2023-01-27 13:37:20 -08:00
|
|
|
// Copyright (c) Tailscale Inc & AUTHORS
|
|
|
|
// SPDX-License-Identifier: BSD-3-Clause
|
2022-12-01 14:39:03 -08:00
|
|
|
|
2025-04-16 16:32:10 -05:00
|
|
|
package ipnserver_test
|
2022-12-01 14:39:03 -08:00
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
2025-01-13 17:37:29 -06:00
|
|
|
"runtime"
|
2025-01-13 18:20:09 -06:00
|
|
|
"strconv"
|
2022-12-01 14:39:03 -08:00
|
|
|
"sync"
|
|
|
|
"testing"
|
2025-01-13 17:37:29 -06:00
|
|
|
|
2025-02-05 10:53:06 -08:00
|
|
|
"tailscale.com/client/local"
|
2025-01-13 17:37:29 -06:00
|
|
|
"tailscale.com/envknob"
|
|
|
|
"tailscale.com/ipn"
|
2025-04-16 16:32:10 -05:00
|
|
|
"tailscale.com/ipn/lapitest"
|
2025-01-13 17:37:29 -06:00
|
|
|
"tailscale.com/types/ptr"
|
2022-12-01 14:39:03 -08:00
|
|
|
)
|
|
|
|
|
2025-01-13 17:37:29 -06:00
|
|
|
func TestUserConnectDisconnectNonWindows(t *testing.T) {
|
|
|
|
enableLogging := false
|
|
|
|
if runtime.GOOS == "windows" {
|
|
|
|
setGOOSForTest(t, "linux")
|
|
|
|
}
|
|
|
|
|
|
|
|
ctx := context.Background()
|
2025-04-16 16:32:10 -05:00
|
|
|
server := lapitest.NewServer(t, lapitest.WithLogging(enableLogging))
|
2025-01-13 17:37:29 -06:00
|
|
|
|
|
|
|
// UserA connects and starts watching the IPN bus.
|
2025-04-16 16:32:10 -05:00
|
|
|
clientA := server.ClientWithName("UserA")
|
2025-01-13 17:37:29 -06:00
|
|
|
watcherA, _ := clientA.WatchIPNBus(ctx, 0)
|
|
|
|
|
|
|
|
// The concept of "current user" is only relevant on Windows
|
|
|
|
// and it should not be set on non-Windows platforms.
|
2025-04-16 16:32:10 -05:00
|
|
|
server.CheckCurrentUser(nil)
|
2025-01-13 17:37:29 -06:00
|
|
|
|
|
|
|
// Additionally, a different user should be able to connect and use the LocalAPI.
|
2025-04-16 16:32:10 -05:00
|
|
|
clientB := server.ClientWithName("UserB")
|
2025-01-13 17:37:29 -06:00
|
|
|
if _, gotErr := clientB.Status(ctx); gotErr != nil {
|
2025-04-16 16:32:10 -05:00
|
|
|
t.Fatalf("Status(%q): want nil; got %v", clientB.Username(), gotErr)
|
2025-01-13 17:37:29 -06:00
|
|
|
}
|
|
|
|
|
|
|
|
// Watching the IPN bus should also work for UserB.
|
|
|
|
watcherB, _ := clientB.WatchIPNBus(ctx, 0)
|
|
|
|
|
|
|
|
// And if we send a notification, both users should receive it.
|
|
|
|
wantErrMessage := "test error"
|
|
|
|
testNotify := ipn.Notify{ErrMessage: ptr.To(wantErrMessage)}
|
2025-04-16 16:32:10 -05:00
|
|
|
server.Backend().DebugNotify(testNotify)
|
2025-01-13 17:37:29 -06:00
|
|
|
|
|
|
|
if n, err := watcherA.Next(); err != nil {
|
2025-04-16 16:32:10 -05:00
|
|
|
t.Fatalf("IPNBusWatcher.Next(%q): %v", clientA.Username(), err)
|
2025-01-13 17:37:29 -06:00
|
|
|
} else if gotErrMessage := n.ErrMessage; gotErrMessage == nil || *gotErrMessage != wantErrMessage {
|
2025-04-16 16:32:10 -05:00
|
|
|
t.Fatalf("IPNBusWatcher.Next(%q): want %v; got %v", clientA.Username(), wantErrMessage, gotErrMessage)
|
2025-01-13 17:37:29 -06:00
|
|
|
}
|
|
|
|
|
|
|
|
if n, err := watcherB.Next(); err != nil {
|
2025-04-16 16:32:10 -05:00
|
|
|
t.Fatalf("IPNBusWatcher.Next(%q): %v", clientB.Username(), err)
|
2025-01-13 17:37:29 -06:00
|
|
|
} else if gotErrMessage := n.ErrMessage; gotErrMessage == nil || *gotErrMessage != wantErrMessage {
|
2025-04-16 16:32:10 -05:00
|
|
|
t.Fatalf("IPNBusWatcher.Next(%q): want %v; got %v", clientB.Username(), wantErrMessage, gotErrMessage)
|
2025-01-13 17:37:29 -06:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestUserConnectDisconnectOnWindows(t *testing.T) {
|
|
|
|
enableLogging := false
|
|
|
|
setGOOSForTest(t, "windows")
|
|
|
|
|
|
|
|
ctx := context.Background()
|
2025-04-16 16:32:10 -05:00
|
|
|
server := lapitest.NewServer(t, lapitest.WithLogging(enableLogging))
|
2025-01-13 17:37:29 -06:00
|
|
|
|
2025-04-16 16:32:10 -05:00
|
|
|
client := server.ClientWithName("User")
|
2025-01-13 17:37:29 -06:00
|
|
|
_, cancelWatcher := client.WatchIPNBus(ctx, 0)
|
|
|
|
|
|
|
|
// On Windows, however, the current user should be set to the user that connected.
|
2025-04-16 16:32:10 -05:00
|
|
|
server.CheckCurrentUser(client.Actor)
|
2025-01-13 17:37:29 -06:00
|
|
|
|
|
|
|
// Cancel the IPN bus watcher request and wait for the server to unblock.
|
|
|
|
cancelWatcher()
|
2025-04-16 16:32:10 -05:00
|
|
|
server.BlockWhileInUse(ctx)
|
2025-01-13 17:37:29 -06:00
|
|
|
|
|
|
|
// The current user should not be set after a disconnect, as no one is
|
|
|
|
// currently using the server.
|
2025-04-16 16:32:10 -05:00
|
|
|
server.CheckCurrentUser(nil)
|
2025-01-13 17:37:29 -06:00
|
|
|
}
|
|
|
|
|
|
|
|
func TestIPNAlreadyInUseOnWindows(t *testing.T) {
|
|
|
|
enableLogging := false
|
|
|
|
setGOOSForTest(t, "windows")
|
|
|
|
|
|
|
|
ctx := context.Background()
|
2025-04-16 16:32:10 -05:00
|
|
|
server := lapitest.NewServer(t, lapitest.WithLogging(enableLogging))
|
2025-01-13 17:37:29 -06:00
|
|
|
|
|
|
|
// UserA connects and starts watching the IPN bus.
|
2025-04-16 16:32:10 -05:00
|
|
|
clientA := server.ClientWithName("UserA")
|
2025-01-13 17:37:29 -06:00
|
|
|
clientA.WatchIPNBus(ctx, 0)
|
|
|
|
|
|
|
|
// While UserA is connected, UserB should not be able to connect.
|
2025-04-16 16:32:10 -05:00
|
|
|
clientB := server.ClientWithName("UserB")
|
2025-01-13 17:37:29 -06:00
|
|
|
if _, gotErr := clientB.Status(ctx); gotErr == nil {
|
2025-04-16 16:32:10 -05:00
|
|
|
t.Fatalf("Status(%q): want error; got nil", clientB.Username())
|
2025-01-13 17:37:29 -06:00
|
|
|
} else if wantError := "401 Unauthorized: Tailscale already in use by UserA"; gotErr.Error() != wantError {
|
2025-04-16 16:32:10 -05:00
|
|
|
t.Fatalf("Status(%q): want %q; got %q", clientB.Username(), wantError, gotErr.Error())
|
2025-01-13 17:37:29 -06:00
|
|
|
}
|
|
|
|
|
|
|
|
// Current user should still be UserA.
|
2025-04-16 16:32:10 -05:00
|
|
|
server.CheckCurrentUser(clientA.Actor)
|
2025-01-13 17:37:29 -06:00
|
|
|
}
|
|
|
|
|
ipn/{ipnlocal,ipnserver}: remove redundant (*LocalBackend).ResetForClientDisconnect
In this commit, we add a failing test to verify that ipn/ipnserver.Server correctly
sets and unsets the current user when two different users connect sequentially
(A connects, A disconnects, B connects, B disconnects).
We then fix the test by updating (*ipn/ipnserver.Server).addActiveHTTPRequest
to avoid calling (*LocalBackend).ResetForClientDisconnect again after a new user
has connected and been set as the current user with (*LocalBackend).SetCurrentUser().
Since ipn/ipnserver.Server does not allow simultaneous connections from different
Windows users and relies on the LocalBackend's current user, and since we already
reset the LocalBackend's state by calling ResetForClientDisconnect when the last
active request completes (indicating the server is idle and can accept connections
from any Windows user), it is unnecessary to track the last connected user on the
ipnserver.Server side or call ResetForClientDisconnect again when the user changes.
Additionally, the second call to ResetForClientDisconnect occurs after the new user
has been set as the current user, resetting the correct state for the new user
instead of the old state of the now-disconnected user, causing issues.
Updates tailscale/corp#25804
Signed-off-by: Nick Khyl <nickk@tailscale.com>
2025-01-13 17:42:12 -06:00
|
|
|
func TestSequentialOSUserSwitchingOnWindows(t *testing.T) {
|
|
|
|
enableLogging := false
|
|
|
|
setGOOSForTest(t, "windows")
|
|
|
|
|
|
|
|
ctx := context.Background()
|
2025-04-16 16:32:10 -05:00
|
|
|
server := lapitest.NewServer(t, lapitest.WithLogging(enableLogging))
|
ipn/{ipnlocal,ipnserver}: remove redundant (*LocalBackend).ResetForClientDisconnect
In this commit, we add a failing test to verify that ipn/ipnserver.Server correctly
sets and unsets the current user when two different users connect sequentially
(A connects, A disconnects, B connects, B disconnects).
We then fix the test by updating (*ipn/ipnserver.Server).addActiveHTTPRequest
to avoid calling (*LocalBackend).ResetForClientDisconnect again after a new user
has connected and been set as the current user with (*LocalBackend).SetCurrentUser().
Since ipn/ipnserver.Server does not allow simultaneous connections from different
Windows users and relies on the LocalBackend's current user, and since we already
reset the LocalBackend's state by calling ResetForClientDisconnect when the last
active request completes (indicating the server is idle and can accept connections
from any Windows user), it is unnecessary to track the last connected user on the
ipnserver.Server side or call ResetForClientDisconnect again when the user changes.
Additionally, the second call to ResetForClientDisconnect occurs after the new user
has been set as the current user, resetting the correct state for the new user
instead of the old state of the now-disconnected user, causing issues.
Updates tailscale/corp#25804
Signed-off-by: Nick Khyl <nickk@tailscale.com>
2025-01-13 17:42:12 -06:00
|
|
|
|
|
|
|
connectDisconnectAsUser := func(name string) {
|
|
|
|
// User connects and starts watching the IPN bus.
|
2025-04-16 16:32:10 -05:00
|
|
|
client := server.ClientWithName(name)
|
ipn/{ipnlocal,ipnserver}: remove redundant (*LocalBackend).ResetForClientDisconnect
In this commit, we add a failing test to verify that ipn/ipnserver.Server correctly
sets and unsets the current user when two different users connect sequentially
(A connects, A disconnects, B connects, B disconnects).
We then fix the test by updating (*ipn/ipnserver.Server).addActiveHTTPRequest
to avoid calling (*LocalBackend).ResetForClientDisconnect again after a new user
has connected and been set as the current user with (*LocalBackend).SetCurrentUser().
Since ipn/ipnserver.Server does not allow simultaneous connections from different
Windows users and relies on the LocalBackend's current user, and since we already
reset the LocalBackend's state by calling ResetForClientDisconnect when the last
active request completes (indicating the server is idle and can accept connections
from any Windows user), it is unnecessary to track the last connected user on the
ipnserver.Server side or call ResetForClientDisconnect again when the user changes.
Additionally, the second call to ResetForClientDisconnect occurs after the new user
has been set as the current user, resetting the correct state for the new user
instead of the old state of the now-disconnected user, causing issues.
Updates tailscale/corp#25804
Signed-off-by: Nick Khyl <nickk@tailscale.com>
2025-01-13 17:42:12 -06:00
|
|
|
watcher, cancelWatcher := client.WatchIPNBus(ctx, 0)
|
|
|
|
defer cancelWatcher()
|
|
|
|
go pumpIPNBus(watcher)
|
|
|
|
|
|
|
|
// It should be the current user from the LocalBackend's perspective...
|
2025-04-16 16:32:10 -05:00
|
|
|
server.CheckCurrentUser(client.Actor)
|
ipn/{ipnlocal,ipnserver}: remove redundant (*LocalBackend).ResetForClientDisconnect
In this commit, we add a failing test to verify that ipn/ipnserver.Server correctly
sets and unsets the current user when two different users connect sequentially
(A connects, A disconnects, B connects, B disconnects).
We then fix the test by updating (*ipn/ipnserver.Server).addActiveHTTPRequest
to avoid calling (*LocalBackend).ResetForClientDisconnect again after a new user
has connected and been set as the current user with (*LocalBackend).SetCurrentUser().
Since ipn/ipnserver.Server does not allow simultaneous connections from different
Windows users and relies on the LocalBackend's current user, and since we already
reset the LocalBackend's state by calling ResetForClientDisconnect when the last
active request completes (indicating the server is idle and can accept connections
from any Windows user), it is unnecessary to track the last connected user on the
ipnserver.Server side or call ResetForClientDisconnect again when the user changes.
Additionally, the second call to ResetForClientDisconnect occurs after the new user
has been set as the current user, resetting the correct state for the new user
instead of the old state of the now-disconnected user, causing issues.
Updates tailscale/corp#25804
Signed-off-by: Nick Khyl <nickk@tailscale.com>
2025-01-13 17:42:12 -06:00
|
|
|
// until it disconnects.
|
|
|
|
cancelWatcher()
|
2025-04-16 16:32:10 -05:00
|
|
|
server.BlockWhileInUse(ctx)
|
ipn/{ipnlocal,ipnserver}: remove redundant (*LocalBackend).ResetForClientDisconnect
In this commit, we add a failing test to verify that ipn/ipnserver.Server correctly
sets and unsets the current user when two different users connect sequentially
(A connects, A disconnects, B connects, B disconnects).
We then fix the test by updating (*ipn/ipnserver.Server).addActiveHTTPRequest
to avoid calling (*LocalBackend).ResetForClientDisconnect again after a new user
has connected and been set as the current user with (*LocalBackend).SetCurrentUser().
Since ipn/ipnserver.Server does not allow simultaneous connections from different
Windows users and relies on the LocalBackend's current user, and since we already
reset the LocalBackend's state by calling ResetForClientDisconnect when the last
active request completes (indicating the server is idle and can accept connections
from any Windows user), it is unnecessary to track the last connected user on the
ipnserver.Server side or call ResetForClientDisconnect again when the user changes.
Additionally, the second call to ResetForClientDisconnect occurs after the new user
has been set as the current user, resetting the correct state for the new user
instead of the old state of the now-disconnected user, causing issues.
Updates tailscale/corp#25804
Signed-off-by: Nick Khyl <nickk@tailscale.com>
2025-01-13 17:42:12 -06:00
|
|
|
// Now, the current user should be unset.
|
2025-04-16 16:32:10 -05:00
|
|
|
server.CheckCurrentUser(nil)
|
ipn/{ipnlocal,ipnserver}: remove redundant (*LocalBackend).ResetForClientDisconnect
In this commit, we add a failing test to verify that ipn/ipnserver.Server correctly
sets and unsets the current user when two different users connect sequentially
(A connects, A disconnects, B connects, B disconnects).
We then fix the test by updating (*ipn/ipnserver.Server).addActiveHTTPRequest
to avoid calling (*LocalBackend).ResetForClientDisconnect again after a new user
has connected and been set as the current user with (*LocalBackend).SetCurrentUser().
Since ipn/ipnserver.Server does not allow simultaneous connections from different
Windows users and relies on the LocalBackend's current user, and since we already
reset the LocalBackend's state by calling ResetForClientDisconnect when the last
active request completes (indicating the server is idle and can accept connections
from any Windows user), it is unnecessary to track the last connected user on the
ipnserver.Server side or call ResetForClientDisconnect again when the user changes.
Additionally, the second call to ResetForClientDisconnect occurs after the new user
has been set as the current user, resetting the correct state for the new user
instead of the old state of the now-disconnected user, causing issues.
Updates tailscale/corp#25804
Signed-off-by: Nick Khyl <nickk@tailscale.com>
2025-01-13 17:42:12 -06:00
|
|
|
}
|
|
|
|
|
|
|
|
// UserA logs in, uses Tailscale for a bit, then logs out.
|
|
|
|
connectDisconnectAsUser("UserA")
|
|
|
|
// Same for UserB.
|
|
|
|
connectDisconnectAsUser("UserB")
|
|
|
|
}
|
|
|
|
|
2025-01-13 18:20:09 -06:00
|
|
|
func TestConcurrentOSUserSwitchingOnWindows(t *testing.T) {
|
|
|
|
enableLogging := false
|
|
|
|
setGOOSForTest(t, "windows")
|
|
|
|
|
|
|
|
ctx := context.Background()
|
2025-04-16 16:32:10 -05:00
|
|
|
server := lapitest.NewServer(t, lapitest.WithLogging(enableLogging))
|
2025-01-13 18:20:09 -06:00
|
|
|
|
|
|
|
connectDisconnectAsUser := func(name string) {
|
|
|
|
// User connects and starts watching the IPN bus.
|
2025-04-16 16:32:10 -05:00
|
|
|
client := server.ClientWithName(name)
|
2025-01-13 18:20:09 -06:00
|
|
|
watcher, cancelWatcher := client.WatchIPNBus(ctx, ipn.NotifyInitialState)
|
|
|
|
defer cancelWatcher()
|
|
|
|
|
|
|
|
runtime.Gosched()
|
|
|
|
|
|
|
|
// Get the current user from the LocalBackend's perspective
|
|
|
|
// as soon as we're connected.
|
2025-04-16 16:32:10 -05:00
|
|
|
gotUID, gotActor := server.Backend().CurrentUserForTest()
|
2025-01-13 18:20:09 -06:00
|
|
|
|
|
|
|
// Wait for the first notification to arrive.
|
|
|
|
// It will either be the initial state we've requested via [ipn.NotifyInitialState],
|
|
|
|
// returned by an actual handler, or a "fake" notification sent by the server
|
|
|
|
// itself to indicate that it is being used by someone else.
|
|
|
|
n, err := watcher.Next()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// If our user lost the race and the IPN is in use by another user,
|
|
|
|
// we should just return. For the sake of this test, we're not
|
|
|
|
// interested in waiting for the server to become idle.
|
|
|
|
if n.State != nil && *n.State == ipn.InUseOtherUser {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// Otherwise, our user should have been the current user since the time we connected.
|
2025-04-16 16:32:10 -05:00
|
|
|
if gotUID != client.Actor.UserID() {
|
|
|
|
t.Errorf("CurrentUser(Initial): got UID %q; want %q", gotUID, client.Actor.UserID())
|
2025-01-13 18:20:09 -06:00
|
|
|
return
|
|
|
|
}
|
2025-04-16 16:32:10 -05:00
|
|
|
if hasActor := gotActor != nil; !hasActor || gotActor != client.Actor {
|
|
|
|
t.Errorf("CurrentUser(Initial): got %v; want %v", gotActor, client.Actor)
|
2025-01-13 18:20:09 -06:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// And should still be the current user (as they're still connected)...
|
2025-04-16 16:32:10 -05:00
|
|
|
server.CheckCurrentUser(client.Actor)
|
2025-01-13 18:20:09 -06:00
|
|
|
}
|
|
|
|
|
|
|
|
numIterations := 10
|
|
|
|
for range numIterations {
|
|
|
|
numGoRoutines := 100
|
|
|
|
var wg sync.WaitGroup
|
|
|
|
wg.Add(numGoRoutines)
|
|
|
|
for i := range numGoRoutines {
|
|
|
|
// User logs in, uses Tailscale for a bit, then logs out
|
|
|
|
// in parallel with other users doing the same.
|
|
|
|
go func() {
|
|
|
|
defer wg.Done()
|
|
|
|
connectDisconnectAsUser("User-" + strconv.Itoa(i))
|
|
|
|
}()
|
|
|
|
}
|
|
|
|
wg.Wait()
|
2025-01-15 14:22:14 -06:00
|
|
|
|
2025-04-16 16:32:10 -05:00
|
|
|
if err := server.BlockWhileInUse(ctx); err != nil {
|
|
|
|
t.Fatalf("BlockUntilIdle: %v", err)
|
2025-01-15 14:22:14 -06:00
|
|
|
}
|
|
|
|
|
2025-04-16 16:32:10 -05:00
|
|
|
server.CheckCurrentUser(nil)
|
2025-01-13 18:20:09 -06:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2025-01-15 16:03:21 -06:00
|
|
|
func TestBlockWhileIdentityInUse(t *testing.T) {
|
|
|
|
enableLogging := false
|
|
|
|
setGOOSForTest(t, "windows")
|
|
|
|
|
|
|
|
ctx := context.Background()
|
2025-04-16 16:32:10 -05:00
|
|
|
server := lapitest.NewServer(t, lapitest.WithLogging(enableLogging))
|
2025-01-15 16:03:21 -06:00
|
|
|
|
|
|
|
// connectWaitDisconnectAsUser connects as a user with the specified name
|
|
|
|
// and keeps the IPN bus watcher alive until the context is canceled.
|
|
|
|
// It returns a channel that is closed when done.
|
|
|
|
connectWaitDisconnectAsUser := func(ctx context.Context, name string) <-chan struct{} {
|
2025-04-16 16:32:10 -05:00
|
|
|
client := server.ClientWithName(name)
|
2025-01-15 16:03:21 -06:00
|
|
|
watcher, cancelWatcher := client.WatchIPNBus(ctx, 0)
|
|
|
|
|
|
|
|
done := make(chan struct{})
|
|
|
|
go func() {
|
|
|
|
defer cancelWatcher()
|
|
|
|
defer close(done)
|
|
|
|
for {
|
|
|
|
_, err := watcher.Next()
|
|
|
|
if err != nil {
|
|
|
|
// There's either an error or the request has been canceled.
|
|
|
|
break
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}()
|
|
|
|
return done
|
|
|
|
}
|
|
|
|
|
|
|
|
for range 100 {
|
|
|
|
// Connect as UserA, and keep the connection alive
|
|
|
|
// until disconnectUserA is called.
|
|
|
|
userAContext, disconnectUserA := context.WithCancel(ctx)
|
|
|
|
userADone := connectWaitDisconnectAsUser(userAContext, "UserA")
|
|
|
|
disconnectUserA()
|
|
|
|
// Check if userB can connect. Calling it directly increases
|
|
|
|
// the likelihood of triggering a deadlock due to a race condition
|
|
|
|
// in blockWhileIdentityInUse. But the issue also occurs during
|
|
|
|
// the normal execution path when UserB connects to the IPN server
|
|
|
|
// while UserA is disconnecting.
|
2025-04-16 16:32:10 -05:00
|
|
|
userB := server.MakeTestActor("UserB", "ClientB")
|
|
|
|
server.BlockWhileInUseByOther(ctx, userB)
|
2025-01-15 16:03:21 -06:00
|
|
|
<-userADone
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2025-01-13 17:37:29 -06:00
|
|
|
func setGOOSForTest(tb testing.TB, goos string) {
|
|
|
|
tb.Helper()
|
|
|
|
envknob.Setenv("TS_DEBUG_FAKE_GOOS", goos)
|
|
|
|
tb.Cleanup(func() { envknob.Setenv("TS_DEBUG_FAKE_GOOS", "") })
|
|
|
|
}
|
|
|
|
|
2025-04-16 16:32:10 -05:00
|
|
|
func pumpIPNBus(watcher *local.IPNBusWatcher) {
|
2025-01-13 17:37:29 -06:00
|
|
|
for {
|
|
|
|
_, err := watcher.Next()
|
|
|
|
if err != nil {
|
|
|
|
break
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|