dns_example_test.go 2.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101
  1. // Copyright (c) Tailscale Inc & AUTHORS
  2. // SPDX-License-Identifier: BSD-3-Clause
  3. package prober_test
  4. import (
  5. "context"
  6. "flag"
  7. "fmt"
  8. "log"
  9. "net"
  10. "net/netip"
  11. "os"
  12. "os/signal"
  13. "time"
  14. "tailscale.com/prober"
  15. "tailscale.com/types/logger"
  16. )
  17. const (
  18. every30s = 30 * time.Second
  19. )
  20. var (
  21. hostname = flag.String("hostname", "tailscale.com", "hostname to probe")
  22. oneshot = flag.Bool("oneshot", true, "run probes once and exit")
  23. verbose = flag.Bool("verbose", false, "enable verbose logging")
  24. )
  25. // This example demonstrates how to use ForEachAddr to create a TLS probe for
  26. // each IP address in the DNS record of a given hostname.
  27. func ExampleForEachAddr() {
  28. flag.Parse()
  29. p := prober.New().WithSpread(true)
  30. if *oneshot {
  31. p = p.WithOnce(true)
  32. }
  33. // This function is called every time we discover a new IP address to check.
  34. makeTLSProbe := func(addr netip.Addr) []*prober.Probe {
  35. pf := prober.TLSWithIP(*hostname, netip.AddrPortFrom(addr, 443))
  36. if *verbose {
  37. logger := logger.WithPrefix(log.Printf, fmt.Sprintf("[tls %s]: ", addr))
  38. pf = probeLogWrapper(logger, pf)
  39. }
  40. probe := p.Run(fmt.Sprintf("website/%s/tls", addr), every30s, nil, pf)
  41. return []*prober.Probe{probe}
  42. }
  43. // Determine whether to use IPv4 or IPv6 based on whether we can create
  44. // an IPv6 listening socket on localhost.
  45. sock, err := net.Listen("tcp", "[::1]:0")
  46. supportsIPv6 := err == nil
  47. if sock != nil {
  48. sock.Close()
  49. }
  50. networks := []string{"ip4"}
  51. if supportsIPv6 {
  52. networks = append(networks, "ip6")
  53. }
  54. var vlogf logger.Logf = logger.Discard
  55. if *verbose {
  56. vlogf = log.Printf
  57. }
  58. // This is the outer probe that resolves the hostname and creates a new
  59. // TLS probe for each IP.
  60. p.Run("website/dns", every30s, nil, prober.ForEachAddr(*hostname, makeTLSProbe, prober.ForEachAddrOpts{
  61. Logf: vlogf,
  62. Networks: networks,
  63. }))
  64. defer log.Printf("done")
  65. // Wait until all probes have run if we're running in oneshot mode.
  66. if *oneshot {
  67. p.Wait()
  68. return
  69. }
  70. // Otherwise, wait until we get a signal.
  71. sigCh := make(chan os.Signal, 1)
  72. signal.Notify(sigCh, os.Interrupt)
  73. <-sigCh
  74. }
  75. func probeLogWrapper(logf logger.Logf, pc prober.ProbeClass) prober.ProbeClass {
  76. return prober.ProbeClass{
  77. Probe: func(ctx context.Context) error {
  78. logf("starting probe")
  79. err := pc.Probe(ctx)
  80. logf("probe finished with %v", err)
  81. return err
  82. },
  83. }
  84. }