable by the Tailscale snap: + +```bash +lxc exec $TAILSCALE_VM_1 -- sh -c "echo 'file in home dir' | tee home.txt" +lxc exec $TAILSCALE_VM_1 -- tailscale file cp home.txt $TAILSCALE_VM_2: +``` + +The result should be `open home.txt: permission denied`. + +### Tailscale drive + +For sharing a directory over webdav. + +TODO - this is WIP +```bash +lxc exec $TAILSCALE_VM_1 -- bash +tailscale drive {list,rename,unshare} +``` +sharing a drive does not work (although the commands appear to succeed). +See: +https://github.com/tailscale/tailscale/blob/e3c6ca43d3e3cad27714d07b3a9ec20141c9c65c/drive/driveimpl/remote_impl.go#L336-L355 + +tailscaled in the snap is running as root, without access to su. +So the su check fails, and the check for running as non-root user also fails. +This is regardless of file paths and file permissions. + +## Functionality not working + +This functionality does not work, +due to being strictly confined. + + +TODO +does not work: +- tailscale drive share +- tailscale ssh (didn't re-test) +- tailscale dns query + + + +## Unknowns + +Untested; this playbook does not cover these cases. + +- tailscale update (it won't work, crashing with a permissions error - TODO: add an example test for this, even if we can't test it if tailscale is at the latest version) +- tailscale switch (untested - requires multiple accounts. no reason for it to not work though) +- tailscale configure kubeconfig (untested - requires k8s server. This may not work if requires file paths, etc., but the command is alpha) +- tailscale lock